首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   58069篇
  免费   5512篇
  国内免费   5032篇
电工技术   5231篇
技术理论   10篇
综合类   4503篇
化学工业   2741篇
金属工艺   328篇
机械仪表   1720篇
建筑科学   2226篇
矿业工程   678篇
能源动力   1687篇
轻工业   803篇
水利工程   665篇
石油天然气   380篇
武器工业   271篇
无线电   7100篇
一般工业技术   3420篇
冶金工业   1180篇
原子能技术   194篇
自动化技术   35476篇
  2024年   254篇
  2023年   860篇
  2022年   930篇
  2021年   1372篇
  2020年   1686篇
  2019年   1582篇
  2018年   1441篇
  2017年   1933篇
  2016年   2122篇
  2015年   2021篇
  2014年   4132篇
  2013年   4873篇
  2012年   3724篇
  2011年   4369篇
  2010年   3177篇
  2009年   3701篇
  2008年   3708篇
  2007年   3846篇
  2006年   3308篇
  2005年   2890篇
  2004年   2346篇
  2003年   2166篇
  2002年   1720篇
  2001年   1318篇
  2000年   1217篇
  1999年   1021篇
  1998年   873篇
  1997年   759篇
  1996年   684篇
  1995年   584篇
  1994年   525篇
  1993年   498篇
  1992年   385篇
  1991年   364篇
  1990年   286篇
  1989年   223篇
  1988年   193篇
  1987年   167篇
  1986年   141篇
  1985年   199篇
  1984年   197篇
  1983年   178篇
  1982年   156篇
  1981年   100篇
  1980年   73篇
  1979年   87篇
  1978年   61篇
  1977年   67篇
  1976年   20篇
  1975年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
In a typical embedded CPU, large on-chip storage is critical to meet high performance requirements. However, the fast increasing size of the on-chip storage based on traditional SRAM cells makes the area cost and energy consumption unsustainable for future embedded applications. Replacing SRAM with DRAM on the CPU’s chip is generally considered not worthwhile because DRAM is not compatible with the common CMOS logic and requires additional processing steps beyond what is required for CMOS. However a special DRAM technology, Gain-Cell embedded-DRAM (GC-eDRAM)  [1], [2], [3] is logic compatible and retains some of the good properties of DRAM (small and low power). In this paper we evaluate the performance of a novel hybrid cache memory where the data array, generally populated with SRAM cells, is replaced with GC-eDRAM cells while the tag array continues to use SRAM cells. Our evaluation of this cache demonstrates that, compared to the conventional SRAM-based designs, our novel architecture exhibits comparable performance with less energy consumption and smaller silicon area, enabling the sustainable on-chip storage scaling for future embedded CPUs.  相似文献   
2.
Development of efficient, low cost and multifunctional electrocatalysts for water splitting to harvest hydrogen fuels is a challenging task, but the combination of carbon materials with transition metal-based compounds is providing a unique and attractive strategy. Herein, composite systems based on cobalt ferrite oxide-reduced graphene oxide (Co2FeO4) @(rGO) using simultaneous hydrothermal and chemical reduction methods have been prepared. The proposed study eliminates one step associated with the conversion of GO into rGO as it uses direct GO during the synthesis of cobalt ferrite oxide, consequently rGO based hybrid system is achieved in-situ significantly, the optimized Co2FeO4@rGO composite has revealed an outstanding multifunctional applications related to both oxygen evolution reaction (OER) and hydrogen counterpart (HER). Various metal oxidation states and oxygen vacancies at the surface of Co2FeO4@rGO composites guided the multifunctional surface properties. The optimized Co2FeO4@rGO composite presents excellent multifunctional properties with onset potential of 0.60 V for ORR, an overpotential of 240 mV at a 20 mAcm?2 for OER and 320 mV at a 10 mAcm?2 for HER respectively. Results revealed that these multifunctional properties of the optimized Co2FeO4@ rGO composite are associated with high electrical conductivity, high density of active sites, crystal defects, oxygen vacancies, and favorable electronic structure arisinng from the substitution of Fe for Co atoms in binary spinel oxide phase. These surface features synergistically uplifted the electrocatalytic properties of Co2FeO4@rGO composites. The multifunctional properties of the Co2FeO4@ rGO composite could be of high interest for its use in a wide range of applications in sustainable and renewable energy fields.  相似文献   
3.
