全文获取类型
收费全文 | 21276篇 |
免费 | 909篇 |
国内免费 | 149篇 |
专业分类
电工技术 | 360篇 |
综合类 | 37篇 |
化学工业 | 4731篇 |
金属工艺 | 663篇 |
机械仪表 | 690篇 |
建筑科学 | 406篇 |
矿业工程 | 48篇 |
能源动力 | 1532篇 |
轻工业 | 1235篇 |
水利工程 | 160篇 |
石油天然气 | 90篇 |
武器工业 | 1篇 |
无线电 | 2660篇 |
一般工业技术 | 4867篇 |
冶金工业 | 1631篇 |
原子能技术 | 181篇 |
自动化技术 | 3042篇 |
出版年
2024年 | 106篇 |
2023年 | 456篇 |
2022年 | 1064篇 |
2021年 | 1219篇 |
2020年 | 966篇 |
2019年 | 1006篇 |
2018年 | 1289篇 |
2017年 | 1025篇 |
2016年 | 995篇 |
2015年 | 645篇 |
2014年 | 908篇 |
2013年 | 1675篇 |
2012年 | 1000篇 |
2011年 | 1187篇 |
2010年 | 947篇 |
2009年 | 899篇 |
2008年 | 799篇 |
2007年 | 644篇 |
2006年 | 543篇 |
2005年 | 410篇 |
2004年 | 324篇 |
2003年 | 283篇 |
2002年 | 228篇 |
2001年 | 218篇 |
2000年 | 196篇 |
1999年 | 200篇 |
1998年 | 343篇 |
1997年 | 290篇 |
1996年 | 258篇 |
1995年 | 194篇 |
1994年 | 189篇 |
1993年 | 185篇 |
1992年 | 119篇 |
1991年 | 151篇 |
1990年 | 111篇 |
1989年 | 104篇 |
1988年 | 90篇 |
1987年 | 105篇 |
1986年 | 102篇 |
1985年 | 111篇 |
1984年 | 100篇 |
1983年 | 92篇 |
1982年 | 80篇 |
1981年 | 94篇 |
1980年 | 69篇 |
1979年 | 52篇 |
1978年 | 45篇 |
1977年 | 45篇 |
1976年 | 49篇 |
1975年 | 22篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
Jeena Jose Karippal H. N. Narasimha Murthy K. S. Rai M. Krishna M. Sreejith 《Journal of Materials Engineering and Performance》2010,19(8):1143-1149
This paper presents the experimental results of dispersing multiwalled carbon nanotubes (MWNTs) into epoxy (space grade structural adhesive) nanocomposites using co-rotating twin screw extrusion process. Two sets of specimens were prepared; set 1 with ultrasonication for predispersing MWNT before extrusion and set 2 direct dispersion of MWNT in the extruder. MWNT was loaded up to 8 vol.% in both the sets. The specimens were characterized for room temperature volume and surface resistivities as per ASTM D257 using Keithley Model 6517 and for thermal conductivity in the temperature range ?50 to 150 °C as per ASTM E 1530 using Thermal Conductivity Instrument (TCI) 2022 SX211. The volume resistivity of sets 1 and 2 decreased to an extent of 1011 and 109 respectively. The surface resistivity drop was of the order of 109 for both the sets. These drops corresponded to the maximum MWNT loading of 8 vol.%. Electrical conductivity values of the specimens were fitted into the Power Law Model to evaluate the critical exponent. Both sets 1 and 2 showed increase in thermal conductivity with increase in temperature in the testing range. Thermal conductivity increased with increase in filler loading and the maximum increase was 60% at 150 °C in case of 8 vol.% MWNT nanocomposites for set 1. The corresponding value for the set 2 was 25%. Thermal conductivity values were predicted using Lewis Nielson model. DSC of the specimens showed increase in glass transition temperature with increase in filler loading. The dispersion of the nanofillers was studied using SEM and the surface morphology using AFM. 相似文献
102.
