全文获取类型
收费全文 | 30891篇 |
免费 | 2671篇 |
国内免费 | 2226篇 |
专业分类
电工技术 | 1442篇 |
技术理论 | 10篇 |
综合类 | 3615篇 |
化学工业 | 2095篇 |
金属工艺 | 314篇 |
机械仪表 | 1157篇 |
建筑科学 | 1652篇 |
矿业工程 | 2463篇 |
能源动力 | 1500篇 |
轻工业 | 854篇 |
水利工程 | 4367篇 |
石油天然气 | 1118篇 |
武器工业 | 173篇 |
无线电 | 3860篇 |
一般工业技术 | 1323篇 |
冶金工业 | 1382篇 |
原子能技术 | 195篇 |
自动化技术 | 8268篇 |
出版年
2024年 | 128篇 |
2023年 | 403篇 |
2022年 | 776篇 |
2021年 | 1025篇 |
2020年 | 1084篇 |
2019年 | 775篇 |
2018年 | 735篇 |
2017年 | 949篇 |
2016年 | 1059篇 |
2015年 | 1157篇 |
2014年 | 1892篇 |
2013年 | 1892篇 |
2012年 | 2148篇 |
2011年 | 2260篇 |
2010年 | 1784篇 |
2009年 | 1657篇 |
2008年 | 1690篇 |
2007年 | 2024篇 |
2006年 | 2032篇 |
2005年 | 1703篇 |
2004年 | 1467篇 |
2003年 | 1442篇 |
2002年 | 1210篇 |
2001年 | 1053篇 |
2000年 | 945篇 |
1999年 | 697篇 |
1998年 | 439篇 |
1997年 | 273篇 |
1996年 | 203篇 |
1995年 | 170篇 |
1994年 | 157篇 |
1993年 | 107篇 |
1992年 | 84篇 |
1991年 | 77篇 |
1990年 | 62篇 |
1989年 | 53篇 |
1988年 | 34篇 |
1987年 | 21篇 |
1986年 | 19篇 |
1985年 | 19篇 |
1984年 | 14篇 |
1983年 | 4篇 |
1982年 | 5篇 |
1981年 | 8篇 |
1980年 | 9篇 |
1979年 | 6篇 |
1978年 | 4篇 |
1977年 | 7篇 |
1975年 | 7篇 |
1954年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 8 毫秒
1.
The recent trend of integration among new network services such as the long-term evolution (LTE) based on internet protocol (IP) needs reputable analyses and prediction information on the internet traffic. The IP along with increased internet traffics due to expanding new service platforms such as smartphones will reflect policies such as network QoS according to new services. The establishment of monitoring methods and analysis plans is thus required for the development of internet traffics that will analyze their status and predict their future. The paper with the speed of Internet traffic model is developed for monitoring the state of the experiment and verified. The problem is that the proposed service Internet service provider (ISP) to resolve the conflict between the occurrences can be considerably Internet traffic and that the state of data may be helpful in understanding. The paper advancement policy to reflect the network traffic volume of Internet services and users irradiation with increased traffic due to the development and management of the analysis was carried out experimental measurements. 相似文献
2.
Number entry is a ubiquitous activity and is often performed in safety- and mission-critical procedures, such as healthcare, science, finance, aviation and in many other areas. We show that Monte Carlo methods can quickly and easily compare the reliability of different number entry systems. A surprising finding is that many common, widely used systems are defective, and induce unnecessary human error. We show that Monte Carlo methods enable designers to explore the implications of normal and unexpected operator behaviour, and to design systems to be more resilient to use error. We demonstrate novel designs with improved resilience, implying that the common problems identified and the errors they induce are avoidable. 相似文献
3.
This study explored adolescents’ opinions about how Internet use supports the achievement of their developmental tasks. Qualitative data were collected in focus groups interviews with 127 Italian Internet users (11–20) attending middle and high schools. Discussions were recorded, transcribed and analyzed using content analysis. Results showed that the Internet plays important functions in identity formation, personal autonomy, and relationships outside the family. It allows teens to develop their own interests, to identify with others and, at the same time, differentiate from others. The Internet is also an arena in which adolescents develop and practice autonomy. The Internet can be a source of conflict with parents, because of parents’ concerns about Internet use. However, the Internet can also be a meeting ground with parents. Finally, participants indicated the Internet is used to form close relationships with peers. Gender and age differences are discussed. Although the study is cross-sectional and relies only on adolescent report, findings illustrate how the conceptual framework of developmental goals may be helpful for understanding how the Internet can affect adolescents’ lives. 相似文献
4.
