首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   200539篇
  免费   971篇
  国内免费   487篇
电工技术   4090篇
综合类   154篇
化学工业   26901篇
金属工艺   7529篇
机械仪表   5480篇
建筑科学   4067篇
矿业工程   748篇
能源动力   4727篇
轻工业   14575篇
水利工程   1787篇
石油天然气   2889篇
武器工业   7篇
无线电   27425篇
一般工业技术   37590篇
冶金工业   45486篇
原子能技术   3729篇
自动化技术   14813篇
  2021年   1310篇
  2020年   1077篇
  2019年   1405篇
  2018年   2136篇
  2017年   2115篇
  2016年   2243篇
  2015年   1537篇
  2014年   2642篇
  2013年   7997篇
  2012年   4493篇
  2011年   6169篇
  2010年   4949篇
  2009年   5783篇
  2008年   6176篇
  2007年   6216篇
  2006年   5656篇
  2005年   5317篇
  2004年   5267篇
  2003年   5102篇
  2002年   4936篇
  2001年   5317篇
  2000年   4929篇
  1999年   5448篇
  1998年   15637篇
  1997年   10328篇
  1996年   7936篇
  1995年   5793篇
  1994年   5020篇
  1993年   5026篇
  1992年   3391篇
  1991年   3266篇
  1990年   3226篇
  1989年   3056篇
  1988年   2791篇
  1987年   2242篇
  1986年   2307篇
  1985年   2615篇
  1984年   2320篇
  1983年   2067篇
  1982年   1907篇
  1981年   2047篇
  1980年   1796篇
  1979年   1668篇
  1978年   1662篇
  1977年   2028篇
  1976年   2708篇
  1975年   1427篇
  1974年   1371篇
  1973年   1318篇
  1972年   1129篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
This paper presents an artificial intelligence approach of using evolutionary programming to estimate the transient and subtransient parameters of a generator under normal operation. The estimation using evolutionary programming is compared with that using a corrected extended Kalman filter. The comparisons with both simulation and micromachine test results show that evolutionary programming is robust to search the real values of parameters even when the data are highly contaminated by noise, while with the extended Kalman filter, the estimation tends to diverge with such data  相似文献   
52.
Explicit analytic design rules are derived for both 3 dB and full adiabatic couplers. The design rules are in excellent agreement with numerical calculations using the beam propagation method (BPM). It is shown that the length scaling for 3 dB couplers compared to full couplers makes the former more difficult to design. The design for each case is optimized to obtain the upper limit of performance and a comparison is carried out between two different design geometries for both 3 dB and full adiabatic couplers  相似文献   
53.
54.
55.
Penetrating injuries of the eye are an important cause of unilateral visual loss. We studied a series of 82 cases of penetrating injuries treated here from 1987 through 1993. The injuries were caused by sharp objects in 66% and blunt trauma in 6%. The prognosis after a penetrating injury is greatly influenced by the nature of the injury and the extent of the initial drainage. Among factors associated with an unfavorable visual outcome were diminished preoperative visual acuity and scleral wounds with dense vitreous hemorrhage.  相似文献   
56.
As shown previously for two-dimensional geometries, anisotropy effects should not be ignored in electrical impedance tomography (EIT) and structural information is important for the reconstruction of anisotropic conductivities. Here, we describe the static reconstruction of an anisotropic conductivity distribution for the more realistic three-dimensional (3-D) case. Boundaries between different conductivity regions are anatomically constrained using magnetic resonance imaging (MRI) data. The values of the conductivities are then determined using gradient-type-algorithms in a nonlinear-indirect approach. At each iteration, the forward problem is solved by the finite element method. The approach is used to reconstruct the 3-D conductivity profile of a canine torso. Both computational performance and simulated reconstruction results are presented together with a detailed study on the sensitivity of the prediction error with respect to different parameters. In particular, the use of an intracavity catheter to better extract interior conductivities is demonstrated  相似文献   
57.
58.
A three-dimensional finite-element method hybridized with the spectral/spatial domain method of moments is presented for the analysis of ferrite-tuned cavity-backed slot antennas. The cavity, which is partially filled with magnetized ferrite layers, is flush mounted on an infinite ground plane with possible dielectric or magnetic overlay. The antenna operates primarily in the ultrahigh-frequency band. The finite-element method is used to solve for the electric-field distribution inside the cavity, whereas the spectral-domain approach is used to solve for the exterior region. An asymptotic extraction of the exponential behavior of the Green's function followed by a spatial evaluation of the resulting integral is used to improve computational speed. Radar cross section, input impedance, return loss, gain, and efficiency of ferrite-tuned cavity-backed slots (CBS) are calculated for various biasing conditions. Numerical results are compared with experimental data  相似文献   
59.
We report the modulation characteristics of a waveguide-type optical frequency comb generator (WG-OFCG) with the advantages of compactness, high modulation index and low driving power. The characteristics of the optical frequency comb (OFC) generated when the modulation index exceeds 2π are discussed. The power of the modulation sidebands was measured by the optical heterodyne method with an external-cavity laser as a local oscillator. The dependence of the modulation index of the WG-OFCG on the modulation frequency up to 40 GHz was measured. The generation span of the OFC at the modulation frequency detuned from an integer multiple of the free spectral range (FSR) is discussed  相似文献   
60.
A new token-passing mechanism, priority token passing, which features real-time access and fast detection and recovery of transmission errors, is discussed in detail in comparison with standard token-passing protocols, and its large-scale integration (LSI)-oriented design concept is described. Priority token passing includes only a small performance overhead, due to its switching functions, which can change network topology from ring to broadcast medium. A token-holding node passes the token to another node after determining the successor through priority comparison. Errors occurring during token passing can, thus, be detected and corrected simply and promptly. Priority token passing has a simple hardware implementation, requiring only small additions to the frame control circuitry, and has a small implementation overhead. The priority token-passing protocol and two other important network communication functions, dual ring network reconfiguration and high-level data link control (HDLC) normal response mode-based message transmission, are designed as a single finite-state machine, and implemented into a compact LSI chip. This integrated instrument network (IINET) chip provides complete network communication services and requires only three additional external electronic components for operation  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号