When a sensor network is deployed to detect objects penetrating a protected region, it is not necessary to have every point
in the deployment region covered by a sensor. It is enough if the penetrating objects are detected at some point in their
trajectory. If a sensor network guarantees that every penetrating object will be detected by at least k distinct sensors before it crosses the barrier of wireless sensors, we say the network provides k-barrier coverage. In this paper, we develop theoretical foundations for k-barrier coverage. We propose efficient algorithms using which one can quickly determine, after deploying the sensors, whether
the deployment region is k-barrier covered. Next, we establish the optimal deployment pattern to achieve k-barrier coverage when deploying sensors deterministically. Finally, we consider barrier coverage with high probability when
sensors are deployed randomly. The major challenge, when dealing with probabilistic barrier coverage, is to derive critical
conditions using which one can compute the minimum number of sensors needed to ensure barrier coverage with high probability.
Deriving critical conditions for k-barrier coverage is, however, still an open problem. We derive critical conditions for a weaker notion of barrier coverage,
called weak k-barrier coverage. 相似文献
103.
Energy efficiency is an important issue in mobile wireless networks since the battery life of mobile terminals is limited. Conservation of battery power has been addressed using many techniques such as variable speed CPUs, flash memory, disk spindowns, and so on. We believe that energy conservation should be an important factor in the design of networking protocols for mobile wireless networks. In particular, this paper addresses energy efficiency in medium access control (MAC) protocols for wireless networks. The paper develops a framework to study the energy consumption of a MAC protocol from the transceiver usage perspective. This framework is then applied to compare the performance of a set of protocols that includes IEEE 802.11, ECMAC, PRMA, MDRTDMA, and DQRUMA*. The performance metrics considered are transmitter and receiver usage times for packet transmission and reception. The time estimates are then combined with power ratings for a Proxim RangeLAN2 radio card to obtain an estimate of the energy consumed for MAC related activities. The analysis here shows that protocols that aim to reduce the number of contentions perform better from an energy consumption perspective. The receiver usage time, however, tends to be higher for protocols that require the mobile to sense the medium before attempting transmission. The paper also provides a set of principles that could be applied when designing access protocols for wireless networks.*ECMAC: energyconserving MAC. PRMA: packet reservation multiple access. MDRTDMA: multiservices dynamic reservation TDMA. DQRUMA: distributedqueuing request update multiple access. 相似文献
104.
On the speedup required for work-conserving crossbar switches 总被引:5,自引:0,他引:5
Krishna P. Patel N.S. Charny A. Simcoe R.J. 《Selected Areas in Communications, IEEE Journal on》1999,17(6):1057-1066
This paper describes the architecture for a work-conserving server using a combined I/O-buffered crossbar switch. The switch employs a novel algorithm based on output occupancy, the lowest occupancy output first algorithm (LOOFA), and a speedup of only two. A work-conserving switch provides the same throughput performance as an output-buffered switch. The work-conserving property of the switch is independent of the switch size and input traffic pattern. We also present a suite of algorithms that can be used in combination with LOOFA. These algorithms determine the fairness and delay properties of the switch. We also describe a mechanism to provide delay bounds for real-time traffic using LOOFA. These delay bounds are achievable without requiring output-buffered switch emulation 相似文献
105.
Qian Liu Shohei Kumagai Sergei Manzhos Yingqian Chen Indunil Angunawela Masrur Morshed Nahid Krishna Feron Steven E. Bottle John Bell Harald Ade Jun Takeya Prashant Sonar 《Advanced functional materials》2020,30(34)
To achieve semiconducting materials with high electron mobility in organic field‐effect transistors (OFETs), low‐lying energy levels (the highest occupied molecular orbital (HOMO) and the lowest unoccupied molecular orbital (LUMO)) and favorable molecular packing and ordering are two crucial factors. Here, it is reported that the incorporation of pyridine and selenophene into the backbone of a diketopyrrolopyrrole (DPP)‐based copolymer produces a high‐electron‐mobility semiconductor, PDPPy‐Se. Compared with analogous polymers based on other DPP derivatives and selenophene, PDPPy‐Se features a lower LUMO that can decrease the electron transfer barrier for more effective electron injection, and simultaneously a lower HOMO that, however, can increase the hole transfer barrier to suppress the hole injection. Combined with thermal annealing at 240 °C for thin film morphology optimization to achieve large‐scale crystallite domains with tight molecular packing for effective charge transport along the conducting channel, OFET devices fabricated with PDPPy‐Se exhibit an n‐type‐dominant performance with an electron mobility (μe) as high as 2.22 cm2 V?1 s?1 and a hole/electron mobility ratio (μh/μe) of 0.26. Overall, this study demonstrates a simple yet effective approach to boost the electron mobility in organic transistors by synergistic use of pyridine and selenophene in the backbone of a DPP‐based copolymer. 相似文献
106.
