首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   198866篇
  免费   2634篇
  国内免费   606篇
工业技术   202106篇
  2021年   1601篇
  2019年   1569篇
  2018年   2572篇
  2017年   2644篇
  2016年   2775篇
  2015年   1794篇
  2014年   3074篇
  2013年   8939篇
  2012年   5050篇
  2011年   7021篇
  2010年   5589篇
  2009年   6350篇
  2008年   6443篇
  2007年   6511篇
  2006年   5579篇
  2005年   5228篇
  2004年   5008篇
  2003年   4892篇
  2002年   4525篇
  2001年   4656篇
  2000年   4578篇
  1999年   4729篇
  1998年   11376篇
  1997年   8120篇
  1996年   6408篇
  1995年   4674篇
  1994年   4273篇
  1993年   4075篇
  1992年   3223篇
  1991年   3076篇
  1990年   2870篇
  1989年   2951篇
  1988年   2826篇
  1987年   2398篇
  1986年   2307篇
  1985年   2715篇
  1984年   2505篇
  1983年   2345篇
  1982年   2090篇
  1981年   2203篇
  1980年   2029篇
  1979年   2094篇
  1978年   2095篇
  1977年   2343篇
  1976年   3162篇
  1975年   1814篇
  1974年   1736篇
  1973年   1756篇
  1972年   1434篇
  1971年   1320篇
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
141.
Solder joints are generated using a variety of methods to provide both mechanical and electrical connection for applications such as flip-chip, wafer level packaging, fine pitch, ball-grid array, and chip scale packages. Solder joint shape prediction has been incorporated as a key tool to aid in process development, wafer level and package level design and development, assembly, and reliability enhancement. This work demonstrates the application of an analytical model and the Surface Evolver software in analyzing a variety of solder processing methods and package types. Bump and joint shape prediction was conducted for the design of wafer level bumping, flip-chip assembly, and wafer level packaging. The results from the prediction methodologies are validated with experimentally measured geometries at each level of design.  相似文献   
142.
Continuing the process of improvements made to TCP through the addition of new algorithms in Tahoe and Reno, TCP SACK aims to provide robustness to TCP in the presence of multiple losses from the same window. In this paper we present analytic models to estimate the latency and steady-state throughput of TCP Tahoe, Reno, and SACK and validate our models using both simulations and TCP traces collected from the Internet. In addition to being the first models for the latency of finite Tahoe and SACK flows, our model for the latency of TCP Reno gives a more accurate estimation of the transfer times than existing models. The improved accuracy is partly due to a more accurate modeling of the timeouts, evolution of cwnd during slow start and the delayed ACK timer. Our models also show that, under the losses introduced by the droptail queues which dominate most routers in the Internet, current implementations of SACK can fail to provide adequate protection against timeouts and a loss of roughly more than half the packets in a round will lead to timeouts. We also show that with independent losses SACK performs better than Tahoe and Reno and, as losses become correlated, Tahoe can outperform both Reno and SACK.  相似文献   
143.
Ultrawideband (UWB) transmissions induce pronounced frequency-selective fading effects in their multipath propagation. Multipath diversity gains can be collected to enhance performance, provided that the underlying channel can be estimated at the receiver. To this end, we develop a novel pilot waveform assisted modulation (PWAM) scheme that is tailored for UWB communications. We select our PWAM parameters by jointly optimizing channel estimation performance and information rate. The resulting transmitter design maximizes the average capacity, which is shown to be equivalent to minimizing the mean-square channel estimation error, and thereby achieves the Crame/spl acute/r-Rao lower bound. Application of PWAM to practical UWB systems is promising because it entails simple integrate-and-dump operations at the frame rate. Equally important, it offers a flexible UWB channel estimator, capable of striking desirable rate-performance tradeoffs depending on the channel coherence time.  相似文献   
144.
