首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   115732篇
  免费   2324篇
  国内免费   523篇
电工技术   1192篇
综合类   2548篇
化学工业   17384篇
金属工艺   5452篇
机械仪表   3723篇
建筑科学   3260篇
矿业工程   663篇
能源动力   2157篇
轻工业   8243篇
水利工程   1523篇
石油天然气   505篇
武器工业   6篇
无线电   11582篇
一般工业技术   20895篇
冶金工业   9448篇
原子能技术   526篇
自动化技术   29472篇
  2023年   207篇
  2022年   600篇
  2021年   949篇
  2020年   691篇
  2019年   762篇
  2018年   15129篇
  2017年   14123篇
  2016年   10778篇
  2015年   1304篇
  2014年   1303篇
  2013年   2022篇
  2012年   4682篇
  2011年   11141篇
  2010年   9549篇
  2009年   6950篇
  2008年   7987篇
  2007年   8827篇
  2006年   1022篇
  2005年   2146篇
  2004年   2120篇
  2003年   2074篇
  2002年   1395篇
  2001年   838篇
  2000年   746篇
  1999年   632篇
  1998年   2288篇
  1997年   1467篇
  1996年   1053篇
  1995年   670篇
  1994年   533篇
  1993年   582篇
  1992年   244篇
  1991年   324篇
  1990年   234篇
  1989年   209篇
  1988年   232篇
  1987年   167篇
  1986年   175篇
  1985年   196篇
  1984年   140篇
  1983年   98篇
  1982年   123篇
  1981年   127篇
  1980年   123篇
  1979年   94篇
  1978年   77篇
  1977年   150篇
  1976年   240篇
  1975年   86篇
  1954年   70篇
排序方式: 共有10000条查询结果,搜索用时 12 毫秒
991.
The finite-difference time-domain method based on recursive convoltion method (RC-FDTD) for the electric anisotropic dispersive medium is discussed in detail. To exemplify the availability of the three-dimensional RC-FDTD algorithm, the backscattering Radar-Cross-Section(RCS) of a non-magnetized plasma sphere is computed, and the numerical results are the same as the one of the Shift Operater-FDTD method, and show that the RC-FDTD method is correct and efficient. In addition, the co-polarized and cross-polarized backscattering time-domain of a magnetized plasma sphere are obtained by the RC-FDTD algorithm. The results show that when the external magnetic field is implemented, the cross-polarized component appear, evidently.  相似文献   
992.
Comparing to the traditional multihop ad hoc networks, dynamic spectrum environment is the special characteristic of CRAHN (cognitive radio ad hoc networks). Therefore, the cognitive users will show their selfishness on spectrum bandwidth cost in multihop communication. In CRAHN, multipath routing is a reasonable choice when considering efficiency and stability. In order to take further advantage of efficiency of multipath routing, this paper study the efficiency-awareness traffic assignment problem of multipath routing in CRAHN. There are several existing game based traffic assignment schemes for selfish wireless network, however, all of them can not be directly applicable to CRAHN. In addition, none of the existing works studied whether the scheme is efficient. In this paper, a noncooperative differential game is proposed, and the equilibrium of the game is computed and proved to be an efficient traffic assignment for multipath routing in CRAHN. Besides this, we also optimize the total cost of game from the game designer’s point of view, and give a simple example to illustrate the optimization procedure.  相似文献   
993.
This work presents a novel scalable multiplication algorithm for a type-t Gaussian normal basis (GNB) of GF(2m). Utilizing the basic characteristics of MSD-first and LSD-first schemes with d-bit digit size, the GNB multiplication can be decomposed into n(n + 1) Hankel matrix-vector multiplications. where n = (mt + 1)/d. The proposed scalable architectures for computing GNB multiplication comprise of one d × d Hankel multiplier, four registers and one final reduction polynomial circuit. Using the relationship of the basis conversion from the GNB to the normal basis, we also present the modified scalable multiplier which requires only nk Hankel multiplications, where k = mt/2d if m is even or k = (mt − t + 2)/2d if m is odd. The developed scalable multipliers have the feature of scalability. It is shown that, as the selected digit size d ≥ 8, the proposed scalable architectures have significantly lower time-area complexity than existing digit-serial multipliers. Moreover, the proposed architectures have the features of regularity, modularity, and local interconnection ability. Accordingly, they are well suited for VLSI implementation.  相似文献   
994.
The compression creep behavior was studied for the ternary solder alloy 95.5Sn-3.9Ag-0.6Cu in the as-cast condition. Samples were tested under stresses of 2–45 MPa and temperatures of −25–160°C. There was a significant variability in the creep curve shape, strain magnitude, and steady-state strain-rate properties. A multivariable linear-regression analysis of the steady-state strain-rate data, using the sinh-law stress representation, indicated two mechanisms distinguished by low- and high-temperature regimes of −25–75°C and 75–160°C, respectively. The sinh-law stress exponent (n) and apparent-activation energy (ΔH) in the −25–75°C regime were 4.4 ± 0.7 kJ/mol and 25 ± 7 kJ/mol (63% confidence intervals), respectively. Those same parameters in the 75–160°C regime were 5.2±0.8 kJ/mol and 95±14 kJ/mol, respectively, for the high-temperature regime. The values of ΔH suggested a short-circuit diffusion mechanism at low temperatures and a lattice or bulk-diffusion mechanism at high temperatures. The stress dependency of the steady-state strain rate did not indicate a strong power-law breakdown behavior or a threshold stress phenomenon. Cracks and grain-boundary sliding were not observed in any of the samples. As the creep temperature increased, a coarsened particle boundary and particle depletion zone formed in the region of fine Ag3Sn particles that existed between the Sn-rich phase areas. The coarsened particle boundary, as well as accelerated coarsening of Ag3Sn particles, were direct consequences of the creep deformation process.  相似文献   
995.