In this paper TCAD-based simulation of a novel insulated shallow extension (ISE) cylindrical gate all around (CGAA) Schottky barrier (SB) MOSFET has been reported,to eliminate the suicidal ambipolar behavior (bias-dependent OFF state leakage current) of conventional SB-CGAA MOSFET by blocking the metal-induced gap states as well as unwanted charge sharing between source/channel and drain/channel regions.This novel structure offers low barrier height at the source and offers high ON-state current.The ION/IoFF of ISE-CGAA-SB-MOS-FET increases by 1177 times and offers steeper subthreshold slope (~60 mV/decade).However a little reduction in peak cut off frequency is observed and to further improve the cut-off frequency dual metal gate architecture has been employed and a comparative assessment of single metal gate,dual metal gate,single metal gate with ISE,and dual metal gate with ISE has been presented.The improved performance of Schottky barrier CGAA MOSFET by the incorporation of ISE makes it an attractive candidate for CMOS digital circuit design.The numerical simulation is performed using the ATLAS-3D device simulator. 相似文献
107.
For system-on-chips (SoC) using deep submicron (DSM) technologies, interconnects are becoming critical determinants for performance, reliability and power. Buses and long interconnects being susceptible to crosstalk noise, may lead to functional and timing failures. Existing at-speed interconnect crosstalk test methods propose inserting dedicated interconnect self-test structures in the SoC to generate vectors which have high crosstalk defect coverage. However, these methods may have a prohibitively high area overhead. To reduce this overhead, existing logic BIST structures like LFSRs could be reused to deliver interconnect tests. But, as shown by our experiments, use of LFSR tests achieve poor crosstalk defect coverage. Additionally, it has been shown that the power consumed during testing can potentially become a significant concern.In this paper, we present Logic-Interconnect BIST (LI-BIST), a comprehensive self-test solution for both the logic of the cores and the SoC interconnects. LI-BIST reuses existing logic BIST structures but generates high-quality tests for interconnect crosstalk defects, while minimizing the area overhead and interconnect power consumption. The application of the LI-BIST methodology on example SoCs indicates that LI-BIST is a viable, low-cost, yet comprehensive solution for testing SoCs. 相似文献
108.
Current desktop computers typically use fan-heat sinks for cooling the CPU, referred to as active heat sinks. This work seeks to determine the heat rejection limits for such fan-heat sinks, within specific fan and heat sink space limits. A fixed volume, 80 /spl times/ 60 /spl times/ 50 mm is chosen as the limiting dimensions, which includes the fan volume. The present work addresses plane fin heat sinks, on which a typical 60 mm fan is mounted. Both duct flow and impinging flow are considered. Analytically based models are used to predict the optimum geometry (minimum convection resistance) for plane fins with duct and impinging flow configurations. Also assessed are the effects of increased fan speed (up to 25%) and heat sink base size (33% increase) on air-cooling limits in duct and impinging flow. Tests on fan-heat sinks are done to validate the predictions. Optimization is also done for an enhanced (offset-strip) fin geometry in duct flow. The plane fin is found to outperform the enhanced geometry. 相似文献
109.
110.
S. Manoj Kumar N. Rajkumar W. Catherine Christinal Mary 《Wireless Personal Communications》2013,70(4):1697-1709
In Wireless Sensor Network (WSN) sensors are densely deployed where the intruders can compromise some sensor nodes and inject false data in order to raise false alarms, reduce network lifetime, utilize bandwidth resources and so on. False Data Injection can possibly occur in Data Aggregation (DA) and Data Forwarding (DF). This paper analyses EFDD Protocol-Early False Data Detection Protocol which addresses the two possibilities in a simple and secure way considering the constraints of sensor nodes. The main idea is the selection of the network structure; this protocol will work effectively in Spatial/Semantic Correlation Tree Structure (SCT). False Data Detection in DA is done using some monitoring nodes which will monitor the Data Aggregator. EFDD in SCT structure reduce the counterfeit data transmission when compared to other structure in a better way. The result shows that EFDD reduce data transmission by dropping false data earlier and it also reduces computation when compared to the existing schemes. 相似文献