全文获取类型
收费全文 | 23284篇 |
免费 | 369篇 |
国内免费 | 90篇 |
专业分类
电工技术 | 754篇 |
综合类 | 96篇 |
化学工业 | 3533篇 |
金属工艺 | 1315篇 |
机械仪表 | 1673篇 |
建筑科学 | 517篇 |
矿业工程 | 334篇 |
能源动力 | 226篇 |
轻工业 | 713篇 |
水利工程 | 415篇 |
石油天然气 | 861篇 |
武器工业 | 11篇 |
无线电 | 2342篇 |
一般工业技术 | 5526篇 |
冶金工业 | 2803篇 |
原子能技术 | 439篇 |
自动化技术 | 2185篇 |
出版年
2023年 | 74篇 |
2022年 | 332篇 |
2021年 | 512篇 |
2020年 | 402篇 |
2019年 | 590篇 |
2018年 | 1155篇 |
2017年 | 1195篇 |
2016年 | 1399篇 |
2015年 | 823篇 |
2014年 | 1191篇 |
2013年 | 1607篇 |
2012年 | 1439篇 |
2011年 | 1402篇 |
2010年 | 1316篇 |
2009年 | 1538篇 |
2008年 | 1407篇 |
2007年 | 1336篇 |
2006年 | 1052篇 |
2005年 | 690篇 |
2004年 | 401篇 |
2003年 | 241篇 |
2002年 | 222篇 |
2001年 | 197篇 |
2000年 | 507篇 |
1999年 | 402篇 |
1998年 | 513篇 |
1997年 | 460篇 |
1996年 | 171篇 |
1995年 | 70篇 |
1994年 | 70篇 |
1993年 | 75篇 |
1992年 | 61篇 |
1991年 | 33篇 |
1990年 | 56篇 |
1989年 | 27篇 |
1988年 | 30篇 |
1987年 | 39篇 |
1986年 | 25篇 |
1985年 | 39篇 |
1984年 | 40篇 |
1983年 | 30篇 |
1982年 | 31篇 |
1981年 | 25篇 |
1980年 | 35篇 |
1979年 | 39篇 |
1978年 | 38篇 |
1977年 | 37篇 |
1976年 | 68篇 |
1973年 | 26篇 |
1969年 | 26篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
72.
Boldyrev V. S. Men’shikov V. V. Bogomolov B. B. Kuznetsov S. V. Zubarev A. M. 《Theoretical Foundations of Chemical Engineering》2021,55(2):307-314
Theoretical Foundations of Chemical Engineering - This team of authors presents the development of an algorithm and its practical application in the software for solving the problems of... 相似文献
73.
74.
Kaouthar?DeghdakEmail authorView authors OrcID profile Vincent?T’kindt Jean-Louis?Bouquard 《Journal of Scheduling》2016,19(4):467-478
In this paper, we consider a large-scale evacuation problem after a major disaster. The evacuation is assumed to occur by means of a fleet of buses, thus leading to scheduling the evacuation operations by buses [(bus evacuation problem (BEP)]. We propose time-indexed formulations as well as heuristic algorithms such as greedy algorithms and a matheuristic. This matheuristic uses the former formulation to improve the best solution obtained by the greedy heuristics. In computational experiments, we analyze and evaluate the efficiency of the proposed solution algorithms. 相似文献
75.
76.
A. I. Kibzun M. N. Krasil’shchikov V. L. Miroshkin K. I. Sypalo 《Journal of Computer and Systems Sciences International》2013,52(4):628-636
An approach to the control of the motion of the center of mass of a high altitude hypervelocity flying vehicle whose engine thrust and aerodynamics strongly depend on the angle of attack in the midcourse active phase of the flight is proposed. This approach provides a basis for the method of the trajectory control of motion. The motion of this flying vehicle is simulated with regard to the disturbed atmosphere. It is shown that the proposed approach can be used to form launching zones of high altitude hypervelocity flying vehicles. 相似文献
77.
ISA100自动化用无线系统旨在统一工业无线技术。以下叙述了来自200多家公司的600名成员是如何合作实现这一目标的。 相似文献
78.
Yu. E. Berezkin S. A. Borinskaya A. V. Kuznetsova O. V. Sen’ko 《Pattern Recognition and Image Analysis》2009,19(4):630-633
This work is devoted to the development and substantiation of intellectual data mining as applied to studying folklore and
mythological traditions. The approach is based on use of the functions of distance between traditions. The examples of application
of the methods developed to investigate the interrelation between folklore traditions of the American continent are considered. 相似文献
79.
V. N. Fal’k 《Journal of Computer and Systems Sciences International》2009,48(1):78-83
FALGOL (Formal ALGOrithmic Language) is a fundamental theoretical model of high-level operational languages with unrestricted program object hierarchy. This model formalizes binding, assignment, substitution, and recursion; moreover, the principle of dynamic binding is implemented in the model in contrast to other formal systems of this sort, which makes FALGOL appropriate to specify the most difficultly formalized concepts in modern object programming languages. 相似文献
80.
Practical Interdomain Routing Security 总被引:1,自引:0,他引:1
This article reviews risks and vulnerabilities in interdomain routing and best practices that can have near-term benefits for routing security. It includes examples of routing failures and common attacks on routers, and countermeasures to reduce router vulnerabilities. 相似文献