全文获取类型
收费全文 | 17907篇 |
免费 | 468篇 |
国内免费 | 47篇 |
专业分类
电工技术 | 347篇 |
综合类 | 23篇 |
化学工业 | 4123篇 |
金属工艺 | 430篇 |
机械仪表 | 402篇 |
建筑科学 | 1009篇 |
矿业工程 | 119篇 |
能源动力 | 423篇 |
轻工业 | 979篇 |
水利工程 | 103篇 |
石油天然气 | 56篇 |
武器工业 | 2篇 |
无线电 | 2316篇 |
一般工业技术 | 2733篇 |
冶金工业 | 2680篇 |
原子能技术 | 232篇 |
自动化技术 | 2445篇 |
出版年
2022年 | 162篇 |
2021年 | 203篇 |
2020年 | 141篇 |
2019年 | 151篇 |
2018年 | 224篇 |
2017年 | 168篇 |
2016年 | 250篇 |
2015年 | 279篇 |
2014年 | 385篇 |
2013年 | 1210篇 |
2012年 | 529篇 |
2011年 | 749篇 |
2010年 | 604篇 |
2009年 | 644篇 |
2008年 | 648篇 |
2007年 | 607篇 |
2006年 | 597篇 |
2005年 | 531篇 |
2004年 | 486篇 |
2003年 | 434篇 |
2002年 | 467篇 |
2001年 | 407篇 |
2000年 | 383篇 |
1999年 | 369篇 |
1998年 | 497篇 |
1997年 | 428篇 |
1996年 | 384篇 |
1995年 | 335篇 |
1994年 | 351篇 |
1993年 | 347篇 |
1992年 | 345篇 |
1991年 | 262篇 |
1990年 | 307篇 |
1989年 | 296篇 |
1988年 | 261篇 |
1987年 | 215篇 |
1986年 | 189篇 |
1985年 | 184篇 |
1984年 | 206篇 |
1983年 | 151篇 |
1982年 | 160篇 |
1981年 | 194篇 |
1980年 | 160篇 |
1979年 | 178篇 |
1978年 | 162篇 |
1977年 | 171篇 |
1976年 | 141篇 |
1975年 | 154篇 |
1973年 | 118篇 |
1972年 | 112篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
121.
Recently, it has been shown that EDM wires undergo thermal buckling at low axial transport speeds and a series of transport instabilities at high axial transport speeds. Hence, only intermediate speeds ensure the straight wire configuration, which is needed for high-accuracy cutting. These conclusions are based on the assumption that the convective heat transfer coefficient remains piecewise constant along the length of the wire. However, a recent study on convection from a vibrating, flexible body shows that the convection coefficient becomes modal. The present study re-examines the wire stability problem with this modal effect in mind. It is shown that at low axial transport speeds, the straight wire configuration may be stable. Its stability hinges on vibration—large amplitude motion implies increased convection and increased stability from thermal buckling. At high transport speeds, the system still undergoes the reported transport instabilities. This work shows that the well-defined intermediate speed range is not so well-defined in the presence of wire vibrations. 相似文献
122.
In order to select the optimal device for a particular application, designers must carefully analyze the tradeoffs between competing devices. Recent progress in SiC power rectifiers has resulted in the demonstration of high-voltage PiN and Schottky barrier diodes (SBDs). With both technologies maturing, power electronics engineers will soon face the task of selecting between these two devices. Until recently, the choice was simple, since silicon SBDs are only available for relatively low voltage applications. The choice is not as clear when considering SiC diodes, and guidelines for determining the proper application of each are needed. The purpose of this paper is to provide such guidelines, based on an analysis of the most significant tradeoffs involved. 相似文献
123.
The large-scale utilization of solar energy will be facilitated by economical and efficient energy storage. The proposed energy storage systems have been critically reviewed, and capital cost estimates compared on a common basis. A model for sizing an energy storage system is proposed and used to determine the size range of practical interest. Based on selection criteria and relevant data two storage systems have been investigated: an all sodium system and a molten salt system. The design equations, cost estimates, and correlations indicate that, for the energy storage systems developed to date, in the capacity range of 700–2100 MWh, a molten salt, two-tank isolated-type system is the most cost effective and technically feasible for a solar, central receiver, hybrid cogeneration plant. At the extremes of the above range the unit capital cost for the molten salt storage system was found to be 22.8–26.7 $/kWh of stored energy, compared to 43.0–45.4 $/kWh for the sodium storage system. 相似文献
124.
125.
In general, the performance of a KE penetrator against most targets increases with velocity regardless of the particular penetrator-target interaction mode. It is possible to show that there exists an optimum velocity which maximizes the performance of an impacting penetrator for a given expenditure of kinetic energy. Simple graphical methods are described that determine the optimum velocity from general performance-velocity plots. These graphical methods may also be applied to experimental data alone. In addition, simple analytic models which describe the velocity dependent penetration/perforation performance of KE penetrators are examined and extended. These models may be used to explicitly assess the influence of parameters such as target strength and density and penetrator mass, strength and density. For some of the models in this analysis, the explicit relations between the optimum striking velocity for a specific kinetic energy value and the penetrator-target parameters are described. 相似文献
126.
Convergence is the idea of merging the duties and responsibilities of physical security with that of digital security to make them part of a common reporting structure--to employ tools and techniques that are parallel if not collinear. 相似文献
127.
L. B. Sjogren H-X. L. Liu X-H. Qin C. W. Domier N. C. Luhmann Jr. 《Journal of Infrared, Millimeter and Terahertz Waves》1993,14(8):1509-1529
New array design concepts are described for the phase and amplitude control of millimeter and submillimeter-wave beams. Phase shifter array designs providing increased phase range and wider bandwidth are described. Techniques involving the integration of gain-producing elements as well as tuning elements on a single array are proposed for application to high-performance beam control and beam shaping. These concepts should facilitate the further development of quasi-optical solid state device-based arrays for application to millimeter-wave electronic systems. 相似文献
128.
Frank Rees 《Computer Fraud & Security》1998,1998(3):11
Much of what has been written in Australia about the protection of computer programs has been inspired by high profile cases concerning the boundaries of copyright protection. The Australian law firm Clayton Utz says that there has been little discussion about other types of legal protection for computer programs, and as a consequence, other intellectual property laws should not be overlooked. 相似文献
129.
130.
Louis Anthony Cox Jr. 《Annals of Mathematics and Artificial Intelligence》1990,2(1-4):93-107
Interactive expert systems seek relevant information from a user in order to answer a query or to solve a problem that the user has posed. A fundamental design issue for such a system is therefore itsinformation-seeking strategy, which determines the order in which it asks questions or performs experiments to gain the information that it needs to respond to the user. This paper examines the problem of optimal knowledge acquisition through questioning in contexts where it is expensive or time-consuming to obtain the answers to questions. An abstract model of an expert classification system — considered as a set of logical classification rules supplemented by some statistical knowledge about attribute frequencies — is developed and applied to analyze the complexity and to present constructive algorithms for doing probabilistic question-based classification. New heuristics are presented that generalize previous results for optimal identification keys and questionnaires. For an important class of discrete discriminant analysis problems, these heuristics find optimal or near-optimal questioning strategies in a small fraction of the time required by an exact solution algorithm. 相似文献