全文获取类型
收费全文 | 10588篇 |
免费 | 549篇 |
国内免费 | 43篇 |
专业分类
电工技术 | 178篇 |
综合类 | 67篇 |
化学工业 | 2140篇 |
金属工艺 | 247篇 |
机械仪表 | 286篇 |
建筑科学 | 254篇 |
矿业工程 | 36篇 |
能源动力 | 378篇 |
轻工业 | 1617篇 |
水利工程 | 95篇 |
石油天然气 | 65篇 |
无线电 | 578篇 |
一般工业技术 | 1372篇 |
冶金工业 | 2748篇 |
原子能技术 | 65篇 |
自动化技术 | 1054篇 |
出版年
2024年 | 32篇 |
2023年 | 98篇 |
2022年 | 249篇 |
2021年 | 422篇 |
2020年 | 289篇 |
2019年 | 339篇 |
2018年 | 375篇 |
2017年 | 393篇 |
2016年 | 364篇 |
2015年 | 255篇 |
2014年 | 363篇 |
2013年 | 657篇 |
2012年 | 518篇 |
2011年 | 591篇 |
2010年 | 410篇 |
2009年 | 450篇 |
2008年 | 382篇 |
2007年 | 327篇 |
2006年 | 285篇 |
2005年 | 188篇 |
2004年 | 201篇 |
2003年 | 245篇 |
2002年 | 248篇 |
2001年 | 193篇 |
2000年 | 133篇 |
1999年 | 164篇 |
1998年 | 826篇 |
1997年 | 492篇 |
1996年 | 387篇 |
1995年 | 237篇 |
1994年 | 171篇 |
1993年 | 177篇 |
1992年 | 56篇 |
1991年 | 69篇 |
1990年 | 70篇 |
1989年 | 39篇 |
1988年 | 60篇 |
1987年 | 46篇 |
1986年 | 48篇 |
1985年 | 51篇 |
1984年 | 9篇 |
1982年 | 11篇 |
1981年 | 15篇 |
1980年 | 18篇 |
1979年 | 8篇 |
1978年 | 11篇 |
1977年 | 36篇 |
1976年 | 130篇 |
1975年 | 14篇 |
1974年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
101.
Digeorgia da Silva André I. Reis Renato P. Ribas 《Microelectronics Reliability》2010,50(9-11):1223-1229
In digital CMOS circuits, parametric yield improvement may be achieved by reducing the variability of performance and power consumption of individual cell instances. Such improvement of variation robustness can be attained by evaluating parameter variation impact at gate level. Statistical characterization of logic gates are usually obtained by computationally expensive electrical simulations. An efficient gate delay variability estimation method is proposed for variability-aware design. The proposed method has been applied to different topologies (transistor network arrangements) and CMOS gates, and it has been compared to Monte Carlo simulations for data validation, resulting in computation time savings. 相似文献
102.
Security is one of the major issues in MANETs. Their natural characteristics make them vulnerable to numerous severe attacks. It is widely acknowledged that cryptography provides a set of strong techniques against most vulnerabilities. Several cryptographic mechanisms for MANETs can be found in the literature. Among them, identity-based cryptographic mechanisms and key management schemes are proposed to simplify key management and to reduce the memory storage cost. This article presents the most important ID-based key management schemes, discussing their approaches, strengths, and weaknesses, and comparing their main features. It also presents the main IDbased key management application fields on MANETs. In this way it can be useful for users and researchers as a starting point on ID-based key management and its possible uses in MANETs. 相似文献
103.
Antonio Macilio Pereira de Lucena Magno Prudêncio de Almeida Filho Caio Gomes de Figueredo Diego Braga Pimentel Clauson Sales do Nascimento Rios Francisco de Assis Tavares Ferreira da Silva 《International Journal of Satellite Communications and Networking》2017,35(4):359-374
In this paper, we present the design of a fully digital binary phase shift keying demodulator for application in satellite high‐rate suppressed carrier telecommand system. The proposed system digitalizes the received signal in the intermediate frequency stage using bandpass sampling technique, and the resulting baseband signal is used to synchronization of symbol and phase and to bit detection. The design of all functional modules is presented in details. Another innovation presented in this work is the inclusion of a non‐linearity in the phase synchronizer module to permit its operation independent from the signal amplitude. Moreover, aiming the characterization and performance evaluation of the system, we do some original mathematical analyses. Finally, test results show that the demodulator complies all the project requirements, and the prototype implementation loss, in terms of bit energy to noise power density ratio, is less than 0.3 dB. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献
104.
The nonsubsampled contourlet transform: theory, design, and applications. 总被引:126,自引:0,他引:126
Arthur L da Cunha Jianping Zhou Minh N Do 《IEEE transactions on image processing》2006,15(10):3089-3101
In this paper, we develop the nonsubsampled contourlet transform (NSCT) and study its applications. The construction proposed in this paper is based on a nonsubsampled pyramid structure and nonsubsampled directional filter banks. The result is a flexible multiscale, multidirection, and shift-invariant image decomposition that can be efficiently implemented via the à trous algorithm. At the core of the proposed scheme is the nonseparable two-channel nonsubsampled filter bank (NSFB). We exploit the less stringent design condition of the NSFB to design filters that lead to a NSCT with better frequency selectivity and regularity when compared to the contourlet transform. We propose a design framework based on the mapping approach, that allows for a fast implementation based on a lifting or ladder structure, and only uses one-dimensional filtering in some cases. In addition, our design ensures that the corresponding frame elements are regular, symmetric, and the frame is close to a tight one. We assess the performance of the NSCT in image denoising and enhancement applications. In both applications the NSCT compares favorably to other existing methods in the literature. 相似文献
105.
