首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1405篇
  免费   42篇
  国内免费   13篇
电工技术   25篇
综合类   12篇
化学工业   273篇
金属工艺   22篇
机械仪表   43篇
建筑科学   55篇
矿业工程   25篇
能源动力   45篇
轻工业   72篇
水利工程   26篇
石油天然气   17篇
无线电   107篇
一般工业技术   228篇
冶金工业   220篇
原子能技术   27篇
自动化技术   263篇
  2022年   10篇
  2021年   9篇
  2020年   9篇
  2019年   21篇
  2018年   25篇
  2017年   28篇
  2016年   25篇
  2015年   22篇
  2014年   27篇
  2013年   113篇
  2012年   58篇
  2011年   84篇
  2010年   52篇
  2009年   55篇
  2008年   73篇
  2007年   64篇
  2006年   39篇
  2005年   50篇
  2004年   51篇
  2003年   32篇
  2002年   35篇
  2001年   28篇
  2000年   24篇
  1999年   25篇
  1998年   28篇
  1997年   34篇
  1996年   36篇
  1995年   37篇
  1994年   31篇
  1993年   17篇
  1992年   23篇
  1991年   17篇
  1990年   16篇
  1989年   13篇
  1988年   10篇
  1987年   16篇
  1986年   21篇
  1985年   16篇
  1984年   14篇
  1983年   11篇
  1982年   13篇
  1980年   11篇
  1979年   11篇
  1978年   9篇
  1977年   11篇
  1976年   10篇
  1975年   8篇
  1974年   8篇
  1973年   12篇
  1972年   9篇
排序方式: 共有1460条查询结果,搜索用时 18 毫秒
11.
Despite 30-year development of carbon nanotube (CNT) based materials, harnessing the outstanding nanoscale properties of individual CNT for macroscale applications remains challenging. High specific surface area, a crucial feature of CNTs, often suffers from the formation of tightly packed bundles with inaccessible “dead space”. Herein, a novel “microwave shock” approach to open the “dead space” trapped within bundles is reported. Employing N2 ambient during microwave irradiation, CNT bundles undergo an efficient structural alteration and interfacial modification simultaneously due to the strong radiative coupling, while the graphitic structure remains undamaged. In this way, a 15-fold increase (from 42 to 648 m2 g−1) in the interstitial surface area as well as the lithiophilic functionalization (≈1 atom% nitrogen doping) are achieved without the degradation of other properties. Furthermore, to highlight the merits of this microwave shock process, the treated CNT films are applied as a host material for the anode in a lithium metal battery and demonstrate the suppression of dendritic lithium growth and improve cycling stability. This microwave shock approach provides an efficient avenue to modify nanocarbon-based materials for further applications.  相似文献   
12.
Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities   总被引:12,自引:0,他引:12  
We show how to find sufficiently small integer solutions to a polynomial in a single variable modulo N, and to a polynomial in two variables over the integers. The methods sometimes extend to more variables. As applications: RSA encryption with exponent 3 is vulnerable if the opponent knows two-thirds of the message, or if two messages agree over eight-ninths of their length; and we can find the factors of N=PQ if we are given the high order bits of P. Received 21 December 1995 and revised 11 August 1996  相似文献   
13.
Zhang  Zhi‐Li  Liu  Zhen  Kurose  Jim  Towsley  Don 《Telecommunication Systems》1997,7(1-3):125-152
Provision of Quality‐of‐Service (QoS) guarantees is an important and challenging issue in the design of integrated‐services packet networks. Call admission control is an integral part of the challenge and is closely related to other aspects of networks such as service models, scheduling disciplines, traffic characterization and QoS specification. In this paper we provide a theoretical framework within which call admission control schemes with multiple statistical QoS guarantees can be constructed for the Generalized Processor Sharing (GPS) scheduling discipline. Using this framework, we present several admission control schemes for both session‐based and class‐based service models. The theoretical framework is based on recent results in the statistical analysis of the GPS scheduling discipline and the theory of effective bandwidths. Both optimal schemes and suboptimal schemes requiring less computational effort are studied under these service models. The QoS metric considered is loss probability. This revised version was published online in June 2006 with corrections to the Cover Date.  相似文献   
14.
A Software-Optimized Encryption Algorithm   总被引:2,自引:0,他引:2  
We describe the software-efficient encryption algorithm SEAL 3.0. Computational cost on a modern 32-bit processor is about 4 clock cycles per byte of text. The cipher is a pseudorandom function family: under control of a key (first preprocessed into an internal table) it stretches a 32-bit position index into a long, pseudorandom string. This string can be used as the keystream of a Vernam cipher. Received 3 May 1996 and revised 17 September 1997  相似文献   
15.
