首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2633篇
  免费   2篇
电工技术   78篇
综合类   1篇
化学工业   277篇
金属工艺   103篇
机械仪表   95篇
建筑科学   51篇
矿业工程   10篇
能源动力   69篇
轻工业   197篇
水利工程   2篇
石油天然气   12篇
无线电   787篇
一般工业技术   479篇
冶金工业   36篇
原子能技术   68篇
自动化技术   370篇
  2021年   13篇
  2020年   14篇
  2018年   15篇
  2017年   14篇
  2016年   17篇
  2015年   10篇
  2014年   31篇
  2013年   123篇
  2012年   45篇
  2011年   65篇
  2010年   76篇
  2009年   115篇
  2008年   96篇
  2007年   125篇
  2006年   126篇
  2005年   92篇
  2004年   118篇
  2003年   72篇
  2002年   78篇
  2001年   96篇
  2000年   81篇
  1999年   95篇
  1998年   83篇
  1997年   80篇
  1996年   82篇
  1995年   81篇
  1994年   57篇
  1993年   70篇
  1992年   77篇
  1991年   73篇
  1990年   56篇
  1989年   50篇
  1988年   66篇
  1987年   27篇
  1986年   28篇
  1985年   31篇
  1984年   28篇
  1983年   21篇
  1982年   33篇
  1981年   26篇
  1980年   14篇
  1979年   16篇
  1978年   16篇
  1977年   11篇
  1976年   13篇
  1975年   11篇
  1974年   10篇
  1973年   8篇
  1972年   8篇
  1970年   10篇
排序方式: 共有2635条查询结果,搜索用时 0 毫秒
41.
Optimization algorithms are studied for a class of semi-Markov control processes (SMCPs) with compact action set. Both the long-run average and discounted cost problems are considered. Formulas of performance potentials and optimality equations for SMCPs are derived. A policy iteration algorithm and a value iteration algorithm are proposed, which can lead to an optimal or suboptimal stationary policy in a finite number of iterations. The convergence of these algorithms is established, without the assumption of the corresponding iteration operator being a span-contraction. In addition, an online policy iteration optimization algorithm based on a single sample path is provided to escape ‘curse of dimensionality’. In the end, a numerical example is provided to illustrate the application of the algorithms.  相似文献   
42.
A CMOS preamplifier optimized for piezoelectric transducers is presented. The extensive use of CMOS-compatible lateral bipolar transistors (CLBTs) and careful layout leads to a very low noise along with good untrimmed DC and AC characteristics. These features make it competitive with bipolar and JFET realizations. In addition, long coaxial lines can be driven without significant alteration of performance using the two uncommitted on-chip buffers. This circuit was fabricated in a standard 3-μm p-well CMOS technology, opening perspectives to monolithic integration of data acquisition subsystems  相似文献   
43.
In this paper, the performance of an all-fiber short-wave IR (SWIR) transmitter with wideband tunability and high peak power is reported. Transmitter construction relied on parametric process in highly nonlinear fiber to convert a seed laser at 1260 nm to 2155 nm SWIR channel with record 39 dB efficiency and translation over 900 nm spectral range. We demonstrated 61 W of peak converted power at 2 $mu$m and 26 W at 2.15 $mu$ m. Efficient conversion was made possible by engineered fourth-order dispersion of the highly nonlinear fiber and construction of a low-noise pump source in a 1550 nm band.   相似文献   
44.
Two-dimensional synthetic aperture images over a land surface scene   总被引:1,自引:0,他引:1  
The Soil Moisture and Ocean Salinity (SMOS) space mission is currently undergoing phase-B studies at the European Space Agency. The SMOS payload is an L-band interferometric radiometer based on a two-dimensional aperture synthesis concept. This paper presents the first images obtained by a demonstrator of the SMOS instrument over land surfaces at the Avignon test site in 1999  相似文献   
45.
Embedded systems present significant security challenges due to their limited resources and power constraints. This paper focuses on the issues of building secure embedded systems on reconfigurable hardware and proposes a security architecture for embedded systems (SAFES). SAFES leverages the capabilities of reconfigurable hardware to provide efficient and flexible architectural support for security standards and defenses against a range of hardware attacks. The SAFES architecture is based on three main ideas: (1) reconfigurable security primitives; (2) reconfigurable hardware monitors; and (3) a hierarchy of security controllers at the primitive, system and executive level. Results are presented for reconfigurable AES and RC6 security primitives and highlight the value of such an architecture. This paper also emphasizes that reconfigurable hardware is not just a technology for hardware accelerators dedicated to security primitives as has been focused on by most studies but a real solution to provide high-security and high-performance for a system.  相似文献   
46.