This paper proposes a new strategy for improving the localization capabilities of linear inverse solutions, based on the relationship between the real solution and the estimated solution as described by the resolution matrix equation. Specifically, we present two alternatives based on either the partial or total inversion of the resolution matrix and applied them to the minimum norm solution, which is known for its poor performance in three-dimensional (3-D) localization problems. The minimum norm transformed inverse showed a clear improvement in 3-D localization. The strong dependence of localization errors with the eccentricity of the sources, characteristic of this solution, disappears after the proposed transformation. A similar effect is illustrated, using a realistic example where multiple generators at striate areas are active. While the original minimum norm incorrectly places the generators at extrastriate cortex, the transformed minimum norm localizes, for the example considered, the sources at their correct eccentricity with very low spatial blurring.  相似文献   
996.
A method to compute the monostatic radar cross section (RCS) of complex bodies modeled by nonuniform rational B-spline (NURBS) surfaces is presented. The bodies can be covered by any kind of radar absorbing material (RAM) with electric and/or magnetic losses. Physical optics (PO) is used to obtain the scattered field of each surface. Fresnel coefficients are included in the stationary phase method (SPM) in order to take into account the effect of the RAM material. The contribution of diffraction by edges and double effects is also considered, improving the results of the PO approach. The diffraction is computed by the equivalent current method (ECM). A combination of geometrical optics (GO) with PO and ECM is used for the double reflection and double interaction between edges and surfaces respectively. Some simple cases are shown to validate the proposed method. The reliability of the method to analyzing the effect of covering a realistic target with RAM is also illustrated.  相似文献   
997.
In recent years, embedded memories are the fastest growing segment of system on chip. They therefore have a major impact on the overall Defect per Million (DPM). Further, the shrinking technologies and processes introduce new defects that cause previously unknown faults; such faults have to be understood and modeled in order to design appropriate test techniques that can reduce the DPM level. This paper discusses a new memory fault class, namely dynamic faults, based on industrial test results; it defines the concept of dynamic faults based on the fault primitive concept. It further shows the importance of dynamic faults for the new memory technologies and introduces a systematic way for modeling them. It concludes that current and future SRAM products need to consider testability for dynamic faults or leave substantial DPM on the table, and sets a direction for further research.  相似文献   
998.
In this paper, we describe HW and SW features of the developed prototype of a hybrid 3G mobile phone and wireless terminal, which provides integral video projection onto two VGA/2 displays that, when put side-by-side, form the integrated display with the ratio of the overall width to its overall height, equal to 4:3, so providing the integral video VGA format and enabling visual presentation of standard full-size web pages, PC mainstream SW screens (such as e.g. the ones of e-mail clients), multi-media content etc. When not in use, the displays can be fold back one onto each other, so preserving the industry-standard dimensions of the device. The two displays that share the image provide it with overall resolution of 640 x 480 pixels per inch. The device is driven by Texas Instruments OMAP 2420 multimedia processor with ARM1136 core and Linux operating system. In addition, the device is equipped with specially developped prototypes of unique spring/microgenerator-based battery charger as well as with ultra-thin mountable foil-based QWERTY keyboard.  相似文献   
999.
In this paper, effects of reader-to-reader interference are investigated for LED identification (LED-ID) system in a multi-reader environment. The LED-ID readers typically use different channels to avoid collision between readers. However, in-channel collision usually happens in terms of interrogation range. A reader-to-reader interference scenario is proposed, and nominal interrogation range of a desired reader is derived from this model. In order to evaluate the LED-ID reader-to-reader interference quantitatively, an efficient detection scheme is proposed and simulated by employing spreading sequence. The spreading sequence is inserted between each user’s frame formats. In the receiver, the desired signal is detected by using correlation among inserted spreading sequences. From simulation results, it is confirmed that the proposed scheme is very effective to enhance reliability of LED-ID communication systems.  相似文献   
1000.
In this paper, we present a blind steganalysis based on feature fusion. Features based on Short Time Fourier Transform (STFT), which consists of second-order derivative spectrum features of audio and Mel-frequency cepstrum coefficients, audio quality metrics and features on linear prediction residue are extracted separately. Then feature fusion is conducted. The performance of the proposed steganalysis is evaluated against 4 steganographic schemes: Direct Sequence Spread Spectrum (DSSS), Quantization Index Modulation (QIM), ECHO embedding (ECHO), and Least Significant Bit embedding (LSB). Experiment results show that the classifying performance of the proposed detector is much superior to the previous work. Even more exciting is that the proposed methodology could detect the four steganography, with 85%+ classification accuracy achieved in all the detections, which makes the proposed steganalysis methodology capable of being regarded as a blind steganalysis, and especially useful when the steganalyzer are without the knowledge of the steganographic scheme employed in data embedding.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号