Professional search in patent repositories poses several unique challenges. One key requirement is to search the entire affected space of concepts, following well-defined procedures to ensure traceability of results obtained. Several techniques have been introduced to enhance query generation, preferably via automated query term expansion, to improve retrieval effectiveness. Currently, these approaches are mostly limited to computing additional query terms from patent documents based on statistical measures. For conceptual search to solve the limitation of traditional keyword search standard dictionaries are used to provide synonyms and keyword phrases for query refinement. Studies show that these are insufficient in such highly specialized domains. In this paper, we present an approach to extract keyword phrases from query logs created during the validation procedure of the patent applications. This creates valuable domain-specific lexical databases for several specific patent classes that can be used to both expand as well as limit the scope of a patent search. This provides a more powerful means to guide a professional searcher through the search process. We evaluate the lexical databases based on real query sessions of patent examiners. 相似文献
5.
A number of worms, named P2P (peer-to-peer) passive worms, have recently surfaced, which propagate in P2P file-sharing networks and have posed heavy threats to these networks. In contrast to the majority of Internet worms, it is by exploiting users’ legitimate activities instead of vulnerabilities of networks in which P2P passive worms propagate. This feature evidently slows down their propagation, which results in them not attracting an adequate amount of attention in literature. Meanwhile, this feature visibly increases the difficulty of detecting them, which makes it very possible for them to become epidemic. In this paper, we propose an analytical model for P2P passive worm propagation by adopting epidemiological approaches so as to identify their behaviors and predict the tendency of their propagation accurately. Compared with a few existing models, dynamic characteristics of P2P networks are taken into account. Based on this proposed model, the sufficient condition for the global stability of the worm free equilibrium is derived by applying epidemiological theories. Large scale simulation experiments have validated both the proposed model and the condition. 相似文献
6.
7.
Beneficial effects of wettability altering surfactants in oil-wet fractured reservoirs 总被引:3,自引:0,他引:3
Subhash C. Ayirala Chandra S. Vijapurapu Dandina N. Rao 《Journal of Petroleum Science and Engineering》2006,52(1-4):261
In fractured reservoirs, an effective matrix-fracture mass transfer is required for oil recovery. Surfactants have long been considered for oil recovery enhancement, mainly in terms of their ability to reduce oil–water interfacial tension. These surfactants are effective when the fractured formations are water-wet, where capillary imbibition of surfactants from the fracture into the matrix contributes to oil recovery. However, another beneficial aspect of surfactants, namely their ability to alter wettability, remains to be explored and exploited. Surfactants capable of altering wettability can be especially beneficial in oil-wet fractured formations, where the surfactant in the fracture diffuses into the matrix and alters the wettability, enabling imbibition of even more surfactant into the matrix. This sequential process of initial diffusion followed by imbibition continues well into the matrix yielding significant enhancements in oil recovery.In order to test this hypothesis of sequential diffusion–imbibition phenomenon, Dual-Drop Dual-Crystal (DDDC) contact angle experiments have been conducted using fractured Yates dolomite reservoir fluids, two types of surfactants (nonionic and anionic) and dolomite rock substrates. A new experimental procedure was developed in which crude oil equilibrated with reservoir brine has been exposed to surfactant to simulate the matrix-fracture interactions in fractured reservoirs. This procedure enables the measurements of dynamic contact angles and oil–water interfacial tensions, in addition to providing the visual observations of the dynamic behavior of crude oil trapped in the rock matrix as it encounters the diffusing surfactant from the fractures. Both the measurements and visual observations indicate wettability alterations of the matrix surface from oil-wet to less oil-wet or intermediate wet by the surfactants. Thus this study is of practical importance to oil-wet fractured formations where surfactant-induced wettability alterations can result in significant oil recovery enhancements. In addition, this study has also identified the need to include contact angle term in the dimensionless Bond number formulations for better quantitative interpretation of rock–fluids interactions. 相似文献
8.
大同市节水型社会建设的探讨 总被引:1,自引:0,他引:1
大同市是全国108个比较严重缺水城市之一,人均水资源量不足全国的1/10(全国人均水资源量2231m^3),稍超过全省的1/2(全省人均水资源量388m^3),市中心城区工农业及城市生活用水近20年来靠超采地下水来支撑。文中就大同市水资源供需不平衡的现状,提出大同市节水型社会建设的必要性,及今后水资源开源和节流的措施。 相似文献
9.
AlSb晶体内二维磁极化子的磁场与温度效应 总被引:1,自引:0,他引:1
在考虑声子之间相互作用的同时,本文应用线性组合算符和微扰法研究了电子自旋对弱耦合二维磁极化子特性的影响。对AlSb晶体所作的数值计算结果表明,随着磁场的加强,磁极化子平均数减少;随着温度的增加,磁极化子平均数也增加;随着温度的增加,电子自旋作用以及声子之间相互作用都加强;随着磁场的加强,电子自旋作用增加而声子之间相互作用基本不变。 相似文献
10.
介绍了循环伏安法的产生背景、原理。应用该技术可以快速、方便地对润滑油中抗氧剂、总酸(碱)值进行测定,并且可以对不同厂家润滑油的抗氧剂包进行区别。该技术还可以有效地评价润滑油的使用寿命和设备工作状况。 相似文献