首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4262篇
  免费   320篇
  国内免费   29篇
电工技术   54篇
综合类   25篇
化学工业   1174篇
金属工艺   137篇
机械仪表   217篇
建筑科学   169篇
矿业工程   11篇
能源动力   236篇
轻工业   344篇
水利工程   98篇
石油天然气   65篇
武器工业   3篇
无线电   365篇
一般工业技术   731篇
冶金工业   138篇
原子能技术   33篇
自动化技术   811篇
  2024年   17篇
  2023年   61篇
  2022年   93篇
  2021年   220篇
  2020年   242篇
  2019年   288篇
  2018年   377篇
  2017年   328篇
  2016年   299篇
  2015年   187篇
  2014年   327篇
  2013年   513篇
  2012年   364篇
  2011年   352篇
  2010年   226篇
  2009年   220篇
  2008年   118篇
  2007年   99篇
  2006年   62篇
  2005年   32篇
  2004年   29篇
  2003年   20篇
  2002年   20篇
  2001年   12篇
  2000年   13篇
  1999年   18篇
  1998年   5篇
  1997年   6篇
  1996年   6篇
  1995年   12篇
  1994年   3篇
  1993年   6篇
  1992年   4篇
  1991年   4篇
  1990年   4篇
  1989年   4篇
  1988年   2篇
  1986年   2篇
  1984年   6篇
  1982年   5篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1974年   1篇
  1967年   1篇
排序方式: 共有4611条查询结果,搜索用时 15 毫秒
51.
A multisecret sharing (MSS) is a method for sharing a set of secrets among some participants. They can recover each of these secrets without endangering the other secrets. Two kinds of security models have been proposed for MSS schemes. These models are categorized into 2 types. The first security model is unconditional security. This approach decreases the efficiency of MSS schemes. Therefore, the second type of security, which is more relaxed, appeared. This approach is called computational security. In this paper, with 2 examples, we will show that the current definition of computational security does not satisfy all of our expectations from a secure MSS scheme. In fact, in these examples, recovering a secret leaks information to the other secrets while these schemes are considered secure in view of the computational security. After determining the shortcomings of the current security definition, we propose a new definition for computational security and present an MSS scheme that enjoys rigorous proof of security in terms of the new definition. In addition, a complete comparison in terms of share size, number of public values, and required operations for recovering a secret between our scheme and previous schemes indicates that the presented scheme is efficient.  相似文献   
52.
In this paper an all-optical half-adder was proposed by using self-collimation effect in two-dimensional photonic crystals. Self-collimation effect was obtained in XM direction for wavelength 1500 nm by using square lattice rod-type photonic crystal structure. Plane wave expansion and finite-difference time-domain methods were used to obtain the band structure diagram and simulate the optical behavior of the proposed structure, respectively. The maximum delay time and required input intensity are 1 ps and 54 mW/μm2, respectively. The normalized power-level margins for logics 0 and 1 were obtained to be about 20 and 70%, respectively. The total footprint of the structure is about 75 μm2, which is suitable for all optical integrated circuits.  相似文献   
53.
Lower Cretaceous Shurijeh–Shatlyk Formations host some of the main reservoirs in the Kopeh Dagh-Amu Darya Basin.Exploration in this area so far has focused on the development of structural traps, but recognition of stratigraphic traps in this area is of increasing importance. Integration of 3D seismic data with borehole data from thirteen wells and five outcrop sections was used to identify potential reservoir intervals and survey the hydrocarbon trap types in the East Kopeh Dagh Foldbelt(NE Iran). Analyses of horizontal slices indicated that the lower Shurijeh was deposited in a braided fluvial system.Generally, three types of channel were identified in the lower Shurijeh Formation: type 1, which is low-sinuosity channels interpreted to be filled with non-reservoir fine-grained facies; type 2, which is a moderately sinuous sand-filled channel with good prospectively; and type 3, which is narrow, high sinuosity channel filled with fine-grained sediments. Results indicate that upper Shurijeh–Shatlyk Formations were deposited in fluvial to delta and shallow marine environments. The identified delta forms the second reservoir zone in the Khangiran Field. Study of the stratigraphic aspects of the Shurijeh succession indicates that both lower and upper Shurijeh reservoirs are stratigraphic reservoir traps that improved during folding.  相似文献   
54.