106.
Andr Luis Meneses Silva Jos de Jesús Prez‐Alczar Sergio Takeo Kofuji 《International Journal of Communication Systems》2019,32(6)
The significant improvement in processing power, communication, energy consumption, and the size of computational devices has led to the emergence of the Internet of Things (IoT). IoT projects raise many challenges, such as the interoperability between IoT applications because of the high number of sensors, actuators, services, protocols, and data associated with these systems. Semantics solves this problem by using annotations that define the role of each IoT element and reduces the ambiguity of information exchanged between the devices. This work presents SWoTPAD, a semantic framework that helps in the development of IoT projects. The framework is designer oriented and provides a semantic language that is more user‐friendly than OWL‐S and WSML and allows the IoT designer to specify devices, services, environment, and requests. Following this, it makes use of these specifications and maps them for RESTful services. Additionally, it generates an automatic service composition engine that is able to combine services needed to handle complex user requests. We validated this approach with two case studies. The former concerns a residential security system and the latter, the cloud application deployment. The average time required for service discovery and automatic service composition corresponds to 72.9% of the service execution time in the case study 1 and 64.4% in the case study 2. 相似文献
107.
Goh H. L. Tan K. K. Huang S. de Silva C. W. 《Industrial Informatics, IEEE Transactions on》2006,2(4):221-230
There is a growing trend in developing the wireless machine-to-machine (M2M) communication for factory automation. Currently, most wireless protocols for infrastructureless mobile ad-hoc networks focus on the mobility issue and are mainly suitable for narrowband radio devices. The mechanisms for route update and discovery that work well for wireless mobile ad-hoc networks prove to be redundant and instead add to processing overheads in a static wireless factory setting. This paper presents the development and implementation of a new wireless routing protocol, Bluewave, that caters specifically to wireless communication between machines in a factory setting. Bluewave utilizes features of Bluetooth technology when performing the route setup. The merits of the proposed protocol, in terms of shorter initialization time and route setup time, are duly discussed. A case study illustrating the application of Bluewave to an online condition-based maintenance scenario is presented. Experimental results obtained are furnished to show the viability of Bluewave in industrial automation 相似文献
108.
Seiya Suzuki Takuya Iwasaki K. Kanishka H. De Silva Shigeru Suehara Kenji Watanabe Takashi Taniguchi Satoshi Moriyama Masamichi Yoshimura Takashi Aizawa Tomonobu Nakayama 《Advanced functional materials》2021,31(5):2007038
Germanene, a 2D honeycomb germanium crystal, is grown at graphene/Ag(111) and hexagonal boron nitride (h-BN)/Ag(111) interfaces by segregating germanium atoms. A simple annealing process in N2 or H2/Ar at ambient pressure leads to the formation of germanene, indicating that an ultrahigh-vacuum condition is not necessary. The grown germanene is stable in air and uniform over the entire area covered with a van der Waals (vdW) material. As an important finding, it is necessary to use a vdW material as a cap layer for the present germanene growth method since the use of an Al2O3 cap layer results in no germanene formation. The present study also proves that Raman spectroscopy in air is a powerful tool for characterizing germanene at the interfaces, which is concluded by multiple analyses including first-principles density functional theory calculations. The direct growth of h-BN-capped germanene on Ag(111), which is demonstrated in the present study, is considered to be a promising technique for the fabrication of future germanene-based electronic devices. 相似文献
109.
Felipe Silva Jardel Silveira Jarbas Silveira César Marcon Fabian Vargas Otávio LimaJr 《Journal of Electronic Testing》2018,34(4):417-433
As the microelectronics technology continuously advances to deep submicron scales, the occurrence of Multiple Cell Upset (MCU) induced by radiation in memory devices becomes more likely to happen. The implementation of a robust Error Correction Code (ECC) is a suitable solution. However, the more complex an ECC, the more delay, area usage and energy consumption. An ECC with an appropriate balance between error coverage and computational cost is essential for applications where fault tolerance is heavily needed, and the energy resources are scarce. This paper describes the conception, implementation, and evaluation of Column-Line-Code (CLC), a novel algorithm for the detection and correction of MCU in memory devices, which combines extended Hamming code and parity bits. Besides, this paper evaluates the variation of the 2D CLC schemes and proposes an additional operation to correct more MCU patterns called extended mode. We compared the implementation cost, reliability level, detection/correction rate and the mean time to failure among the CLC versions and other correction codes, proving the CLCs have high MCU correction efficacy with reduced area, power and delay costs. 相似文献
110.
Rheological properties of low-moisture part-skim Mozarella cheese were evaluated as a function of storage time, test temperature, and deformation rate by uniaxial extension in a horizontal plane. Proteolysis of Mozzarella cheese caused marked decreases in the tensile strength and the deformability modulus, but not in the fracture strain. As the temperature increased from 10 to 40C, the fracture strain increased more than five-fold. The strength and the deformability modulus decreased about 60 and 85%, respectively, as the cheese temperature increased from 10 to 30C. The fracture strain of the cheese did not exhibit a clear trend with the deformation rate in the range of 50–500 mm/min. However, its strength and deformability modulus increased with the increasing deformation rate. 相似文献