全文获取类型
收费全文 | 366919篇 |
免费 | 22709篇 |
国内免费 | 11414篇 |
专业分类
电工技术 | 16192篇 |
技术理论 | 31篇 |
综合类 | 19220篇 |
化学工业 | 60731篇 |
金属工艺 | 21240篇 |
机械仪表 | 21195篇 |
建筑科学 | 24962篇 |
矿业工程 | 10021篇 |
能源动力 | 8974篇 |
轻工业 | 20041篇 |
水利工程 | 6001篇 |
石油天然气 | 20534篇 |
武器工业 | 2234篇 |
无线电 | 40078篇 |
一般工业技术 | 49383篇 |
冶金工业 | 17713篇 |
原子能技术 | 3093篇 |
自动化技术 | 59399篇 |
出版年
2024年 | 1222篇 |
2023年 | 4686篇 |
2022年 | 7947篇 |
2021年 | 11484篇 |
2020年 | 8564篇 |
2019年 | 7290篇 |
2018年 | 21228篇 |
2017年 | 21368篇 |
2016年 | 17150篇 |
2015年 | 11752篇 |
2014年 | 14009篇 |
2013年 | 16643篇 |
2012年 | 20689篇 |
2011年 | 28233篇 |
2010年 | 24486篇 |
2009年 | 20996篇 |
2008年 | 21805篇 |
2007年 | 22472篇 |
2006年 | 16084篇 |
2005年 | 15303篇 |
2004年 | 10105篇 |
2003年 | 9029篇 |
2002年 | 7829篇 |
2001年 | 6592篇 |
2000年 | 7285篇 |
1999年 | 8570篇 |
1998年 | 6897篇 |
1997年 | 5853篇 |
1996年 | 5495篇 |
1995年 | 4521篇 |
1994年 | 3774篇 |
1993年 | 2639篇 |
1992年 | 2148篇 |
1991年 | 1624篇 |
1990年 | 1173篇 |
1989年 | 935篇 |
1988年 | 769篇 |
1987年 | 525篇 |
1986年 | 389篇 |
1985年 | 266篇 |
1984年 | 184篇 |
1983年 | 120篇 |
1982年 | 130篇 |
1981年 | 86篇 |
1980年 | 70篇 |
1968年 | 43篇 |
1966年 | 42篇 |
1965年 | 46篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
文章介绍了目前国内外长输管道外防护技术的特点和防护层应用的现状,分析了常用防腐蚀材料的防腐蚀性能。指出在山区复杂地形条件下,应考虑环境条件和施工条件,并通过技术经济分析对管道外防腐蚀层进行合理选择。 相似文献
992.
993.
994.
Co-evolution as a computational and cognitive model of design 总被引:6,自引:0,他引:6
Co-evolutionary design has been developed as a computational model that assumes two parallel search spaces: the problem space
and the solution space. The design process iteratively searches each space using the other space as the basis for a fitness
function when evaluating the alternatives. Co-evolutionary design can also be developed as a cognitive model of design by
characterizing the way in which designers iteratively search for a design solution, making revisions to the problem specification.
This paper presents the computational model of co-evolutionary design and then describes a protocol study of human designers
looking for evidence of co-evolution of problem specifications and design solutions. The study shows that co-evolutionary
design is a good cognitive model of design and highlights the similarities and differences between the computational model
and the cognitive model. The results show that the two kinds of co-evolutionary design complement each other, having strengths
in different aspects of the design process.
Electronic Publication 相似文献
995.