Estimation of locations of sudden changes in a steplike signal has many signal processing applications; e.g., well-log signal segmentation, ionic-channel signal classification, edge detection, and segmentation of images. In this work, the Cramer-Rao lower bound (CRLB) on locations of steps in one-dimensional (1-D) steplike signals is calculated. The calculation is based on the use of a sigmoidal function to model a sudden-change (step) in the signal. The introduced model has an adjustable parameter that can be used to fit the CRLB calculation to a particular class of steplike signals  相似文献   
55.
在多孔介质流体流动模拟中,应用网格粗化方法必须在保留重要储集层参数的空间分布的前提下,首先利用大网格粗化原始地质模型(尤其是孔隙型介质),并用数值方法求解。提出了根据属性参数的空间分布、以核函数的自适应带宽为基础的网格粗化新方法,该方法既减少了网格数量,同时也保留原始精细模型的主要非均质性特征。该方法的关键点在于可以同时对两种储集层属性参数进行网格粗化。首先计算每个储集层属性参数的带宽量或最优门槛值并得到粗化结果,然后根据最大带宽和最小带宽采用两种不同的方法对两个属性参数同时粗化。现在已经能够实现利用不同方法建立储集层两个属性参数的最终粗化模型,不同方法的网格单元数和网格位置都相同。最小带宽法的粗化误差小于最大带宽法。图6表1参29  相似文献   
56.
This work presents a framework for future studies to better understand the appropriate time to include chemical inhibitors at different stages of asphaltene aggregation in the oil. For this purpose, molecular dynamics (MD) simulations were performed to study the aggregation of asphaltene molecules in heptane, in terms of strength, dynamics, and the occurrence time of each stage of aggregation from single molecules to a large flocculate. Results indicate that the nucleation of nanoaggregates begins prior to 10?ns, clusters start forming at 98?ns, and flocculation happens after 120?ns. It was also observed that the final flocculate had a globular shape.  相似文献   
57.
Polycyclic aromatic hydrocarbons (PAHs) containing more than three rings are mainly less biodegradable. Therefore, the isolation of PAHs-degrading bacteria is of great importance to be augmented for bioremediation of polluted sites with PAHs. PAHs-degrading bacteria were isolated from contaminated sites of an oil refinery. The strains were confirmed by biochemical tests and 16S rRNA, which were Stenotrophomonas maltophilia (two strains), Thermomonas koreensis (three strains), Achromobacter (two strains), Pseudomonas stutzeri (one strain), Azospirillum brasilense (one strain) and Brevibacillus brevis (one strain). The isolate strains can be applied as a bacterial consortium for purification of polluted soil with high levels of PAHs.  相似文献   
58.
This study proposes a versatile criterion for estimating quality of images in electrical impedance tomography. The point spread function (PSF) is calculated throughout the domain based on the scattering of energy as responses to a small anomaly spirally moved from the centre to the boundary. The proposed PSF is a measure of weighted spatial variance (WSV) of the conductivity over the whole domain. For each element, the weighting factor is a normalized multiplication of the area of that element by its square intensity. The WSV collectively incorporates all image attributes, i.e., spatial resolution, artifact, amplitude response, positioning error and shape deformation. The location of artifacts, which significantly influences reconstructed images in reality, is taken into account as well. The results illustrate that the proposed measure is more tolerant than existing criteria in evaluating performance of EIT systems in both theory and practice.  相似文献   
59.
Wireless Personal Communications - Software Defined Networks (SDNs) have accelerated and simplified the management, configuration and error detection in today’s networking systems. However,...  相似文献   
60.
In this paper, the context of modeling of the impact of mismatch and statistical variations on analogue circuit building blocks is emphasized. The aim is to develop a new algorithm which predicts the statistical behavior of important parameters of an amplifier including output resistance, voltage gain and trans-conductance. The relative error of standard deviation of statistical parameters will remain less than 5% compared with the most accurate Monte-Carlo (MC) simulations using atomistic library model-cards. In comparison with other models which are based on the normal distribution of parameters, the proposed model does not need this limiting presumption. On the other hand, the proposed algorithm is more efficient compared with time consuming MC atomistic simulations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号