全文获取类型
收费全文 | 19035篇 |
免费 | 2264篇 |
国内免费 | 1386篇 |
专业分类
电工技术 | 1926篇 |
技术理论 | 1篇 |
综合类 | 2619篇 |
化学工业 | 1751篇 |
金属工艺 | 310篇 |
机械仪表 | 1042篇 |
建筑科学 | 759篇 |
矿业工程 | 406篇 |
能源动力 | 903篇 |
轻工业 | 995篇 |
水利工程 | 491篇 |
石油天然气 | 1979篇 |
武器工业 | 217篇 |
无线电 | 2649篇 |
一般工业技术 | 1127篇 |
冶金工业 | 532篇 |
原子能技术 | 199篇 |
自动化技术 | 4779篇 |
出版年
2024年 | 30篇 |
2023年 | 225篇 |
2022年 | 434篇 |
2021年 | 561篇 |
2020年 | 524篇 |
2019年 | 559篇 |
2018年 | 440篇 |
2017年 | 581篇 |
2016年 | 656篇 |
2015年 | 761篇 |
2014年 | 1040篇 |
2013年 | 1059篇 |
2012年 | 1358篇 |
2011年 | 1495篇 |
2010年 | 1199篇 |
2009年 | 1284篇 |
2008年 | 1327篇 |
2007年 | 1416篇 |
2006年 | 1317篇 |
2005年 | 1068篇 |
2004年 | 885篇 |
2003年 | 781篇 |
2002年 | 611篇 |
2001年 | 511篇 |
2000年 | 439篇 |
1999年 | 408篇 |
1998年 | 268篇 |
1997年 | 227篇 |
1996年 | 204篇 |
1995年 | 189篇 |
1994年 | 194篇 |
1993年 | 132篇 |
1992年 | 86篇 |
1991年 | 80篇 |
1990年 | 79篇 |
1989年 | 62篇 |
1988年 | 51篇 |
1987年 | 20篇 |
1986年 | 20篇 |
1985年 | 21篇 |
1984年 | 17篇 |
1983年 | 8篇 |
1982年 | 6篇 |
1981年 | 8篇 |
1980年 | 5篇 |
1979年 | 5篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1975年 | 7篇 |
1954年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
港里矿围岩软弱破碎,随开采深度延伸,地压显现越来越剧烈,严重影响港里矿正常回采。为研究港里矿软破围岩采矿,分析了影响采矿正常进行的因素和机理,调整采矿的顺序,使港里矿软破围岩采矿的困难得到根本扭转,保证了采矿生产的正常进行,选择围岩稳固及充分卸压部位布置斜坡道和联巷、优先回采围岩破碎的高应力区是地压管理的关键问题。 相似文献
32.
A number of worms, named P2P (peer-to-peer) passive worms, have recently surfaced, which propagate in P2P file-sharing networks and have posed heavy threats to these networks. In contrast to the majority of Internet worms, it is by exploiting users’ legitimate activities instead of vulnerabilities of networks in which P2P passive worms propagate. This feature evidently slows down their propagation, which results in them not attracting an adequate amount of attention in literature. Meanwhile, this feature visibly increases the difficulty of detecting them, which makes it very possible for them to become epidemic. In this paper, we propose an analytical model for P2P passive worm propagation by adopting epidemiological approaches so as to identify their behaviors and predict the tendency of their propagation accurately. Compared with a few existing models, dynamic characteristics of P2P networks are taken into account. Based on this proposed model, the sufficient condition for the global stability of the worm free equilibrium is derived by applying epidemiological theories. Large scale simulation experiments have validated both the proposed model and the condition. 相似文献
33.
