全文获取类型
收费全文 | 6414篇 |
免费 | 327篇 |
国内免费 | 20篇 |
专业分类
电工技术 | 77篇 |
综合类 | 10篇 |
化学工业 | 1179篇 |
金属工艺 | 237篇 |
机械仪表 | 319篇 |
建筑科学 | 122篇 |
矿业工程 | 1篇 |
能源动力 | 269篇 |
轻工业 | 511篇 |
水利工程 | 24篇 |
石油天然气 | 12篇 |
无线电 | 1350篇 |
一般工业技术 | 1272篇 |
冶金工业 | 501篇 |
原子能技术 | 87篇 |
自动化技术 | 790篇 |
出版年
2024年 | 6篇 |
2023年 | 70篇 |
2022年 | 103篇 |
2021年 | 161篇 |
2020年 | 94篇 |
2019年 | 130篇 |
2018年 | 172篇 |
2017年 | 153篇 |
2016年 | 199篇 |
2015年 | 162篇 |
2014年 | 243篇 |
2013年 | 457篇 |
2012年 | 384篇 |
2011年 | 484篇 |
2010年 | 328篇 |
2009年 | 380篇 |
2008年 | 327篇 |
2007年 | 278篇 |
2006年 | 230篇 |
2005年 | 239篇 |
2004年 | 169篇 |
2003年 | 181篇 |
2002年 | 168篇 |
2001年 | 130篇 |
2000年 | 130篇 |
1999年 | 115篇 |
1998年 | 244篇 |
1997年 | 134篇 |
1996年 | 133篇 |
1995年 | 118篇 |
1994年 | 80篇 |
1993年 | 88篇 |
1992年 | 58篇 |
1991年 | 54篇 |
1990年 | 46篇 |
1989年 | 43篇 |
1988年 | 31篇 |
1987年 | 31篇 |
1986年 | 23篇 |
1985年 | 21篇 |
1984年 | 23篇 |
1983年 | 19篇 |
1982年 | 22篇 |
1981年 | 13篇 |
1980年 | 17篇 |
1979年 | 6篇 |
1978年 | 6篇 |
1977年 | 8篇 |
1976年 | 13篇 |
1975年 | 9篇 |
排序方式: 共有6761条查询结果,搜索用时 15 毫秒
41.
I. Antonopoulou and S. Papastavridis (1987) published an algorithm for computing the reliability of a circular consecutive-k -out-of-n :F system which claimed O (kn ) time. J.S. Wu and R.J. Chen (1993) correctly pointed out that the algorithm achieved only O (kn 2) time. The present study shows that the algorithm can be implemented for O (kn ) time 相似文献
42.
A device level transconductance spectroscopy approach is developed for characterizing surface states in metal-semiconductor field-effect transistors. A comparison of the theoretical results and the available experimental observations shows that the model can successfully explain both the surface leakage current dependence of transconductance dispersion magnitude reported by M. Ozeki et al. (1982) and the temperature dependence of transconductance dispersion observed by S.R. Blight et al. (1986) 相似文献
43.
This study examined the effects of multitasking on persuasion, including comprehension and counterarguing of persuasive messages, which were presented in three different contexts: (a) nonmultitasking with full attention paid to the message, (b) multitasking with primary attention paid to the message, and (c) multitasking with secondary attention paid to the message. Consistent with predictions, the results suggested that multitasking reduced the actual and perceived levels of comprehension and also reduced counterarguing. The implications for research on persuasion are further discussed. 相似文献
44.
Y. P. Chen G. Brill E. M. Campo T. Hierl J. C. M. Hwang N. K. Dhar 《Journal of Electronic Materials》2004,33(6):498-502
We report on the first successful growth of the quaternary alloy Cd1−yZnySexTe1−x(211) on 3-in. Si(211) substrates using molecular beam epitaxy (MBE). The growth of CdZnSeTe was performed using a compound
CdTe effusion source, a compound ZnTe source, and an elemental Se effusion source. The alloy compositions (x and y) of the
Cd1−yZnySexTe1−x quaternary compound were controlled through the Se/CdTe and ZnTe/CdTe flux ratios, respectively. Our results indicated that
the surface morphology of CdZnSeTe improves as the Zn concentration decreases, which fits well with our previous observation
that the surface morphology of CdZnTe/Si is poorer than that of CdSeTe/Si. Although the x-ray full-width at half-maximums
(FWHMs) of CdZnSeTe/Si with 4% of Zn + Se remain relatively constant regardless of the individual Zn and Se concentrations,
etched-pit density (EPD) measurements exhibit a higher dislocation count on CdZnSeTe/Si layers with about 2% Zn and Se incorporated.
