全文获取类型
收费全文 | 19030篇 |
免费 | 518篇 |
国内免费 | 17篇 |
专业分类
电工技术 | 227篇 |
综合类 | 14篇 |
化学工业 | 2631篇 |
金属工艺 | 230篇 |
机械仪表 | 343篇 |
建筑科学 | 919篇 |
矿业工程 | 42篇 |
能源动力 | 464篇 |
轻工业 | 1981篇 |
水利工程 | 267篇 |
石油天然气 | 28篇 |
无线电 | 1729篇 |
一般工业技术 | 2421篇 |
冶金工业 | 5419篇 |
原子能技术 | 142篇 |
自动化技术 | 2708篇 |
出版年
2023年 | 69篇 |
2022年 | 118篇 |
2021年 | 269篇 |
2020年 | 144篇 |
2019年 | 206篇 |
2018年 | 278篇 |
2017年 | 257篇 |
2016年 | 285篇 |
2015年 | 263篇 |
2014年 | 402篇 |
2013年 | 680篇 |
2012年 | 703篇 |
2011年 | 939篇 |
2010年 | 655篇 |
2009年 | 680篇 |
2008年 | 718篇 |
2007年 | 695篇 |
2006年 | 580篇 |
2005年 | 566篇 |
2004年 | 520篇 |
2003年 | 473篇 |
2002年 | 439篇 |
2001年 | 351篇 |
2000年 | 324篇 |
1999年 | 445篇 |
1998年 | 1942篇 |
1997年 | 1183篇 |
1996年 | 796篇 |
1995年 | 487篇 |
1994年 | 468篇 |
1993年 | 462篇 |
1992年 | 205篇 |
1991年 | 201篇 |
1990年 | 194篇 |
1989年 | 192篇 |
1988年 | 195篇 |
1987年 | 129篇 |
1986年 | 131篇 |
1985年 | 181篇 |
1984年 | 140篇 |
1983年 | 98篇 |
1982年 | 107篇 |
1981年 | 111篇 |
1980年 | 85篇 |
1979年 | 92篇 |
1978年 | 79篇 |
1977年 | 133篇 |
1976年 | 147篇 |
1975年 | 76篇 |
1974年 | 71篇 |
排序方式: 共有10000条查询结果,搜索用时 171 毫秒
991.
Bruce Melville Rick van Ballegooy Sjoerd van Ballegooy 《Canadian Metallurgical Quarterly》2006,132(3):324-327
An experimental study of flow-induced failure of cable-tied blocks is presented. The particular failure mechanism studied is overturning and rolling up of the leading edge of a cable-tied block mat. Individual blocks were investigated also. The block size, flow depth, and block (mat) protrusion above the surrounding bed were systematically varied. The results are presented in terms of the critical dimensionless shear stress θc for block (mat) failure. A relationship between θc, block size and block protrusion, and flow depth is given. 相似文献
992.
Many studies have found smokers' quit history to correlate with quitting smoking, but little is known about the psychological processes explaining this relationship. This study uses the integrative model of behavioral prediction to examine how quit history affects quit intention. Data from 3,428 Dutch smokers demonstrate that quit history affects (a) beliefs about quitting and (b) the degree to which self-efficacy predicts quit intention. It seems that a relatively unsuccessful history of prior quit attempts reduces self-efficacy over quitting and strengthens the relationship of self-efficacy with the intention to quit. The results are used to call for more process-oriented research in order to advance our understanding of the relationship between quit history and quit intention. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
993.
Gautama H. van Gemund A.J.C. 《Parallel and Distributed Systems, IEEE Transactions on》2006,17(1):78-91
Current analytic solutions to the execution time distribution of a parallel composition of tasks having stochastic execution times are computationally complex, except for a limited number of distributions. In this paper, we present an analytical solution based on approximating execution time distributions in terms of the first four statistical moments. This low-cost approach allows the parallel execution time distribution to be approximated at ultra-low solution complexity for a wide range of execution time distributions. The accuracy of our method is experimentally evaluated for synthetic distributions as well as for task execution time distributions found in real parallel programs and kernels (NAS-EP, SSSP, APSP, Splash2-Barnes, PSRS, and WATOR). Our experiments show that the prediction error of the mean value of the parallel execution time for N-ary parallel composition is in the order of percents, provided the task execution time distributions are sufficiently independent and unimodal. 相似文献
994.
