首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1067篇
  免费   25篇
  国内免费   1篇
电工技术   14篇
化学工业   242篇
金属工艺   28篇
机械仪表   12篇
建筑科学   11篇
矿业工程   2篇
能源动力   79篇
轻工业   61篇
水利工程   4篇
石油天然气   4篇
无线电   103篇
一般工业技术   266篇
冶金工业   141篇
原子能技术   16篇
自动化技术   110篇
  2024年   2篇
  2023年   10篇
  2022年   8篇
  2021年   35篇
  2020年   28篇
  2019年   43篇
  2018年   40篇
  2017年   35篇
  2016年   31篇
  2015年   15篇
  2014年   31篇
  2013年   119篇
  2012年   35篇
  2011年   57篇
  2010年   40篇
  2009年   51篇
  2008年   35篇
  2007年   50篇
  2006年   40篇
  2005年   29篇
  2004年   23篇
  2003年   25篇
  2002年   19篇
  2001年   16篇
  2000年   14篇
  1999年   21篇
  1998年   38篇
  1997年   30篇
  1996年   17篇
  1995年   16篇
  1994年   17篇
  1993年   16篇
  1992年   13篇
  1991年   12篇
  1990年   8篇
  1989年   3篇
  1988年   8篇
  1987年   8篇
  1986年   2篇
  1985年   6篇
  1984年   2篇
  1983年   5篇
  1981年   5篇
  1980年   3篇
  1979年   10篇
  1978年   13篇
  1977年   2篇
  1976年   1篇
  1975年   4篇
  1969年   1篇
排序方式: 共有1093条查询结果,搜索用时 31 毫秒
11.
12.
The occurrence of a significant amount of age hardening, due to the precipitation of the γ′ phase, has been demonstrated in the nickel-copper base alloy MONEL K 500. The microstructure of the precipitation-hardened and deformed alloy has been examined in peak-aged underaged and overaged conditions. An attempt has been made to compare the observed increments in strength in these three aged conditions to those predicted on the basis of relevant theoretical models.  相似文献   
13.
A novel method for the crosslinking of poly(ethylene terephthalate) fibers is described using 1,6‐hexanedisulfonyl azide, 1,3‐benzenedisulfonyl azide, and 2,6‐naphthalenedisulfonyl azide. The azides are diffused into poly(ethylene terephthalate) fibers (Dacron) from perchloroethylene solution, and the fibers are heat treated to bring about decomposition of the sulfonyl azide and give rise to crosslinking. A study is made of the mechanical and thermal properties of the resultant fibers, which are changed considerably in comparison to the untreated fiber. © 2002 Wiley Periodicals, Inc. J Appl Polym Sci 83: 1517–1527, 2002  相似文献   
14.
In this paper, the authors introduce a workflow model. The development of computer network technology enables us to share the distributed data in real time. It is a considerable significance in the practical application of network capabilities not only to office work but also to the medical environment. In order to construct a well-connected, managed post (environment, scene), a model is needed to design the workflow. Here we propose a workflow model to cope with the scene of unforeseen events that we usually encounter in daily clinical activities. We give careful consideration to the ability of this model to manage dynamic changes within the workflow and describe its application to a medical scene (triage) and then carry out simulations based on this model. The authors are able to demonstrate the validity of this model through this simulation.  相似文献   
15.
16.

The quantum-dot cellular automata (QCA) is considered to be one of the ground-breaking nanotechnologies developed over the last two decades. A layered T (LT) logic cell library is constructed herein, and the methodology is extended to generic adder and subtractor module designs. The two proposed algorithms lead to more efficient QCA layout designs for an n-bit ripple carry adder (RCA) and subtractor based on an effective clock zone assignment approach. The suggested one-, four-, and eight-bit RCAs and subtractors surpass most of their existing counterparts by offering lower effective area and cell complexity. A comparative analysis is presented regarding the complexity, irreversible power dissipation, and Costα of the proposed n-bit layouts from a cost estimation purview.

  相似文献   
17.
Design and implementation of division algorithm is one of the most complicated problems in multi-precision arithmetic. Huang et al. [1] proposed an efficient multi-precision integer division algorithm, and experimentally showed that it is about three times faster than the most popular algorithms proposed by Knuth [2] and Smith [3]. This paper reports a bug in the algorithm of Huang et al. [1], and suggests the necessary corrections. The theoretical correctness proof of the proposed algorithm is also given. The resulting algorithm remains as fast as that of [1].  相似文献   
18.
The basic objective of this article is to improve the polymer blend properties by changing mixing sequence. Blending of two elastomers does not lead to a molecularly homogeneous blend (true solution), but to a heterogeneous system in which both polymer phases are present. In this article, the detailed study of heterogeneous distribution of carbon black as well as blend inhomogenity and the physicomechanical including dynamic mechanical properties of the blend has been carried out. The choice of the blend was natural rubber/polybutadiene rubber as 85:15. Heterogeneous carbon black distribution study was also performed in differential scanning calorimeter. © 2007 Wiley Periodicals, Inc. J Appl Polym Sci 104: 2735–2742, 2007  相似文献   
19.
20.
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportunistically access and use parts of the spectrum not being used by others. Though cooperation among nodes is desirable for efficient network operations and performance, there might be some malicious nodes whose objective could be to hinder communications and disrupt network operations. The absence of a central authority or any policy enforcement mechanism makes these kinds of open-access network more vulnerable and susceptible to attacks.In this paper, we analyze a common form of denial-of-service attack, i.e., collaborative jamming. We consider a network in which a group of jammers tries to jam the channels being used by legitimate users who in turn try to evade the jammed channels. First, we compute the distribution of the jamming signal that a node experiences by considering a random deployment of jammers. Then, we propose different jamming and defending schemes that are employed by the jammers and legitimate users, respectively. In particular, we model and analyze the channel availability when the legitimate users randomly choose available channels and the jammers jam different channels randomly. We propose a multi-tier proxy-based cooperative defense strategy to exploit the temporal and spatial diversity for the legitimate secondary users in an infrastructure-based centralized cognitive radio network. Illustrative results on spectrum availability rates show how to improve resiliency in cognitive radio networks in the presence of jammers.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号