Mobile ad hoc networks rely on the co-operation of devices that route for each other. This immediately presents security problems. Each device's data passes through the not so friendly hands of other devices. Forwarding devices must use their processing power and battery power to route packets for others. When bandwidth is limited they must also use bandwidth that they might want to use for themselves. These are not great issues with the first incarnations of ad hoc networks — military systems or others where all the devices are owned by a single organisation. However, if ad hoc networks are to be generally deployed and become an alternative or adjunct to future cellular systems, then ways to encourage co-operation are required. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   
145.
For the first time, we successfully fabricated and demonstrated high performance metal-insulator-metal (MIM) capacitors with HfO/sub 2/-Al/sub 2/O/sub 3/ laminate dielectric using atomic layer deposition (ALD) technique. Our data indicates that the laminate MIM capacitor can provide high capacitance density of 12.8 fF//spl mu/m/sup 2/ from 10 kHz up to 20 GHz, very low leakage current of 3.2 /spl times/ 10/sup -8/ A/cm/sup 2/ at 3.3 V, small linear voltage coefficient of capacitance of 240 ppm/V together with quadratic one of 1830 ppm/V/sup 2/, temperature coefficient of capacitance of 182 ppm//spl deg/C, and high breakdown field of /spl sim/6 MV/cm as well as promising reliability. As a result, the HfO/sub 2/-Al/sub 2/O/sub 3/ laminate is a very promising candidate for next generation MIM capacitor for radio frequency and mixed signal integrated circuit applications.  相似文献   
146.
The linearity of the modulus of elasticity of a randomly reinforced composite as a function of the volume content of fibre filler is experimentally established. The basic factors that determine the modulus of elasticity of the thermoplastic composite are determined: the modulus of elasticity, shape, and volume content of filler. The modulus of elasticity of the composite is not a function of the adhesion of the fibre filler to the matrix. Realization of the strength of fibre fillers in randomly reinforced composites should obey the mechanisms that hold for unidirectional, continuously reinforced composites with consideration of the effect of the filler and process parameters on the rheology and morphology of the binder.  相似文献   
147.
The nonlocal enhancement in the velocities of charge carriers to ionization is shown to outweigh the opposing effects of dead space, increasing the avalanche speed of short avalanche photodiodes (APDs) over the predictions of a conventional local model which ignores both of these effects. The trends in the measured gain-bandwidth product of two short InAlAs APDs reported in the literature support this result. Relatively large speed benefits are predicted to result from further small reductions in the lengths of short multiplication regions.  相似文献   
148.
The term atmospheric residue describes the material at the bottom of the atmospheric distillation tower having a lower boiling point limit of about 340°C; the term vacuum residue (heavy petroleum fractions) refers to the bottom of the vacuum distillation, which has an atmospheric equivalent boiling point (AEBP) above 540°C. In this work, the objective is to evaluate the behavior of different kinds of Brazilian atmospheric and vacuum residues using molecular distillation. The Falling Film Molecular Distillator was used. For the results obtained through this process, a significant range of temperature can be explored avoiding the thermal decomposition of the material. So these results are very important to the refinery decisions and improvements. The Experimental Factorial Design results showed that the temperature has more influence on the process than the feed flow rate, when a higher percentage of distillate is required.  相似文献   
149.
Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence. When the user departs, the token and device lose contact and the device secures itself. We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep. Our evaluation shows this is done without inconveniencing the user, while imposing a minimal performance overhead  相似文献   
150.
The mechanism of the inhibiting effect of diphenylamine during the oxidation of two base stocks of hydraulic oils were studied at 120, 130, and 140°C. The key reactions in the mechanism of the action of the inhibitor were identified, and the values of the kinetic parameters and their activation energies were determined. The kinetic parameters were calculated, and the salient kinetic features of the inhibited oxidation of the two specimens were compared at 70°C, the temperature of accelerated testing of hydraulic oils. The results of this prediction were analyzed, and the reasons for differences in the oxidation stability of the samples examined were established.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号