全文获取类型
收费全文 | 105749篇 |
免费 | 8790篇 |
国内免费 | 4662篇 |
专业分类
电工技术 | 5987篇 |
技术理论 | 7篇 |
综合类 | 6944篇 |
化学工业 | 17428篇 |
金属工艺 | 6096篇 |
机械仪表 | 7020篇 |
建筑科学 | 7699篇 |
矿业工程 | 3389篇 |
能源动力 | 3154篇 |
轻工业 | 6919篇 |
水利工程 | 1713篇 |
石油天然气 | 6974篇 |
武器工业 | 872篇 |
无线电 | 11526篇 |
一般工业技术 | 12903篇 |
冶金工业 | 5509篇 |
原子能技术 | 1200篇 |
自动化技术 | 13861篇 |
出版年
2024年 | 478篇 |
2023年 | 1810篇 |
2022年 | 3118篇 |
2021年 | 4257篇 |
2020年 | 3292篇 |
2019年 | 2937篇 |
2018年 | 3296篇 |
2017年 | 3629篇 |
2016年 | 3102篇 |
2015年 | 4256篇 |
2014年 | 5308篇 |
2013年 | 6356篇 |
2012年 | 6626篇 |
2011年 | 7051篇 |
2010年 | 6282篇 |
2009年 | 5868篇 |
2008年 | 5734篇 |
2007年 | 5544篇 |
2006年 | 5522篇 |
2005年 | 4825篇 |
2004年 | 3403篇 |
2003年 | 3288篇 |
2002年 | 3338篇 |
2001年 | 2820篇 |
2000年 | 2499篇 |
1999年 | 2573篇 |
1998年 | 2096篇 |
1997年 | 1725篇 |
1996年 | 1673篇 |
1995年 | 1394篇 |
1994年 | 1130篇 |
1993年 | 844篇 |
1992年 | 658篇 |
1991年 | 515篇 |
1990年 | 395篇 |
1989年 | 295篇 |
1988年 | 273篇 |
1987年 | 171篇 |
1986年 | 159篇 |
1985年 | 118篇 |
1984年 | 84篇 |
1983年 | 54篇 |
1982年 | 57篇 |
1981年 | 48篇 |
1980年 | 38篇 |
1979年 | 27篇 |
1977年 | 17篇 |
1976年 | 31篇 |
1975年 | 15篇 |
1974年 | 12篇 |
排序方式: 共有10000条查询结果,搜索用时 16 毫秒
51.
MIP-CGP工艺专用催化剂CGP-1的开发与应用 总被引:11,自引:3,他引:8
阐述了生产汽油组分满足欧Ⅲ排放标准并多产丙烯的催化裂化工艺(简称MIP-CGP)专用催化剂(简称CGP-1)的研究开发与工业应用结果。CGP-1催化剂的基质具有良好的容炭性能,使活性组元受到良好保护,其优势作用在第二反应区得以充分发挥,具有更高的氢转移活性和强的汽油小分子烯烃裂化活性。中国石化九江分公司和镇海炼化公司的MIP-CGP工业试验标定结果表明,与常规FCC相比,采用CGP-1催化剂的MIP-CGP技术在生产烯烃体积分数小于18%的汽油组分的同时,丙烯产率达到8%以上。此外,汽油诱导期大幅提高,抗爆指数增加;总液体收率有所提高,干气产率下降,焦炭选择性良好。 相似文献
52.
Average consensus in networks of dynamic agents with switching topologies and multiple time-varying delays 总被引:5,自引:0,他引:5
In this paper, we discuss average consensus problem in undirected networks of dynamic agents with fixed and switching topologies as well as multiple time-varying communication delays. By employing a linear matrix inequality method, we prove that all the nodes in the network achieve average consensus asymptotically for appropriate communication delays if the network topology is connected. Particularly, several feasible linear matrix inequalities are established to determine the maximal allowable upper bound of time-varying communication delays. Numerical examples are given to demonstrate the effectiveness and the sharpness of the theoretical results. 相似文献
53.