The reliability results of thin gate oxide and nitride–oxide film development for application in dynamic random access memories are presented. Data and observations from this technology development are embedded in general state-of-the-art review. Therein features of lifetime extrapolation models are discussed. Process and test structures as well as the stress procedure are briefly described. Among the data presented are long term stress results supporting the anode hole injection model down to 5 V, breakdown propagation results and the soft breakdown of 6 nm oxide, which allows detection of device degradation due to Fowler–Nordheim stress. Furthermore the dependence of the voltage acceleration on oxide thickness is shown for the range of less than 2–10 nm oxide thickness. The importance of physical failure analysis is emphazised.  相似文献   
47.
Network Topology Inference Based on End-to-End Measurements   总被引:1,自引:0,他引:1  
We consider using traceroute-like end-to-end measurement to infer the underlay topology for a group of hosts. One major issue is the measurement cost. Given N hosts in an asymmetric network without anonymous routers, traditionally full N(N-1) traceroutes are needed to determine the underlay topology. We investigate how to efficiently infer an underlay topology with low measurement cost, and propose a heuristic called Max-Delta. In the heuristic, a server selects appropriate host-pairs to measure in each iteration so as to reveal the most undiscovered information on the underlay. We further observe that the presence of anonymous routers significantly distorts and inflates the inferred topology. Previous research has shown that obtaining both exact and approximate topology in the presence of anonymous routers under certain consistency constraints is intractable. We hence propose fast algorithms on how to practically construct an approximate topology by relaxing some constraints. We investigate and compare two algorithms to merge anonymous routers. The first one uses Isomap to map routers into a multidimensional space and merges anonymous routers according to their interdistances. The second algorithm is based on neighbor router information, which trades off some accuracy with speed. We evaluate our inference algorithms on Internet-like and real Internet topologies. Our results show that almost full measurement is needed to fully discover the underlay topology. However, substantial reduction in measurements can be achieved if a little accuracy, say 5%, can be compromised. Moreover, our merging algorithms in the presence of anonymous routers can efficiently infer an underlay topology with good accuracy  相似文献   
48.
Position location (PL) of a UE requesting E-911 services should be provided by wireless communication service providers, according to the Federal Communications Commission (FCC) regulations. Raising pilot power fraction can improve the system locatability, while it may also cause pilot pollution and increase interference to UEs in neighboring cells. In this letter we find the optimal pilot power allocation subject to coverage and locatability constraints. The results have shown that with new localization techniques such as idle period downlink (IPDL) and cumulative virtual blanking (CVB), the coverage and locatability constraints can be satisfied without requiring long integration time and large pilot power fraction.  相似文献   
49.
The original concept that led to the structuring of a computer-based medical decision support system (DSS) that is able to support a physician's diagnosis is introduced in this paper. The concept's implementation modeled a generic DSS, the core of which are an integrated knowledge/information base (KIB) along with the inference properties of a data evaluator. The KIB encapsulates the necessary medical knowledge and experience in the form of rules and constraints, preemptive tasks and actual patients' clinical data. The data evaluator handles approved medical subjective and objective criteria for assessing the KIB's data. The data evaluator incorporates a medical standard data gathering and decision process, structured upon the principles of the clinical differential diagnosis methodology, and has been integrated in the system by means of both algorithmic and artificial intelligence techniques. The novel model and the resulted computer-based package have been extensively tested at the Pulmonary Department of the University Regional Hospital Patras, Greece  相似文献   
50.
A 45° angled reactive ion etching combined with an in situ monitoring technique was used to fabricate ridge waveguide folded-cavity in-plane surface-emitting lasers. This laser structure, with two 45°C angle-etched internal total-reflection mirrors and an epitaxially grown distributed Bragg reflector, is very promising for OEIC applications. Laser-structure design and laser fabrication are addressed. A continuous-wave threshold current of 8 mA, the lowest reported in the literature, was achieved on 3-μm-wide, 350-μm long devices  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号