全文获取类型
收费全文 | 13868篇 |
免费 | 1218篇 |
国内免费 | 478篇 |
专业分类
电工技术 | 580篇 |
综合类 | 446篇 |
化学工业 | 2598篇 |
金属工艺 | 618篇 |
机械仪表 | 535篇 |
建筑科学 | 741篇 |
矿业工程 | 271篇 |
能源动力 | 458篇 |
轻工业 | 1130篇 |
水利工程 | 214篇 |
石油天然气 | 315篇 |
武器工业 | 64篇 |
无线电 | 2315篇 |
一般工业技术 | 2232篇 |
冶金工业 | 868篇 |
原子能技术 | 113篇 |
自动化技术 | 2066篇 |
出版年
2024年 | 51篇 |
2023年 | 241篇 |
2022年 | 446篇 |
2021年 | 679篇 |
2020年 | 520篇 |
2019年 | 463篇 |
2018年 | 523篇 |
2017年 | 514篇 |
2016年 | 630篇 |
2015年 | 546篇 |
2014年 | 687篇 |
2013年 | 1022篇 |
2012年 | 853篇 |
2011年 | 927篇 |
2010年 | 758篇 |
2009年 | 736篇 |
2008年 | 694篇 |
2007年 | 623篇 |
2006年 | 587篇 |
2005年 | 533篇 |
2004年 | 366篇 |
2003年 | 336篇 |
2002年 | 295篇 |
2001年 | 261篇 |
2000年 | 229篇 |
1999年 | 222篇 |
1998年 | 343篇 |
1997年 | 219篇 |
1996年 | 179篇 |
1995年 | 159篇 |
1994年 | 115篇 |
1993年 | 138篇 |
1992年 | 68篇 |
1991年 | 83篇 |
1990年 | 52篇 |
1989年 | 58篇 |
1988年 | 47篇 |
1987年 | 32篇 |
1986年 | 32篇 |
1985年 | 34篇 |
1984年 | 41篇 |
1983年 | 22篇 |
1982年 | 26篇 |
1981年 | 25篇 |
1980年 | 22篇 |
1979年 | 20篇 |
1978年 | 19篇 |
1977年 | 19篇 |
1974年 | 8篇 |
1973年 | 14篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
This paper deals with the stability radii of implicit dynamic equations on time scales when the structured perturbations act on both the coefficient of derivative and the right-hand side. Formulas of the stability radii are derived as a unification and generalization of some previous results. A special case where the real stability radius and the complex stability radius are equal is studied. Examples are derived to illustrate results. 相似文献
32.
Tich Phuoc Tran Thi Thanh Sang Nguyen Poshiang Tsai Xiaoying Kong 《Artificial Intelligence Review》2011,35(4):369-382
In the modern age of Internet connectivity, advanced information systems have accumulated huge volumes of data. Such fast
growing, tremendous amount of data, collected and stored in large databases has far exceeded our human ability to comprehend
without proper tools. There has been a great deal of research conducted to explore the potential applications of Machine Learning
technologies in Security Informatics. This article studies the Network Security Detection problems in which predictive models
are constructed to detect network security breaches such as spamming. Due to overwhelming volume of data, complexity and dynamics
of computer networks and evolving cyber threats, current security systems suffer limited performance with low detection accuracy
and high number of false alarms. To address such performance issues, a novel Machine Learning algorithm, namely Boosted Subspace
Probabilistic Neural Network (BSPNN), has been proposed which combines a Radial Basis Function Neural Network with an innovative
diversity-based ensemble learning framework. Extensive empirical analyses suggested that BSPNN achieved high detection accuracy
with relatively small computational complexity compared with other conventional detection methods. 相似文献
33.
Pei‐Chi Wu 《Software》2001,31(12):1125-1130
ISO 10646 Universal Character Set (UCS) is a 31‐bit coding architecture that covers symbols in most of the world's written languages. Identifiers in programming languages are usually defined by using alphanumeric characters of ASCII, which represent mainly English words. An approach for working around this deficiency is to encode multilingual identifiers into the alphanumeric range of ASCII. For case‐sensitive languages, an encoding that utilizes [0–9][A–Z][a–z] can be more space‐efficient for multilingual identifiers. This paper proposes a base62 transformation format of ISO 10646 called UTF‐62. The resulting string of UTF‐62 is within a [0–9][A–Z][a–z] range, a total of 62 base characters. UTF‐62 also preserves the lexicographic sorting order of UCS‐4. Copyright © 2001 John Wiley & Sons, Ltd. 相似文献
34.