Zhang X.B. Lam S.S. Dong-Young Lee Yang Y.R. 《Networking, IEEE/ACM Transactions on》2003,11(6):908-922
We present the design and specification of a protocol for scalable and reliable group rekeying together with performance evaluation results. The protocol is based upon the use of key trees for secure groups and periodic batch rekeying. At the beginning of each rekey interval, the key server sends a rekey message to all users consisting of encrypted new keys (encryptions, in short) carried in a sequence of packets. We present a scheme for identifying keys, encryptions, and users, and a key assignment algorithm that ensures that the encryptions needed by a user are in the same packet. Our protocol provides reliable delivery of new keys to all users eventually. It also attempts to deliver new keys to all users with a high probability by the end of the rekey interval. For each rekey message, the protocol runs in two steps: a multicast step followed by a unicast step. Proactive forward error correction (FEC) multicast is used to reduce delivery latency. Our experiments show that a small FEC block size can be used to reduce encoding time at the server without increasing server bandwidth overhead. Early transition to unicast, after at most two multicast rounds, further reduces the worst-case delivery latency as well as user bandwidth requirement. The key server adaptively adjusts the proactivity factor based upon past feedback information; our experiments show that the number of NACKs after a multicast round can be effectively controlled around a target number. Throughout the protocol design, we strive to minimize processing and bandwidth requirements for both the key server and users. 相似文献
996.
The microstructure and thermal behavior of the Sn-Zn-Ag solder were investigated for 8.73–9% Zn and 0–3.0% Ag. The scanning
electron microscopy (SEM) analysis shows the Ag-Zn compound when the solder contains 0.1% Ag. X-ray diffraction (XRD) analysis
results indicate that Ag5Zn8 and AgZn3 become prominent when the Ag content is 0.3% and above. Meanwhile, the Zn-rich phase is refined, and the Zn orientations
gradually diminish upon increase in Ag content. The morphology of the Ag-Zn compound varies from nodular to dendrite structure
when the Ag content increases. The growth of the Ag-Zn compounds is accompanied by the diminishing of the eutectic structure
of the Sn-9Zn solder. Differential scanning calorimetry (DSC) investigation reveals that the solidus temperature of these
solders exists at around 198°C. A single, sharp exothermic peak was found for the solders with Ag content less than 0.5%.
Liquidus temperatures were identified with the DSC analysis to vary from 206°C to 215°C when the Ag content ranges from 1.0%
to 3.0% 相似文献
997.
998.
信息社会世界峰会是根据ITU的相关决议,在ITU的大力倡导下,在联合国和其他国际组织、国际机构的支持和配合下促成的。峰会的目的旨在通过召开尽可能高级别的会议,就信息社会建设问题达成全球共识,通过利用信息通信技术潜力。推动实现联合国《千年宣言》所确定的目标,促进全人类的进步。峰会的整个进程分为两个阶段,第一阶段于2003年12月在日内瓦举行,第二阶段于2005年在突尼斯举行。目前,峰会的主要议题和安排已基本确定,各国,尤其是发达国家和发展中国家在对信息社会的认识和未来的一些做法上还存在明显分歧。 相似文献
999.
Qiang Wang Yi Shen Ye Zhang Jian Qiu Zhang 《IEEE transactions on instrumentation and measurement》2003,52(4):1041-1047
Hyperspectral image fusion is a key technique of hyperspectral data processing. In recent years, many fusion methods have been proposed, but there is little work concerning evaluation of the performances of different image fusion methods. In this paper, a method called quantitative correlation analysis (QCA) is proposed, which provides a quantitative measure of the information transferred by an image fusion technique into the output image. Using the proposed method, the performances of different image fusion methods can be compared and analyzed directly based on the images of before and after performing the fusion. The correlation information entropy, based on the developed QCA, is also proposed and testified by numerical simulations. Typical hyperspectral data are applied to the proposed method. The results show that the method is effective, and its conclusions agree with the classification results in applications. 相似文献
1000.
ω—烷氧基聚醚的用途 总被引:2,自引:0,他引:2
ω-烷氧基聚醚与ω-羟基聚醚相比具有许多特殊的性能,例如粘度低,粘温变化小,化学惰性发等,这些特殊性能使得ω-烷氧基聚醚在化纤油剂、低泡表面活性剂和聚醚改性有机硅等方面都能找到用途,笔者建议加快ω-甲氧基聚醚的应用开发步伐。 相似文献