首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2687篇
  免费   63篇
  国内免费   7篇
电工技术   25篇
综合类   2篇
化学工业   563篇
金属工艺   61篇
机械仪表   78篇
建筑科学   73篇
矿业工程   6篇
能源动力   88篇
轻工业   177篇
水利工程   13篇
石油天然气   16篇
无线电   314篇
一般工业技术   442篇
冶金工业   570篇
原子能技术   22篇
自动化技术   307篇
  2023年   19篇
  2022年   37篇
  2021年   57篇
  2020年   42篇
  2019年   45篇
  2018年   50篇
  2017年   49篇
  2016年   56篇
  2015年   41篇
  2014年   55篇
  2013年   161篇
  2012年   74篇
  2011年   133篇
  2010年   84篇
  2009年   74篇
  2008年   90篇
  2007年   67篇
  2006年   80篇
  2005年   72篇
  2004年   57篇
  2003年   50篇
  2002年   44篇
  2001年   47篇
  2000年   52篇
  1999年   49篇
  1998年   170篇
  1997年   114篇
  1996年   86篇
  1995年   63篇
  1994年   68篇
  1993年   73篇
  1992年   34篇
  1991年   27篇
  1990年   29篇
  1989年   40篇
  1988年   25篇
  1987年   33篇
  1986年   23篇
  1985年   32篇
  1984年   21篇
  1983年   38篇
  1982年   42篇
  1981年   27篇
  1980年   19篇
  1979年   17篇
  1978年   16篇
  1977年   30篇
  1976年   29篇
  1974年   16篇
  1973年   15篇
排序方式: 共有2757条查询结果,搜索用时 12 毫秒
21.
When a sensor network is deployed to detect objects penetrating a protected region, it is not necessary to have every point in the deployment region covered by a sensor. It is enough if the penetrating objects are detected at some point in their trajectory. If a sensor network guarantees that every penetrating object will be detected by at least k distinct sensors before it crosses the barrier of wireless sensors, we say the network provides k-barrier coverage. In this paper, we develop theoretical foundations for k-barrier coverage. We propose efficient algorithms using which one can quickly determine, after deploying the sensors, whether the deployment region is k-barrier covered. Next, we establish the optimal deployment pattern to achieve k-barrier coverage when deploying sensors deterministically. Finally, we consider barrier coverage with high probability when sensors are deployed randomly. The major challenge, when dealing with probabilistic barrier coverage, is to derive critical conditions using which one can compute the minimum number of sensors needed to ensure barrier coverage with high probability. Deriving critical conditions for k-barrier coverage is, however, still an open problem. We derive critical conditions for a weaker notion of barrier coverage, called weak k-barrier coverage.  相似文献   
22.
23.
Studies on the diffusion of iodine into CdTe, mercury cadmium telluride (Hg0.8Cd0.2Te, referred to as MCT) and zinc cadmium telluride (Zn0.5Cd0.95Te, referred to as ZCT) in the temperature range of 20 to 600°C are compared and discussed. The concentration profiles were measured using a radiotracer sectioning technique. As with the diffusion studies using the halogens into CdTe, the profiles were composed of four parts to which a computer package consisting of the sum of four complementary error functions (erfc) gave satisfactory fits. The diffusivity for the diffusion of iodine into MCT was faster than for the diffusion into CdTe, which was faster than for the diffusion into ZCT. The high diffusivity for the fastest profile part at 20°C indicates that when iodine is diffused from the vapor into these materials, it is not a suitable long term stable dopant in devices where sharp junctions are required.  相似文献   
24.
Electric and magnetic dipole transition probabilities, fluorescence branching ratios, integrated emission coefficients, fluorescence efficiencies, and fluorescence lifetimes are determined for the lower lying states of Pr:LaCl3 using the Judd-Ofelt theory and calculated multiphonon emission probabilities. The results are used to characterize demonstrated mid-IR laser transitions and predict new potential mid-IR laser transitions in Pr:LaCl3  相似文献   
25.
