首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30891篇
  免费   2671篇
  国内免费   2226篇
电工技术   1442篇
技术理论   10篇
综合类   3615篇
化学工业   2095篇
金属工艺   314篇
机械仪表   1157篇
建筑科学   1652篇
矿业工程   2463篇
能源动力   1500篇
轻工业   854篇
水利工程   4367篇
石油天然气   1118篇
武器工业   173篇
无线电   3860篇
一般工业技术   1323篇
冶金工业   1382篇
原子能技术   195篇
自动化技术   8268篇
  2024年   128篇
  2023年   403篇
  2022年   776篇
  2021年   1025篇
  2020年   1084篇
  2019年   775篇
  2018年   735篇
  2017年   949篇
  2016年   1059篇
  2015年   1157篇
  2014年   1892篇
  2013年   1892篇
  2012年   2148篇
  2011年   2260篇
  2010年   1784篇
  2009年   1657篇
  2008年   1690篇
  2007年   2024篇
  2006年   2032篇
  2005年   1703篇
  2004年   1467篇
  2003年   1442篇
  2002年   1210篇
  2001年   1053篇
  2000年   945篇
  1999年   697篇
  1998年   439篇
  1997年   273篇
  1996年   203篇
  1995年   170篇
  1994年   157篇
  1993年   107篇
  1992年   84篇
  1991年   77篇
  1990年   62篇
  1989年   53篇
  1988年   34篇
  1987年   21篇
  1986年   19篇
  1985年   19篇
  1984年   14篇
  1983年   4篇
  1982年   5篇
  1981年   8篇
  1980年   9篇
  1979年   6篇
  1978年   4篇
  1977年   7篇
  1975年   7篇
  1954年   3篇
排序方式: 共有10000条查询结果,搜索用时 8 毫秒
1.
The recent trend of integration among new network services such as the long-term evolution (LTE) based on internet protocol (IP) needs reputable analyses and prediction information on the internet traffic. The IP along with increased internet traffics due to expanding new service platforms such as smartphones will reflect policies such as network QoS according to new services. The establishment of monitoring methods and analysis plans is thus required for the development of internet traffics that will analyze their status and predict their future. The paper with the speed of Internet traffic model is developed for monitoring the state of the experiment and verified. The problem is that the proposed service Internet service provider (ISP) to resolve the conflict between the occurrences can be considerably Internet traffic and that the state of data may be helpful in understanding. The paper advancement policy to reflect the network traffic volume of Internet services and users irradiation with increased traffic due to the development and management of the analysis was carried out experimental measurements.  相似文献   
2.
Number entry is a ubiquitous activity and is often performed in safety- and mission-critical procedures, such as healthcare, science, finance, aviation and in many other areas. We show that Monte Carlo methods can quickly and easily compare the reliability of different number entry systems. A surprising finding is that many common, widely used systems are defective, and induce unnecessary human error. We show that Monte Carlo methods enable designers to explore the implications of normal and unexpected operator behaviour, and to design systems to be more resilient to use error. We demonstrate novel designs with improved resilience, implying that the common problems identified and the errors they induce are avoidable.  相似文献   
3.
This study explored adolescents’ opinions about how Internet use supports the achievement of their developmental tasks. Qualitative data were collected in focus groups interviews with 127 Italian Internet users (11–20) attending middle and high schools. Discussions were recorded, transcribed and analyzed using content analysis. Results showed that the Internet plays important functions in identity formation, personal autonomy, and relationships outside the family. It allows teens to develop their own interests, to identify with others and, at the same time, differentiate from others. The Internet is also an arena in which adolescents develop and practice autonomy. The Internet can be a source of conflict with parents, because of parents’ concerns about Internet use. However, the Internet can also be a meeting ground with parents. Finally, participants indicated the Internet is used to form close relationships with peers. Gender and age differences are discussed. Although the study is cross-sectional and relies only on adolescent report, findings illustrate how the conceptual framework of developmental goals may be helpful for understanding how the Internet can affect adolescents’ lives.  相似文献   
4.
Professional search in patent repositories poses several unique challenges. One key requirement is to search the entire affected space of concepts, following well-defined procedures to ensure traceability of results obtained. Several techniques have been introduced to enhance query generation, preferably via automated query term expansion, to improve retrieval effectiveness. Currently, these approaches are mostly limited to computing additional query terms from patent documents based on statistical measures. For conceptual search to solve the limitation of traditional keyword search standard dictionaries are used to provide synonyms and keyword phrases for query refinement. Studies show that these are insufficient in such highly specialized domains. In this paper, we present an approach to extract keyword phrases from query logs created during the validation procedure of the patent applications. This creates valuable domain-specific lexical databases for several specific patent classes that can be used to both expand as well as limit the scope of a patent search. This provides a more powerful means to guide a professional searcher through the search process. We evaluate the lexical databases based on real query sessions of patent examiners.  相似文献   
5.
