首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7149篇
  免费   370篇
  国内免费   19篇
电工技术   77篇
综合类   10篇
化学工业   1156篇
金属工艺   237篇
机械仪表   319篇
建筑科学   122篇
矿业工程   1篇
能源动力   269篇
轻工业   513篇
水利工程   24篇
石油天然气   13篇
无线电   1348篇
一般工业技术   1275篇
冶金工业   1295篇
原子能技术   87篇
自动化技术   792篇
  2023年   65篇
  2022年   81篇
  2021年   161篇
  2020年   94篇
  2019年   130篇
  2018年   172篇
  2017年   153篇
  2016年   199篇
  2015年   163篇
  2014年   243篇
  2013年   457篇
  2012年   384篇
  2011年   484篇
  2010年   328篇
  2009年   380篇
  2008年   327篇
  2007年   278篇
  2006年   232篇
  2005年   238篇
  2004年   170篇
  2003年   186篇
  2002年   168篇
  2001年   130篇
  2000年   131篇
  1999年   138篇
  1998年   477篇
  1997年   267篇
  1996年   217篇
  1995年   176篇
  1994年   122篇
  1993年   125篇
  1992年   63篇
  1991年   70篇
  1990年   55篇
  1989年   53篇
  1988年   41篇
  1987年   49篇
  1986年   29篇
  1985年   31篇
  1984年   23篇
  1983年   21篇
  1982年   26篇
  1981年   20篇
  1980年   30篇
  1979年   6篇
  1978年   9篇
  1977年   28篇
  1976年   61篇
  1975年   11篇
  1971年   5篇
排序方式: 共有7538条查询结果,搜索用时 125 毫秒
51.
Plastic deformation in a multifunctional Ti-Nb-Ta-Zr-O alloy   总被引:7,自引:0,他引:7  
Mechanisms for plastic deformation in the newly developed Ti-24 at. pct (Ta + Nb + V)-(Zr,Hf)-O alloys (Gum Metal) were investigated in relation to their unique properties. Transmission electron microscopy revealed that the microstructure after deformation was characterized by highly distorted crystal images, which are accompanied by numerous “giant faults.” Such plastic behavior implies that a large amount of elastic stain energy was stored discretely and hierarchically during cold working. Calculated elastic constants of the Ti-X (Nb,Ta,Mo,V) binary systems predicted that Young’s modulus in 〈001〉 and shear moduli along some directions including slip systems in a bcc crystal were extraordinary small. The low modulus not only well explains the highly distorted microstructure observed in the cold-worked specimens, but also signifies that ideal shear strength of the developed alloys is a very small value, which is close to the practical strength required for plastic deformation in the alloy. This implies that the giant faults observed in the deformed specimen were formed without the aid of dislocation glide.  相似文献   
52.
Due to interference, path loss, multipath fading, background noise, and many other factors, wireless communication normally cannot provide a wireless link with both a high data rate and a long transmission range. To address this problem, striping network traffic in parallel over multiple lower-data-rate but longer-transmission-range wireless channels may be used. In this paper, we propose a new striping method and evaluate its performances over multiple IEEE 802.11(b) channels under various conditions. Our extensive simulation results show that this method is quite effective for such an application. S.Y. Wang is an Associate Professor of the Department of Computer Science and Information Engineering at National Chiao Tung University, Taiwan. He received his Master and Ph.D. degree in computer science from Harvard University in 1997 and 1999, respectively. His research interests include wireless networks, Internet technologies, network simulations, and operating systems. He is the author of the NCTUns 2.0 network simulator and emulator, which is being widely used by network and communication researchers. More information about the tool is available at http://NSL.csie.nctu.edu.tw/nctuns.html. C.H. Hwang received his master degree in computer science from NCTU in 2002 and currently is working for a network company. C.L. Chou currently is a third-year Ph.D. student at the Department of Computer Science and Information Engineering, National Chiao TungUniversity (NCTU), Taiwan. He received his master degree in computer science from NCTU in 2002.  相似文献   
53.
54.
Efficient OVSF code assignment and reassignment strategies in UMTS   总被引:1,自引:0,他引:1  
This paper presents an integrated solution for code management, assignment, and reassignment problems in UMTS. We propose a new architecture for code management and, based upon this new architecture, a code assignment strategy, referred to as "crowded-group first strategy". Our system architecture and code assignment strategy represent significant improvements both in the time complexity and the maintenance complexity. Moreover, the code blocking probability of the crowded-group first strategy is competitive to that of the other strategies. In this paper, we also propose a new code reassignment strategy, called the "crowded-branch first strategy". The main objective of this reassignment strategy is to reduce reassigned call probability with low computation overhead and extend this strategy for the general case. In order to systematically analyze the performances of the code assignment strategy, we implement a simulator to analyze the code selection behavior and code blocking probability of each strategy. Moreover, we propose some new performance metrics, named "weighted code blocking", "reassigned call probability", and "ratio of actual code reassignments", in order to precisely measure the performance obtained by different strategies. From the simulation results, we show that our proposed strategies efficiently utilize the OVSF codes with low computation overhead.  相似文献   
55.
