首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   342125篇
  免费   5222篇
  国内免费   1942篇
电工技术   6045篇
综合类   340篇
化学工业   46751篇
金属工艺   12411篇
机械仪表   10011篇
建筑科学   8471篇
矿业工程   689篇
能源动力   9844篇
轻工业   33795篇
水利工程   2695篇
石油天然气   2441篇
武器工业   20篇
无线电   47091篇
一般工业技术   64004篇
冶金工业   70091篇
原子能技术   4516篇
自动化技术   30074篇
  2022年   1489篇
  2021年   2510篇
  2020年   1875篇
  2019年   2330篇
  2018年   3601篇
  2017年   3603篇
  2016年   3988篇
  2015年   3061篇
  2014年   5096篇
  2013年   16080篇
  2012年   9029篇
  2011年   12885篇
  2010年   10070篇
  2009年   11519篇
  2008年   12132篇
  2007年   12177篇
  2006年   11328篇
  2005年   10272篇
  2004年   9868篇
  2003年   9594篇
  2002年   8881篇
  2001年   9483篇
  2000年   8589篇
  1999年   9475篇
  1998年   25073篇
  1997年   16993篇
  1996年   12891篇
  1995年   9384篇
  1994年   8191篇
  1993年   8035篇
  1992年   5379篇
  1991年   5158篇
  1990年   4833篇
  1989年   4546篇
  1988年   4293篇
  1987年   3369篇
  1986年   3285篇
  1985年   3961篇
  1984年   3504篇
  1983年   3187篇
  1982年   2942篇
  1981年   2977篇
  1980年   2697篇
  1979年   2467篇
  1978年   2241篇
  1977年   2658篇
  1976年   3626篇
  1975年   1848篇
  1974年   1733篇
  1973年   1785篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
71.
'Software defined radio' (SDR) is a technology that will appear in future generations of mobile phones, i.e. following the third-generation mobile phone technology that is currently being defined and developed. Early versions of 'pragmatic' SDR will allow the terminal to be reconfigured at any level of its protocol stack. Ultimately, the 'pure' SDR technology will allow a mobile phone or terminal to have its air interface software configured or reconfigured by other software (or software parameters) that have been downloaded to the terminal, e.g. over the air, or from a remote server via the Internet and one's personal computer (PC). A number of security issues arise with downloaded code that implements the air interface functions, and these may not be obvious simply from looking at the way PC software is updated on-line today. This paper starts with an outline of the code that allows a mobile phone to operate over a particular air interface. This sets the baseline for a discussion of the security issues surrounding the change of this code from one that is fixed and downloaded once only, to code that is reconfigurable during the life of a product.  相似文献   
72.
73.
74.
This paper describes a sequential tripping strategy used in a wide area back-up protection expert system (BPES) to combat situations in which protection relays have maloperated or information is missing. The BPES is an innovative back-up protection scheme designed to prevent the occurrence of widespread blackouts. The BPES evaluates the certainty that transmission lines are likely to be affected by the fault and uses a sequential tripping strategy to isolate the fault if a firm decision is not available due to maloperated relays and/or missing information. The mode of analysis and the sequential tripping strategy ensures that the BPES will clear a fault at minimum risk to the network. An example is included to demonstrate how the certainty factor based sequential tripping strategy is employed by the BPES to clear a fault which occurred on the South Western part of the UK National Grid System  相似文献   
75.
Eliminating the adoption barrier   总被引:1,自引:0,他引:1  
Krueger  C. 《Software, IEEE》2002,19(4):29-31
  相似文献   
76.
The usefulness of selected PCR-protocols for the detection of Salmonella in 117 samples of animal origin (17 raw minced meat, 27 raw chicken meat, 8 raw sausages, and 25 egg samples, as well as 18 poultry faecal, and caecal swabs samples) and DNA-fingerprinting typing is shown. To establish an accurate PCR-procedure for Salmonella detection the following parameters were evaluated: two pre-PCR concentration procedures, centrifugation and immunomagnetic separation (IMS) using Dynabeads anti- Salmonella; the specificity and sensitivity of 10 sets of primers; and different conditions of the amplification reaction. In light of the results obtained from the use of PCR-based procedures alone or in combination with conventional methods, the following findings can be underlined: First, IMS is more efficient than centrifugation in the recovery of Salmonella. Second, the selected IMS/PCR-detection protocol is less time-consuming (45 h) than the IMS/culture procedure (90 h), and a good concordance between them was found when the Kappa coefficient was calculated (0·87). Third, PCR-ribotyping technique showed a very low discrimination power, being able to differentiate only three profiles. Fourth, RAPD technique using specific primers supports previous works in which it was proposed as a simple and useful tool for discriminating isolates between and within serotypes. Fifth, The efficiency, rapidity, and flexibility of the PCR-protocols applied were high, and they can be performed using two PCR-programs and the same basic equipment.  相似文献   
77.
78.
We examine the symmetry-breaking transitions in equilibrium shapes of coherent precipitates in two-dimensional (2-D) systems under a plane-strain condition with the principal misfit strain components ε* xx and ε* yy . For systems with cubic elastic moduli, we first show all the shape transitions associated with different values of t=ε* yy /ε* xx . We also characterize each of these transitions, by studying its dependence on elastic anisotropy and inhomogeneity. For systems with dilatational misfit (t=1) and those with pure shear misfit (t=−1), the transition is from an equiaxed shape to an elongated shape, resulting in a break in rotational symmetry. For systems with nondilatational misfit (−1<t<1; t ≠ 0), the transition involves a break in mirror symmetries normal to the x- and y-axes. The transition is continuous in all cases, except when 0<t<1. For systems which allow an invariant line (−1≤t<0), the critical size increases with an increase in the particle stiffness. However, for systems which do not allow an invariant line (0<t≤1), the critical size first decreases, reaches a minimum, and then starts increasing with increasing particle stiffness; moreover, the transition is also forbidden when the particle stiffness is greater than a critical value.  相似文献   
79.
Fuzzy logic was first suggested as the mechanism by which humans drive cars. This paper addresses the use of fuzzy logic and algorithms towards the intelligent autonomous motion control of land vehicles. To cope with vehicle complexities, internal parametric changes, and with unpredictable environmental effects, the controllers that are presented, whilst heuristic in nature, are self-organizing or self-learning in that they generate automatically by observation an experiential rule base that models the vehicle, and via an appropriate performance index an optimal control rule base that is robust to large parametric changes. The methodology presented is applicable to any complex process which is too difficult to model or control using conventional methods, or which has relied on the experience of a human operator. An overview of fuzzy logic and static fuzzy logic control (akin to expert systems) is provided, together with illustrative examples.  相似文献   
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号