首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   115243篇
  免费   3951篇
  国内免费   2031篇
电工技术   2954篇
技术理论   2篇
综合类   4466篇
化学工业   16488篇
金属工艺   6467篇
机械仪表   5134篇
建筑科学   5308篇
矿业工程   1480篇
能源动力   1983篇
轻工业   6165篇
水利工程   1832篇
石油天然气   1767篇
武器工业   281篇
无线电   13060篇
一般工业技术   19859篇
冶金工业   3880篇
原子能技术   657篇
自动化技术   29442篇
  2024年   178篇
  2023年   641篇
  2022年   1187篇
  2021年   1626篇
  2020年   1152篇
  2019年   959篇
  2018年   15311篇
  2017年   14392篇
  2016年   10926篇
  2015年   1912篇
  2014年   1917篇
  2013年   2096篇
  2012年   5275篇
  2011年   11635篇
  2010年   10285篇
  2009年   7459篇
  2008年   8559篇
  2007年   9451篇
  2006年   1753篇
  2005年   2617篇
  2004年   2054篇
  2003年   2024篇
  2002年   1384篇
  2001年   857篇
  2000年   872篇
  1999年   774篇
  1998年   549篇
  1997年   512篇
  1996年   513篇
  1995年   387篇
  1994年   325篇
  1993年   218篇
  1992年   173篇
  1991年   135篇
  1990年   83篇
  1989年   83篇
  1988年   72篇
  1987年   45篇
  1986年   36篇
  1968年   43篇
  1966年   42篇
  1965年   45篇
  1962年   64篇
  1961年   57篇
  1960年   46篇
  1959年   37篇
  1958年   37篇
  1957年   36篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 14 毫秒
991.
The thin film of Sb2Se3 was deposited by thermal evaporation method and the film was annealed in N2 flow in a three zone furnace at a temperature of 290°С for 30 min. The structural properties were characterized by scanning electron microscopy (SEM), transmission electron microscopy (ТЕМ), X-ray diffraction (XRD) and Raman spectroscopy, respectively. It is seen that the as-deposited film is amorphous and the annealed film is polycrystalline in nature. The surface of Sb2Se3 film is oxidized with a thickness of 1.15 nm investigated by X-ray photolecetron spectroscopy (XPS) measurement. Spectroscopic ellipsometry (SE) and UV–vis spectroscopy measurements were carried out to study the optical properties of Sb2Se3 film. In addition, the first principles calculations were applied to study the electronic and optical properties of Sb2Se3. From the theoretical calculation it is seen that Sb2Se3 is intrinsically an indirect band gap semiconductor. Importantly, the experimental band gap is in good agreement with the theoretical band gap. Furthermore, the experimental values of n, k, ε1, and ε2 are much closer to the theoretical results. However, the obtained large dielectric constants and refractive index values suggest that exciton binding energy in Sb2Se3 should be relatively small and an antireflective coating is recommended to enhance the light absorption of Sb2Se3 for thin film solar cells application.  相似文献   
992.
We show that it is possible for the so-called weak locking capacity of a quantum channel (Guha et al. in Phys Rev X 4:011016, 2014) to be much larger than its private capacity. Both reflect different ways of capturing the notion of reliable communication via a quantum system while leaking almost no information to an eavesdropper; the difference is that the latter imposes an intrinsically quantum security criterion whereas the former requires only a weaker, classical condition. The channels for which this separation is most straightforward to establish are the complementary channels of classical-quantum (cq-)channels and, hence, a subclass of Hadamard channels. We also prove that certain symmetric channels (related to photon number splitting) have positive weak locking capacity in the presence of a vanishingly small pre-shared secret, whereas their private capacity is zero. These findings are powerful illustrations of the difference between two apparently natural notions of privacy in quantum systems, relevant also to quantum key distribution: the older, naïve one based on accessible information, contrasting with the new, composable one embracing the quantum nature of the eavesdropper’s information. Assuming an additivity conjecture for constrained minimum output Rényi entropies, the techniques of the first part demonstrate a single-letter formula for the weak locking capacity of complements to cq-channels, coinciding with a general upper bound of Guha et al. for these channels. Furthermore, still assuming this additivity conjecture, this upper bound is given an operational interpretation for general channels as the maximum weak locking capacity of the channel activated by a suitable noiseless channel.  相似文献   
993.
