全文获取类型
收费全文 | 4275篇 |
免费 | 321篇 |
国内免费 | 31篇 |
专业分类
电工技术 | 54篇 |
综合类 | 25篇 |
化学工业 | 1178篇 |
金属工艺 | 135篇 |
机械仪表 | 217篇 |
建筑科学 | 177篇 |
矿业工程 | 11篇 |
能源动力 | 232篇 |
轻工业 | 344篇 |
水利工程 | 98篇 |
石油天然气 | 65篇 |
武器工业 | 3篇 |
无线电 | 366篇 |
一般工业技术 | 732篇 |
冶金工业 | 138篇 |
原子能技术 | 41篇 |
自动化技术 | 811篇 |
出版年
2024年 | 17篇 |
2023年 | 61篇 |
2022年 | 94篇 |
2021年 | 220篇 |
2020年 | 240篇 |
2019年 | 290篇 |
2018年 | 377篇 |
2017年 | 326篇 |
2016年 | 295篇 |
2015年 | 187篇 |
2014年 | 329篇 |
2013年 | 515篇 |
2012年 | 368篇 |
2011年 | 353篇 |
2010年 | 229篇 |
2009年 | 219篇 |
2008年 | 117篇 |
2007年 | 102篇 |
2006年 | 66篇 |
2005年 | 32篇 |
2004年 | 30篇 |
2003年 | 20篇 |
2002年 | 21篇 |
2001年 | 12篇 |
2000年 | 14篇 |
1999年 | 19篇 |
1998年 | 5篇 |
1997年 | 6篇 |
1996年 | 6篇 |
1995年 | 12篇 |
1994年 | 3篇 |
1993年 | 6篇 |
1992年 | 4篇 |
1991年 | 4篇 |
1990年 | 4篇 |
1989年 | 4篇 |
1988年 | 2篇 |
1986年 | 2篇 |
1984年 | 6篇 |
1982年 | 5篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1974年 | 1篇 |
1967年 | 1篇 |
排序方式: 共有4627条查询结果,搜索用时 15 毫秒
51.
Taher Yousefi Reza Davarkhah Ahmad Nozad Golikand Mohammad Hossein Mashhadizadeh 《Materials Science in Semiconductor Processing》2013,16(3):868-876
One-dimensional manganese (IV) oxide (MnO2) (~20 nm in average diameter) were synthesized by cathodic electrodeposition and heat treatment. The mechanism of electrodeposition and nanowire formation were discussed. The product was characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM) and Fourier transform infrared (FT-IR). Nanowires with varying lengths and diameters were found in TEM and SEM images of the sample. The results of N2 adsorption–desorption analysis indicated that the BET surface area of the MnO2 nanowires was 157 m2 g?1 and the pore size distributions were 2.5 and 4.5 nm. The electrochemical performances of the prepared MnO2 as an electrode material for supercapacitors were evaluated by cyclic voltammetry and galvanostatic charge/discharge measurements in a solution of 0.5 M Na2SO4. The higher specific capacitance of 318 F g?1 and good capacity retention of 86% were achieved after 1000 charge–discharge cycles had been observed for the MnO2 nanowires electrode. 相似文献
52.
Mohammad Reza Majma Hossein Pedram Mehdi Dehghan 《Wireless Personal Communications》2014,78(1):687-714
Lifetime and energy efficiency are important factors in the design of wireless sensor network. A critical issue during data collection is the formation of energy holes near the sink. Sensors which are located near the sink have to participate in relaying data on behalf of other sensors and thus their energy will be depleted very quickly. Mobile sink movement yields the significant performance gained by decreasing the amount of energy consumption. In this paper, we propose an Intelligent Grid Based Data Disseminating protocol for mobile sink in wireless sensor networks. We have utilized a virtual grid as the protocol’s substructure. In our proposed method, cell heads (CHs) will be selected based on the locations of virtual cross points (CPs) and CPs selection is needless to transfer any required data between neighbor nodes. We have optimized CPs selection using linear programming technique in order to increase network lifetime. By selecting the CHs based on our proposed algorithm, data will be disseminated toward the sink. Our data dissemination protocol is simple and has low overhead to construct and maintain. Also, we have presented a new method for sink location update which leads to the least cost in data transfer. Simulation results illustrate that by utilizing hierarchical functionality and selecting appropriate CPs and consequently selecting CHs, energy consumption will be decreased in comparison with other presented methods which directly lead to network lifetime increment. Also by determining an optimal cell size, packet delivery rate will be improved noticeably. 相似文献
53.
54.
Seyyed Arash Azimi Siavash Ahmadi Zahra Ahmadian Javad Mohajeri Mohammad Reza Aref 《International Journal of Communication Systems》2018,31(1)
HIGHT is a lightweight block cipher introduced in CHES 2006 by Hong et al as a block cipher suitable for low‐resource applications. In this paper, we propose improved impossible differential and biclique attacks on HIGHT block cipher both exploiting the permutation‐based property of the cipher's key schedule algorithm as well as its low diffusion. For impossible differential attack, we found a new 17‐round impossible differential characteristic that enables us to propose a new 27‐round impossible differential attack. The total time complexity of the attack is 2120.4 where an amount of 259.3 chosen plaintext‐ciphertext pairs and 2107.4 memory are required. We also instantiate a new biclique cryptanalysis of HIGHT, which is based on the new idea of splitting each of the forward and backward keys into 2 parts where the computations associated to each one are performed independently. The time complexity and data complexity of this attack are 2125.7 and 242, respectively. To the best of our knowledge, this is the fastest biclique attack on full‐round HIGHT. 相似文献
55.