Empirical and theoretical evidence for the concept of working memory is considered. We argue that the major weakness of this concept is its loose connection with the knowledge about background perceptive and cognitive processes. Results of two relevant experiments are provided. The first study demonstrated the classical chunking effect in a speeded visual search and comparison task, the proper domain of a large-capacity very short term sensory store. Our second study was a kind of extended levels-of-processing experiment. We attempted to manipulate visual, phonological, and (different) executive components of long-term memory in the hope of finding some systematic relationships between these forms of processing. Indeed, the results demonstrated a high degree of systematicity without any apparent need for a concept such as working memory for the explanation. Accordingly, the place for working memory is at all the interfaces where our metacognitive strategies interfere with mostly domain-specific cognitive mechanisms. Working memory is simply our work with memory.  相似文献   
56.
Adaptive median filters: new algorithms and results   总被引:39,自引:0,他引:39  
Based on two types of image models corrupted by impulse noise, we propose two new algorithms for adaptive median filters. They have variable window size for removal of impulses while preserving sharpness. The first one, called the ranked-order based adaptive median filter (RAMF), is based on a test for the presence of impulses in the center pixel itself followed by a test for the presence of residual impulses in the median filter output. The second one, called the impulse size based adaptive median filter (SAMF), is based on the detection of the size of the impulse noise. It is shown that the RAMF is superior to the nonlinear mean L(p) filter in removing positive and negative impulses while simultaneously preserving sharpness; the SAMF is superior to Lin's (1988) adaptive scheme because it is simpler with better performance in removing the high density impulsive noise as well as nonimpulsive noise and in preserving the fine details. Simulations on standard images confirm that these algorithms are superior to standard median filters.  相似文献   
57.
58.
One proposed contributory mechanism for depressed ventricular performance after hypothermic, hyperkalemic cardioplegic arrest is a reduction in myocyte contractile function caused by alterations in intracellular calcium homeostasis. Because 2,3-butanedione monoxime decreases intracellular calcium transients, this study tested the hypothesis that 2,3-butanedione monoxime supplementation of the hyperkalemic cardioplegic solution could preserve isolated myocyte contractile function after hypothermic, hyperkalemic cardioplegic arrest. Myocytes were isolated from the left ventricles of six pigs. Magnitude and velocity of myocyte shortening were measured after 2 hours of incubation under normothermic conditions (37 degrees C, standard medium), hypothermic, hyperkalemic cardioplegic arrest (4 degrees C in Ringer's solution with 20 mEq potassium chloride and 20 mmol/L 2,3-butanedione monoxime). Because beta-adrenergic agonists are commonly employed after cardioplegic arrest, myocyte contractile function was examined in the presence of the beta-agonist isoproterenol (25 nmol/L). Hypothermic, hyperkalemic cardioplegic arrest and rewarming reduced the velocity (32%) and percentage of myocyte shortening (27%, p < 0.05). Supplementation with 2,3 butanedione monoxime normalized myocyte contractile function after hypothermic, hyperkalemic cardioplegic arrest. Although beta-adrenergic stimulation significantly increased myocyte contractile function under normothermic conditions and after hypothermic, hyperkalemic cardioplegic arrest, contractile function of myocytes exposed to beta-agonist after hypothermic, hyperkalemic cardioplegic arrest remained significantly reduced relative to the normothermic control group. Supplementation with 2,3-butanedione monoxime restored beta-adrenergic responsiveness of myocytes after hypothermic, hyperkalemic cardioplegic arrest. Thus, supplementation of a hyperkalemic cardioplegic solution with 2,3-butanedione monoxime had direct and beneficial effects on myocyte contractile function and beta-adrenergic responsiveness after cardioplegic arrest. A potential mechanism for the effects of 2,3-butanedione monoxime includes modulation of intracellular calcium transients or alterations in sensitivity to calcium. Supplementation with 2,3-butanedione monoxime may have clinical utility in improving myocardial contractile function after hypothermic, hyperkalemic cardioplegic arrest.  相似文献   
59.
We propose a new service for digital mobile communication systems. The service enables two or more users to hold a secure conference. Two requirements must be considered: privacy and authentication. Privacy involves ensuring that an eavesdropper cannot intercept the conversations of the parties holding the conference. Authentication involves ensuring that service is not obtained fraudulently in order to avoid usage charges. We present two new conference key distribution schemes for digital mobile communication systems. In these schemes, a group of users can generate a common secret keg over a public channel so that they may hold a secure conference  相似文献   
60.
Five different single-chain antibody fragments (scFv) against human cell-surface antigens were displayed on murine ecotropic retroviral vectors by fusing them to the Moloney SU envelope glycoprotein. The spacing between the scFv and the SU glycoprotein was varied by fusing the scFv to residue +7 or to residue +1 of Moloney SU and by inserting linker sequences of different lengths between the domains. All of the chimeric envelopes were efficiently incorporated into vector particles and could bind to human cells through their displayed antibody fragments, but did not infect them. The spacing between the scFvs and the SU glycoproteins had no significant effect on the efficiency of envelope expression or viral incorporation and did not affect the binding properties of the chimeric envelopes, nor did it influence the efficiency of targeted gene delivery to human cells by scFv-displaying vectors. However, on murine fibroblasts the infectivity of vectors incorporating the chimeric envelopes was strongly influenced by the length of the interdomain spacer. The titers were very low when the single-chain antibodies were fused through a tripeptide linker to SU residue +7 and were greatly enhanced (up to 10(5)-fold) when they were fused to SU residue +1 through a heptapeptide linker. These results point to the importance of steric interactions between the domains of chimeric envelope glycoproteins and may have implications for retroviral vector design for human gene therapy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号