首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   83581篇
  免费   945篇
  国内免费   406篇
电工技术   770篇
综合类   2316篇
化学工业   11372篇
金属工艺   4782篇
机械仪表   3012篇
建筑科学   2154篇
矿业工程   562篇
能源动力   1098篇
轻工业   3574篇
水利工程   1269篇
石油天然气   341篇
无线电   9229篇
一般工业技术   16255篇
冶金工业   2650篇
原子能技术   253篇
自动化技术   25295篇
  2021年   6篇
  2018年   14448篇
  2017年   13375篇
  2016年   9955篇
  2015年   598篇
  2014年   219篇
  2013年   183篇
  2012年   3129篇
  2011年   9391篇
  2010年   8269篇
  2009年   5531篇
  2008年   6763篇
  2007年   7769篇
  2006年   107篇
  2005年   1203篇
  2004年   1122篇
  2003年   1168篇
  2002年   535篇
  2001年   95篇
  2000年   175篇
  1999年   55篇
  1998年   61篇
  1997年   32篇
  1996年   44篇
  1995年   11篇
  1994年   12篇
  1993年   11篇
  1992年   12篇
  1991年   24篇
  1989年   6篇
  1988年   9篇
  1969年   24篇
  1968年   43篇
  1967年   33篇
  1966年   42篇
  1965年   44篇
  1964年   12篇
  1963年   28篇
  1962年   22篇
  1961年   18篇
  1960年   30篇
  1959年   35篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
  1952年   6篇
  1950年   6篇
  1949年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
The microstructure of the flip-chip solder joints fabricated using stud bumps and Pb-free solder was characterized. The Au or Cu stud bumps formed on Al pads on Si die were aligned to corresponding metal pads in the substrate, which was printed with Sn-3.5Ag paste. Joints were fabricated by reflowing the solder paste. In the solder joints fabricated using Au stud bumps, Au-Sn intermetallics spread over the whole joints, and the solder remained randomly island-shaped. The δ-AuSn, ε-AuSn2, and η-AuSn4 intermetallic compounds formed sequentially from the Au stud bump. The microstructure of the solder joints did not change significantly even after multiple reflows. The AuSn4 was the main phase after reflow because of the fast dissolution of Au. In the solder joints fabricated using Cu stud bumps, the scallop-type Cu6Sn5 intermetallic was formed only at the Cu interface, and the solder was the main phase. The difference in the microstructure of the solder joints with Au and Cu stud bumps resulted from the dissolution-rate difference of Au and Cu into the solder.  相似文献   
992.
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encryption and maintains data secrecy and privacy during transmission. Conventional aggregation functions operate when readings are received in plaintext. If readings are encrypted, aggregation requires decryption creating extra overhead and key management issues. In contrast to conventional schemes, our proposed scheme provides security and privacy, and duplicate instances of original readings will be aggregated into a single packet. Our scheme is resilient to known-plaintext attacks, chosen-plaintext attacks, ciphertext-only attacks and man-in-the-middle attacks. Our experiments show that our proposed aggregation method significantly reduces communication overhead and can be practically implemented in on-the-shelf sensor platforms.  相似文献   
993.
Existing perspiration-based liveness detection algorithms need two successive images (captured in certain time interval), hence they are slow and not useful for real-time applications. Liveness detection methods using extra hardware increase the cost of the system. To alleviate these problems, we propose new curvelet-based method which needs only one fingerprint to detect liveness. Wavelets are very effective in representing objects with isolated point singularities, but fail to represent line and curve singularities. Curvelet transform allows representing singularities along curves in a more efficient way than the wavelets. Ridges oriented in different directions in a fingerprint image are curved; hence curvelets are very significant to characterize fingerprint texture. Textural measures based on curvelet energy and co-occurrence signatures are used to characterize fingerprint image. Dimensionalities of feature sets are reduced by running Pudil’s sequential forward floating selection (SFFS) algorithm. Curvelet energy and co-occurrence signatures are independently tested on three different classifiers: AdaBoost.M1, support vector machine and alternating decision tree. Finally, all the aforementioned classifiers are fused using the “Majority Voting Rule” to form an ensemble classifier. A fingerprint database consisting of 185 real, 90 Fun-Doh and 150 Gummy fingerprints is created by using varieties of artificial materials for casts and moulds of spoof fingerprints. Performance of the new liveness detection approach is found very promising, as it needs only one fingerprint and no extra hardware to detect vitality.  相似文献   
994.
It has been reported that minute Co additions to Sn-based solders are very effective for reducing undercooling, probably due to low Co solubility in Sn. In this study, Co solubility in molten Sn was determined experimentally. According to results of metallographic analysis, Co solubility in molten Sn is as low as 0.04 wt.% at 250°C. Interfacial reactions in Sn-Co/Ni couples at 250°C were examined for Co contents from 0.01 wt.% to 0.4 wt.%. The Ni3Sn4 phase was the only interfacial reaction phase in almost the entire Sn-0.01 wt.%Co/Ni couple. For Sn-Co/Ni couples with a Co content higher than 0.01 wt.%, a thin, continuous Ni3Sn4 layer and a discontinuous decahedron (Ni,Co)Sn4 phase were formed in the initial stage of reaction. The reaction products evolved with time. With longer reaction time, the Sn content in the decahedron (Ni,Co)Sn4 phase decreased, and the (Ni,Co)Sn4 phase transformed into the (Ni,Co)Sn2 phase and cleaved into a sheet, which then detached from the interface, after which Ni3Sn4 began to grow significantly with longer reaction times.  相似文献   
995.