Reza Ghasemi Ali Safi Massoud Hadian Dehkordi 《International Journal of Communication Systems》2018,31(1)
A multisecret sharing (MSS) is a method for sharing a set of secrets among some participants. They can recover each of these secrets without endangering the other secrets. Two kinds of security models have been proposed for MSS schemes. These models are categorized into 2 types. The first security model is unconditional security. This approach decreases the efficiency of MSS schemes. Therefore, the second type of security, which is more relaxed, appeared. This approach is called computational security. In this paper, with 2 examples, we will show that the current definition of computational security does not satisfy all of our expectations from a secure MSS scheme. In fact, in these examples, recovering a secret leaks information to the other secrets while these schemes are considered secure in view of the computational security. After determining the shortcomings of the current security definition, we propose a new definition for computational security and present an MSS scheme that enjoys rigorous proof of security in terms of the new definition. In addition, a complete comparison in terms of share size, number of public values, and required operations for recovering a secret between our scheme and previous schemes indicates that the presented scheme is efficient. 相似文献
56.
Mohammad Reza Jalali-Azizpoor Mohammad Soroosh Yousef Seifi-Kavian 《Photonic Network Communications》2018,36(3):344-349
In this paper an all-optical half-adder was proposed by using self-collimation effect in two-dimensional photonic crystals. Self-collimation effect was obtained in XM direction for wavelength 1500 nm by using square lattice rod-type photonic crystal structure. Plane wave expansion and finite-difference time-domain methods were used to obtain the band structure diagram and simulate the optical behavior of the proposed structure, respectively. The maximum delay time and required input intensity are 1 ps and 54 mW/μm2, respectively. The normalized power-level margins for logics 0 and 1 were obtained to be about 20 and 70%, respectively. The total footprint of the structure is about 75 μm2, which is suitable for all optical integrated circuits. 相似文献
57.
Reza Arghavani Gary Miner Melody Agustin 《集成电路应用》2008,(1):28-32,39
到了45纳米技术节点,高介电常数绝缘材料和金属栅电极将被用于射造逻辑电路器件。而采用高金属功函数和能隙工程电荷陷阱的闪存也能从这些项技术中获益。 相似文献
58.
Soroosh Sharifi‐Asl Fernando A. Soto Tara Foroozan Mohammad Asadi Yifei Yuan Ramasubramonian Deivanayagam Ramin Rojaee Boao Song Xuanxuan Bi Khalil Amine Jun Lu Amin Salehi‐khojin Perla B. Balbuena Reza Shahbazian‐Yassar 《Advanced functional materials》2019,29(23)
LiCoO2 is a prime example of widely used cathodes that suffer from the structural/thermal instability issues that lead to the release of their lattice oxygen under nonequilibrium conditions and safety concerns in Li‐ion batteries. Here, it is shown that an atomically thin layer of reduced graphene oxide can suppress oxygen release from LixCoO2 particles and improve their structural stability. Electrochemical cycling, differential electrochemical mass spectroscopy, differential scanning calorimetry, and in situ heating transmission electron microscopy are performed to characterize the effectiveness of the graphene‐coating on the abusive tolerance of LixCoO2. Electrochemical cycling mass spectroscopy results suggest that oxygen release is hindered at high cutoff voltage cycling when the cathode is coated with reduced graphene oxide. Thermal analysis, in situ heating transmission electron microscopy, and electron energy loss spectroscopy results show that the reduction of Co species from the graphene‐coated samples is delayed when compared with bare cathodes. Finally, density functional theory and ab initio molecular dynamics calculations show that the rGO layers could suppress O2 formation more effectively due to the strong C? Ocathode bond formation at the interface of rGO/LCO where low coordination oxygens exist. This investigation uncovers a reliable approach for hindering the oxygen release reaction and improving the thermal stability of battery cathodes. 相似文献
59.
Karim Mohammad Pour Reza Jalil 《AEUE-International Journal of Electronics and Communications》2005,59(7):392-400
The sinuous antennas have a numerous applications in military and civil systems such as direction finding systems and reflector feeds due to their superior broadband characteristics and simultaneous polarization capability. In this paper, design, construction and measurements of planar sinuous antennas are investigated for 1–5 GHz frequency range. Feeding sections of this antenna are realized by using microstrip tapered baluns. We have determined the microstrip tapered balun dimensions using Ansoft HFSS-simulation program. The performances of the manufactured antenna are measured using HP vector network analyzer. Polarization patterns and return loss characteristics of the designed antenna that have been measured in anechoic chamber, are presented. 相似文献
60.
Computational error due to the fixed-point implementation of two-dimensional (2-D) discrete wavelet transform (DWT) is analyzed. This analysis is based on the exact knowledge of the DWT analysis and synthesis filters and the word length of the original image. In the fixed-point implementation, it is crucial to understand and analyze effects of finite precision in filters coefficients as well as rounding of intermediate calculations for the purpose of storage and/or transmission. Analyses and formulations are presented for both convolution and lifting approaches and they are validated by Monte Carlo simulations. The specific example used throughout this work is the lossy wavelet transformation used in the JPEG2000 compression standard. 相似文献