A number of worms, named P2P (peer-to-peer) passive worms, have recently surfaced, which propagate in P2P file-sharing networks and have posed heavy threats to these networks. In contrast to the majority of Internet worms, it is by exploiting users’ legitimate activities instead of vulnerabilities of networks in which P2P passive worms propagate. This feature evidently slows down their propagation, which results in them not attracting an adequate amount of attention in literature. Meanwhile, this feature visibly increases the difficulty of detecting them, which makes it very possible for them to become epidemic. In this paper, we propose an analytical model for P2P passive worm propagation by adopting epidemiological approaches so as to identify their behaviors and predict the tendency of their propagation accurately. Compared with a few existing models, dynamic characteristics of P2P networks are taken into account. Based on this proposed model, the sufficient condition for the global stability of the worm free equilibrium is derived by applying epidemiological theories. Large scale simulation experiments have validated both the proposed model and the condition.  相似文献   
6.
文中分析了大同市水资源开发利用的状况,并对水资源承载能力的有关问题进行了讨论。  相似文献   
7.
In fractured reservoirs, an effective matrix-fracture mass transfer is required for oil recovery. Surfactants have long been considered for oil recovery enhancement, mainly in terms of their ability to reduce oil–water interfacial tension. These surfactants are effective when the fractured formations are water-wet, where capillary imbibition of surfactants from the fracture into the matrix contributes to oil recovery. However, another beneficial aspect of surfactants, namely their ability to alter wettability, remains to be explored and exploited. Surfactants capable of altering wettability can be especially beneficial in oil-wet fractured formations, where the surfactant in the fracture diffuses into the matrix and alters the wettability, enabling imbibition of even more surfactant into the matrix. This sequential process of initial diffusion followed by imbibition continues well into the matrix yielding significant enhancements in oil recovery.In order to test this hypothesis of sequential diffusion–imbibition phenomenon, Dual-Drop Dual-Crystal (DDDC) contact angle experiments have been conducted using fractured Yates dolomite reservoir fluids, two types of surfactants (nonionic and anionic) and dolomite rock substrates. A new experimental procedure was developed in which crude oil equilibrated with reservoir brine has been exposed to surfactant to simulate the matrix-fracture interactions in fractured reservoirs. This procedure enables the measurements of dynamic contact angles and oil–water interfacial tensions, in addition to providing the visual observations of the dynamic behavior of crude oil trapped in the rock matrix as it encounters the diffusing surfactant from the fractures. Both the measurements and visual observations indicate wettability alterations of the matrix surface from oil-wet to less oil-wet or intermediate wet by the surfactants. Thus this study is of practical importance to oil-wet fractured formations where surfactant-induced wettability alterations can result in significant oil recovery enhancements. In addition, this study has also identified the need to include contact angle term in the dimensionless Bond number formulations for better quantitative interpretation of rock–fluids interactions.  相似文献   
8.
大同市节水型社会建设的探讨   总被引:1,自引:0,他引:1  
大同市是全国108个比较严重缺水城市之一,人均水资源量不足全国的1/10(全国人均水资源量2231m^3),稍超过全省的1/2(全省人均水资源量388m^3),市中心城区工农业及城市生活用水近20年来靠超采地下水来支撑。文中就大同市水资源供需不平衡的现状,提出大同市节水型社会建设的必要性,及今后水资源开源和节流的措施。  相似文献   
9.
AlSb晶体内二维磁极化子的磁场与温度效应   总被引:1,自引:0,他引:1  
在考虑声子之间相互作用的同时,本文应用线性组合算符和微扰法研究了电子自旋对弱耦合二维磁极化子特性的影响。对AlSb晶体所作的数值计算结果表明,随着磁场的加强,磁极化子平均数减少;随着温度的增加,磁极化子平均数也增加;随着温度的增加,电子自旋作用以及声子之间相互作用都加强;随着磁场的加强,电子自旋作用增加而声子之间相互作用基本不变。  相似文献   
10.
介绍了循环伏安法的产生背景、原理。应用该技术可以快速、方便地对润滑油中抗氧剂、总酸(碱)值进行测定,并且可以对不同厂家润滑油的抗氧剂包进行区别。该技术还可以有效地评价润滑油的使用寿命和设备工作状况。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号