Nguyen Quoc Dinh Author VitaeDong-Sung KimAuthor Vitae 《Computer Standards & Interfaces》2012,34(1):117-123
The International Society of Automation recently released ISA100.11a as an open standard for reliable wireless networks for industrial automation. ISA100.11a uses the TDMA scheme in the medium access layer to provide deterministic services. However, ISA100.11a adopts the CSMA-CA mechanism with priorities for retransmission from failure on dedicated links, sporadic data, and network configuration.This paper evaluates ISA100.11a CSMA-CA by simulation, considering the effects of backoff procedures and priority settings to probability of collision and successful use of slots. It's demonstrated that a high number of priority classes enable better network utilization resulting in less number of packets exceeding their lifetime. 相似文献
35.
Résumé Les résultats expérimentaux présentés dans cette étude et ceux publiés précédemment montrent que l'électroréduction de l'oxygène se fait dans les sites actifs formés par des ions Mn4+, et que ceux de Mn3+ assurent le transport des électrons au sein du solide.
Certains de ces résultats ont fait l'object d'une communication enPoster à la réunion I.S.E. à Varna, Septembre 1977.
A=Zn, Cr, Al;B = Ni, Cu; et 0 x,y 1. 相似文献
From the results obtained in this study and those presented in previous publications, it can be deduced that the electroreduction of oxygen occurs via electron transfers at active sites created by Mn4+ ions and that Mn3+ ions contribute to the transport of the electrons through the bulk of the electrocatalysts.
Certains de ces résultats ont fait l'object d'une communication enPoster à la réunion I.S.E. à Varna, Septembre 1977.
A=Zn, Cr, Al;B = Ni, Cu; et 0 x,y 1. 相似文献
36.
Hung-Chang Chien Chien-Chung Lee Sien Chi 《Photonics Technology Letters, IEEE》2006,18(12):1344-1346
An all-optical 2R regenerator, based on a compact self-seeded Fabry-Pe/spl acute/rot laser diode with a 10-mm-long embedded fiber Bragg grating cavity, and a bidirectional erbium-doped fiber amplifier, is proposed and experimentally demonstrated to execute all-optical 2R regeneration at 10 Gb/s. Compared with the conventional 1R regeneration, the proposed scheme has achieved significant 6.4-dB improvement of power penalty at bit-error ratio =10/sup -9/ in the transmission experiment over 100-km standard single-mode fiber. 相似文献
37.
Nguyen G. D. Ephremides A. Wieselthier J. E. 《Selected Areas in Communications, IEEE Journal on》2006,24(12):2340-2341
For original paper by Zorzi and Rao, see IEEE J. Sel. Areas Commun., vol.12, no.8, p.1289-98 (1994 October) 相似文献
38.
39.
40.
J. Burton A. T. Nguyen Le J. E. Rutledge P. Taborek 《Journal of Low Temperature Physics》2004,134(1-2):275-280
We have studied heterogeneous nucleation of liquid 4He on cesiated surfaces using calorimetric techniques. Nucleation kinetics are strongly influenced by wetting properties. Since liquid 4He does not wet cesium below 2K, substantial supercooling of the vapor is expected on theoretical grounds. Experimentally, however, we have been unable to detect any supercooling in our cells. This may be due to microscopic defects in the Cs coating, which in turn may be related to the fact that we have been unable to find a cell construction material which is wetted by Cs. Somewhat paradoxically, it is possible to supercool helium vapor even in a container made of conventional wetted materials by imposing a large heat and mass flux from the liquid to the vapor across the bulk liquid-vapor interface. When evaporation is sufficiently strong, the vapor above the liquid becomes unstable, and forms a dense fog. Videos of this process show that the fog front propagates rapidly from very near the liquid-vapor interface upward into the vapor. Fog formation near the liquid interface implies that the vapor is in a supercooled metastable state. Qualitative ideas from non-equilibrium thermodynamics and kinetic theory are used to explain this phenomenon. 相似文献