全文获取类型
收费全文 | 5389篇 |
免费 | 79篇 |
国内免费 | 12篇 |
专业分类
电工技术 | 85篇 |
综合类 | 30篇 |
化学工业 | 1518篇 |
金属工艺 | 96篇 |
机械仪表 | 96篇 |
建筑科学 | 338篇 |
矿业工程 | 23篇 |
能源动力 | 105篇 |
轻工业 | 423篇 |
水利工程 | 35篇 |
石油天然气 | 2篇 |
无线电 | 340篇 |
一般工业技术 | 1113篇 |
冶金工业 | 482篇 |
原子能技术 | 40篇 |
自动化技术 | 754篇 |
出版年
2023年 | 42篇 |
2022年 | 50篇 |
2021年 | 92篇 |
2020年 | 96篇 |
2019年 | 85篇 |
2018年 | 83篇 |
2017年 | 98篇 |
2016年 | 146篇 |
2015年 | 107篇 |
2014年 | 164篇 |
2013年 | 248篇 |
2012年 | 222篇 |
2011年 | 323篇 |
2010年 | 247篇 |
2009年 | 254篇 |
2008年 | 249篇 |
2007年 | 236篇 |
2006年 | 236篇 |
2005年 | 203篇 |
2004年 | 174篇 |
2003年 | 136篇 |
2002年 | 112篇 |
2001年 | 89篇 |
2000年 | 91篇 |
1999年 | 100篇 |
1998年 | 118篇 |
1997年 | 83篇 |
1996年 | 91篇 |
1995年 | 70篇 |
1994年 | 71篇 |
1993年 | 77篇 |
1992年 | 73篇 |
1991年 | 57篇 |
1990年 | 62篇 |
1989年 | 56篇 |
1988年 | 61篇 |
1987年 | 54篇 |
1986年 | 48篇 |
1985年 | 46篇 |
1984年 | 54篇 |
1983年 | 39篇 |
1982年 | 47篇 |
1981年 | 47篇 |
1980年 | 31篇 |
1979年 | 29篇 |
1978年 | 34篇 |
1977年 | 31篇 |
1976年 | 33篇 |
1975年 | 37篇 |
1973年 | 31篇 |
排序方式: 共有5480条查询结果,搜索用时 15 毫秒
11.
Wolfgang Freyer 《Advanced Synthesis \u0026amp; Catalysis》1977,319(6):911-918
Pyrazolone Derivatives. III. A Contribution to Stereochemistry of N, N-Disubstituted 4-Aminomethylene-3-methyl-1-phenyl-Δ2-pyrazolinones-(5) The N,N-disubstituted 4-aminomethylene-Δ2-pyrazolinones-(5) 1 and 2 show a hindered internal rotation around the bond indicating a considerable polarisation of the system. This assumption is supported by i.r.-spectroscopic measurements which show that the CO-bond order decreases with increasing solvent polarity. Compounds 1 and 2 exist in the Z-configuration relative to the exocyclic CC-double bond. That can be attributed to a steric hindrance in the E-configuration of the aminomethylene-substituents with the methyl-group at the pyrazolone-ring. 相似文献
12.
13.
Schleidt Wolfgang; Shalter Michael D.; Moura-Neto Humberto 《Canadian Metallurgical Quarterly》2011,125(2):121
We present a historical account of the story behind the famous hawk/goose experiments of Lorenz and Tinbergen in a wider context of cognitive ethology. We discuss their significance, for ethological experimentation in general, and specifically for understanding innate constraints on cognition. As examples of the continuing significance of the hawk/goose paradigm of selective habituation, we discuss its relation to “exposure therapy” of human phobias and the use of hawk silhouettes as deterrents for songbirds. Finally we rephrase Uexküll's thesis of taxon-specific worlds (“Umwelten”) as a “Theory of World.” (PsycINFO Database Record (c) 2011 APA, all rights reserved) 相似文献
14.
