首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13099篇
  免费   1007篇
  国内免费   488篇
电工技术   667篇
综合类   681篇
化学工业   2254篇
金属工艺   681篇
机械仪表   816篇
建筑科学   884篇
矿业工程   333篇
能源动力   411篇
轻工业   743篇
水利工程   176篇
石油天然气   852篇
武器工业   72篇
无线电   1816篇
一般工业技术   1686篇
冶金工业   721篇
原子能技术   89篇
自动化技术   1712篇
  2024年   33篇
  2023年   212篇
  2022年   319篇
  2021年   507篇
  2020年   327篇
  2019年   296篇
  2018年   336篇
  2017年   376篇
  2016年   351篇
  2015年   486篇
  2014年   660篇
  2013年   800篇
  2012年   771篇
  2011年   926篇
  2010年   777篇
  2009年   715篇
  2008年   759篇
  2007年   689篇
  2006年   746篇
  2005年   665篇
  2004年   424篇
  2003年   361篇
  2002年   296篇
  2001年   276篇
  2000年   275篇
  1999年   395篇
  1998年   363篇
  1997年   286篇
  1996年   277篇
  1995年   191篇
  1994年   179篇
  1993年   117篇
  1992年   98篇
  1991年   68篇
  1990年   58篇
  1989年   37篇
  1988年   30篇
  1987年   11篇
  1986年   25篇
  1985年   4篇
  1984年   10篇
  1983年   7篇
  1982年   16篇
  1981年   9篇
  1980年   8篇
  1979年   5篇
  1977年   4篇
  1976年   5篇
  1975年   3篇
  1974年   2篇
排序方式: 共有10000条查询结果,搜索用时 491 毫秒
991.
提出了一种基于MEMS技术的在线式微波功率传感器结构,并对该结构进行了理论分析、设计、制作和测量.该结构通过测量由MEMS膜耦合出的一小部分微波功率实现功率的测量.该结构制作工艺与GaAs MMIC工艺完全兼容.测量结果显示,在12GHz频率以内,微波功率传感器的反射系数小于-15dB,插入损耗小于2dB,在10GHz中心频率下的灵敏度为10 4μV/mW.  相似文献   
992.
在蓝宝石衬底表面无氮化、低Ⅴ/Ⅲ比的情况下,采用1200℃的衬底温度、5kPa反应室气压,用MOCVD方法在蓝宝石衬底上生长出了表面原子级光滑的AlN外延层.原子力显微镜测试表明其平均粗糙度为0.44nm,X射线衍射(0002)回摆曲线FWHM为166".实验结果和分析表明,极性和气相反应是影响AlN表面形貌的主要原因.以原子级光滑的AlN为模板生长出了高质量的高Al组分的n型AlGaN,证实了AlN模板具有较好的质量.  相似文献   
993.
This paper considers robust absolute stability of Lurie control systems. Particular attention is given to the systems with parameters having uncertain, but bounded values. Such so‐called Lurie interval control systems have wide applications in practice. In this paper, a number of sufficient and necessary conditions are derived by using the theories of Hurwitz matrix, M matrix and partial variable absolute stability. Moreover, several algebraic sufficient and necessary conditions are provided for the robust absolute stability of Lurie interval control systems. These algebraic conditions are easy to be verified and convenient to be used in applications. Three mathematical examples and a practical engineering problem are presented to show the applicability of theoretical results. Numerical simulation results are also given to verify the analytical predictions. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   
994.
分布式电源大规模接入城市电网会给城市电网的故障特征带来一定的影响,其出力的随机性会引起故障特征的不确定。针对现有故障分析方法未考虑出力随机性的影响,提出一种基于蒙特卡洛法的含分布式电源的城市电网故障分析方法。首先,基于分布式电源出力的概率模型,利用蒙特卡洛法进行随机抽样;然后,通过PQ控制和低电压穿越策略下的故障模型进行计算,形成故障电压、短路电流的概率分布;最后,通过算例进行仿真分析。结果表明,分布式电源接入城市电网后故障特征具有概率特性,该方法计及分布式电源出力随机性的影响,可得故障电压、短路电流的概率分布,可对城市电网故障特性分析以及整定值的选取提供依据。  相似文献   
995.
