全文获取类型
收费全文 | 550篇 |
免费 | 87篇 |
国内免费 | 56篇 |
专业分类
电工技术 | 8篇 |
综合类 | 62篇 |
化学工业 | 15篇 |
金属工艺 | 4篇 |
机械仪表 | 24篇 |
建筑科学 | 2篇 |
矿业工程 | 2篇 |
能源动力 | 2篇 |
轻工业 | 3篇 |
水利工程 | 2篇 |
石油天然气 | 1篇 |
武器工业 | 2篇 |
无线电 | 311篇 |
一般工业技术 | 55篇 |
冶金工业 | 2篇 |
原子能技术 | 1篇 |
自动化技术 | 197篇 |
出版年
2024年 | 3篇 |
2023年 | 11篇 |
2022年 | 25篇 |
2021年 | 28篇 |
2020年 | 24篇 |
2019年 | 16篇 |
2018年 | 10篇 |
2017年 | 9篇 |
2016年 | 11篇 |
2015年 | 14篇 |
2014年 | 27篇 |
2013年 | 36篇 |
2012年 | 30篇 |
2011年 | 27篇 |
2010年 | 26篇 |
2009年 | 26篇 |
2008年 | 44篇 |
2007年 | 24篇 |
2006年 | 33篇 |
2005年 | 38篇 |
2004年 | 28篇 |
2003年 | 11篇 |
2002年 | 22篇 |
2001年 | 18篇 |
2000年 | 30篇 |
1999年 | 22篇 |
1998年 | 14篇 |
1997年 | 16篇 |
1996年 | 14篇 |
1995年 | 15篇 |
1994年 | 6篇 |
1993年 | 12篇 |
1992年 | 13篇 |
1991年 | 4篇 |
1990年 | 3篇 |
1988年 | 1篇 |
1983年 | 1篇 |
1974年 | 1篇 |
排序方式: 共有693条查询结果,搜索用时 31 毫秒
71.
An acoustic imaging system using holographic techniques is described. Insonification of the object is achieved using a phased array scanner. Image reconstruction uses Fourier Transformations to produce a 128 × 128 pixel TV display. The system has the ability to focus in the ‘near field’ of its transducer arrays and has a frame rate of approximately 0.3 Hz. 相似文献
72.
散射参考光法制作真彩色全息图 总被引:2,自引:1,他引:1
本文提出了用散射参考光制作2D真彩色全息图的原理,按本原理制作的全息图比用散射物光法制作的图像清晰得多,并且使记录激光能量得到充分利用,特别适用于记录大幅面彩色全息图。 相似文献
73.
Klaus Schmeh 《Cryptologia》2013,37(4):342-361
AbstractThe cryptology literature and other sources mention several dozen books that are entirely or partially encrypted. However, a systematic treatise about this issue has never been made. This article aims to close this gap. The author has assembled a list of encrypted books that contains 41 entries, so far. Based on this list, an overview on encrypted books is given. Encrypted books are classified according to criteria like purpose, solved/unsolved, encryption method, and creation time. Numerous open research questions are identified. Finally, it is a goal of this article to ask readers for additional information about the books on the list and for encrypted books that are still missing. 相似文献
74.
75.
Raimondas Petruškevi?ius Darius Kezys Viktoras Grigaliūnas 《Microelectronic Engineering》2010,87(11):2332-2337
A fully vectorial 3D beam propagation method (BPM) has been applied to obtain a required pattern of computer generated hologram (CGH) with a variable profile of four phase levels. The computer reconstruction of the CGH image having one and two focal spots was performed by application of the fully vectorial 3D BPM method. After transferring the CGH by EBL technique an adequate phase profile was obtained. Inter-level parameter method was developed to obtain the estimated an electron beam dose required for the even topographical patterning. Using this method, an EBL exposure dose determined to achieve the required relief amplitude of 1.29 μm was 43 μC/cm2. The manufactured holograms showed that the overall proposed production process, from the 3D BPM computer simulation to e-beam lithography, can be used to obtain good quality product with reasonable time and computational resources. 相似文献
76.
77.
78.
With the development of battery vehicles, vehicle‐to‐grid (V2G) networks are becoming more and more important in smart grid. Although battery vehicles are environmentally friendly and flexible to use two‐way communication and two‐way electricity flow, they also raise privacy‐preservation challenges, such as location and movement privacy. On the one hand, utility companies have to monitor the grid and analyze user data to control the power production, distribution, scheduling, and billing process, while typical users need to access their data later online. On the other hand, users are not willing to provide their personal data because they do not trust the system security of the utility companies where their data stored, and it may potentially expose their privacy. Therefore, in this paper, we study data management of V2G networks in smart grid with privacy‐preservation to benefit both the customers and the utility companies. Both data aggregation and data publication of V2G networks are protected in the proposed architecture. To check its security, we analyze this architecture in several typical V2G networks attacks. We conduct several experiments to show that the proposed architecture is effective and efficient, and it can enhance user privacy protection while providing enough information for utility companies to analyze and monitor the grid. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献
79.
通过微电子机械技术(MEMS)在抛光的熔融石英基材表面制作了平面精度达到0.4μm的超大单片面积的全息透镜。采用了分辨率达到0.2μm的步进投影式拼接光刻,适合石英基材的专用等离子耦合刻蚀(ICP)干法刻蚀技术,特殊的物理清洗方法,以及相关的多项辅助工艺。透镜理想面形横截面曲线为分段抛物线,每一片由23个柱状结构单元周期横向排列构成,采用等深度不等宽度的4台阶结构拟合,单元宽度约为2.966mm。在4in(10.16cm)圆片上,获得了单片尺寸为68mm×68mm的方形透镜。采用接触式台阶仪,扫描电子显微镜(SEM),高倍光学显微镜等方法进行不同阶段检测。结果显示:台阶平面精度为0.4μm,垂直精度为30nm,有非常好的立墙陡直度和刻蚀均匀性。此工艺方案可实现小规模批量生产,成本适中,可以直接用于制作6in(15.24cm)以上同等级要求的石英透镜,经适当改进也可用于蓝宝石等基底材料的制作。 相似文献
80.