5G系统将移动通信服务从移动电话、移动宽带和大规模机器通信扩展到新的应用领域,即所谓对通信服务有特殊要求的垂直领域。对使能未来工厂的5G能力进行了全面的分析总结,包括弹性网络架构、灵活频谱、超可靠低时延通信、时间敏感网络、安全和定位,而弹性网络架构又包括对网络切片、非公共网络、5G局域网和边缘计算的支持。希望从广度到深度,对相关的理论及技术应用做透彻、全面的梳理,对其挑战做清晰的总结,从而为相关研究和工程技术人员提供借鉴。  相似文献   
4.
朱宏  张蔚翔  郭成英 《中州煤炭》2021,(11):239-243
为应对电力系统安全分析中的停机问题,基于概率法的方式,将常用的确定停机计算与加入了概率法的概率停机进行比较,研究了二者的区别与其在长期投资方向的不同。在进行电力系统停机分析时,通常会分别从确定停机与概率停机的角度出发,对其应急状态下的潮流进行计算。但前者的方法可能导致极低概率的停机事件被忽略,进而影响长期的资金投资。通过加入概率法的计算,使得对单个停机事件的判定由其具体的频率来确定,增加了系统运行的稳定性。  相似文献   
5.
Smartphones are a promising tool as student response systems (SRS) for interactive teaching due to their widespread diffusion. Here, the main purpose is to assess the efficacy of smartphone-based SRS in large classroom settings of undergraduate Thermodynamics, as representative of engineering courses requiring high-level cognitive skills for problem solving. Four sets of multiple-choice questions were presented during the course. Overall, the results refer to 1055 students between control and SRS classes, each corresponding to a3 years period.One of the main results of this work is the strong linear correlation between the average questionnaire score and the final exam grade (R2 = 0.91). A similar correlation, although with a lower value of R2, is already found in the first questionnaire, thus showing the SRS high predictive power of class performance. The results of this study provide guidance for a quantitative use of smartphone-based SRS in teaching basic disciplines. The SRS monitoring capability allows early detection of struggling students, thus paving the way to personalized tutoring and improved student engagement in active learning practices. This approach is especially important in emergency situations, such as the SARS-Cov-2 pandemic, when distance learning is widely adopted, and remote interactive tools are highly needed.  相似文献   
6.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
7.
This paper deals with the problem of designing a robust static output feedback controller for polytopic systems. The current research that tackled this problem is mainly based on LMI method, which is conservative by nature. In this paper, a novel approach is proposed, which considers the design space of the controller parameters and iteratively partitions the space to small simplexes. Then, by assessing the stability in each simplex, the solution space for design parameters is directly determined. It has been theoretically proved that, if there exists a feasible solution in the design space, the algorithm can find it. To validate the result of the proposed approach, comparative simulation examples are given to illustrate the performance of the design methodology as compared to those of previous approaches.  相似文献   
8.
Number entry is a ubiquitous activity and is often performed in safety- and mission-critical procedures, such as healthcare, science, finance, aviation and in many other areas. We show that Monte Carlo methods can quickly and easily compare the reliability of different number entry systems. A surprising finding is that many common, widely used systems are defective, and induce unnecessary human error. We show that Monte Carlo methods enable designers to explore the implications of normal and unexpected operator behaviour, and to design systems to be more resilient to use error. We demonstrate novel designs with improved resilience, implying that the common problems identified and the errors they induce are avoidable.  相似文献   
9.
Several three-party password authenticated key exchange (3-PAKE) protocols have recently been proposed for heterogeneous wireless sensor networks (HWSN). These are efficient and designed to address security concerns in ad-hoc sensor network applications for a global Internet of Things framework, where a user may request access to sensitive information collected by resource-constrained sensors in clusters managed by gateway nodes. In this paper we first analyze three recently proposed 3-PAKE protocols and discuss their vulnerabilities. Then, based on Radio Frequency Identification technologies we propose a novel 3-PAKE protocol for HWSN applications, with two extensions for additional security features, that is provably secure, efficient and flexible.  相似文献   
10.
ABSTRACT

This paper deals with asymptotic stabilisation of a class of nonlinear input-delayed systems via dynamic output feedback in the presence of disturbances. The proposed strategy has the structure of an observer-based control law, in which the observer estimates and predicts both the plant state and the external disturbance. A nominal delay value is assumed to be known and stability conditions in terms of linear matrix inequalities are derived for fast-varying delay uncertainties. Asymptotic stability is achieved if the disturbance or the time delay is constant. The controller design problem is also addressed and a numerical example with an unstable system is provided to illustrate the usefulness of the proposed strategy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号