首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5389篇
  免费   79篇
  国内免费   12篇
电工技术   85篇
综合类   30篇
化学工业   1518篇
金属工艺   96篇
机械仪表   96篇
建筑科学   338篇
矿业工程   23篇
能源动力   105篇
轻工业   423篇
水利工程   35篇
石油天然气   2篇
无线电   340篇
一般工业技术   1113篇
冶金工业   482篇
原子能技术   40篇
自动化技术   754篇
  2023年   42篇
  2022年   50篇
  2021年   92篇
  2020年   96篇
  2019年   85篇
  2018年   83篇
  2017年   98篇
  2016年   146篇
  2015年   107篇
  2014年   164篇
  2013年   248篇
  2012年   222篇
  2011年   323篇
  2010年   247篇
  2009年   254篇
  2008年   249篇
  2007年   236篇
  2006年   236篇
  2005年   203篇
  2004年   174篇
  2003年   136篇
  2002年   112篇
  2001年   89篇
  2000年   91篇
  1999年   100篇
  1998年   118篇
  1997年   83篇
  1996年   91篇
  1995年   70篇
  1994年   71篇
  1993年   77篇
  1992年   73篇
  1991年   57篇
  1990年   62篇
  1989年   56篇
  1988年   61篇
  1987年   54篇
  1986年   48篇
  1985年   46篇
  1984年   54篇
  1983年   39篇
  1982年   47篇
  1981年   47篇
  1980年   31篇
  1979年   29篇
  1978年   34篇
  1977年   31篇
  1976年   33篇
  1975年   37篇
  1973年   31篇
排序方式: 共有5480条查询结果,搜索用时 15 毫秒
11.
Pyrazolone Derivatives. III. A Contribution to Stereochemistry of N, N-Disubstituted 4-Aminomethylene-3-methyl-1-phenyl-Δ2-pyrazolinones-(5) The N,N-disubstituted 4-aminomethylene-Δ2-pyrazolinones-(5) 1 and 2 show a hindered internal rotation around the bond indicating a considerable polarisation of the system. This assumption is supported by i.r.-spectroscopic measurements which show that the CO-bond order decreases with increasing solvent polarity. Compounds 1 and 2 exist in the Z-configuration relative to the exocyclic CC-double bond. That can be attributed to a steric hindrance in the E-configuration of the aminomethylene-substituents with the methyl-group at the pyrazolone-ring.  相似文献   
12.
13.
We present a historical account of the story behind the famous hawk/goose experiments of Lorenz and Tinbergen in a wider context of cognitive ethology. We discuss their significance, for ethological experimentation in general, and specifically for understanding innate constraints on cognition. As examples of the continuing significance of the hawk/goose paradigm of selective habituation, we discuss its relation to “exposure therapy” of human phobias and the use of hawk silhouettes as deterrents for songbirds. Finally we rephrase Uexküll's thesis of taxon-specific worlds (“Umwelten”) as a “Theory of World.” (PsycINFO Database Record (c) 2011 APA, all rights reserved)  相似文献   
14.
Obtaining reliable estimates of the statistical properties of complex macromolecules by computer simulation is a task that requires high computational effort as well as the development of highly efficient simulation algorithms. We present here an algorithm combining local moves, the pivot algorithm, and an adjustable simulation lattice box for simulating dilute systems of bottle-brush polymers with a flexible backbone and flexible side chains under good solvent conditions. Applying this algorithm to the bond fluctuation model, very precise estimates of the mean square end-to-end distances and gyration radii of the backbone and side chains are obtained, and the conformational properties of such a complex macromolecule are studied. Varying the backbone length (from Nb=67 to Nb=1027), side chain length (from N=0 to N=24 or 48), the scaling predictions for the backbone behavior as well as the side chain behavior are checked. We are also able to give a direct comparison of the structure factor between experimental data and the simulation results.  相似文献   
15.
16.
In this paper we revisit the concept of mandatory access control and investigate its potential with personal digital assistants (PDA). Only if applications are clearly separated and Trojans cannot leak personal information can these PDAs become personal trusted devices. Limited processing power and memory can be overcome by using Web services instead of full-fledged applications – a trend also in non-mobile computing. Web services, however, introduce additional security risks, some of them specific for mobile users. We propose an identification scheme that can be effectively used to protect privacy and show how this system builds upon a light-weight version of mandatory access control.  相似文献   
17.
A system with known minimal cuts is considered. In order to compute its reliability a binary tree is constructed with nodes being assigned numerical values. The value of each non-leaf node is a linear combination of its child nodes' values. The values of leaf nodes can be computed in a very simple way. The value of the root node is the system's reliability. The presented method is a memory saving one. Moreover, it is possible to apply parallel computation to the nodes located on the same level, which may significantly reduce the computing time.  相似文献   
18.
Broadband networks using wireless transmission techniques are a quick and flexible means of implementing subscriber access. Unoccupied frequency bands with sufficient bandwidth to allow the transmission of digital signals at very high bit rates are found only in the microwave bands. Because the path loss is fairly high at these frequencies, the diameter of radio cells is limited to a maximum of a few kilometres. This results in a microcellular system, which is best implemented in the form of a point‐to‐multipoint system, where one radio‐base station serves all subscribers registered in that radio cell. An interactive, broadband, ATM‐based radio local loop has undergone successful trials in Munich. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   
19.
In the national research project “Multifunctional Battery Storage System (MBS)” open questions were answered concerning the technical feasibility and profitability of a grid-connected battery storage system using a vanadium-redox-flow battery in combination with the renewable power generation plants PV and small wind power (Sterrer et al., Multifunktionales Batteriespeichersystem—MBS-Endbericht. Industrielle Forschung im Rahmen der österreichischen Programmlinie Neue Energie 2020, 3. Ausschreibung, noch nicht veröffentlicht, 2013). The technical implementation and the demonstration operation of the pilot plant over a period of two years showed that the battery storage system is suitable for intelligent marketing of renewable energy as well as the provision of system services for grid stabilisation. However, the investigation of different operating strategies of the pilot battery-storage system, a large scale storage system and pooled PV/battery storage systems as virtual power plant for the participation at the energy trading market and energy reserve market showed that all operation strategies being considered in this study may not be profitable in foreseeable future. However, if the costs of the battery storage system can be reduced to about 250 €/kWh until the year 2030, the application of the vanadium-redox-flow battery in particular in large-scale storage plants (e.g. 10 MW, 100 MWh) for the participation at the energy reserve market seems realistic.  相似文献   
20.
Frequently, affine recurrence equations can be scheduled more efficiently by quadratic scheduling functions than by linear scheduling functions. In this paper, the problem of finding optimal quadratic schedules for affine recurrence equations is formulated as a convex nonsmooth programming problem. In particular, sufficient constraints for causality are used generalizing Lamport's condition. In this way, the presented problem formulation becomes independent of the problem size. The research tool AQUAD is described implementing this problem formulation. Several nontrivial examples demonstrate that AQUAD can be effectively used to calculate quadratic schedules for affine recurrence equations. Finally, it is shown how array processors can be synthesized from affine recurrence equations which are scheduled by quadratic functions with a singular Hessian matrix.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号