首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   303030篇
  免费   5579篇
  国内免费   867篇
电工技术   5435篇
综合类   350篇
化学工业   45719篇
金属工艺   10939篇
机械仪表   9364篇
建筑科学   7404篇
矿业工程   1165篇
能源动力   7171篇
轻工业   30410篇
水利工程   3002篇
石油天然气   4070篇
武器工业   74篇
无线电   36390篇
一般工业技术   57206篇
冶金工业   56197篇
原子能技术   5551篇
自动化技术   29029篇
  2021年   3073篇
  2020年   2442篇
  2019年   3037篇
  2018年   5285篇
  2017年   5290篇
  2016年   5596篇
  2015年   3718篇
  2014年   5676篇
  2013年   14796篇
  2012年   9129篇
  2011年   11162篇
  2010年   8888篇
  2009年   9520篇
  2008年   10388篇
  2007年   10197篇
  2006年   8856篇
  2005年   8046篇
  2004年   7714篇
  2003年   7518篇
  2002年   7109篇
  2001年   7004篇
  2000年   6662篇
  1999年   6799篇
  1998年   17200篇
  1997年   12253篇
  1996年   9383篇
  1995年   7157篇
  1994年   6278篇
  1993年   6204篇
  1992年   4774篇
  1991年   4424篇
  1990年   4210篇
  1989年   3960篇
  1988年   3817篇
  1987年   3333篇
  1986年   3207篇
  1985年   3779篇
  1984年   3528篇
  1983年   3139篇
  1982年   2988篇
  1981年   3116篇
  1980年   2931篇
  1979年   2729篇
  1978年   2586篇
  1977年   3252篇
  1976年   4224篇
  1975年   2383篇
  1974年   2375篇
  1973年   2397篇
  1972年   1871篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
This paper extends an analysis developed for tubular permanent-magnet machines to account for the effect of fringing associated with the finite length of the ferromagnetic armature core. The magnetic field distribution, established by using an analytical technique formulated in the cylindrical coordinate system, provides an accurate means of evaluating the effect of the fringing flux on the thrust force and the back-electromotive force. Finite-element calculations confirm the analytically derived results. In Part II of the paper, the analysis is used to predict the cogging force that results from end effects and to facilitate minimization of the force.  相似文献   
52.
53.
Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence. When the user departs, the token and device lose contact and the device secures itself. We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep. Our evaluation shows this is done without inconveniencing the user, while imposing a minimal performance overhead  相似文献   
54.
High-performance circular probe-fed stacked patch antenna designs are explored through the use of numerical optimization. New trends are sought to aid understanding and to suggest novel solutions. We describe the optimization technique, present a new design trend relating efficiency and bandwidth to the choice of substrate dielectric, and propose and demonstrate a novel, optimized antenna achieving 33% bandwidth whilst maintaining greater than 80% surface wave efficiency.  相似文献   
55.
On the capacities of bipartite Hamiltonians and unitary gates   总被引:2,自引:0,他引:2  
We consider interactions as bidirectional channels. We investigate the capacities for interaction Hamiltonians and nonlocal unitary gates to generate entanglement and transmit classical information. We give analytic expressions for the entanglement generating capacity and entanglement-assisted one-way classical communication capacity of interactions, and show that these quantities are additive, so that the asymptotic capacities equal the corresponding 1-shot capacities. We give general bounds on other capacities, discuss some examples, and conclude with some open questions.  相似文献   
56.
Membrane separation technology represents an alternative way to achieve biomass retention in anaerobic bioreactors for wastewater treatment. Due to high biomass concentrations of anaerobic reactors, cake formation is likely to represent a major cause of flux decline. In the presented research, experiments are performed on the effect of biomass concentration and level of gas sparging on the hydraulic capacity of a submerged anaerobic membrane bioreactor. Both parameters significantly affected the hydraulic capacity, with biomass exerting the most pronounced effect. After 50 days of continuous operation the critical flux remained virtually unchanged, despite an increase in membrane resistance, suggesting that biomass characteristics and hydraulic conditions determine the bio-layer formation rather than the membrane's fouling level. The concept of bio-layer management is introduced to describe the programmed combination of actions performed in order to control the formation of biomass layer over membranes.  相似文献   
57.
Grapevine powdery mildew ( Erysiphe necator) affects grape yield and fruit quality worldwide. Managers of conventional vineyards rely mainly on synthetic fungicides and sulfur to control powdery mildew, while in organic vineyards sulfur is the main control agent, often in rotation with canola-based oils, bicarbonates and biological control agents. The efficacy of those materials has not been evaluated critically under field conditions in Australia. Accordingly, a range of materials showing most promise in previous greenhouse trials (Crisp et al. 2006 Australian Journal of Grape and Wine Research 12 , pp. 192–202) were assessed via field trials in commercial vineyards. Applications of either milk or whey (alone, or mixed with a canola oil-based product), as well as applications of potassium bicarbonate (commercial formulation), all reduced the severity of powdery mildew compared with untreated vines. Eight applications of a 1:10 dilution of milk, 45 g/L whey powder or programs comprising rotations of potassium bicarbonate plus oil and whey, applied at 10–14 day intervals, reduced the severity of powdery mildew to levels not significantly different from that on vines sprayed with sulfur (wettable powder, 3–6 g/L). However, the relative control of powdery mildew by the test materials in field trials was dependent on the susceptibility of the grapevine cultivar and the extent of spray coverage achieved. In vineyards where highly susceptible cultivars were planted, and spray coverage was compromised, the resultant control of powdery mildew was reduced; and sometimes to commercially unacceptable levels.  相似文献   
58.
Recent studies revealed that organic acids such as citric and oxalic acids seemed to be more promising as chemical extracting agents for removal of heavy metals from contaminated sludge, since they are biodegradable and can attain a higher metal extraction efficiency at mildly acidic pH compared to other extracting agents. Results of a lab-scale study on the efficiency of citric acid in the extraction of chromium (Cr), copper (Cu), lead (Pb), nickel (Ni) and zinc (Zn) from anaerobically digested sludge, revealed that citric acid seemed to be highly effective in extracting Cr (at 100%), Cu (at 88%), Ni (at 98%) and Zn (at 100%) at pH 2.33, mostly at 5 days leaching time except for Cu and Zn, which are at 1 day and 2 h contact times respectively. Lead removal at the same pH was also high at 95% but at a longer leaching time of 11 days. At pH 3, citric acid seemed to be highly effective in extracting Pb (at 100%) at 1 day leaching time, although higher removals were also attained for Ni (70%) and Zn (80%) at only 2 h leaching time. Chemical speciation studies showed that Cr, Cu and Ni in the sludge sample seem to predominate in residual fractions, while Pb and Zn were found mostly bound to organic and inorganic matter forms, hence the potential of the sludge for land application.  相似文献   
59.
Robust programming aims to prevent abnormal termination or unexpected actions and requires code to handle bad (invalid or absurd) inputs in a way that is consistent with the developer's intent. For example, if an internal error occurs, the program might terminate gracefully rather than simply failing, providing enough information for the programmer to debug the program and avoiding giving the user additional access or information. This article focuses on teaching these principles.  相似文献   
60.
In this letter, the concept of pseudorandom active reflector, based on the ultra-wideband (UWB) technology, is introduced. It consists of a simple device that repeats a slightly delayed version of the received UWB signal only in certain time intervals according to a suitable pseudorandom time-hopping sequence. An example of application of this device for accurate ranging in precise location systems is given. The advantages of this solution are in the hardware simplicity (only the analog section is present), in the low power consumption of the reflector and in the low timing constraint regarding the relative transmitter and reflector clock rates.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号