全文获取类型
收费全文 | 801篇 |
免费 | 146篇 |
国内免费 | 113篇 |
专业分类
电工技术 | 39篇 |
综合类 | 140篇 |
化学工业 | 34篇 |
金属工艺 | 12篇 |
机械仪表 | 48篇 |
建筑科学 | 58篇 |
矿业工程 | 24篇 |
能源动力 | 8篇 |
轻工业 | 4篇 |
水利工程 | 26篇 |
石油天然气 | 44篇 |
武器工业 | 6篇 |
无线电 | 109篇 |
一般工业技术 | 132篇 |
冶金工业 | 16篇 |
原子能技术 | 3篇 |
自动化技术 | 357篇 |
出版年
2024年 | 3篇 |
2023年 | 19篇 |
2022年 | 32篇 |
2021年 | 46篇 |
2020年 | 46篇 |
2019年 | 49篇 |
2018年 | 32篇 |
2017年 | 44篇 |
2016年 | 43篇 |
2015年 | 27篇 |
2014年 | 60篇 |
2013年 | 51篇 |
2012年 | 68篇 |
2011年 | 81篇 |
2010年 | 41篇 |
2009年 | 59篇 |
2008年 | 44篇 |
2007年 | 40篇 |
2006年 | 33篇 |
2005年 | 24篇 |
2004年 | 29篇 |
2003年 | 13篇 |
2002年 | 26篇 |
2001年 | 10篇 |
2000年 | 19篇 |
1999年 | 16篇 |
1998年 | 11篇 |
1997年 | 10篇 |
1996年 | 12篇 |
1995年 | 14篇 |
1994年 | 11篇 |
1993年 | 7篇 |
1992年 | 4篇 |
1991年 | 4篇 |
1990年 | 4篇 |
1989年 | 4篇 |
1988年 | 5篇 |
1987年 | 3篇 |
1986年 | 5篇 |
1984年 | 4篇 |
1983年 | 2篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1974年 | 1篇 |
排序方式: 共有1060条查询结果,搜索用时 15 毫秒
51.
53.
Computing surfaces invariant under subdivision 总被引:3,自引:0,他引:3
In this paper, we propose a general subdivision algorithm for generating surfaces. The algorithm has as motivation our earlier work on the design of free form curves where similar ideas were investigated. Here we describe some properties of uniform refinement algorithms for surface generation. A detail analysis of their properties will be given later by one of us. 相似文献
54.
裂隙岩体渗流参数讨论和渗流场有限元计算与分析 总被引:5,自引:4,他引:1
Zhang Jiafa 《长江科学院院报》1990,(2)
本文综合讨论了裂隙岩体渗流参数的特征,及由裂隙参数确定岩体渗透张量的过程。叙述了将岩体作为连续介质的三维非均质各向异性稳定渗流场有限元计算方法。通过对简单模型的有限元计算分析,讨论了各向异性渗流场的二个特征,即渗透主轴对渗流场的控制意义、以及渗透主轴与边界的关系对渗流场的控制意义。 相似文献
55.
Two continuous field variables, called as continuity tensor and damage variable tensor, are used to describe the anisotropic responses of an elastic-brittle material under transverse impact load. Based on the continuum damage mechanics, anisotropic damage constitutive equations in both full and incremental forms are proposed here. The expressions of effective elastic module tensor, damage variable tensor and damage propagation force tensor are further derived, and the methods for determining the tensors are explained in detail. An example of strain and damage response of a fiber reinforced composite laminated plate under transverse impact load is employed to demonstrate the application of this theory. In the example, the damage variable coupled with geometric large deformation of laminated plate is also considered. The calculating results illustrate the influence of damage on strain field in the impacted laminated plate. 相似文献
56.
给出分子惯量张量的并矢式,利用标量场性质得到惯量张量的示性曲面,根据Neumann原理讨论各种点群分子惯量张量示性面的特点,给出分子惯量张量沿不同方向值的分布规律及角动量与角速度共线的方向. 相似文献
57.
58.
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc. 相似文献
59.
The emergence of quantum computer will threaten the security of existing public-key cryptosystems,including the Diffie Hellman key exchange protocol,encryption scheme and etc,and it makes the study of resistant quantum cryptography very urgent.This motivate us to design a new key exchange protocol and encryption scheme in this paper.Firstly,some acknowledged mathematical problems was introduced,such as ergodic matrix problem and tensor decomposition problem,the two problems have been proved to NPC hard.From the computational complexity prospective,NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them.From the algebraic structures prospective,non-commutative cryptography has been considered to resist quantum.The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures,so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures.Secondly,a new problem was constructed based on the introduced problems in this paper,then a key exchange protocol and a public key encryption scheme were proposed based on it.Finally the security analysis,efficiency,recommended parameters,performance evaluation and etc.were also been given.The two schemes has the following characteristics,provable security,security bits can be scalable,to achieve high efficiency,quantum resistance,and etc. 相似文献
60.
《岩石力学与岩土工程学报(英文版)》2020,12(5):943-959
In this study, servo-controlled biaxial compression tests were conducted on marble specimens to investigate their failure characteristics and fracturing process. The complete stress–strain curves were obtained, and the three-dimensional (3D) features of the failure surfaces were acquired by 3D laser scanning. Acoustic emission (AE) monitoring and moment tensor (MT) analysis were used in combination to better understand the fracturing mechanism of marble under biaxial compression. It was noted that a type of 3D stepwise cracking behaviour occurred on the fracturing surfaces of the examined specimens. The stress dropped multiple times, and a repeated fracturing mode corresponding to the repeated stress drops in the post-peak regime was observed. Three substages, i.e. stress stabilisation, stress decrease and stress increase, were identified for a single fracturing mode. Then quantitative and statistical analyses of the fracturing process at each substage were discussed. Based on the testing results, it was found that at the stress stabilisation substage, the proportion of mixed-mode fractures increased. At the stress decrease substage, the proportion of mixed-mode fractures decreased, and the tensile or shear fractures increased. At the stress increase substage, the proportion of mixed-mode or tensile fractures decreased, and the shear fractures increased. Finally, a conceptual model for the stepwise crack formation was proposed. 相似文献