全文获取类型
收费全文 | 9525篇 |
免费 | 451篇 |
国内免费 | 20篇 |
专业分类
电工技术 | 99篇 |
综合类 | 4篇 |
化学工业 | 1956篇 |
金属工艺 | 140篇 |
机械仪表 | 188篇 |
建筑科学 | 613篇 |
矿业工程 | 21篇 |
能源动力 | 317篇 |
轻工业 | 839篇 |
水利工程 | 108篇 |
石油天然气 | 28篇 |
无线电 | 697篇 |
一般工业技术 | 1938篇 |
冶金工业 | 1242篇 |
原子能技术 | 36篇 |
自动化技术 | 1770篇 |
出版年
2023年 | 70篇 |
2022年 | 135篇 |
2021年 | 215篇 |
2020年 | 175篇 |
2019年 | 210篇 |
2018年 | 232篇 |
2017年 | 231篇 |
2016年 | 254篇 |
2015年 | 226篇 |
2014年 | 334篇 |
2013年 | 657篇 |
2012年 | 554篇 |
2011年 | 785篇 |
2010年 | 501篇 |
2009年 | 472篇 |
2008年 | 586篇 |
2007年 | 509篇 |
2006年 | 433篇 |
2005年 | 386篇 |
2004年 | 328篇 |
2003年 | 306篇 |
2002年 | 276篇 |
2001年 | 146篇 |
2000年 | 155篇 |
1999年 | 133篇 |
1998年 | 133篇 |
1997年 | 143篇 |
1996年 | 130篇 |
1995年 | 113篇 |
1994年 | 88篇 |
1993年 | 85篇 |
1992年 | 80篇 |
1991年 | 61篇 |
1990年 | 75篇 |
1989年 | 61篇 |
1988年 | 42篇 |
1987年 | 59篇 |
1986年 | 52篇 |
1985年 | 56篇 |
1984年 | 52篇 |
1983年 | 67篇 |
1982年 | 49篇 |
1981年 | 40篇 |
1980年 | 36篇 |
1979年 | 38篇 |
1978年 | 29篇 |
1977年 | 26篇 |
1976年 | 23篇 |
1975年 | 22篇 |
1974年 | 14篇 |
排序方式: 共有9996条查询结果,搜索用时 15 毫秒
21.
The documented data regarding the three-dimensional structure of the air capillaries (ACs), the ultimate sites of gas exchange in the avian lung is contradictory. Further, the mode of gas exchange, described as cross-current has not been clearly elucidated. We studied the temporal and spatial arrangement of the terminal air conduits of the chicken lung and their relationship with the blood capillaries (BCs) in embryos as well as the definitive architecture in adults. Several visualization techniques that included corrosion casting, light microscopy as well as scanning and transmission electron microscopy were used. Two to six infundibulae extend from each atrium and give rise to numerous ACs that spread centrifugally. Majority of the ACs are tubular structures that give off branches, which anastomose with their neighboring cognates. Some ACs have globular shapes and a few are blind-ending tapering tubes. During inauguration, the luminal aspects of the ACs are characterized by numerous microvillus-like microplicae, which are formed during the complex processes of cell attenuation and canalization of the ACs. The parabronchial exchange BCs, initially inaugurated as disorganized meshworks, are reoriented via pillar formation to lie predominantly orthogonal to the long axes of the ACs. The remodeling of the retiform meshworks by intussusceptive angiogenesis essentially accomplishes a cross-current system at the gas exchange interface in the adults, where BCs form ring-like patterns around the ACs, thus establishing a cross-current system. Our findings clarify the mode of gas exchange in the parabronchial mantle and illuminate the basis for the functional efficiency of the avian lung. 相似文献
22.
雀巢公司位于瑞士柯诺芬根的研发中心开发奶制品。并设计制造工艺。而监测换热器的压力,对于这家研发中心来说具有特殊的挑战性。 相似文献
23.
Andrew Batson 《中国计算机用户》2008,(17):16-17
随着消费意识在中国——这个世界上人口最多的国度逐渐形成,许多专业投资者正将关注的目光从中国的出口制造商转向以国内为重点的商品和服务提供商。 相似文献
24.