Obtaining reliable estimates of the statistical properties of complex macromolecules by computer simulation is a task that requires high computational effort as well as the development of highly efficient simulation algorithms. We present here an algorithm combining local moves, the pivot algorithm, and an adjustable simulation lattice box for simulating dilute systems of bottle-brush polymers with a flexible backbone and flexible side chains under good solvent conditions. Applying this algorithm to the bond fluctuation model, very precise estimates of the mean square end-to-end distances and gyration radii of the backbone and side chains are obtained, and the conformational properties of such a complex macromolecule are studied. Varying the backbone length (from Nb=67 to Nb=1027), side chain length (from N=0 to N=24 or 48), the scaling predictions for the backbone behavior as well as the side chain behavior are checked. We are also able to give a direct comparison of the structure factor between experimental data and the simulation results. 相似文献
15.
16.
In this paper we revisit the concept of mandatory access control and investigate its potential with personal digital assistants (PDA). Only if applications are clearly separated and Trojans cannot leak personal information can these PDAs become personal trusted devices. Limited processing power and memory can be overcome by using Web services instead of full-fledged applications – a trend also in non-mobile computing. Web services, however, introduce additional security risks, some of them specific for mobile users. We propose an identification scheme that can be effectively used to protect privacy and show how this system builds upon a light-weight version of mandatory access control. 相似文献
17.
A parallel algorithm evaluating the reliability of a system with known minimal cuts (paths) 总被引:1,自引:0,他引:1
A system with known minimal cuts is considered. In order to compute its reliability a binary tree is constructed with nodes being assigned numerical values. The value of each non-leaf node is a linear combination of its child nodes' values. The values of leaf nodes can be computed in a very simple way. The value of the root node is the system's reliability. The presented method is a memory saving one. Moreover, it is possible to apply parallel computation to the nodes located on the same level, which may significantly reduce the computing time. 相似文献
18.
Josef Eichinger Karl Heinz Mhrmann Jrg Sommer Wolfgang Zirwas Alfred Plattner Stefan Willke 《International Journal of Communication Systems》2001,14(3):319-331
Broadband networks using wireless transmission techniques are a quick and flexible means of implementing subscriber access. Unoccupied frequency bands with sufficient bandwidth to allow the transmission of digital signals at very high bit rates are found only in the microwave bands. Because the path loss is fairly high at these frequencies, the diameter of radio cells is limited to a maximum of a few kilometres. This results in a microcellular system, which is best implemented in the form of a point‐to‐multipoint system, where one radio‐base station serves all subscribers registered in that radio cell. An interactive, broadband, ATM‐based radio local loop has undergone successful trials in Munich. Copyright © 2001 John Wiley & Sons, Ltd. 相似文献
19.
In the national research project “Multifunctional Battery Storage System (MBS)” open questions were answered concerning the technical feasibility and profitability of a grid-connected battery storage system using a vanadium-redox-flow battery in combination with the renewable power generation plants PV and small wind power (Sterrer et al., Multifunktionales Batteriespeichersystem—MBS-Endbericht. Industrielle Forschung im Rahmen der österreichischen Programmlinie Neue Energie 2020, 3. Ausschreibung, noch nicht veröffentlicht, 2013). The technical implementation and the demonstration operation of the pilot plant over a period of two years showed that the battery storage system is suitable for intelligent marketing of renewable energy as well as the provision of system services for grid stabilisation. However, the investigation of different operating strategies of the pilot battery-storage system, a large scale storage system and pooled PV/battery storage systems as virtual power plant for the participation at the energy trading market and energy reserve market showed that all operation strategies being considered in this study may not be profitable in foreseeable future. However, if the costs of the battery storage system can be reduced to about 250 €/kWh until the year 2030, the application of the vanadium-redox-flow battery in particular in large-scale storage plants (e.g. 10 MW, 100 MWh) for the participation at the energy reserve market seems realistic. 相似文献
20.
Frequently, affine recurrence equations can be scheduled more efficiently by quadratic scheduling functions than by linear scheduling functions. In this paper, the problem of finding optimal quadratic schedules for affine recurrence equations is formulated as a convex nonsmooth programming problem. In particular, sufficient constraints for causality are used generalizing Lamport's condition. In this way, the presented problem formulation becomes independent of the problem size. The research tool AQUAD is described implementing this problem formulation. Several nontrivial examples demonstrate that AQUAD can be effectively used to calculate quadratic schedules for affine recurrence equations. Finally, it is shown how array processors can be synthesized from affine recurrence equations which are scheduled by quadratic functions with a singular Hessian matrix. 相似文献