全文获取类型
收费全文 | 10285篇 |
免费 | 341篇 |
国内免费 | 109篇 |
专业分类
电工技术 | 236篇 |
综合类 | 193篇 |
化学工业 | 1984篇 |
金属工艺 | 381篇 |
机械仪表 | 374篇 |
建筑科学 | 366篇 |
矿业工程 | 104篇 |
能源动力 | 407篇 |
轻工业 | 645篇 |
水利工程 | 123篇 |
石油天然气 | 157篇 |
武器工业 | 16篇 |
无线电 | 1135篇 |
一般工业技术 | 2331篇 |
冶金工业 | 1163篇 |
原子能技术 | 113篇 |
自动化技术 | 1007篇 |
出版年
2023年 | 101篇 |
2022年 | 197篇 |
2021年 | 250篇 |
2020年 | 203篇 |
2019年 | 164篇 |
2018年 | 269篇 |
2017年 | 226篇 |
2016年 | 233篇 |
2015年 | 218篇 |
2014年 | 296篇 |
2013年 | 632篇 |
2012年 | 415篇 |
2011年 | 488篇 |
2010年 | 418篇 |
2009年 | 399篇 |
2008年 | 381篇 |
2007年 | 360篇 |
2006年 | 327篇 |
2005年 | 277篇 |
2004年 | 248篇 |
2003年 | 226篇 |
2002年 | 210篇 |
2001年 | 175篇 |
2000年 | 223篇 |
1999年 | 232篇 |
1998年 | 309篇 |
1997年 | 269篇 |
1996年 | 246篇 |
1995年 | 199篇 |
1994年 | 187篇 |
1993年 | 178篇 |
1992年 | 154篇 |
1991年 | 155篇 |
1990年 | 104篇 |
1989年 | 112篇 |
1988年 | 113篇 |
1987年 | 114篇 |
1986年 | 92篇 |
1985年 | 132篇 |
1984年 | 128篇 |
1983年 | 138篇 |
1982年 | 101篇 |
1981年 | 97篇 |
1980年 | 88篇 |
1979年 | 94篇 |
1978年 | 76篇 |
1977年 | 67篇 |
1976年 | 76篇 |
1975年 | 59篇 |
1974年 | 54篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
31.
Sambasiva Rao Chinnamsetty Mike Espig Wolfgang Hackbusch 《Computing and Visualization in Science》2015,17(6):267-275
The computation of a six-dimensional density matrix is the crucial step for the evaluation of kinetic energy in electronic structure calculations. For molecules with heavy nuclei, one has to consider a very refined mesh in order to deal with the nuclear cusps. This leads to high computational time and needs huge memory for the computation of the density matrix. To reduce the computational complexity and avoid discretization errors in the approximation, we use mesh-free canonical tensor products in electronic structure calculations. In this paper, we approximate the six-dimensional density matrix in an efficient way and then compute the kinetic energy. Accuracy is examined by comparing our computed kinetic energy with the exact computation of the kinetic energy. 相似文献
32.
33.
34.
视频在无线传感器网络传输,由于网络的不稳定,可能使视频质量受到一定的影响。在人类视觉模型的基础上,提出一个改进的无参考质量评估算法,直接通过收到的图像,判断视频质量的好坏。较之当前广泛使用的视频评估算法一媒体延迟指标而言,大大提高在网络丢包时,对于视频质量评估的准确性。评估结果接近人眼观察的效果,并且可以大规模投入使用,具有较强现实意义和商业使用价值。 相似文献
35.
36.
37.
Journal of Electronic Testing - Error-Tolerant applications regularly accomplish more data adaption. Approximate computing is one of the optimum strategies for data manipulation in several... 相似文献
38.
Y. Narendra Babu M. Venkateswara Rao A. Gopala Krishna 《Materialwissenschaft und Werkstofftechnik》2023,54(1):81-89
Developing light weight polymer based composites dispersed with novel reinforcements which can function well in the presence of aggressive environments is an active research field in the materials engineering. Hence, in the current work, halloysite nanotubes (1 %, 2 %, 4 %, 6 %, 8 % and 10 % by weight) were reinforced into acrylonitrile butadiene styrene/polycarbonate blend and the role of reinforcing phases on the mechanical performance under aggressive environmental conditions has been evaluated. Hardness was measured as gradually increased in the composites with the increased content of the reinforcements. Impact strength of the composites was observed as increased in the composites up to 4 % reinforcement and further decreased. Increased strength was measured for the composite up to 2 % reinforcement. Ductility of the composites was decreased as reflected form the decreased % of elongation with the higher fraction of reinforcements due to induced brittleness. The composites were exposed to diluted sulfuric acid for 3 h and 6 h at 60 °C and then subjected to tensile loading. With the increased time of exposure, composites with 1 % and 2 % reinforcement exhibited relatively better performance. 相似文献
39.
Defense frontier analysis of quantum cryptographic systems 总被引:1,自引:0,他引:1
When a quantum cryptographic system operates in the presence of background noise, security of the key can be recovered by a procedure called key distillation. A key-distillation scheme effective against so-called individual (bitwise-independent) eavesdropping attacks involves sacrifice of some of the data through privacy amplification. We derive the amount of data sacrifice sufficient to defend against individual eavesdropping attacks in both BB84 and B92 protocols and show in what sense the communication becomes secure as a result. We also compare the secrecy capacity of various quantum cryptosystems, taking into account data sacrifice during key distillation, and conclude that the BB84 protocol may offer better performance characteristics than the B92. 相似文献
40.
S. K. Mishra L. C. Pathak V. Rao D. Bhattacharya K. L. Chopra 《Journal of Superconductivity》1996,9(2):211-216
Critical current densities of the superconducting Y-Ba-Cu-O (YBCO) films have been observed to decrease with the increase of power of microwave radiation. Presence of Josephson type of junctions in the microbridges has been established from the microwave irradiation and magnetic field studies. BCS energy gap parameter (2/kT
c
) has been calculated from thedI/dV characteristics and found to be 3.7 at 13 K. 相似文献