This study details the numerical modelling and optimization of natural convection heat suppression in a solar cavity receiver with plate fins. The use of plate fins attached to the inner aperture surface is presented as a possible low cost means of suppressing natural convection heat loss in a cavity receiver. In the first part of the study a three-dimensional numerical model that captures the heat transfer and flow processes in the cavity receiver is analyzed, and the possibilities of optimization were then established. The model is laminar in the range of Rayleigh number, inclination angle, plate height and thickness considered. In the second part of the study, the geometric parameters considered were optimized using optimization programme with search algorithm. The results indicate that significant reduction on the natural convection heat loss can be achieved from cavity receivers by using plate fins, and an optimal plate fins configuration exit for minimal natural convection heat loss for a given range of Rayleigh number. Reduction of up to a maximum of 20% at 0° receiver inclination was observed. The results obtained provide a novel approach for improving design of cavity receiver for optimal performance. 相似文献
34.
Dr. Hu Zeng Bo He Prof. Chengqi Yi 《Chembiochem : a European journal of chemical biology》2019,20(15):1898-1905
Over the past few decades, various DNA modification detection methods have been developed; many of the high-resolution methods are based on bisulfite treatment, which leads to DNA degradation, to a degree. Thus, novel bisulfite-free approaches have been developed in recent years and shown to be useful for epigenome analysis in otherwise difficult-to-handle, but important, DNA samples, such as hmC-seal and hmC-CATCH. Herein, an overview of advances in the development of epigenome sequencing methods for these important DNA modifications is provided. 相似文献
35.
36.
37.
冯鹏一 《信息通信技术与政策》2020,(1):12-15
以电信用户入网协议为切入点,电信用户的携号转网行为应受到《合同法》《消费者权益保护法》等私法规范的保护与限制。该行为引起的格式条款解释、合同终止、违约责任、损失赔偿等问题,不能仅靠《电信条例》等公法规范来调整。应当积极引导广大消费者用户以私法领域相关规定为依据,转变争议解决思维,拓宽纠纷处理途径,合理选择维权手段,以保护自身合法民事权益,与行业监管部门共同推动电信行业有序发展。 相似文献
38.
随着物联网(IoT)的快速发展,越来越多的IoT节点设备被部署,但伴随而来的安全问题也不可忽视。IoT的网络层节点设备主要通过无线传感网进行通信,其相较于互联网更开放也更容易受到拒绝服务等网络攻击。针对无线传感网面临的网络层安全问题,提出了一种基于序列模型的网络入侵检测系统,对网络层入侵进行检测和报警,具有较高的识别率以及较低的误报率。另外,针对无线传感网节点设备面临的节点主机设备的安全问题,在考虑节点开销的基础上,提出了一种基于简单序列模型的主机入侵检测系统。实验结果表明,针对无线传感网的网络层以及主机层的两个入侵检测系统的准确率都达到了99%以上,误报率在1%左右,达到了工业需求,这两个系统可以全面有效地保护无线传感网安全。 相似文献
39.
A new optimization algorithm for optimal PMU configuration based on combination of graph theory and genetic algorithm is proposed. According to four topology reconstruction rules and three PMU configuration rules based on the graphic relationships between PMUs, constraints of PMU placement are put forward through topology constraint analysis, which dramatically limits the feasible solution space, thereby enhancing the algorithm speed. Meanwhile, an improved genetic algorithm based on serial number coding is presented to avoid infeasible solutions and improve the overall optimization performance. New corresponding crossover and mutation operator is also created. Examples show that the proposed algorithm performs very well and is highly valuable to large-scale networks. 相似文献
40.
Number entry is a ubiquitous activity and is often performed in safety- and mission-critical procedures, such as healthcare, science, finance, aviation and in many other areas. We show that Monte Carlo methods can quickly and easily compare the reliability of different number entry systems. A surprising finding is that many common, widely used systems are defective, and induce unnecessary human error. We show that Monte Carlo methods enable designers to explore the implications of normal and unexpected operator behaviour, and to design systems to be more resilient to use error. We demonstrate novel designs with improved resilience, implying that the common problems identified and the errors they induce are avoidable. 相似文献