全文获取类型
收费全文 | 5365篇 |
免费 | 588篇 |
国内免费 | 583篇 |
专业分类
电工技术 | 391篇 |
综合类 | 567篇 |
化学工业 | 138篇 |
金属工艺 | 53篇 |
机械仪表 | 204篇 |
建筑科学 | 271篇 |
矿业工程 | 74篇 |
能源动力 | 109篇 |
轻工业 | 36篇 |
水利工程 | 230篇 |
石油天然气 | 146篇 |
武器工业 | 72篇 |
无线电 | 724篇 |
一般工业技术 | 289篇 |
冶金工业 | 74篇 |
原子能技术 | 37篇 |
自动化技术 | 3121篇 |
出版年
2024年 | 20篇 |
2023年 | 74篇 |
2022年 | 68篇 |
2021年 | 97篇 |
2020年 | 111篇 |
2019年 | 133篇 |
2018年 | 92篇 |
2017年 | 153篇 |
2016年 | 146篇 |
2015年 | 172篇 |
2014年 | 238篇 |
2013年 | 280篇 |
2012年 | 298篇 |
2011年 | 365篇 |
2010年 | 293篇 |
2009年 | 359篇 |
2008年 | 392篇 |
2007年 | 489篇 |
2006年 | 383篇 |
2005年 | 374篇 |
2004年 | 302篇 |
2003年 | 265篇 |
2002年 | 230篇 |
2001年 | 159篇 |
2000年 | 140篇 |
1999年 | 129篇 |
1998年 | 103篇 |
1997年 | 118篇 |
1996年 | 102篇 |
1995年 | 74篇 |
1994年 | 92篇 |
1993年 | 61篇 |
1992年 | 39篇 |
1991年 | 45篇 |
1990年 | 19篇 |
1989年 | 23篇 |
1988年 | 19篇 |
1987年 | 13篇 |
1986年 | 4篇 |
1985年 | 11篇 |
1984年 | 7篇 |
1983年 | 7篇 |
1982年 | 6篇 |
1981年 | 6篇 |
1980年 | 5篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1974年 | 3篇 |
1962年 | 2篇 |
排序方式: 共有6536条查询结果,搜索用时 0 毫秒
1.
2.
含缺陷压力管道经缺陷评定合乎使用后,其疲劳寿命的估计具有重要的工程意义。将整个含缺陷压力管道作为一个整体,分析了含缺陷压力管道的疲劳裂纹扩展特点,提出了相应的含缺陷压力管道疲劳寿命的计算过程,并在基于可靠性评价的基础上,给出了核压力管道的可接受失效概率,最终得到了含缺陷核压力管道疲劳寿命预测方法。 相似文献
3.
带隔板底水油藏油井临界产量计算公式 总被引:25,自引:9,他引:16
本给出了带隔板底水油藏油井的监界产量计算公式,它适用于所有带隔板底水油藏的油井。 相似文献
4.
John Watrous 《Computational Complexity》2003,12(1-2):48-84
This paper studies the space-complexity of predicting the
long-term behavior of a class of stochastic processes based on evolutions
and measurements of quantum mechanical systems. These processes
generalize a wide range of both quantum and classical space-bounded
computations, including unbounded error computations given by machines
having algebraic number transition amplitudes or probabilities.
It is proved that any space s quantum stochastic process from this class
can be simulated probabilistically with unbounded error in space O(s),
and therefore deterministically in space O(s2). 相似文献
5.
F. Pasquarelli 《Journal of scientific computing》1995,10(3):289-304
The multidomain technique for elliptic problems, that allows the fulfillment of the interface conditions by means of a suitable combination of the continuity of the solution and of its normal derivative, is considered. Some choices of this combination are investigated and, in particular, a choice that allows the solution of the multidomain problem through two solutions for each subproblem, is proposed. The scheme has been discretized with a collocation method and some numerical tests are reported. Moreover the method is compared with the more classical Dirichlet/Neumann one as well as with the capacitance matrix method.This research has been supported by a grant from M.P.I. (40%). 相似文献
6.
Dmitri E. Nikonov George I. Bourianoff Paolo A. Gargini 《Journal of Superconductivity and Novel Magnetism》2006,19(6):497-513
Quantum limits of power dissipation in spintronic computing are estimated. A computing element composed of a single electron
in a quantum dot is considered. Dynamics of its spin due to external magnetic field and interaction with adjacent dots are
described via the Bloch equations. Spin relaxation due to magnetic noise from various sources is described as coupling to
a reservoir. Resulting dissipation of energy is calculated and is shown to be much less than the thermal limit, ∼kT per bit,
if the rate of spin relaxation is much slower than the switching rate. Clues on how to engineer an energy efficient spintronic
device are provided. 相似文献
7.
8.
Oded Goldreich 《Distributed Computing》2003,16(2-3):177-199
We survey the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems. We start by presenting some of the central tools (e.g., computational difficulty, pseudorandomness, and zero-knowledge proofs), and next turn to the treatment of encryption and signature schemes. We conclude with an extensive treatment of secure cryptographic protocols both when executed in a stand-alone manner and when many sessions of various protocols are concurrently executed and controlled by an adversary. The survey is intended for researchers in distributed computing, and assumes no prior familiarity with cryptography.Received: June 2001, Accepted: July 2002, 相似文献
9.
The paper proposes and describes several tools enabling their user to estimate the efficiency of Pascal or C-like programs. The approach consists of generating symbolic formulas expressing the efficiency of the programs being analyzed. The formulas are applicable to a variety of compiler-machine configurations. The actual numeric values of the variables in the symbolic formula are determined using linear programming techniques. The proposed approach reduces considerably the amount of benchmarking needed to analyze programs. Several examples are presented showing the applicability of the tools. The effort necessary to implement them is considerably reduced by the combined usage of Prolog and a symbolic formula manipulation package (Maple). 相似文献
10.
横流均匀环境中三维线源型正负浮力射流特性研究 总被引:2,自引:2,他引:0
本文利用混合有限分析法及交错网格。对横流均匀环境中三维线源型正负浮力射流及负浮力射流的特性进行研究,分析了不同工况下流速,温度和湍动能在断面上的分布及影响射流轨迹线的因素,讨论了轨迹线上温度的变化及浮力射流的贴壁现象。对三维长线源型负浮力射流,分析了流速比,喷口弗汝德数对负浮力射流的影响。 相似文献