本文系统地研究了原型沙和模型沙(电木粉)的基本运动特性。首次提出了可应用于高含沙水流模型试验的相似关系,据此理论建造了黄河小浪底枢纽1:80的正态泥沙模型。研究了小浪底工程不同运用阶段的泥沙问题。同时,还重点研究了高含沙异重流和泄水建筑物的防淤堵问题。  相似文献   
16.
This paper studies the problem of detection of directional antennas and omni-directional antennas by hostile detection systems. We present a model for calculating the probability of detecting a transmitter at arbitrary location around the transmitter. Our study shows that, if a directional antenna employs the same transmit power as an omni-directional antenna, the directional antenna can not decrease the probability of being detected. In some scenarios, a directional antenna is more likely to be detected than an omni-directional antenna. However, if a directional antenna provides the same Effective Isotropic Radiated Power in the direction of the receiver as an omni-directional antenna, the transmit power needed by a directional antenna to send data is much less than that of an omni-directional antenna. In this scenario, the probability of detecting a directional antenna is reduced by over 90%. This reveals that directional antennas can be used to build a secure path to send data at low probability of being detected by adversaries.  相似文献   
17.
Considers rate-based flow control throttles feeding a sequence of single server infinite capacity queues. Specifically, the authors consider two types of throttles, the token bank and the leaky bucket. They show that the cell waiting times at the downstream queues are increasing functions of the token buffer capacity. These results are established when the rate-based throttles have finite capacity data buffers as well as infinite capacity buffers. In the case that the data buffer has finite capacity, they require that the sum of the capacities of the data buffer and token buffer be a constant. Last, they establish similar results for the process of number of losses at the last downstream queue in the case that the waiting buffer has finite capacity  相似文献   
18.
Spatio-temporal EEG source localization using simulated annealing   总被引:6,自引:0,他引:6  
The estimation of multiple dipole parameters in spatio-temporal source modeling (STSM) of electroencephalographic (EEG) data is a difficult nonlinear optimization problem due to multiple local minima in the cost function. A straightforward iterative optimization approach to such a problem is very susceptible to being trapped in a local minimum, thereby resulting in incorrect estimates of the dipole parameters. Here, the authors present and evaluate a more robust optimization approach based on the simulated annealing algorithm. The complexity of this approach for the STSM problem was reduced by separating the dipole parameters into linear (moment) and nonlinear (location) components. The effectiveness of the proposed method and its superiority over the traditional nonlinear simplex technique in escaping local minima were tested and demonstrated through computer simulations. The annealing algorithm and its implementation for multidipole estimation are also discussed. The authors found the simulated annealing approach to be 7-31% more effective than the simplex method at converging to the true global minimum for a number of different kinds of three-dipole problems simulated in this work. In addition, the computational cost of the proposed approach was only marginally higher than its simplex counterpart. The annealing method also yielded similar solutions irrespective of the initial guesses used. The proposed simulated annealing method is an attractive alternative to the simplex method that is currently more common in dipole estimation applications  相似文献   
19.
Wearable strain sensors are widely researched as core components in electronic skin. However, their limited capability of detecting only a single axial strain, and their low sensitivity, stability, opacity, and high production costs hinder their use in advanced applications. Herein, multiaxially highly sensitive, optically transparent, chemically stable, and solution‐processed strain sensors are demonstrated. Transparent indium tin oxide and zinc oxide nanocrystals serve as metallic and insulating components in a metal–insulator matrix and as active materials for strain gauges. Synergetic sensitivity‐ and stability‐reinforcing agents are developed using a transparent SU‐8 polymer to enhance the sensitivity and encapsulate the devices, elevating the gauge factor up to over 3000 by blocking the reconnection of cracks caused by the Poisson effect. Cross‐shaped patterns with an orthogonal crack strategy are developed to detect a complex multiaxial strain, efficiently distinguishing strains applied in various directions with high sensitivity and selectivity. Finally, all‐transparent wearable strain sensors with Ag nanowire electrodes are fabricated using an all‐solution process, which effectively measure not only the human motion or emotion, but also the multiaxial strains occurring during human motion in real time. The strategies can provide a pathway to realize cost‐effective and high‐performance wearable sensors for advanced applications such as bio‐integrated devices.  相似文献   
20.
目前光纤电路的应用范围不只是限于极远距离的高速率数据传输.标准的光纤连接器正在逐渐扩展其应用范围,从激光外科手术到水下摄像设备,从石油化工厂的外界环境到原子反应堆的内部,我们都可以找到光纤连接器的应用.本文的目的是想给刚进入光纤连接器领域的工程师们提供一些知识,帮助他们认识连接器的基本类型和安装风格,本文所介绍的内容可以为读者提供连接器性能和价格方面的参考.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号