Xin Sun Qiang Lu Moroz V. Takeuchi H. Gebara G. Wetzel J. Shuji Ikeda Changhwan Shin Tsu-Jae King Liu 《Electron Device Letters, IEEE》2008,29(5):491-493
A tri-gate bulk MOSFET design utilizing a low-aspect-ratio channel is proposed to provide an evolutionary pathway for CMOS scaling to the end of the roadmap. 3-D device simulations indicate that this design offers the advantages of a multi-gate FET (reduced variability in performance and improved scalability) together with the advantages of a conventional planar MOSFET (low substrate cost and capability for dynamic threshold-voltage control). 相似文献
54.
Shu‐Li Sun Jing Ma Nan Lv 《International Journal of Adaptive Control and Signal Processing》2008,22(10):932-948
Based on the optimal fusion estimation algorithm weighted by scalars in the linear minimum variance sense, a distributed optimal fusion Kalman filter weighted by scalars is presented for discrete‐time stochastic singular systems with multiple sensors and correlated noises. A cross‐covariance matrix of filtering errors between any two sensors is derived. When the noise statistical information is unknown, a distributed identification approach is presented based on correlation functions and the weighted average method. Further, a distributed self‐tuning fusion filter is given, which includes two stage fusions where the first‐stage fusion is used to identify the noise covariance and the second‐stage fusion is used to obtain the fusion state filter. A simulation verifies the effectiveness of the proposed algorithm. Copyright © 2008 John Wiley & Sons, Ltd. 相似文献
55.
The main difficulty with EM algorithm for mixture model concerns the number of components, say g. This is the question of model selection, and the EM algorithm itself could not estimate g. On the contrary, the algorithm requires g to be specified before the remaining parameters can be estimated. To solve this problem, a new algorithm, which is called stepwise split-and-merge EM (SSMEM) algorithm, is proposed. The SSMEM algorithm alternately splits and merges components, estimating g and other parameters of components simultaneously. Also, two novel criteria are introduced to efficiently select the components for split or merge. Experimental results on simulated and real data demonstrate the effectivity of the proposed algorithm. 相似文献
56.
Craig S. Long Albert A. Groenwold 《International journal for numerical methods in engineering》2004,61(6):837-855
Reduced integration is frequently used in evaluating the element stiffness matrix of quadratically interpolated finite elements. Typical examples are the serendipity (Q8) and Lagrangian (Q9) membrane finite elements, for which a reduced 2 × 2 Gauss–Legendre integration rule is frequently used, as opposed to full 3 × 3 Gauss–Legendre integration. This ‘softens’ these element, thereby increasing accuracy, albeit at the introduction of spurious zero energy modes on the element level. This is in general not considered problematic for the ‘hourglass’ mode common to Q8 and Q9 elements, since this spurious mode is non‐communicable. The remaining two zero energy modes occurring in the Q9 element are indeed communicable. However, in topology optimization for instance, conditions may arise where the non‐communicable spurious mode associated with the elements becomes activated. To effectively suppress these modes altogether in elements employing quadratic interpolation fields, two modified quadratures are employed herein. For the Q8 and Q9 membrane elements, the respective rules are a five and an eight point rule. As compared to fully integrated elements, the new rules enhance element accuracy due to the introduction of soft, higher‐order deformation modes. A number of standard test problems reveal that element accuracy remains comparable to that of the under‐integrated counterparts. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
57.
