首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   522120篇
  免费   8233篇
  国内免费   3000篇
电工技术   9649篇
技术理论   5篇
综合类   1699篇
化学工业   80417篇
金属工艺   20653篇
机械仪表   15311篇
建筑科学   13047篇
矿业工程   3063篇
能源动力   12196篇
轻工业   47297篇
水利工程   5655篇
石油天然气   10752篇
武器工业   290篇
无线电   57506篇
一般工业技术   101575篇
冶金工业   96946篇
原子能技术   11729篇
自动化技术   45563篇
  2021年   4923篇
  2020年   3604篇
  2019年   4340篇
  2018年   7528篇
  2017年   7489篇
  2016年   8073篇
  2015年   5702篇
  2014年   9196篇
  2013年   23596篇
  2012年   15130篇
  2011年   19749篇
  2010年   15621篇
  2009年   17028篇
  2008年   18243篇
  2007年   18261篇
  2006年   15721篇
  2005年   14089篇
  2004年   13314篇
  2003年   12687篇
  2002年   12380篇
  2001年   12244篇
  2000年   11495篇
  1999年   11941篇
  1998年   28509篇
  1997年   20403篇
  1996年   15662篇
  1995年   11841篇
  1994年   10584篇
  1993年   10505篇
  1992年   7777篇
  1991年   7434篇
  1990年   7385篇
  1989年   7325篇
  1988年   6815篇
  1987年   6019篇
  1986年   6042篇
  1985年   6736篇
  1984年   6390篇
  1983年   5881篇
  1982年   5336篇
  1981年   5612篇
  1980年   5317篇
  1979年   5256篇
  1978年   5222篇
  1977年   5641篇
  1976年   7505篇
  1975年   4530篇
  1974年   4320篇
  1973年   4344篇
  1972年   3694篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
42.
Why does it pay to be selfish in a MANET?   总被引:2,自引:0,他引:2  
Routing protocols for a mobile ad hoc network have assumed that all mobile nodes voluntarily participate in forwarding others' packets. This was a reasonable assumption because all MNs in a MANET belonged to a single authority. In the near future, however, a MANET may consist of MNs that belong to many different organizations since numerous civilian applications are expected to crop up. In this situation, some MNs may run independently and purposely decide not to forward packets so as to save their own energy. This could potentially lead to network partitioning and corresponding performance degradation. To minimize such situations in MANETs, many studies have explored the use of both the carrot and the stick approaches by having reputation-based, credit-payment, and game theory schemes. This article summarizes existing schemes, identifies their relative advantages, and projects future directions  相似文献   
43.
A recent approach to solution of 2D scattering problems for electromagnetic waves scattered by thin screens is analyzed. With the use of examples of scattering by a strip and an unclosed cylindrical surface, it is shown that the proposed approach has no advantages in terms of the efficiency of numerical solution over a well-known approach based on exact integral equations for currents that have singular kernels and that are solved with the Krylov-Bogoliubov method.  相似文献   
44.
The objective of this work was to determine the significant parameters of a 3-GW 200-kV dc superconducting cable system which influence the transient voltage distribution in the various parts of the cable. The cable system consists of four coaxial metallic cylinders. It was found that the dielectric constant and the electrical resistivity of the soil significantly affect the severity of the transient voltages; lower dielectric constant and higher resistivity of the soil will increase the magnitudes of the transient voltages by increasing the earth-return impedance. It was also found that the effect of the conductor internal impedances of the cable is insignificant. Shorting the coaxial cylinders of the cryogen flow and the cryostat will lessen the severity of the transient voltages. Grounding the second, third, and fourth cylinders at regular intervals with low-impedance grounding impedance will also improve the transient performance of the cable. More research is needed to evaluate these procedures.  相似文献   
45.
The Boundary Element Method (BEM) incorporating the Embedded Cell Approach (ECA) has been used to analyse the effects of constituent material properties, fibre spatial distribution and microcrack damage on the localised behaviour of transversely fractured, unidirectional fibre-reinforced composites. Three specific composites, i.e., glass fibre reinforced polyester, carbon fibre reinforced epoxy and a glass-carbon hybrid, are considered. The geometrical structures examined were perfectly periodic, uniformly spaced fibre arrangements in square and hexagonal embedded cells. In addition, numerical simulations were also conducted using embedded cells containing randomly distributed fibres. The models involve both elastic fibres and matrix, with the interfaces between the different phases being fully bonded. The results indicate that the constituent material properties (two phase composite) and spatial distribution have a significant effect on the localised stress distributions around the primary crack tip. However, the strain energy release rate associated with crack propagation is predominantly influenced by the material composition. The three-phase hybrid composite exhibited an apparent intermediate fracture toughness value, compared to the all-glass and all-carbon models. Furthermore, the strain energy release rate for the macrocrack lowers as it enters a zone of localised damage (microcracking). The presence of microcracks relaxes the stress field, which can result in a significant reduction in the energetics of the primary crack.  相似文献   
46.
Mössbauer effect measurements and physicochemical analysis demonstrate that annealing of amorphous Fe–P–Mn alloys leads to the formation of a nanocrystalline structure.  相似文献   
47.
One of the ultimate miniaturizations in nanotechnology is molecular electronics, where devices will consist of individual molecules. There are many complications associated with the use of molecules in electronic devices, such as the electronic perturbations in the molecule associated with being bonded to an electrode, how electrons traverse the metal-molecule junction, and the difficulty of macroscopically addressing single to very few molecules. Whether fabricating a test structure or a usable device, the use of self-assembly is fundamental to the fabrication of molecular electronic devices. We will discuss how to fabricate self-assembled monolayers into test assemblies and how to use intermolecular interactions to direct molecules into desired positions to create nanostructures and to connect functional molecules to the outside world. These assemblies serve as test structures for measurements on single or bundled molecules. The development of several experimental techniques, including various scanning probes, mercury drop junctions, break junctions, nanopores, crossed wires, and other techniques using nanoparticles have enabled the ability to test these structures and make reproducible measurements on single molecules. Many of these methods have been developed to test molecules with potential for integration into devices such as oligo (phenylene-ethynylene) molecules and other /spl pi/-conjugated molecules, in ensemble or single-molecule measurements.  相似文献   
48.
The oxidation/sulphidation behaviour of a Ti‐46.7Al‐1.9W‐0.5Si alloy with a TiAl3 diffusion coating was studied in an environment of H2/H2S/H2O at 850oC. The kinetic results demonstrate that the TiAl3 coating significantly increased the high temperature corrosion resistance of Ti‐46.7Al‐1.9W‐0.5Si. The SEM, EDX, XRD and TEM analysis reveals that the formation of an Al2O3 scale on the surface of the TiAl3‐coated sample was responsible for the enhancement of the corroison resistance. The Ti‐46.7Al‐1.9W‐0.5Si alloy was also modified by Nb ion implantation. The Nb ion implanted and as received sampels were subjected to cyclic oxidation in an open air at 800oC. The Nb ion implantation not only increased the oxidation resistance but also substantially improved the adhesion of scale to the substrate.  相似文献   
49.
50.
Self-organized public-key management for mobile ad hoc networks   总被引:6,自引:0,他引:6  
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号