This paper describes a novel strategy to weaken the piezopotential screening effect by forming Schottky junctions on the ZnO surface through the introduction of Au particles onto the surface. With this approach, the piezoelectric-energyconversion performance was greatly enhanced. The output voltage and current density of the Au@ZnO nanoarray-based piezoelectric nanogenerator reached 2 V and 1 μA/cm2, respectively, 10 times higher than the output of pristine ZnO nanoarray-based piezoelectric nanogenerators. We attribute this enhancement to dramatic suppression of the screening effect due to the decreased carrier concentration, as determined by scanning Kelvin probe microscope measurements and impedance analysis. The lowered capacitance of the Au@ZnO nanoarraybased piezoelectric nanogenerator also contributes to the improved output. This work provides a novel method to enhance the performance of piezoelectric nanogenerators and possibly extends to piezotronics and piezophototronics.
  相似文献   
996.
There have been many studies focusing on individuals’ knowledge sharing behavior in the organizational setting. With the rapid prevalence of social networking sites, many people began to express their thoughts or share their knowledge via Facebook website. Facebook is an open environment which does not provide any immediate monetary benefits to its users. Its Groups members’ knowledge sharing behavior could be different from the ones in organizations. We proposed a research model to examine factors which promote the Facebook Groups users’ willingness to share knowledge. The factors in the study include extrinsic motivation, social and psychological forces, and social networking sharing culture. We used PLS to test our proposed hypotheses based on 271 responses collected through an online survey. Our results indicated that reputation would affect knowledge sharing attitude of Groups members and sense of self-worth would directly and indirectly (through subjective norm) affect the attitude. In addition, social networking sharing culture (fairness, identification, and openness) is the most significant factor, not only directly affecting knowledge sharing intention, but also indirectly influencing the sharing intention through subjective norm and knowledge sharing attitude.  相似文献   
997.
Language understanding is one of the most important characteristics for human beings. As a pervasive phenomenon in natural language, metaphor is not only an essential thinking approach, but also an ingredient in human conceptual system. Many of our ways of thinking and experiences are virtually represented metaphorically. With the development of the cognitive research on metaphor, it is urgent to formulate a computational model for metaphor understanding based on the cognitive mechanism, especially with the view to promoting natural language understanding. Many works have been done in pragmatics and cognitive linguistics, especially the discussions on metaphor understanding process in pragmatics and metaphor mapping representation in cognitive linguistics. In this paper, a theoretical framework for metaphor understanding based on the embodied mechanism of concept inquiry is proposed. Based on this framework, ontology is introduced as the knowledge representation method in metaphor understanding, and metaphor mapping is formulated as ontology mapping. In line with the conceptual blending theory, a revised conceptual blending framework is presented by adding a lexical ontology and context as the fifth mental space, and a metaphor mapping algorithm is proposed.  相似文献   
998.
廖飞  龚恒翔  梁霄 《微型机与应用》2013,32(16):23-25,29
在分析Toshiba公司TCD1209D型CCD工作原理的基础上,分析了驱动时序的关系,详细介绍了驱动电路的设计和实现方法.用Verilog语言设计了TCD 1209D的驱动时序控制电路;选用CyclonelⅣ系列FPGA器件,使用QuartusⅡ软件对设计电路进行了功能仿真,实现了TCD1209D的高速时序驱动;在CycloneⅣ芯片平台上测试了TCD 1209D的实际输出信号.实验结果显示,CCD信号噪声较小,验证了所设计驱动电路的可行性,确定了相关双采样的时刻和位置,为小型CCD测量系统的设计提供了有益参考.  相似文献   
999.
提出了一种利用有用时序偏差来提高电路性能的方法,利用时钟偏差规划算法在时钟树综合之前对时序偏差重新调整规划,以提高电路的性能.使用ISCAS89作为实验对象来验证算法并进行了分析.  相似文献   
1000.
Network forensics supports capabilities such as attacker identification and attack reconstruction, which complement the traditional intrusion detection and perimeter defense techniques in building a robust security mechanism. Attacker identification pinpoints attack origin to deter future attackers, while attack reconstruction reveals attack causality and network vulnerabilities. In this paper, we discuss the problem and feasibility of back tracking the origin of a self-propagating stealth attack when given a network traffic trace for a sufficiently long period of time. We propose a network forensics mechanism that is scalable in computation time and space while maintaining high accuracy in the identification of the attack origin. We further develop a data reduction method to filter out attack-irrelevant data and only retain evidence relevant to potential attacks for a post-mortem investigation. Using real-world trace driven experiments, we evaluate the performance of the proposed mechanism and show that we can trim down up to 97% of attack-irrelevant network traffic and successfully identify attack origin.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号