Andrew W. Appel 《LISP and Symbolic Computation》1994,7(4):337-343
The introduction of a loop header block facilitates the hoisting of loop-invariant code from a loop. In a -calculus intermediate representation, which has a notion of scope, this transformation is particularly useful. Loop headers with scope also solve a problem with in-line expansion of recursive functions or loops: if done naively, only the first iteration is inlined. A loop header can encapsulate the loop or recursion for better in-line expansion. This optimization improves performance by about 5% in Standard ML of New Jersey. 相似文献
25.
RG Ciocca DK Wilkerson DL Madson CT Andrew AM Graham 《Canadian Metallurgical Quarterly》1995,9(2):204-208
Congenital abnormalities of the aortic arch may lead to signs and symptoms of tracheal and esophageal obstruction secondary to a restrictive vascular ring. There are many case reports and monographs concerning the surgical management of dysphagia lusoria. This case provides the first example of long-term follow-up of surgical intervention for relief of dysphagia lusoria. A 45-year-old laborer presented with a several year history of episodic bilateral blindness and a more recent onset of "drop attacks." Notably this patient had presented at the age of 18 months with difficulty breathing and eating since birth. The patient also had frequent upper respiratory infections and episodes of pneumonia. Workup revealed a right-sided aortic arch with a left ligamentum arteriosum. When he was first seen in our clinic, history and physical examination revealed claudication and diminished pulses in the left upper extremity. Arteriography and duplex studies confirmed reversal of flow in the patient's left vertebral artery. The arteriogram demonstrated the presence of a right-sided aortic arch and descending aorta along with the proximal stump of the previously ligated left subclavian artery. He underwent left carotid to left axillary artery bypass for the treatment of symptomatic subclavian steal syndrome. His symptoms have resolved with return of antegrade vertebral flow and the presence of normal pulses in the left arm. Congenital aortic abnormalities that lead to tracheal and esophageal compromise are numerous and varied. Surgical management requires a thorough understanding of the person's anatomy and preoperative planning. The life expectancy of patients with dysphagia lusoria necessitates consideration of the long-term consequences of surgical intervention. 相似文献
26.
3D Motion recovery via affine Epipolar geometry 总被引:10,自引:6,他引:4
Larry S. Shapiro Andrew Zisserman Michael Brady 《International Journal of Computer Vision》1995,16(2):147-182
Algorithms to perform point-based motion estimation under orthographic and scaled orthographic projection abound in the literature. A key limitation of many existing algorithms is that they operate on the minimum amount of data required, often requiring the selection of a suitable minimal set from the available data to serve as a local coordinate frame. Such approaches are extremely sensitive to errors and noise in the minimal set, and forfeit the advantages of using the full data set. Furthermore, attention is seldom paid to the statistical performance of the algorithms.We present a new framework that allowsall available features to be used in the motion computations, without the need to select a frame explicitly. This theory is derived in the context of theaffine camera, which preserves parallelism and generalises the orthographic, scaled orthographic and para-perspective models. We define the affine epipolar geometry for two such cameras, giving the fundamental matrix in this case. The noise resistant computation of the epipolar geometry is discussed, and a statistical noise model constructed so that confidence in the results can be assessed.The rigid motion parameters are then determineddirectly from the epipolar geometry, using the novel rotation representation of Koenderink and van Doorn (1991). The two-view partial motion solution comprises the scale factor between views, the projection of the 3D axis of rotation and the cyclotorsion angle, while the addition of a third view allows the true 3D rotation axis to be computed (up to a Necker reversal). The computed uncertainties in these parameters permit optimal estimates to be obtained over time by means of a linear Kalman filter. Our theory extends work by Huang and Lee (1989), Harris (1990), and Koenderink and van Doorn (1991), and results are given on both simulated and real data. 相似文献
27.
28.
29.
30.
Christian Collberg Andrew Huntwork Edward Carter Gregg Townsend Michael Stepp 《Information and Software Technology》2009,51(1):56-67
This paper presents an implementation of the watermarking method proposed by Venkatesan et al. in their paper [R. Venkatesan, V. Vazirani, S. Sinha, A graph theoretic approach to software watermarking, in: Fourth International Information Hiding Workshop, Pittsburgh, PA, 2001]. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We present two algorithms for splitting a watermark number into a redundant set of pieces and an algorithm for turning a watermark number into a control-flow graph. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks. 相似文献