首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   425996篇
  免费   5145篇
  国内免费   1326篇
电工技术   7920篇
综合类   467篇
化学工业   61612篇
金属工艺   16827篇
机械仪表   13358篇
建筑科学   10256篇
矿业工程   2257篇
能源动力   10719篇
轻工业   36604篇
水利工程   4501篇
石油天然气   7352篇
武器工业   75篇
无线电   52817篇
一般工业技术   83039篇
冶金工业   78661篇
原子能技术   9389篇
自动化技术   36613篇
  2021年   3368篇
  2019年   3345篇
  2018年   5554篇
  2017年   5709篇
  2016年   5996篇
  2015年   3838篇
  2014年   6559篇
  2013年   18837篇
  2012年   10730篇
  2011年   14693篇
  2010年   11689篇
  2009年   13135篇
  2008年   13904篇
  2007年   13928篇
  2006年   12315篇
  2005年   11387篇
  2004年   10969篇
  2003年   10742篇
  2002年   10081篇
  2001年   10228篇
  2000年   9859篇
  1999年   10097篇
  1998年   23751篇
  1997年   17112篇
  1996年   13472篇
  1995年   10271篇
  1994年   9231篇
  1993年   9005篇
  1992年   7098篇
  1991年   6693篇
  1990年   6385篇
  1989年   6216篇
  1988年   5944篇
  1987年   5207篇
  1986年   5023篇
  1985年   5904篇
  1984年   5488篇
  1983年   5023篇
  1982年   4623篇
  1981年   4829篇
  1980年   4444篇
  1979年   4437篇
  1978年   4260篇
  1977年   4959篇
  1976年   6379篇
  1975年   3863篇
  1974年   3814篇
  1973年   3826篇
  1972年   3056篇
  1971年   2855篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
71.
Static energy reduction techniques for microprocessor caches   总被引:1,自引:0,他引:1  
Microprocessor performance has been improved by increasing the capacity of on-chip caches. However, the performance gain comes at the price of static energy consumption due to subthreshold leakage current in cache memory arrays. This paper compares three techniques for reducing static energy consumption in on-chip level-1 and level-2 caches. One technique employs low-leakage transistors in the memory cell. Another technique, power supply switching, can be used to turn off memory cells and discard their contents. A third alternative is dynamic threshold modulation, which places memory cells in a standby state that preserves cell contents. In our experiments, we explore the energy and performance tradeoffs of these techniques. We also investigate the sensitivity of microprocessor performance and energy consumption to additional cache latency caused by leakage-reduction techniques.  相似文献   
72.
For the first time, we successfully fabricated and demonstrated high performance metal-insulator-metal (MIM) capacitors with HfO/sub 2/-Al/sub 2/O/sub 3/ laminate dielectric using atomic layer deposition (ALD) technique. Our data indicates that the laminate MIM capacitor can provide high capacitance density of 12.8 fF//spl mu/m/sup 2/ from 10 kHz up to 20 GHz, very low leakage current of 3.2 /spl times/ 10/sup -8/ A/cm/sup 2/ at 3.3 V, small linear voltage coefficient of capacitance of 240 ppm/V together with quadratic one of 1830 ppm/V/sup 2/, temperature coefficient of capacitance of 182 ppm//spl deg/C, and high breakdown field of /spl sim/6 MV/cm as well as promising reliability. As a result, the HfO/sub 2/-Al/sub 2/O/sub 3/ laminate is a very promising candidate for next generation MIM capacitor for radio frequency and mixed signal integrated circuit applications.  相似文献   
73.
The prohibitive - exponential in the number of users - computational complexity of the maximum-likelihood multiuser detector for direct-sequence code-division multiple-access communications has fueled an extensive research effort for the development of low-complexity multiuser detection alternatives. We show that we can efficiently and effectively approach the error rate performance of the optimum multiuser detector as follows. We utilize a multiuser zero-forcing or minimum mean-square error (MMSE) linear filter as a preprocessor and we establish that the output magnitudes, when properly scaled, provide a reliability measure for each user bit decision. Then, we prepare an ordered, reliability-based error search sequence of length linear in the number of users; it returns the most likely user bit vector among all visited options. Numerical and simulation studies for moderately loaded systems that permit exact implementation of the optimum detector indicate that the error rate performance of the optimum and the proposed detector are nearly indistinguishable over the whole predetection. signal-to-noise ratio range of practical interest. Similar studies for higher user loads (that prohibit comparisons with the optimum detector) demonstrate error rate performance gains of orders of magnitude in comparison with straight decorrelating or MMSE multiuser detection.  相似文献   
74.
This paper extends an analysis developed for tubular permanent-magnet machines to account for the effect of fringing associated with the finite length of the ferromagnetic armature core. The magnetic field distribution, established by using an analytical technique formulated in the cylindrical coordinate system, provides an accurate means of evaluating the effect of the fringing flux on the thrust force and the back-electromotive force. Finite-element calculations confirm the analytically derived results. In Part II of the paper, the analysis is used to predict the cogging force that results from end effects and to facilitate minimization of the force.  相似文献   
75.
The nonlocal enhancement in the velocities of charge carriers to ionization is shown to outweigh the opposing effects of dead space, increasing the avalanche speed of short avalanche photodiodes (APDs) over the predictions of a conventional local model which ignores both of these effects. The trends in the measured gain-bandwidth product of two short InAlAs APDs reported in the literature support this result. Relatively large speed benefits are predicted to result from further small reductions in the lengths of short multiplication regions.  相似文献   
76.
77.
Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence. When the user departs, the token and device lose contact and the device secures itself. We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep. Our evaluation shows this is done without inconveniencing the user, while imposing a minimal performance overhead  相似文献   
78.
79.
80.
High-performance circular probe-fed stacked patch antenna designs are explored through the use of numerical optimization. New trends are sought to aid understanding and to suggest novel solutions. We describe the optimization technique, present a new design trend relating efficiency and bandwidth to the choice of substrate dielectric, and propose and demonstrate a novel, optimized antenna achieving 33% bandwidth whilst maintaining greater than 80% surface wave efficiency.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号