The sex pheromone of aPlanotortrix excessana sibling species was investigated. Females were found to produce eight potential pheromone components: dodecyl acetate, tetradecyl acetate (14OAc). (Z)-5-tetradecenyl acetate (Z5-14OAc), (Z)-7-tetradecenyl acetate (Z7-14OAc), (Z)-9-tetradecenyl acetate, hexadecyl acetate, (Z)-7-hexadecenyl acetate, and (Z)-9-hexadecenyl acetate. When these compounds were bioassayed using field-trapping and wind-tunnel techniques, only 14OAc,Z5-14OAc, andZ7-14OAc were found to be behaviorally active. The sex pheromone glands of females of other species including,Planotortrix MBS,Planotortrix M,P. notophaea, Ctenopseustis servana, and aC. obliquana sibling species, were also found to containZ5-14OAc orZ7-14OAc, singly or in combination. In the case ofPlanotortrix M, the addition ofZ7-14OAc to the previously identified sex pheromone blend ofZ5-14OAc and 14OAc was found to increase trap captures of male moths of this species. Thus in these New Zealand species (and in some Australian species),Z5-14OAc andZ7-14OAc appear to be utilized in combination in pheromonal communication just as (Z)-11-tetradecenyl acetate and (E)-11-tetradecenyl acetate are used by many species of Holarctic Tortricidae in the tribe Archipini.Lepidoptera: Tortricidae: Tortricinae.  相似文献   
26.
简单廉价电路使用一个低成本按键开关就可以触发电源的开关.该电路可替换更高价格及外形较大的按键式机械开关.按键开关触发一个单稳电路.  相似文献   
27.
28.
In this letter, we propose an extension to the ordered subcarrier selection algorithm (OSSA) for orthogonal frequency division multiplexing (OFDM) systems. The result is a simple algorithm for minimizing the bit error rate of the OFDM system at a fixed throughput. The proposed algorithm employs multiple modulations (non-uniform bit loading) within an OFDM symbol. However, unlike existing bit loading algorithms that have a very high computational complexity, the proposed algorithm is based only on the ordered statistics of the subcarrier gains and is consequently very simple. After ordering the subcarriers based on their gains, progressively higher order modulations are used with increasing gains. The key aspect here that greatly simplifies the algorithm is that the modulation used on a subcarrier depends only on the position of its gain in the ordered set and not on the actual values of the gains. We show an analytical approach for determining the parameters of the algorithm.  相似文献   
29.
The status of long length, Bi2Sr2CaCu2O8+x (Bi-2212) wire development at the New York State Institute on Superconductivity (NYSIS) is reviewed and updated. Transport Jcs (4.2K, 0 T) of Bi-2212/Ag oxide powder-in-tube singlefilamentary tapes have reached 70,000-80,000, 50,000-60,000, and 30,000–40,000 A/cm2 for 1, 4–15, and 40–90 meter length tapes, respectively. The decrease in Jc as the tape length was increased from 15 to 90 meters was attributed to the (measured) sensitivity of Jc to temperature nonuniformities (±3‡C) in the box-type furnace used for annealing. To reduce this problem, a ringtype high-temperature furnace (∼3 meter diameter) was designed and constructed which provides a large-volume (∼13w × 10h × 10001 cm) processing zone with expected excellent temperature uniformity (±0.5‡C). The advantages of the ring-type furnace for processing of kilometer-length conductors are described.  相似文献   
30.
Condition monitoring of turbine generators, housed at British Energy nuclear power stations throughout the U.K., is implemented to diagnose incipient faults at an early stage, so corrective action can be taken to avoid the associated high costs of an unplanned shutdown. A prototype expert system has been developed that provides decision support to condition monitoring experts who monitor British Energy turbine generators. The expert system automatically interprets data from strategically positioned sensors and transducers on the turbine generator by applying expert knowledge in the form of heuristic rules. This paper reviews the application domain and describes the work undertaken in developing the prototype expert system. The paper also outlines a learning module design that uses an approach based on an analytical symbolic machine learning technique, explanation-based generalization, to semiautomatically derive heuristic rules for turbine generator fault diagnosis. The approach adopted by the learning module is explained in detail and a worked example demonstrates how the learning module can derive a fault heuristic from a single training example. The modular approach to capturing the causal fault and behavioral models is described, and the method in which the module will be integrated with the existing expert system has been outlined. A preliminary evaluation of the learning module design is discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号