A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a “qualified” subset of parties can efficiently reconstruct the secret while any “unqualified” subset of parties cannot efficiently learn anything about the secret. The collection of “qualified” subsets is defined by a monotone Boolean function. It has been a major open problem to understand which (monotone) functions can be realized by a computational secret-sharing scheme. Yao suggested a method for secret-sharing for any function that has a polynomial-size monotone circuit (a class which is strictly smaller than the class of monotone functions in \({\mathsf {P}}\)). Around 1990 Rudich raised the possibility of obtaining secret-sharing for all monotone functions in \({\mathsf {NP}}\): in order to reconstruct the secret a set of parties must be “qualified” and provide a witness attesting to this fact. Recently, Garg et al. (Symposium on theory of computing conference, STOC, pp 467–476, 2013) put forward the concept of witness encryption, where the goal is to encrypt a message relative to a statement \(x\in L\) for a language \(L\in {\mathsf {NP}}\) such that anyone holding a witness to the statement can decrypt the message; however, if \(x\notin L\), then it is computationally hard to decrypt. Garg et al. showed how to construct several cryptographic primitives from witness encryption and gave a candidate construction. One can show that computational secret-sharing implies witness encryption for the same language. Our main result is the converse: we give a construction of a computational secret-sharing scheme for any monotone function in \({\mathsf {NP}}\) assuming witness encryption for \({\mathsf {NP}}\) and one-way functions. As a consequence we get a completeness theorem for secret-sharing: computational secret-sharing scheme for any single monotone \({\mathsf {NP}}\)-complete function implies a computational secret-sharing scheme for every monotone function in \({\mathsf {NP}}\).  相似文献   
994.
皮秒激光辐照硅基PIN光电二极管的瞬态响应信号分析   总被引:1,自引:0,他引:1  
实验研究了超短脉冲皮秒激光辐照硅基PIN光电二极管的瞬态响应的规律特性,测量了在不同激光能量密度辐照下的脉冲响应信号.分析实验结果表明,随着激光能量密度的增大,器件出现了非线性饱和状态,半高宽从37.2μs到113μs,底宽从181μs到322 μs,脉冲响应信号出现展宽现象,信号的展宽意味着器件的瞬态响应发生了退化,...  相似文献   
995.
This paper investigates the possible coexistence issues between the digital video broadcasting-terrestrial (DVB-T) system and the long term evolution (LTE) that operate in adjacent frequency bands. The proposed methodology for interference assessment evaluates the DVB-T performance degradation in presence of aggregate LTE-800 interference targeting the territory of Macedonia as evaluation area. The simulation analysis quantifies the percentage of interference degraded pixels and obtains the probability of pixel DVB-T service degradation. Furthermore, a measurement trial complements the simulation analysis through the evaluation of the influence of active antenna usage by the DVB-T receivers. The simulation and measurement results in this particular case confirm that the alignment of the active DVB-T receiving antenna towards the LTE-800 base station can substantially increase the degradation whereas aligning of the active DVB-T receiving antenna towards the DVB-T transmitter maintains the efficient TV reception. Finally, this paper proposes a simple algorithm for optimal LTE frequency arrangement, resulting in significant reduction of the LTE interference towards the DVB-T system.  相似文献   
996.
