首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   48047篇
  免费   6159篇
  国内免费   3783篇
电工技术   2384篇
技术理论   6篇
综合类   3914篇
化学工业   12287篇
金属工艺   1436篇
机械仪表   3601篇
建筑科学   4802篇
矿业工程   1146篇
能源动力   5105篇
轻工业   5205篇
水利工程   1314篇
石油天然气   1527篇
武器工业   346篇
无线电   2900篇
一般工业技术   5499篇
冶金工业   1934篇
原子能技术   1150篇
自动化技术   3433篇
  2024年   260篇
  2023年   902篇
  2022年   1682篇
  2021年   2112篇
  2020年   1988篇
  2019年   1945篇
  2018年   1754篇
  2017年   1754篇
  2016年   1923篇
  2015年   1865篇
  2014年   2749篇
  2013年   3356篇
  2012年   3042篇
  2011年   3508篇
  2010年   2574篇
  2009年   2558篇
  2008年   2440篇
  2007年   2953篇
  2006年   2678篇
  2005年   2502篇
  2004年   2012篇
  2003年   1891篇
  2002年   1522篇
  2001年   1222篇
  2000年   1011篇
  1999年   839篇
  1998年   795篇
  1997年   687篇
  1996年   578篇
  1995年   512篇
  1994年   402篇
  1993年   343篇
  1992年   305篇
  1991年   214篇
  1990年   201篇
  1989年   172篇
  1988年   125篇
  1987年   96篇
  1986年   88篇
  1985年   64篇
  1984年   85篇
  1983年   52篇
  1982年   37篇
  1981年   60篇
  1980年   27篇
  1979年   11篇
  1975年   4篇
  1966年   7篇
  1959年   16篇
  1951年   31篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
151.
Branched polyacrylonitrile (PAN) was prepared through a self‐condensing vinyl copolymerization of acrylonitrile and 2‐(2‐bromopropionyloxy)ethyl acrylate (BPEA). The branched architecture of the product was confirmed by NMR spectra and the average degree of branching (DB ) was estimated. Through a comparison of the intrinsic viscosity of the product with that of its linear analogue, the contraction factor g′ was calculated. It was found that the viscosity of the branched PAN was obviously lower that that of linear PAN. © 2008 Wiley Periodicals, Inc. J Appl Polym Sci, 2008  相似文献   
152.
A statistical learning model is considered within the framework of the theory of uniform convergence of frequencies of errors in the case where the convergence is violated as a result of increasing the informativeness of training examples. Drawbacks of nonconstructive refinements of Vapnik-Chervonenkis estimates based on an assumption on the distribution law of violations are shown. A new approach to obtaining constructive estimates for mass data sets is proposed.  相似文献   
153.
154.
155.
基于USB数据同步采集设计方案   总被引:6,自引:0,他引:6  
李进 《测试技术学报》2003,17(4):293-297
介绍了USB在数据同步传输方面的可行性及其在同步传输方面的优点,合理解决了数据采集的同步性问题,和以往的采集方法相比,具有高速、高精度、多路同步采集及实时处理等特点,可广泛地应用于工业等各方面的数据测试系统中。  相似文献   
156.
Fluorescent photon down conversion for the improvement of the blue response of ZnO/CdS/Cu(In,Ga)Se2 heterojunction solar cells and modules is investigated. Fluorescent dyes of the series Lumogen® F are analyzed by optical transmission and reflection as well as by photoluminescence measurements. A spectral transfer matrix formalism is introduced that allows to predict the suitability of a luminescent dye as a down-converter for a given solar cell from its absorption/emission properties. We find that Lumogen® F Violet 570 and Lumogen® F Yellow 083 as well as a combination of both yields improvements for Cu(In,Ga)Se2 solar modules. Particularly, we find that the short circuit current density of a Cu(In,Ga)Se2 mini-module is improved by 1.5 mA cm− 2 when applying a varnish with a combination of Lumogen® F Violet and Yellow. About 0.5 mA cm− 2 of this improvement is due to a reduced overall reflectance and an improvement of 1 mA cm− 2 results from the frequency conversion by the dyes.  相似文献   
157.
Verifiable Distributed Oblivious Transfer and Mobile Agent Security   总被引:1,自引:0,他引:1  
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting mobile agents not only is possible, but also can be implemented efficiently. This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399 and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003. Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases, and wireless networks. On the theoretical side, he is interested in cryptography and game theory. Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS) at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998 and 2001).  相似文献   
158.
大体积承台混凝土施工   总被引:3,自引:3,他引:0  
宋立德 《山西建筑》2004,30(10):59-60
阐述了东莞水道特大桥主桥承台大体积混凝土浇筑施工工艺 ,及施工中的注意事项 ,从分层的厚度、表面处理等方面 ,提出了采用泵送混凝土浇筑施工中质量弊病的预防措施  相似文献   
159.
This article presents results from a numerical study of pulsating jet impingement heat transfer. The motivation is to seek conditions offering a significant enhancement compared to steady flow impingement drying. The CFD software package FLUENT was used for simulating slot-type pulsating jet impingement flows with confinement. The parameter study included velocity amplitude ratio, mean jet velocity, and pulsation frequency. The distance from nozzle exit to surface was three times the hydraulic diameter of the nozzle. The Reynolds number based on the nozzle hydraulic diameter and jet temperature was 2,460 with a mean jet velocity of 30 m/s, which is the base case of the numerical experiments. Results showed that time-averaged surface heat transfer increased with increasing velocity amplitude for the same mean jet velocity. Large velocity amplitudes helped enhance heat transfer by two mechanisms: high jet velocity during the positive cycle and strong recirculating flows during the negative cycle. For the cases with different mean jet velocities but the same maximum velocity, time-averaged surface heat flux decreased with decreasing mean jet velocity. As for the effects of pulsation frequency, with high-velocity amplitude ratio, time-averaged surface heat fluxes were at the same level regardless of frequency. However, at low-velocity amplitude ratio, high frequency caused stronger recirculating flows resulting in greater heat transfer compared to the cases with a lower frequency.  相似文献   
160.
Two experiments examined the disruption of feature-based selection in triple-conjunction search at multiple target transfers. In Experiment 1, after 10 training sessions, a new target possessing previous distractor features was introduced. This produced disruption in RT and fixation number, but no disruption in feature-based selection. Specifically, there was a tendency to fixate objects sharing the target's contrast polarity and shape and this did not change even upon transfer to the new target. In Experiment 2, 30 training sessions were provided with three target transfers. At the first transfer, the results replicated Experiment 1. Subsequent transfers did not produce disruption on any measure. These findings are discussed in terms of strength theory, Guided Search, rule-based approaches to perceptual learning, and the area activation model. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号