首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   10299篇
  免费   365篇
  国内免费   39篇
电工技术   170篇
综合类   23篇
化学工业   2426篇
金属工艺   188篇
机械仪表   252篇
建筑科学   613篇
矿业工程   39篇
能源动力   196篇
轻工业   945篇
水利工程   59篇
石油天然气   14篇
武器工业   1篇
无线电   669篇
一般工业技术   1655篇
冶金工业   1762篇
原子能技术   81篇
自动化技术   1610篇
  2023年   55篇
  2022年   115篇
  2021年   161篇
  2020年   115篇
  2019年   132篇
  2018年   180篇
  2017年   124篇
  2016年   204篇
  2015年   211篇
  2014年   260篇
  2013年   618篇
  2012年   432篇
  2011年   597篇
  2010年   442篇
  2009年   423篇
  2008年   486篇
  2007年   446篇
  2006年   387篇
  2005年   337篇
  2004年   311篇
  2003年   248篇
  2002年   245篇
  2001年   205篇
  2000年   192篇
  1999年   175篇
  1998年   323篇
  1997年   241篇
  1996年   197篇
  1995年   169篇
  1994年   156篇
  1993年   158篇
  1992年   158篇
  1991年   92篇
  1990年   102篇
  1989年   96篇
  1988年   116篇
  1987年   79篇
  1986年   70篇
  1985年   95篇
  1984年   112篇
  1983年   71篇
  1982年   84篇
  1981年   96篇
  1980年   84篇
  1979年   101篇
  1978年   84篇
  1977年   98篇
  1976年   88篇
  1975年   63篇
  1973年   65篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
In Deutschland geh?rt der Einsatz von NEDAP-Wahlcomputern in immer mehr Gemeinden zum Alltag. Durch Untersuchungen zur Sicherheit und Manipulierbarkeit konnten Erkenntnisse gewonnen werden, mit welchen Methoden manipulierte Software in den Wahlcomputer eingebracht und Hardwarekomponenten ausgetauscht werden k?nnen. Dadurch ist erstmals eine Beurteilung der Eignung der NEDAP-Wahlcomputer hinsichtlich der Anforderungen an manipulationsfeste, nachvollziehbare und transparente Wahlen m?glich.  相似文献   
102.
CMOS scaling into the nanometer regime   总被引:11,自引:0,他引:11  
Starting with a brief review on 0.1-μm (100 nm) CMOS status, this paper addresses the key challenges in further scaling of CMOS technology into the nanometer (sub-100 nm) regime in light of fundamental physical effects and practical considerations. Among the issues discussed are: lithography, power supply and threshold voltage, short-channel effect, gate oxide, high-field effects, dopant number fluctuations and interconnect delays. The last part of the paper discusses several alternative or unconventional device structures, including silicon-on-insulator (SOI), SiGe MOSFET's, low-temperature CMOS, and double-gate MOSFET's, which may lead to the outermost limits of silicon scaling  相似文献   
103.
A circuit is described that determines the average of the transit time of light from an event in a scintillation counter to the two ends of that counter. The design offers superior time resolution and a novel gating scheme that significantly reduces circuit dead-time.  相似文献   
104.
Summary Polymeric antioxidants prepared from 2,6-di-tertiary-butyl-4-vinyl (4-lsopropenyl)phenol and butadiene or isoprene, and their hydrogenated products (6-8 mol % of phenolic AO in the polymer) were tested by oxygen uptake studies for their effectiveness as antioxidants for polyolefins and polydienes. The polymeric antioxidants seem to be slightly less effective in short-term protection against oxidation at 150° C as compared to low molecular weight antioxidants, but more effective in long-term protection of the polymer samples at a level of 0.1 weight percent.Part 43: P. Grosso, O. Vogl: J. Macromol. Sci. Chem., in pressNow Chemical Company, Midland, MI 48674, USATo whom all correspondence should be addressed: Herman F. Mark Professor of Polymer Science, Polytechnic Institute of New York, Brooklyn, NY 11201, USA  相似文献   
105.
In general, the performance of a KE penetrator against most targets increases with velocity regardless of the particular penetrator-target interaction mode. It is possible to show that there exists an optimum velocity which maximizes the performance of an impacting penetrator for a given expenditure of kinetic energy. Simple graphical methods are described that determine the optimum velocity from general performance-velocity plots. These graphical methods may also be applied to experimental data alone. In addition, simple analytic models which describe the velocity dependent penetration/perforation performance of KE penetrators are examined and extended. These models may be used to explicitly assess the influence of parameters such as target strength and density and penetrator mass, strength and density. For some of the models in this analysis, the explicit relations between the optimum striking velocity for a specific kinetic energy value and the penetrator-target parameters are described.  相似文献   
106.
Much of what has been written in Australia about the protection of computer programs has been inspired by high profile cases concerning the boundaries of copyright protection. The Australian law firm Clayton Utz says that there has been little discussion about other types of legal protection for computer programs, and as a consequence, other intellectual property laws should not be overlooked.  相似文献   
107.
Background, prime influences upon present day methods and current trends in United Kingdom tendering practices are reviewed. Significant weaknesses are identified, confirming the need for some revision of existing contractor selection methods. The findings compliment recommendations of the recent government/industry review of the construction sector headed by Sir Michael Latham. Specifically, that tendering procedure should embrace investigation of contractors' potential to deliver a service of acceptable standard, on time, within budget. Present selection methods often fail in this objective, being inclined to discriminate predominantly on cost.  相似文献   
108.
109.
A robustness analysis and synthesis for incomplete nonlinear decoupling for a class of nonlinear systems is discussed. Rigid and elastic-joint robot models belong to this class. For the elastic case, a transformation facilitates the robustness analysis under a weak assumption. Charts with H 1- and H - norms of closed-loop disturbance transfer functions of the nonlinear-decoupled system are presented for a robust pole assignment.  相似文献   
110.
Neural Computing and Applications - In the medical imaging domain, nonlinear warping has enabled pixel-by-pixel mapping of one image dataset to a reference dataset. This co-registration of data...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号