全文获取类型
收费全文 | 12438篇 |
免费 | 1435篇 |
国内免费 | 1117篇 |
专业分类
电工技术 | 545篇 |
技术理论 | 1篇 |
综合类 | 1741篇 |
化学工业 | 1355篇 |
金属工艺 | 217篇 |
机械仪表 | 471篇 |
建筑科学 | 923篇 |
矿业工程 | 474篇 |
能源动力 | 188篇 |
轻工业 | 434篇 |
水利工程 | 335篇 |
石油天然气 | 489篇 |
武器工业 | 83篇 |
无线电 | 1133篇 |
一般工业技术 | 766篇 |
冶金工业 | 1483篇 |
原子能技术 | 110篇 |
自动化技术 | 4242篇 |
出版年
2024年 | 33篇 |
2023年 | 120篇 |
2022年 | 315篇 |
2021年 | 350篇 |
2020年 | 407篇 |
2019年 | 396篇 |
2018年 | 348篇 |
2017年 | 327篇 |
2016年 | 413篇 |
2015年 | 466篇 |
2014年 | 723篇 |
2013年 | 690篇 |
2012年 | 866篇 |
2011年 | 919篇 |
2010年 | 772篇 |
2009年 | 803篇 |
2008年 | 792篇 |
2007年 | 858篇 |
2006年 | 824篇 |
2005年 | 721篇 |
2004年 | 638篇 |
2003年 | 527篇 |
2002年 | 495篇 |
2001年 | 398篇 |
2000年 | 289篇 |
1999年 | 203篇 |
1998年 | 150篇 |
1997年 | 138篇 |
1996年 | 118篇 |
1995年 | 110篇 |
1994年 | 92篇 |
1993年 | 80篇 |
1992年 | 77篇 |
1991年 | 47篇 |
1990年 | 34篇 |
1989年 | 35篇 |
1988年 | 29篇 |
1987年 | 16篇 |
1986年 | 21篇 |
1965年 | 18篇 |
1964年 | 22篇 |
1963年 | 23篇 |
1961年 | 25篇 |
1960年 | 19篇 |
1959年 | 25篇 |
1958年 | 18篇 |
1957年 | 22篇 |
1956年 | 22篇 |
1955年 | 32篇 |
1954年 | 20篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
Reviews the book, Basic Processes in Reading Visual Word Recognition by Derek Besner and Glyn W. Humphreys (see record 1990-99017-000). While there has been an increase in the amount of work on many different aspects of reading, as Besner and Humphreys point out in the overview to their book, the vast majority of the research on the topic of reading in the past twenty years has been concerned with the processes involved in word recognition. For this reason, Besner and Humphreys have attempted to bring together studies on topics which are both relevant to current debates in the field of word recognition, and which are likely to be important for future developments in the field. They have compiled an edited volume consisting of their overview and eight additional chapters. The editors have attempted to span the continuum of processes involved in word recognition and thus have included chapters which cover topics ranging from the visual analysis of words, to those on the influence of semantic factors on word recognition. The authors of these chapters comprise an impressive list of researchers in the field of word recognition, with the majority of chapters being authored by leading researchers on the topic. Given the stature of the authors and the range of topics covered, in theory this volume should provide a very thorough overview of current theory and research on reading. There is no question that each of the chapters is interesting and important in its own right. However, in practice the volume as a whole fell somewhat short of my expectations. The different tacts taken by different authors has resulted in a very uneven coverage of the current debates in the field. Notwithstanding these criticisms, I am sure that the majority of researchers in this field will consider this volume to be an important contribution. The book would provide a very useful addition to graduate courses in cognitive sciences and as a supplemental text for an undergraduate course on the psychology of reading. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
52.
以单片机8031 为核心组成的采集、保护和通信模块,通过RS485 的连接,与486 工控微机构成了分布式35 kV 变电站的自控系统,实现变电站的计量、保护和控制等功能,以达到变电站的无人值守或少人值守。 相似文献
53.
Algebraic properties of cryptosystem PGM 总被引:2,自引:0,他引:2
In the late 1970s Magliveras invented a private-key cryptographic system calledPermutation Group Mappings (PGM). PGM is based on the prolific existence of certain kinds of factorization sets, calledlogarithmic signatures, for finite permutation groups. PGM is an endomorphic system with message space ℤ|G| for a given finite permutation groupG. In this paper we prove several algebraic properties of PGM. We show that the set of PGM transformations ℐ
G
is not closed under functional composition and hence not a group. This set is 2-transitive on ℤ|G| if the underlying groupG is not hamiltonian and not abelian. Moreover, if the order ofG is not a power of 2, then the set of transformations contains an odd permutation. An important consequence of these results
is that the group generated by the set of transformations is nearly always the symmetric group ℒ|G|. Thus, allowing multiple encryption, any permutation of the message space is attainable. This property is one of the strongest
security conditions that can be offered by a private-key encryption system.
S. S. Magliveras was supported in part by NSF/NSA Grant Number MDA904-82-H0001, by U.S. West Communications, and by the Center
for Communication and Information Science of the University of Nebraska. 相似文献
54.
55.
基于浙江省优质水资源相对短缺的现实,提出了开展水库(群)优化调度的基本思路,在分析水库群不同联结方式特点的基础上,提出水库群联合优化调度的技术方法,实例验证表明,该方法增加供水量12%,科学可行。 相似文献
56.
57.
C. N. Cacaval E. C. BuruianÎ D. Rou E. Rusu G. E. Grigoriu V. Brboiu 《Polymer International》1985,17(4):343-346
Thermogravimetry and pyrolysis in combination with gas chromatography and infrared spectroscopy were the experimental techniques applied to the thermal degradation of cinnamoylated poly(vinyl alcohol) samples, constituted from vinyl alcohol-vinyl cinnamate photocrosslinkable copolymers. The thermal decomposition products include gases, liquids and solids. The gases are formed from saturated and unsaturated volatile hydrocarbons C1? C4, carbon monoxide and carbon dioxide. The liquid fraction includes aromatic hydrocarbons and some oxygenated organic compounds. The solid product identified in the greatest amount was cinnamic acid. The content in the thermal decomposition products varies considerably both with copolymer composition and temperature. 相似文献
58.
59.
何明一 《电子科学学刊(英文版)》1994,11(1):1-10
A new concept, the generalized inverse group (GIG) of signal, is firstly proposed and its properties, leaking coefficients and implementation with neural networks are presented. Theoretical analysis and computational simulation have shown that (1) there is a group of finite length of generalized inverse signals for any given finite signal, which forms the GIG; (2) each inverse group has different leaking coefficients, thus different abnormal states; (3) each GIG can be implemented by a grouped and improved single-layer perceptron which appears with fast convergence. When used in deconvolution, the proposed GIG can form a new parallel finite length of filtering deconvolution method. On off-line processing, the computational time is reduced to O(N) from O(N2). And the less the leaking coefficient is, the more reliable the deconvolution will be. 相似文献
60.