The growth kinetics of an intermetallic compound (IMC) layer formed between Sn-3.5Ag-0.5Cu (SAC) solders and Cu-Zn alloy substrates was investigated for samples aged at different temperatures. Scallop-shaped Cu6Sn5 formed after soldering by dipping Cu or Cu-10 wt.%Zn wires into the molten solder at 260°C. Isothermal aging was performed at 120°C, 150°C, and 180°C for up to 2000 h. During the aging process, the morphology of Cu6Sn5 changed to a planar type in both specimens. Typical bilayer of Cu6Sn5 and Cu3Sn and numerous microvoids were formed at the SAC/Cu interfaces after aging, while Cu3Sn and microvoids were not observed at the SAC/Cu-Zn interfaces. IMC growth on the Cu substrate was controlled by volume diffusion in all conditions. In contrast, IMC growth on Cu-Zn specimens was controlled by interfacial reaction for a short aging time and volume diffusion kinetics for a long aging time. The growth rate of IMCs on Cu-Zn substrates was much slower due to the larger activation energy and the lower layer growth coefficient for the growth of Cu-Sn IMCs. This effect was more prominent at higher aging temperatures.  相似文献   
996.
A method of optimal beamforming for flat Rayleigh faded channels using the Fractional Fourier Transform (FRFT) is considered in this paper. It has been demonstrated through simulations that optimal beamforming with FRFT allows smaller mean-square errors in restoring signals degraded with linear time-or frequency variant distortions and Additive White Gaussian Noise. This is made possible by the additional flexibility that comes with free parameter ‘a’ of the fractional Fourier transform as oppose to the classical Fourier transform (FT). The method is especially useful in moving source problems, where Doppler Effect produces frequency shift when the source is moving, as in mobile and wireless communication where user produces the frequency shift while moving. In this paper it is shown through simulations that beamforming in fractional domain reduces BER as compared to time or frequency domain.  相似文献   
997.
Advances In Peer-To-Peer Content Search   总被引:2,自引:0,他引:2  
Peer-to-peer (P2P) computer networks have recently received tremendous attention due to their inherent scalability and flexibility, which facilitates a broad spectrum of innovative multimedia applications. Such networks rely on the power of participant nodes of the network (called peers) for communications and computation. Traditional applications of P2P multimedia include decentralized file sharing and content distribution. Yet, the value of the virtually unlimited amount of data distributed in the P2P network will be sacrificed if effective and efficient ways to locate the content are missing. This challenge has stimulated extensive research in recent years, and many new P2P content search methods have been proposed. This paper provides a timely review of influential work in the area of peer-to-peer (P2P) content search. We begin with a survey of text-based P2P search mechanisms and continue with an exposition of content-based and semantic-based approaches followed by a discussion of future directions.  相似文献   
998.
A simple and compact microstrip-fed Ultra WideBand(UWB) printed monopole antenna with band-notched characteristic is proposed in this paper.The antenna is composed of a square ring with a small strip bar,so that the antenna occupies about 7.69 GHz bandwidth covering 3.11~10.8 GHz with expected band rejection from 5.12 GHz to 5.87 GHz.A quasi-omnidirectional and quasi-sym-metrical radiation pattern is also obtained.This kind of band-notched UWB antenna requires no ex-ternal filters and thus greatly simplifie...  相似文献   
999.
For many clustering algorithms, it is very important to determine an appropriate number of clusters, which is called cluster validity problem. In this paper, a new clustering validity assessment index is proposed based on a novel method to select the margin point between two clusters for inter-cluster similarity more accurately, and provides an improved scatter function for intra-cluster similarity. Simulation results show the effectiveness of the proposed index on the data sets under consideration regardless of the choice of a clustering algorithm.  相似文献   
1000.
Constant modulus algorithm (CMA) is an adaptive technique for correcting multipath and interference-induced degradations in constant envelope waveforms. The algorithm exploits the fact that both multipath and additive interference can disrupt the constant envelope of the received signal. By detecting the received envelope variations, the adaptive algorithm has the ability to reset the coefficients vector so as to remove the variations, and in the process, reject the various interference components from the desired signal. If both the interferer and the signal of interest have constant envelope and are spectrally non-overlapped, it is possible to find two different solutions for the coefficient vector, in which one suppresses the interferer and the other “captures” the interferer. The problem of how “capture” can occur and how it may be prevented in Gaussian noise environment has been perfectly developed in the previous work (Treichler, Larimore, IEEE Trans Acoust Speech Signal Process, 33:946–958, 1985). However, recent investigation on the physical channels in wireless communication shows that there is aggregate noise component exhibiting high amplitudes for small duration time interval. This paper proposes a GCMA (Generalized CMA) which generalizes the CMA by introducing the α-stable distribution as the noise model. Here the original CMA is only a special case of the GCMA. In order to describe the average behavior of the GCMA, a simple model consisting of only two sinusoids is presented. As assuming slow adaptation, the adaptive weight recursion is shown to compress into a two-by-two recursion in the tone output amplitudes. The simplified recursion is analyzed to determine what combination of signals power and initialization on coefficient vectors leads to “lock” and what leads to the capture of the interferer. The method to determine lock and capture zone boundaries is analyzed. These convergence properties of the GCMA are studied by computer simulations.
Ting LiEmail:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号