首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   770329篇
  免费   11596篇
  国内免费   2198篇
电工技术   13657篇
综合类   733篇
化学工业   120241篇
金属工艺   30046篇
机械仪表   24203篇
建筑科学   18782篇
矿业工程   3745篇
能源动力   21174篇
轻工业   67833篇
水利工程   7605篇
石油天然气   14033篇
武器工业   51篇
无线电   88124篇
一般工业技术   150186篇
冶金工业   143598篇
原子能技术   15843篇
自动化技术   64269篇
  2021年   7674篇
  2020年   5657篇
  2019年   6944篇
  2018年   11486篇
  2017年   11267篇
  2016年   12176篇
  2015年   8488篇
  2014年   13923篇
  2013年   35453篇
  2012年   22001篇
  2011年   29703篇
  2010年   23463篇
  2009年   26067篇
  2008年   26444篇
  2007年   25354篇
  2006年   22431篇
  2005年   20550篇
  2004年   19450篇
  2003年   19044篇
  2002年   18317篇
  2001年   18131篇
  2000年   16842篇
  1999年   17545篇
  1998年   44039篇
  1997年   31306篇
  1996年   24130篇
  1995年   18005篇
  1994年   15753篇
  1993年   15397篇
  1992年   11296篇
  1991年   10774篇
  1990年   10460篇
  1989年   10291篇
  1988年   9718篇
  1987年   8547篇
  1986年   8395篇
  1985年   9469篇
  1984年   8899篇
  1983年   8007篇
  1982年   7486篇
  1981年   7705篇
  1980年   7315篇
  1979年   7131篇
  1978年   7020篇
  1977年   8333篇
  1976年   10987篇
  1975年   6220篇
  1974年   5821篇
  1973年   5888篇
  1972年   4985篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
Reliable multicast protocols suffer from the problem of feedback implosion. To avoid this problem, the number of receivers sending feedback in case of loss must be small. However, losses experienced by different receivers are strongly correlated, since receivers share common resources in the multicast tree. One approach to feedback implosion avoidance relies on delaying feedback at the receivers. We present deterministic timeouts for reliable multicast (DTRM), a distributed algorithm to compute optimal deterministic timeouts for each receiver in a multicast tree as a function of the tree topology and the sender-to-receiver round-trip delays. DTRM has several desirable properties. First, feedback implosion is provably avoided for a single loss anywhere in the tree, provided delay jitter is bounded. Second, the computation of the timeouts can be entirely distributed; receivers and intermediate nodes only rely on local topology information. Third, the timeouts computed by DTRM are optimal with respect to the maximum response time  相似文献   
102.
A beam propagation method (BPM) based on the finite element method (FEM) is described for longitudinally varying three-dimensional (3-D) optical waveguides. In order to avoid nonphysical reflections from the computational window edges, the transparent boundary condition is introduced. The present algorithm using the Pade approximation is, to our knowledge, the first wide-angle finite element beam propagation method for 3-D waveguide structures. To show the validity and usefulness of this approach, numerical results are shown for Gaussian-beam excitation of a straight rib waveguide and guided-mode propagation in a Y-branching rib waveguide  相似文献   
103.
Impact ionization is a major limiting factor to the maximum operating voltage of InGaAs-based, high-speed transistors. In this work, data on the positive temperature dependence of the electron impact ionization coefficient αn in In0.53Ga0.47As at medium-low electric fields are reported for the first time. The increase of αn with temperature is opposite to the behavior normally observed in most semiconductors. This anomalous behavior implies the onset of a positive feedback between power dissipation and avalanche generation which may adversely affect the power handling capability of In0.53Ga 0.47As-based devices, and which should be taken into account in device thermal modeling. In the experimental procedure, based on the measurement of the multiplication factor M-1 in npn In0.53Ga 0.47As/InP Heterojunction Bipolar Transistors (HBT), particular care has been taken in order to rule out possible spurious, temperature-dependent contributions to the measured multiplication current  相似文献   
104.
105.