The enhancement of threading dislocations in these alloys might be due to an alloy disorder effect between ZnSe and CdTe phases.
Our results indicate that the CdZnSeTe/Si quaternary material with low Zn or low Se concentration (less than 1.5%) while maintaining
4% total Zn + Se concentration can be used as lattice-matching composite substrates for long-wavelength infrared (LWIR) HgCdTe
as an alternative for CdZnTe/Si or CdSeTe/Si. 相似文献
45.
We propose two improved scalar multiplication methods on elliptic curves over Fqn where q = 2m using Frobenius expansion. The scalar multiplication of elliptic curves defined over subfield Fq can be sped up by Frobenius expansion. Previous methods are restricted to the case of a small m. However, when m is small, it is hard to find curves having good cryptographic properties. Our methods are suitable for curves defined over medium‐sized fields, that is, 10 ≤ m ≤ 20. These methods are variants of the conventional multiple‐base binary (MBB) method combined with the window method. One of our methods is for a polynomial basis representation with software implementation, and the other is for a normal basis representation with hardware implementation. Our software experiment shows that it is about 10% faster than the MBB method, which also uses Frobenius expansion, and about 20% faster than the Montgomery method, which is the fastest general method in polynomial basis implementation. 相似文献
46.
Yuh-Shyan Hwang Jian-Hong Shen Jiann-Jong Chen Ming-Ren Fan 《Analog Integrated Circuits and Signal Processing》2013,76(2):167-177
Two integrated stereo fully differential filterless class-D amplifiers are presented in this paper. The object is to develop a modulation of a class-D audio amplifier with high power efficiency in this paper. The traditional H-bridge class-D audio amplifier has a shortcoming of large signal distortion which is worse than realized. However, the proposed circuit improves the drawback and provides high power efficiency at the same time. The circuit implements a modified scheme of pulse-width modulation. In this paper, we presented two class-D amplifiers, compared their differences and explained why the efficiency and distortion performance can be modified. The increase in total harmonic distortion (THD) is due to non-linearity in the triangle wave. To overcome this problem, a negative feedback from the output of the switching power stage is adopted to reduce the THD. When a 0.7-VPP and 1 kHz sine wave is used as an input signal, the minimum THD is 0.029 % and the maximum power efficiency is 83 %. The fully differential class-D audio amplifier is implemented with a TSMC 0.35-μm 2P4M CMOS process, and the chip area is 2.57 × 2.57 mm2 (with PADs). 相似文献
47.
Optical networks with DWDM (Dense Wavelength Division Multiplex) can provide multiple data channels to supply high speed,
high capacity to perform bandwidth-intensive multicast transmission service. Light-tree is a popular technique applied to
support point-to-multipoint multicast services. Any failure during a multicast session would cause severe service loss or
disruptions, especially when the faults occur near the source node. A novel ring-based local fault recovery mechanism, Multiple
Ring-based Local Restoration (MRLR), for point-to-multipoint multicast traffic based on the minimum spanning tree (MST) in
WDM mesh networks is proposed in this article. The MRLR mechanism dismembers the multicast tree into several disjoint segment-blocks
(sub-trees) and reserves preplanned spare capacity to set up multiple protection rings in each segment-block for providing
rapid local recovery. The MRLR scheme outperforms other methodologies in terms of the blocking probability, recovery time,
and average hop count of protection path per session for different network topologies. 相似文献
48.
Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of weB-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors. 相似文献
49.
Changki Lee Jihyun Eun Minwoo Jeong Gary Geunbae Lee YiGyu Hwang Myung‐Gil Jang 《ETRI Journal》2007,29(2):179-188
We propose a multi‐strategic concept‐spotting approach for robust spoken language understanding of conversational Korean in a hostile recognition environment such as in‐car navigation and telebanking services. Our concept‐spotting method adopts a partial semantic understanding strategy within a given specific domain since the method tries to directly extract pre‐defined meaning representation slot values from spoken language inputs. In spite of partial understanding, we can efficiently acquire the necessary information to compose interesting applications because the meaning representation slots are properly designed for specific domain‐oriented understanding tasks. We also propose a multi‐strategic method based on this concept‐spotting approach such as a voting method. We present experiments conducted to verify the feasibility of these methods using a variety of spoken Korean data. 相似文献
50.
Min-Shiang Hwang Chih-Wei Lin Cheng-Chi Lee 《Electronics letters》2002,38(23):1429-1431
An authenticated multiple-key agreement protocol is proposed. The protocol is not only secure against the unknown-key attack but also more efficient than other protocols. 相似文献