首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   385294篇
  免费   4744篇
  国内免费   1341篇
电工技术   7640篇
综合类   510篇
化学工业   57651篇
金属工艺   14842篇
机械仪表   12427篇
建筑科学   9863篇
矿业工程   1417篇
能源动力   9672篇
轻工业   36670篇
水利工程   3513篇
石油天然气   4432篇
武器工业   72篇
无线电   50628篇
一般工业技术   73356篇
冶金工业   67345篇
原子能技术   7203篇
自动化技术   34138篇
  2021年   2688篇
  2019年   2743篇
  2018年   4351篇
  2017年   4478篇
  2016年   4787篇
  2015年   3224篇
  2014年   5549篇
  2013年   16892篇
  2012年   9169篇
  2011年   12676篇
  2010年   9940篇
  2009年   11289篇
  2008年   12452篇
  2007年   12579篇
  2006年   11344篇
  2005年   10417篇
  2004年   10093篇
  2003年   9813篇
  2002年   9591篇
  2001年   9557篇
  2000年   9114篇
  1999年   9213篇
  1998年   19822篇
  1997年   14602篇
  1996年   11801篇
  1995年   9384篇
  1994年   8490篇
  1993年   8189篇
  1992年   6757篇
  1991年   6354篇
  1990年   6122篇
  1989年   5876篇
  1988年   5597篇
  1987年   4929篇
  1986年   4821篇
  1985年   5703篇
  1984年   5316篇
  1983年   4865篇
  1982年   4567篇
  1981年   4601篇
  1980年   4300篇
  1979年   4179篇
  1978年   3967篇
  1977年   4691篇
  1976年   5803篇
  1975年   3655篇
  1974年   3490篇
  1973年   3523篇
  1972年   2848篇
  1971年   2671篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
A maximum-likelihood channel estimator for the orthogonal frequency division multiplexing communication environments, in the presence of interference is discussed here. In a training-based scenario, the channel is estimated based on pilots that precede the transmission of the information. To reduce the number of estimation parameters, the channel is estimated iteratively in time-domain. Since interference from other users provide no useful information, parameters of the interference are neither estimated nor the effect of the interference neglected, instead interference along with Gaussian noise is perceived as non-Gaussian noise process. The algorithm assumes no a priori knowledge about the interfering channel and signal at the receiver, further no assumption on the statistical properties of the interferer is assumed, which makes this algorithm robust. The estimated channel information along with the estimated distribution are then utilised to equalise the subsequent data blocks. The strength of the algorithm is in its robustness to both synchronous and asynchronous interference, which is confirmed by the simulation results for both flat and multipath fading channels in presence of synchronous and asynchronous interference.  相似文献   
993.
Kulyako  Yu. M.  Trofimov  T. I.  Samsonov  M. D.  Myasoedov  B. F. 《Radiochemistry》2003,45(5):503-505
It was shown for the first time that weighable amounts of uranium dioxide and its mixtures with Np, Pu, and Am in the form of solid solutions can be efficiently and quantitatively dissolved in the presence of tributyl phosphate saturated with HNO3. Individual PuO2 and NpO2 are not dissolved under these conditions. In treatment of a mechanical mixture of UO2 with PuO2 or NpO2, uranium is completely dissolved, while plutonium and neptunium remain in the precipitate.  相似文献   
994.
The article discusses trade-offs involved in current-generation autonomy systems for deep-space applications and describes emerging research that will let future spacecraft operate unattended for significant periods of time, synthesizing control decisions in response to both planned and unplanned events.  相似文献   
995.
Watterson  C. Heffernan  D. 《Software, IET》2007,1(5):172-179
Ensuring the correctness of software applications is a difficult task. The area of runtime verification, which combines the approaches of formal verification and testing, offers a practical but limited solution that can help in finding many errors in software. Runtime verification relies upon tools for monitoring software execution. There are particular difficulties with regard to monitoring embedded systems. The concerns for arranging non-intrusive monitoring of embedded systems in a way that is suitable for use in runtime verification methods are considered here. A number of existing runtime verification tools are referenced, highlighting their requirement for monitoring solutions. Established and emerging approaches for the monitoring of software execution using execution monitors are reviewed, with an emphasis on the approaches that are best suited for use with embedded systems. A suggested solution for non-intrusive monitoring of embedded systems is presented. The conclusions summarise the possibilities for arranging non-intrusive monitoring of embedded systems, and the potential for runtime verification to utilise such monitoring approaches.  相似文献   
996.
997.
The microhardness of silicon epilayers grown from Sn fluxes is found to be lower than that of the silicon substrates and to significantly depend on the crystallographic orientation of the substrates. The microhardness values follow a Gaussian distribution in all of the epilayers. Unintentional impurities are shown to have a significant effect on the microhardness of the epilayers. The addition of ytterbium to the high-temperature solution reduces the microhardness of the epilayers.  相似文献   
998.
999.
In May 2006, the US Army Research Laboratory and UK Ministry of Defense created the international technology alliance. The consortium of 26 partners including the ARL and MoD offers an open research environment in which leading US and UK companies and universities can collaborate (see table 1). It will also fuse the best aspects of the US Army's Collaborative Technology Alliances and UK MoD's Defense Technology Centers on an international scale. The ITA aims to develop flexible, distributed, and secure decision-making procedures to improve networked coalition operations. Network science is a young discipline we have limited information models and network theories to describe the behavior and scaling of large, complex mobile ad hoc networks.1 moreover, you can't understand a coalition network's performance without understanding its cognitive and sociocultural aspects and physical characteristics. A key ITA goal is to perform basic research in network-centric coalition decision making across four technical areas: network theory, security across a system of systems, sensor information processing and delivery, and distributed coalition planning and decision making, 2. we focus on the last area because this is where intelligent systems will play the biggest role.  相似文献   
1000.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号