Communication network design is becoming increasingly complex, involving making networks more usable, affordable, and reliable. To help with this, we have proposed an expert network designer (END) for configuring, modeling, simulating, and evaluating large structured computer networks, employing artificial intelligence, knowledge representation, and network simulation tools. We present a neural network/knowledge acquisition machine-learning approach to improve the END's efficiency in solving the network design problem and to extend its scope to acquire new networking technologies, learn new network design techniques, and update the specifications of existing technologies  相似文献   
106.
A comprehensive survey of photosensitivity in silica glasses and optical fiber is reviewed. Recent work on understanding the mechanisms contributing to germanium or aluminum doped fiber photosensitivity is discussed within the framework of photoelastic densification models  相似文献   
107.
Single-phase voltage source power converters (VSCs) under consideration are AC-DC current-controlled boost-type power converters with bidirectional power-handling capability. Equivalence between two series-connected two-level power converters and a single three-level power converter is considered here. Further considered is the series operation of three-level power converters. Simulation results and experimental verification for both are provided. Economical configurations of three-level power converters leading to multilevel waveforms are presented thereafter  相似文献   
108.
A novel monitoring method for plasma-charging damage is proposed. This method performs a quick and accurate evaluation using antenna PMOSFET. It was found that not only hot-carrier (HC) lifetime but transistor parameters such as initial gate current and substrate current were changed according to the degree of plasma-charging damage. However, the present work suggests that monitoring the shift of drain current after a few seconds of HC stress is a more accurate method to indicate plasma-charging damage. The monitoring method using the present test structure is demonstrated to be useful for realizing highly reliable devices  相似文献   
109.
Escherichia coli K4 bacteria synthesize a capsule polysaccharide (GalNAc-GlcA(fructose))n with the carbohydrate backbone identical to chondroitin. GlcA- and GalNAc-transferase activities from the bacterial membrane were assayed with acceptors derived from the capsule polysaccharide and radiolabeled UDP-[14C]GlcA and UDP-[3H]GalNAc, respectively. It was shown that defructosylated oligosaccharides (chondroitin) could serve as substrates for both the GlcA- and the GalNAc-transferases. The radiolabeled products were completely degraded with chondroitinase AC; the [14C]GlcA unit could be removed by beta-D-glucuronidase, and the [3H]GalNAc could be removed by beta-N-acetylhexosaminidase. A fructosylated oligosaccharide acceptor tested for GlcA-transferase activity was found to be inactive. These results indicate that the chain elongation reaction of the K4 polysaccharide proceeds in the same way as the polymerization of the chondroitin chain, by the addition of the monosaccharide units one by one to the nonreducing end of the polymer. This makes the biosynthesis of the K4 polysaccharide an interesting parallel system for studies of chondroitin sulfate biosynthesis. In the biosynthesis of capsule polysaccharides from E. coli, a similar mechanism has earlier been demonstrated for polysialic acid (NeuNAc)n (Rohr, T. E., and Troy, F. A. (1980) J. Biol. Chem. 255, 2332-2342) and for the K5 polysaccharide (GlcAbeta1-4GlcNAcalpha1-4)n (Lidholt, K., Fjelstad, M., Jann, K., and Lindahl, U. (1994) Carbohydr. Res. 255, 87-101). In contrast, chain elongation of hyaluronan (GlcAbeta1-3GlcNAcbeta1-4)n is claimed to occur at the reducing end (Prehm, P. (1983) Biochem. J. 211, 181-189).  相似文献   
110.
The purpose of this paper is to evaluate two methods of assessing the productivity and quality impact of Computer Aided Software Engineering (CASE) and Fourth Generation Language (4GL) technologies: (1) by the retrospective method; and (2) the cross-sectional method. Both methods involve the use of questionnaire surveys. Developers' perceptions depend on the context in which they are expressed and this includes expectations about the effectiveness of a given software product. Consequently, it is generally not reliable to base inferences about the relative merits of CASE and 4GLs on a cross-sectional comparison of two separate samples of users. The retrospective method that requires each respondent to directly compare different products is shown to be more reliable. However, there may be scope to employ cross-sectional comparisons of the findings from different samples where both sets of respondents use the same reference point for their judgements, and where numerical rather than verbal rating scales are used to measure perceptions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号