裂缝性油气藏采收率:100个裂缝性油气田实例的经验总结 总被引:5,自引:2,他引:3
通过对世界上100个裂缝性油气藏的综合评价,研究储集层及流体本身的性质(包括孔隙度、渗透率、黏度、可动油比例、含水饱和度、润湿性及裂缝分布特征等)和驱动机制及油藏管理战略(优化日产量和采用不同类型的提高采收率技术)对其最终采收率的影响。将裂缝性油气藏分为4类:I类的基质几乎没有孔隙度和渗透率,裂缝是储存空间和流体流动的通道;Ⅱ类的基质有较低的孔隙度和渗透率,基质提供储存空间,裂缝提供流动通道;Ⅲ类(微孔隙)的基质具有高孔隙度和低渗透率,基质提供储存空间,裂缝提供流动通道;Ⅳ类(大孔隙)的基质具有高的孔隙度和渗透率,基质提供储存空间和流动通道,裂缝仅增加渗透率。对26个Ⅱ类油气藏和20个Ⅲ类油气藏的开采历史的研究表明:Ⅱ类油气藏的采收率受水驱强度和最优日产量控制,日产量过高会很容易破坏Ⅱ类油气藏,一些Ⅱ类油气藏如果管理得当,采收率可以很高,不需要二次或三次采油;Ⅲ类油气藏的采收率主要受岩石和流体本身性质的影响,特别是基质渗透率、流体重度、润湿性以及裂缝强度等,不进行二次或三次采油不可能完全开采,往往需要采用一些提高采收率的专门技术。以往将Ⅱ类和Ⅲ类裂缝性油气藏归为一类,认识它们的区别将有助于选择更好的开发策略。 相似文献
58.
Perturbation analysis and control of two-class stochastic fluid models for communication networks 总被引:2,自引:0,他引:2
Cassandras C.G. Gang Sun Panayiotou C.G. Wardi Y. 《Automatic Control, IEEE Transactions on》2003,48(5):770-782
This paper uses stochastic fluid models (SFMs) for the control and optimization (rather than performance analysis) of communication network nodes processing two classes of traffic: one is uncontrolled and the other is subject to threshold-based buffer control. We derive gradient estimators for packet loss and workload related performance metrics with respect to threshold parameters. These estimators are shown to be unbiased and directly observable from a sample path without any knowledge of underlying stochastic characteristics of the traffic processes. This renders them computable in online environments and easily implementable for network management and control. We further demonstrate their use in buffer control problems where our SFM-based estimators are evaluated based on data from an actual system. 相似文献
59.
Hong Long Chen 《Canadian Metallurgical Quarterly》2007,23(4):171-181
The difficulty in applying the standard curve (S-curve) and cost-schedule integration (CSI) techniques for company-level cost flow forecasting in a project-based industry is the prerequisite of forecasting future unknown individual projects and contract classifications. By analyzing cost flows at the company level through a pool of macroeconomic and internal financial data, this paper proposes an innovative approach to firm-specific model estimation. First, a series of data transformations introduce linear relationships between cost, macroeconomic, and internal financial variables. Second, multivariate regression analysis is employed for initial model building. Third, for the purposes of model restructuring, a subsequent application of Yule–Walker estimates and incomplete principal component analysis is used. This paper uses a sample of four project-based construction firms to demonstrate model performance. Using this methodology, mean absolute percentage error (MAPE) values of the forecasting models range from 0.27 to 0.60%. As such, the transformed cost, macroeconomic, internal financial data could strongly predict company-level cost flow forecasting. While converting the predicted cumulative cost data to periodic cost flows, the MAPE values were augmented, ranging from 7.04 to 17.55%, thus, requiring future research. 相似文献
60.
Zhishou Zhang Qibin Sun Wai-Choong Wong John Apostolopoulos Susie Wee 《Multimedia, IEEE Transactions on》2007,9(2):320-331
This paper proposes an optimized content-aware authentication scheme for JPEG-2000 streams over lossy networks, where a received packet is consumed only when it is both decodable and authenticated. In a JPEG-2000 codestream, some packets are more important than others in terms of coding dependency and image quality. This naturally motivates allocating more redundant authentication information for the more important packets in order to maximize their probability of authentication and thereby minimize the distortion at the receiver. Towards this goal, with the awareness of its corresponding image content, we formulate an optimization framework to compute an authentication graph to maximize the expected media quality at the receiver, given specific authentication overhead and knowledge of network loss rate. System analysis and experimental results demonstrate that the proposed scheme achieves our design goal in that the rate-distortion (R-D) curve of the authenticated image is very close to the R-D curve when no authentication is required 相似文献