全文获取类型
收费全文 | 203904篇 |
免费 | 988篇 |
国内免费 | 509篇 |
专业分类
电工技术 | 3543篇 |
综合类 | 181篇 |
化学工业 | 29508篇 |
金属工艺 | 8086篇 |
机械仪表 | 6101篇 |
建筑科学 | 4891篇 |
矿业工程 | 1311篇 |
能源动力 | 5218篇 |
轻工业 | 17533篇 |
水利工程 | 2386篇 |
石油天然气 | 4159篇 |
武器工业 | 8篇 |
无线电 | 23269篇 |
一般工业技术 | 40415篇 |
冶金工业 | 37446篇 |
原子能技术 | 5279篇 |
自动化技术 | 16067篇 |
出版年
2021年 | 1695篇 |
2019年 | 1718篇 |
2018年 | 2594篇 |
2017年 | 2663篇 |
2016年 | 2839篇 |
2015年 | 1841篇 |
2014年 | 3113篇 |
2013年 | 9025篇 |
2012年 | 5106篇 |
2011年 | 7115篇 |
2010年 | 5645篇 |
2009年 | 6393篇 |
2008年 | 6545篇 |
2007年 | 6554篇 |
2006年 | 5621篇 |
2005年 | 5267篇 |
2004年 | 5033篇 |
2003年 | 4933篇 |
2002年 | 4584篇 |
2001年 | 4704篇 |
2000年 | 4620篇 |
1999年 | 4756篇 |
1998年 | 11443篇 |
1997年 | 8180篇 |
1996年 | 6453篇 |
1995年 | 4717篇 |
1994年 | 4317篇 |
1993年 | 4096篇 |
1992年 | 3258篇 |
1991年 | 3099篇 |
1990年 | 2885篇 |
1989年 | 2980篇 |
1988年 | 2860篇 |
1987年 | 2419篇 |
1986年 | 2330篇 |
1985年 | 2736篇 |
1984年 | 2528篇 |
1983年 | 2360篇 |
1982年 | 2112篇 |
1981年 | 2219篇 |
1980年 | 2051篇 |
1979年 | 2142篇 |
1978年 | 2136篇 |
1977年 | 2400篇 |
1976年 | 3215篇 |
1975年 | 1840篇 |
1974年 | 1787篇 |
1973年 | 1790篇 |
1972年 | 1460篇 |
1971年 | 1353篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
B. Deroide J. C. Giuntini P. Belougne J. V. Zanchetta 《Journal of Materials Science》1989,24(1):53-56
A numerical method for calculation of the polarization conductivity has been developed. This approach has been applied to the correlated barrier hopping (CBH) and quantum mechanical tunnelling (QMT) models in the case of monoelectronic hops. These calculations have been performed on well-known solids such as carbon (HTT 600° C) and badly organized molybdenum and tungsten sulphides. The agreement between theory and experimental results is more satisfying than in a previous approach. The parametersW
M andN
0 are determined for the CBH model, andN(E
F) for the QMT model. 相似文献
993.
M. A. Danilova V. B. Mityukhlyaev Yu. A. Novikov Yu. V. Ozerin A. V. Rakov P. A. Todua 《Measurement Techniques》2008,51(8):839-843
Data are given on the test object for scanning electron microscopy in which the components (ridges) are of trapezoidal profile
and have large angles of inclination for the side walls. The width of the top surface of a projection is less than 10 nm.
Methods have been developed for measuring such dimensions of test objects on standard scanning electron microscopes.
__________
Translated from Izmeritel'naya Tekhnika, No. 8, pp. 20–23, August, 2008. 相似文献
994.
Automated recovery of system features and their designs from program source codes is important in reverse engineering and system comprehension. It also helps in the testing of software. An error that is made by users in an input to an execution of a transaction and discovered only after the completion of the execution is called a posttransaction user-input error (PTUIE) of the transaction. For a transaction in any database application, usually, it is essential to-provide transactions for correcting the effect that could result from any PTUIE of the transaction. We discover some probable properties that exist between the control flow graph of a transaction and the control flow graphs of transactions for correcting PTUIE of the former transaction. Through recognizing these properties, we present a novel approach for the automated approximate recovery of provisions and designs for transactions to correct PTUIE of transactions in a database application. The approach recognizes these properties through analyzing the source codes of transactions in the database application statically. 相似文献
995.
A recursive orthogonal least squares (ROLS) algorithm for multi-input, multi-output systems is developed in this paper and is applied to updating the weighting matrix of a radial basis function network. An illustrative example is given, to demonstrate the effectiveness of the algorithm for eliminating the effects of ill-conditioning in the training data, in an application of neural modelling of a multi-variable chemical process. Comparisons with results from using standard least squares algorithms, in batch and recursive form, show that the ROLS algorithm can significantly improve the neural modelling accuracy. The ROLS algorithm can also be applied to a large data set with much lower requirements on computer memory than the batch OLS algorithm. 相似文献
996.
Deshpande S. Thottan M. Sikdar B. 《Network and Service Management, IEEE Transactions on》2008,5(2):78-90
Being the primary interdomain routing protocol, Border Gateway Protocol (BGP) is the singular means of path establishment across the Internet. Therefore, misconfiguration errors in BGP routers result in failure to establish paths which in turn can cause several networks to become unreachable. In this paper, we first analyze data from recent BGP tables to show that misconfiguration errors occur very frequently in the Internet today. We then show theoretically and using real-world events the impact of these errors on routing stability. A scheme for real-time isolation of large-scale BGP misconfiguration events is then proposed in this paper. Our methodology is based on statistical techniques and is evaluated using data from past wellknown misconfiguration events. We show the effectiveness of our method as compared to the current state-of-the-art. 相似文献
997.
B.C. Majumdar 《Wear》1975,33(1):37-43
A theoretical analysis of load-carrying capacity generated by vibration of the journal (the squeeze-film effect) of an externally pressurized porous gas journal is made. The flow of gas in the porous media is in three dimensions and obeys Darcy's law. The solution has been obtained by the perturbation method. The journal is assumed to vibrate either by translatory motion or by rotational motion around the transverse axis. The dimensionless squeeze load, moment, load- and moment-phase angles are given for various squeeze numbers, feeding parameters and a porosity number. 相似文献
998.
999.
J. Bauch G. Schultze-Dewitz K. A. Sorg G. Böhner J. Seifert L. Malmquist E. Plath A. Burmester K. Rügge L. Plath 《Holz als Roh- und Werkstoff》1968,26(3):108-111
Ohne Zusammenfassung 相似文献
1000.
Donald B. Grant SFPE 《Fire Technology》1968,4(3):229-238
How could a five-million-dollar fire occur in a seemingly low hazard industry? The author discusses one such fire and examines the lessons learned from it. It takes careful study to determine if well-known fire protection principles are being violated. 相似文献