首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   415573篇
  免费   3782篇
  国内免费   840篇
电工技术   7018篇
综合类   236篇
化学工业   63967篇
金属工艺   21456篇
机械仪表   14892篇
建筑科学   8504篇
矿业工程   4623篇
能源动力   8464篇
轻工业   25372篇
水利工程   5853篇
石油天然气   15050篇
武器工业   33篇
无线电   40435篇
一般工业技术   94115篇
冶金工业   65301篇
原子能技术   14058篇
自动化技术   30818篇
  2021年   3997篇
  2019年   3935篇
  2018年   7307篇
  2017年   7598篇
  2016年   8040篇
  2015年   4490篇
  2014年   7726篇
  2013年   17777篇
  2012年   11378篇
  2011年   14807篇
  2010年   11917篇
  2009年   13455篇
  2008年   13562篇
  2007年   13376篇
  2006年   11066篇
  2005年   10027篇
  2004年   9721篇
  2003年   9505篇
  2002年   9003篇
  2001年   8928篇
  2000年   8834篇
  1999年   8451篇
  1998年   17677篇
  1997年   13232篇
  1996年   10254篇
  1995年   7881篇
  1994年   7265篇
  1993年   7244篇
  1992年   5957篇
  1991年   5950篇
  1990年   5844篇
  1989年   5801篇
  1988年   5585篇
  1987年   5228篇
  1986年   4975篇
  1985年   5534篇
  1984年   5284篇
  1983年   5015篇
  1982年   4631篇
  1981年   4796篇
  1980年   4669篇
  1979年   4895篇
  1978年   5075篇
  1977年   5343篇
  1976年   6559篇
  1975年   4578篇
  1974年   4558篇
  1973年   4642篇
  1972年   4014篇
  1971年   3717篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
Current features are considered in the calculation of carrying capacities for constructions in engineering plant (EP). Methods and algorithms are described for EP calculations with comprehensive incorporation of the effects from technological and working defects on the behavior of structures under standard and emergency conditions. __________ Translated from Khimicheskoe i Neftegazovoe Mashinostroenie, No. 8, pp. 38–40, August, 2006.  相似文献   
72.
Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence. When the user departs, the token and device lose contact and the device secures itself. We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep. Our evaluation shows this is done without inconveniencing the user, while imposing a minimal performance overhead  相似文献   
73.
74.
75.
Relations for determining a motive force in a complex model of mass transfer as applied to concurrent, countercurrent, and cross motion of the vapor and liquid phases have been introduced. These forces have been compared for different forms of organization of the flow, and their comparison with similar quantities from the known Murphree and Hausen models is presented.  相似文献   
76.
High-performance circular probe-fed stacked patch antenna designs are explored through the use of numerical optimization. New trends are sought to aid understanding and to suggest novel solutions. We describe the optimization technique, present a new design trend relating efficiency and bandwidth to the choice of substrate dielectric, and propose and demonstrate a novel, optimized antenna achieving 33% bandwidth whilst maintaining greater than 80% surface wave efficiency.  相似文献   
77.
Quality of service has become today a major concern for operators of mobile communication networks. The massive development of networks and strong competition between operators has lead to the necessary and daily follow-up of network quality of service, a key factor for its subscriber’s fidelity. This article aims at presenting the optimization methodology and proposes its illustration with a case of RNO (Radio Network Optimisation) software usage, one of the Alcatel optimization toolchain component. After a short presentation of cellular network, the optimization basic principles are described. RNO software and its main functionnalities are then detailed before a last part dedicated to a real case of optimization done with RNO software.  相似文献   
78.
Variants are considered of palarizational frequency-selective multipath interference devices for millimetric- and submillimetric- wave receivers. Main expressions are presented that describe their characteristics. Advantages are pointed out of the devices as compared with Fabry-Perot interferometers when solving problems of received frequency-band shaping, heterodyne noise rejection, and signal- and heterodyne-radiation transfer to mixer.  相似文献   
79.
Membrane separation technology represents an alternative way to achieve biomass retention in anaerobic bioreactors for wastewater treatment. Due to high biomass concentrations of anaerobic reactors, cake formation is likely to represent a major cause of flux decline. In the presented research, experiments are performed on the effect of biomass concentration and level of gas sparging on the hydraulic capacity of a submerged anaerobic membrane bioreactor. Both parameters significantly affected the hydraulic capacity, with biomass exerting the most pronounced effect. After 50 days of continuous operation the critical flux remained virtually unchanged, despite an increase in membrane resistance, suggesting that biomass characteristics and hydraulic conditions determine the bio-layer formation rather than the membrane's fouling level. The concept of bio-layer management is introduced to describe the programmed combination of actions performed in order to control the formation of biomass layer over membranes.  相似文献   
80.
A review of Distributed Infrastructure Support for Electronic Commerce Applications by Hans-Arno Jacobsen.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号