Cones and foci: A mechanical framework for protocol verification 总被引:1,自引:0,他引:1
We define a cones and foci proof method, which rephrases the question whether two system specifications are branching bisimilar in terms of proof obligations on relations between data objects. Compared to the original cones and foci method from Groote and Springintveld, our method is more generally applicable, because it does not require a preprocessing step to eliminate τ-loops. We prove soundness of our approach and present a set of rules to prove the reachability of focus points. Our method has been formalized and proved correct using PVS. Thus we have established a framework for mechanical protocol verification. We apply this framework to the Concurrent Alternating Bit Protocol.
相似文献
相似文献
995.
Christensen M.G. van de Par S. 《IEEE transactions on audio, speech, and language processing》2006,14(4):1340-1351
In this paper, methods for improved parametric coding of transients are presented. We propose a signal model for coding of transients consisting of a sum of sinusoids each being amplitude-modulated by a different gamma envelope. These envelopes are characterized by an onset time, an attack and a decay parameter. An efficient method for estimating these parameters is presented. Further, methods are proposed that combine this transient model with a constant-amplitude sinusoidal model in order to achieve efficient coding of both stationary and transient signal parts. By rate-distortion optimization using a perceptual distortion measure, we combine variable rate bit allocation and segmentation in an optimal way. Formal, as well as informal, listening tests show that significant improvements can be achieved with the proposed model as compared to a state-of-the-art sinusoidal coder by the combination of optimal segmentation and amplitude modulated sinusoidal audio coding. 相似文献
996.
As organizations flesh out their enterprise software security framework (ESSF), they quickly spot an overwhelming gap between their current state of practice and their eventual goals for building secure applications. To address this gap, the application security group must bring ESSF plans to other parts of the organization: corporate, engineering, business, training, and IT groups, to name a few. Such socialization helps organizational participants understand their role in framework adoption and roll out, and it should cover what tools people will need, how they'll interact with each other, and what levels of effort they can expect to put forth 相似文献
997.
998.
Hilderick A. van der Meiden Author Vitae Willem F. Bronsvoort Author Vitae 《Computer aided design》2006,38(4):275-283
Geometric constraints are at the heart of parametric and feature-based CAD systems. Changing values of geometric constraint parameters is one of the most common operations in such systems. However, because allowable parameter values are not known to the user beforehand, this is often a trial-and-error process. We present an approach for automatically determining the allowable range for parameters of geometric constraints. Considered are systems of distance and angle constraints on points in 3D that can be decomposed into triangular and tetrahedral subproblems, by which most practical situations in parametric and feature-based CAD systems can be represented. Our method uses the decomposition to find critical parameter values for which subproblems degenerate. By solving one problem instance for each interval between two subsequent critical values, the exact parameter range is determined for which a solution exists. 相似文献
999.
Either from a control theoretic viewpoint or from an analysis viewpoint it is necessary to convert smooth systems to discrete systems, which can then be implemented on computers for numerical simulations. Discrete models can be obtained either by discretizing a smooth model, or by directly modeling at the discrete level itself. One of the goals of this paper is to model port-Hamiltonian systems at the discrete level. We also show that the dynamics of the discrete models we obtain exactly correspond to the dynamics obtained via a usual discretization procedure. In this sense we offer an alternative to the usual procedure of modeling (at the smooth level) and discretization. 相似文献
1000.
This work examines two methods for evolving dimensionally correct equations on the basis of data. It is demonstrated that the use of units of measurement aids in evolving equations that are amenable to interpretation by domain specialists. One method uses a strong typing approach that implements a declarative bias towards correct equations, the other method uses a coercion mechanism in order to implement a preferential bias towards the same objective. Four experiments using real-world, unsolved scientific problems were performed in order to examine the differences between the approaches and to judge the worth of the induction methods.Not only does the coercion approach perform significantly better on two out of the four problems when compared to the strongly typed approach, but it also regularizes the expressions it induces, resulting in a more reliable search process.A trade-off between type correctness and ability to solve the problem is identified. Due to the preferential bias implemented in the coercion approach, this trade-off does not lead to sub-optimal performance. No evidence is found that the reduction of the search space achieved through declarative bias helps in finding better solutions faster. In fact, for the class of scientific discovery problems the opposite seems to be the case. 相似文献