首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   188524篇
  免费   11378篇
  国内免费   6548篇
电工技术   8368篇
技术理论   5篇
综合类   10709篇
化学工业   27187篇
金属工艺   11050篇
机械仪表   9999篇
建筑科学   10320篇
矿业工程   3876篇
能源动力   3911篇
轻工业   13429篇
水利工程   3641篇
石油天然气   5908篇
武器工业   1146篇
无线电   21080篇
一般工业技术   27203篇
冶金工业   7278篇
原子能技术   1467篇
自动化技术   39873篇
  2024年   547篇
  2023年   1723篇
  2022年   3321篇
  2021年   4369篇
  2020年   3331篇
  2019年   2755篇
  2018年   17252篇
  2017年   16550篇
  2016年   12869篇
  2015年   5086篇
  2014年   5846篇
  2013年   6750篇
  2012年   10762篇
  2011年   17475篇
  2010年   15543篇
  2009年   12579篇
  2008年   13719篇
  2007年   14318篇
  2006年   6364篇
  2005年   6333篇
  2004年   4897篇
  2003年   4511篇
  2002年   4065篇
  2001年   3132篇
  2000年   2462篇
  1999年   1992篇
  1998年   1391篇
  1997年   1185篇
  1996年   1082篇
  1995年   841篇
  1994年   674篇
  1993年   509篇
  1992年   381篇
  1991年   345篇
  1990年   238篇
  1989年   173篇
  1988年   138篇
  1987年   77篇
  1986年   63篇
  1985年   36篇
  1968年   43篇
  1967年   33篇
  1966年   42篇
  1965年   44篇
  1959年   46篇
  1958年   37篇
  1957年   36篇
  1956年   34篇
  1955年   63篇
  1954年   68篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
As the development of cloud computing and the convenience of wireless sensor netowrks, smart devices are widely used in daily life, but the security issues of the smart devices have not been well resolved. In this paper, we present a new NTRU-type public-key cryptosystem over the binary field. Specifically, the security of our scheme relies on the computational intractability of an unbalanced sparse polynomial ratio problem (DUSPR). Through theoretical analysis, we prove the correctness of our proposed cryptosystem. Furthermore, we implement our scheme using the NTL library, and conduct a group of experiments to evaluate the capabilities and consuming time of encryption and decryption. Our experiments result demonstrates that the NTRU-type public-key cryptosystem over the binary field is relatively practical and effective.  相似文献   
42.
Multibody System Dynamics - This paper represents an explicit analytical solution for attitude dynamics of spacecraft combination during on-orbit refueling. Due to the fuel transfer from the...  相似文献   
43.
44.
Mobile software applications have to cope with a particular environment that involves small size, limited resources, high autonomy requirements, competitive business models and many other challenges. To provide development guidelines that respond to these needs, several practices have been introduced; however, it is not clear how these guidelines may contribute to solve the issues present in the mobile domain. Furthermore, the rapid evolution of the mobile ecosystem challenges many of the premises upon which the proposed practices were designed. In this paper, we present a survey of the literature on software assurance practices for mobile applications, with the objective of describing them and assessing their contribution and success. We identified, organized and reviewed a body of research that spans in three levels: software development processes, software product assurance practices, and software implementation practices. By carrying out this literature survey, we reviewed the different approaches that researchers on Software Engineering have provided to address the needs that raise in the mobile software development arena. Moreover, we review the evolution of these practices, identifying how the constant changes and modernization of the mobile execution environment has impacted the methods proposed in the literature. Finally, we introduced discussion on the application of these practices in a real productive setting, opening an area for further research that may determine if practitioners have followed the proposed assurance paradigms.  相似文献   
45.
In order to predict the wearing of stellite alloys,the related methods of rare metals data processing were discussed. The method of opposite degree(OD) algorithm was put forward to predict the wearing of stellite alloys.OD algorithm is based on prior numerical data, posterior numerical data and the opposite degree between numerical forecast data. To compare the performance of predicted results based on different algorithms, the back propagation(BP) and radial basis function(RBF) neural network methods were introduced. Predicted results show that the relative error of OD algorithm is smaller than those of BP and RBF neural network methods. OD algorithm is an effective method to predict the wearing of stellite alloys and it can be applied in practice.  相似文献   
46.
This paper presents an integrated passive damping approach in hybrid metal-CFRP parts for structural applications. In this concept a viscoelastic material is embedded in the joint zone of the hybrid component. To examine the connection strength single-lap-joint specimens were produced and tested and the influence of the used material combinations, different surface structures, and different process parameters i.e. the moment of cross-linking were evaluated. Afterwards, the metal-CFRP hybrids were tested in quasi-static tests to assess their connection strength and failure behaviour. Dynamic cyclic tensile tests with step-wise increased loading conditions were performed to determine the specimens damping behaviour and to estimate their fatigue performance. Finally, these results are compared to a state of the art metal-CFRP hybrid with rivets connecting both materials.  相似文献   
47.
In this paper, we consider the classical finite mixture model, which is an effective tool for modeling lifetime distributions for random samples from heterogeneous populations. We discuss new results on stochastic comparison for two finite mixtures when each of them is drawn from one of the following semiparametric families, i.e., proportional hazards, accelerated lifetime and proportional reversed hazards.  相似文献   
48.
49.
随着市场的发展,精品超市和改造店铺逐渐增多,需要一种更加适合的制冷机组来满足市场的需求。本文提供了一种新型的解决方案,解决了现有机组存在的高噪音和高成本问题,不仅提高了制冷效率,而且节约能源,保护环境。  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号