In this paper, the hierarchical space time cyclic delay diversity (H-STCDD) scheme is proposed. Proposed scheme uses hierarchical modulation and achieves approximately full rate. It also uses a cyclic delay diversity scheme, which improves the benefit of channel coding particularly in high SNR environment between source to relay and source to destination. According to simulation result, proposed scheme has up to 2.2 dB better BER performance than conventional cooperative scheme at BER of 10?3 and has similar BER performance with the STCDD scheme particularly in high SNR environment between source to relay and source to destination. Throughput of the proposed scheme is better than those of other cooperative schemes. Therefore proposed scheme is more efficient than other cooperative scheme and can be efficiently used in high SNR environment between source to relay and source to destination.  相似文献   
997.
A mature cloud system needs a complete resource allocation policy which includes internal and external allocation. They not only enable users to have better experiences, but also allows the cloud provider to cut costs. In the other words, internal and external allocation are indispensable since a combination of them is only a total solution for whole cloud system. In this paper, we clearly explain the difference between internal allocation (IA) and external allocation (EA) as well as defining the explicit IA and EA problem for the follow up research. Although many researchers have proposed resource allocation methods, they are just based on subjective observations which lead to an imbalance of the overall cloud architecture, and cloud computing resources to operate se-quentially. In order to avoid an imbalanced situation, in previous work, we proposed Data Envelopment Analysis (DEA) to solve this problem; it considers all of a user’s demands to evaluate the overall cloud parameters. However, although DEA can provide a higher quality solution, it requires more time. So we use the Q-learning and Data Envelopment Analysis (DEA) to solve the imbalance problem and reduce computing time. As our simulation results show, the proposed DEA+Qlearning will provide almost best quality but too much calculating time.  相似文献   
998.
Target detection in remote sensing images (RSIs) is a fundamental yet challenging problem faced for remote sensing images analysis. More recently, weakly supervised learning, in which training sets require only binary labels indicating whether an image contains the object or not, has attracted considerable attention owing to its obvious advantages such as alleviating the tedious and time consuming work of human annotation. Inspired by its impressive success in computer vision field, in this paper, we propose a novel and effective framework for weakly supervised target detection in RSIs based on transferred deep features and negative bootstrapping. On one hand, to effectively mine information from RSIs and improve the performance of target detection, we develop a transferred deep model to extract high-level features from RSIs, which can be achieved by pre-training a convolutional neural network model on a large-scale annotated dataset (e.g. ImageNet) and then transferring it to our task by domain-specifically fine-tuning it on RSI datasets. On the other hand, we integrate negative bootstrapping scheme into detector training process to make the detector converge more stably and faster by exploiting the most discriminative training samples. Comprehensive evaluations on three RSI datasets and comparisons with state-of-the-art weakly supervised target detection approaches demonstrate the effectiveness and superiority of the proposed method.  相似文献   
999.
For the robust detection of pedestrians in intelligent video surveillance, an approach to multi-view and multi-plane data fusion is proposed. Through the estimated homography, foreground regions are projected from multiple camera views to a reference view. To identify false-positive detections caused by foreground intersections of non-corresponding objects, the homographic transformations for a set of parallel planes, which are from the head plane to the ground, are applied. Multiple features including occupancy information and colour cues are extracted from such planes for joint decision-making. Experimental results on real world sequences have demonstrated the good performance of the proposed approach in pedestrian detection for intelligent visual surveillance.  相似文献   
1000.
Cloud-integrated fiber-wireless (FiWi) networks inheriting advantages of optical and wireless access networks have a broad prospect in the future. As various component failures may occur in cloud-integrated FiWi networks, survivability is becoming one of the key important issues. It is necessary to provide survivability strategies for cloud-integrated FiWi networks. Hence, this paper mainly focuses on the survivability of cloud-integrated FiWi networks against multiple fibers failure. Firstly, in this paper, a novel integer linear programming (ILP) solution is proposed to tolerate the failure of multiple distribution fibers with capacity and coverage constraints in the context of urban area. Then, considering the complexity of ILP models, an efficient heuristic scheme is proposed, in order to get the approximate solutions of ILP. Simulation results and analysis give the configurations of optical network units (ONUs) and wireless routers with different constraints and show the network coverage of clients for different number of ONUs and wireless routers with ILP solution and heuristic approach, respectively.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号