首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   259024篇
  免费   3243篇
  国内免费   751篇
电工技术   4733篇
综合类   916篇
化学工业   42553篇
金属工艺   10440篇
机械仪表   8124篇
建筑科学   6056篇
矿业工程   1701篇
能源动力   5339篇
轻工业   25747篇
水利工程   2905篇
石油天然气   6363篇
武器工业   118篇
无线电   26089篇
一般工业技术   48822篇
冶金工业   47067篇
原子能技术   6696篇
自动化技术   19349篇
  2021年   2443篇
  2019年   2332篇
  2018年   3889篇
  2017年   3867篇
  2016年   4140篇
  2015年   2720篇
  2014年   4453篇
  2013年   10883篇
  2012年   6803篇
  2011年   8954篇
  2010年   7100篇
  2009年   7791篇
  2008年   8095篇
  2007年   8250篇
  2006年   7354篇
  2005年   6411篇
  2004年   6199篇
  2003年   6046篇
  2002年   6293篇
  2001年   6132篇
  2000年   5691篇
  1999年   5510篇
  1998年   12710篇
  1997年   9033篇
  1996年   6999篇
  1995年   5453篇
  1994年   4860篇
  1993年   4745篇
  1992年   3813篇
  1991年   3521篇
  1990年   3752篇
  1989年   3658篇
  1988年   3465篇
  1987年   3085篇
  1986年   3119篇
  1985年   3583篇
  1984年   3433篇
  1983年   3104篇
  1982年   2950篇
  1981年   3029篇
  1980年   2929篇
  1979年   2854篇
  1978年   2963篇
  1977年   3237篇
  1976年   4078篇
  1975年   2655篇
  1974年   2564篇
  1973年   2668篇
  1972年   2258篇
  1971年   2136篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
891.
A new method is proposed and an algorithm is developed for two-wire channel routing in a two-layer board, with horizontal interconnections made in one layer and vertical interconnections in the other layer.Translated from Kibernetika, No. 3, pp. 32–35, May–June, 1991.  相似文献   
892.
893.
A novel technique for both online and offline computation is presented. With this technique, a reconstruction analysis in elementary particle physics, otherwise prohibitively long, has been accomplished. It will be used online in an upcoming Fermilab experiment to reconstruct more than 100000 events per second and to trigger on the basis of that information. The technique delivers 40 gigaoperations per second, has a bandwidth on the order of gigabytes per second, and has a modest cost. An overview of the program, details of the system, and performance measurements are presented  相似文献   
894.
This paper presents some improvements to the load flow solution in rectangular coordinates. First, in an attempt to use as linear a model as possible, both the nodal equations and the bus constraints are retained. The Newton-Raphson (NR) method is then applied to the enlarged set of equations, and written in terms of bus voltages and currents. This scheme, combined with a simple procedure to handle PV buses, leads to a computationally efficient algorithm, particularly advantageous in the presence of zero-injection buses. Experimental results are provided comparing the performance of the proposed approach with that of the conventional formulation  相似文献   
895.
Thermogravimetry and pyrolysis in combination with gas chromatography and infrared spectroscopy were the experimental techniques applied to the thermal degradation of cinnamoylated poly(vinyl alcohol) samples, constituted from vinyl alcohol-vinyl cinnamate photocrosslinkable copolymers. The thermal decomposition products include gases, liquids and solids. The gases are formed from saturated and unsaturated volatile hydrocarbons C1? C4, carbon monoxide and carbon dioxide. The liquid fraction includes aromatic hydrocarbons and some oxygenated organic compounds. The solid product identified in the greatest amount was cinnamic acid. The content in the thermal decomposition products varies considerably both with copolymer composition and temperature.  相似文献   
896.
897.
Ice observations, results, and conclusions are summarized for the March 1987 Labrador Ice Margin Experiment (LIMEX'87), an international oceanographic study conducted in the pack ice of the Grand Banks area off the coast of Newfoundland. Included are the ice extent, flow size and thickness, ice kinematics and rheology, ice microwave properties, oceanic properties under the ice, and penetration of swell into the ice  相似文献   
898.
In our one-semester course at the US Military Academy in New York, we educate roughly 800 undergraduates from nontechnical fields each year on intermediate-level IT skills. We place our students in an isolated virtual-computing environment, give them hands-on experience with a variety of attack vectors that hackers use to exploit vulnerabilities, and provide them with a multidimensional framework for understanding and mitigating risks. As a result of this educational experience, our students are better able to internalize the concepts we teach and end up with an increased realization of the actions required to protect crucial resources.  相似文献   
899.
We formulate the inverse problem of scattering of electromagnetic fields by thin defects and analyze numerical algorithms used for its solution. It is shown that, in the two-dimensional case, the shape of a thin defect is completely determined by the scattered field given on a certain curve for a fixed value of the wave number. For the solution of the inverse scattering problem, we propose to use the procedure of iterative regularization based on the gradient methods. We deduce expressions for the Fréchet derivative of the operator of direct scattering problem with Dirichlet conditions imposed on the surface of a scatterer.  相似文献   
900.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号