全文获取类型
收费全文 | 199715篇 |
免费 | 2310篇 |
国内免费 | 613篇 |
专业分类
电工技术 | 3468篇 |
综合类 | 149篇 |
化学工业 | 28978篇 |
金属工艺 | 8049篇 |
机械仪表 | 6068篇 |
建筑科学 | 4811篇 |
矿业工程 | 1303篇 |
能源动力 | 5128篇 |
轻工业 | 17118篇 |
水利工程 | 2297篇 |
石油天然气 | 4047篇 |
武器工业 | 8篇 |
无线电 | 23072篇 |
一般工业技术 | 40014篇 |
冶金工业 | 37228篇 |
原子能技术 | 5086篇 |
自动化技术 | 15814篇 |
出版年
2021年 | 1606篇 |
2019年 | 1568篇 |
2018年 | 2573篇 |
2017年 | 2645篇 |
2016年 | 2775篇 |
2015年 | 1797篇 |
2014年 | 3076篇 |
2013年 | 8942篇 |
2012年 | 5052篇 |
2011年 | 7022篇 |
2010年 | 5591篇 |
2009年 | 6351篇 |
2008年 | 6447篇 |
2007年 | 6514篇 |
2006年 | 5581篇 |
2005年 | 5232篇 |
2004年 | 5007篇 |
2003年 | 4891篇 |
2002年 | 4527篇 |
2001年 | 4659篇 |
2000年 | 4581篇 |
1999年 | 4727篇 |
1998年 | 11373篇 |
1997年 | 8121篇 |
1996年 | 6409篇 |
1995年 | 4673篇 |
1994年 | 4271篇 |
1993年 | 4074篇 |
1992年 | 3223篇 |
1991年 | 3077篇 |
1990年 | 2871篇 |
1989年 | 2952篇 |
1988年 | 2826篇 |
1987年 | 2398篇 |
1986年 | 2308篇 |
1985年 | 2715篇 |
1984年 | 2505篇 |
1983年 | 2346篇 |
1982年 | 2090篇 |
1981年 | 2203篇 |
1980年 | 2029篇 |
1979年 | 2124篇 |
1978年 | 2120篇 |
1977年 | 2366篇 |
1976年 | 3188篇 |
1975年 | 1833篇 |
1974年 | 1761篇 |
1973年 | 1772篇 |
1972年 | 1443篇 |
1971年 | 1339篇 |
排序方式: 共有10000条查询结果,搜索用时 10 毫秒
181.
182.
S. O. Balanetskii B. Grushko K. Urban T. Ya. Velikanova 《Powder Metallurgy and Metal Ceramics》2004,43(9):480-483
Scanning and transmission electron microscopy have been combined with x-ray diffraction to examine the phase equilibria in the Al - Pd - Re system at 1000°C for compositions from 50 to 100 at.% Al, and the corresponding isothermal section has been constructed. The binary monoclinic Al3 Re phase has been observed for the first time. It is confirmed that there is a stable icosahedral phase in this system. The boundaries to its homogeneity region have been determined and the phase equilibria in which it participates. 相似文献
183.
184.
185.
Conclusions The chemical mutagenesis method is recommended for use in local purification installations for cleaning up of caprolactam-containing wastewater.Use of this method permits one to carry out a biochemical clean-up of wastewater having a caprolactam content up to 600 mg/liter while increasing the oxidative power of the aeration tank by a factor of two.Translated from Khimicheskie Volokna, No. 6, p. 46, November–December, 1985. 相似文献
186.
Z. P. Shul'man B. M. Khusid I. L. Ryklina É. A. Zal'tsgendler O. R. Dornyak É. V. Ivashkevich Z. A. Shabunina 《Journal of Engineering Physics and Thermophysics》1987,53(5):1285-1291
Dynamic processes are studied in media with softly and hardly internal destroyable configurations. A method is examined for the measurement of properties of media with spatial separation of the chemical transformation stages and thermal hydrodynamic measurements.Translated from Inzhenerno-Fizicheskii Zhurnal, Vol. 53, No. 5, pp. 781–789, November, 1987. 相似文献
187.
Y. Rey-Tauriac J. Badoc B. Reynard R.A. Bianchi D. Lachenal A. Bravaix 《Microelectronics Reliability》2005,45(9-11):1349
This paper presents results of reliability investigation of 20 V N-Drift MOS transistor in 0.13 μm CMOS technology. Due to high performances required for CMOS applications, adding high voltage devices becomes a big challenge to guarantee the reliability criteria. In this context, new reliability approaches are needed. Safe Operating Area are defined for switch, Vds limited and Vgs limited applications in order to improve circuit designs. For Vds limited applications, deep doping dose effects in drift area are investigated in correlation to lifetime evaluations based on device parameter shifts under hot carrier stressing. To further determine the amount and locations of hot carriers injections, accurate 2D technological and electrical simulations are performed and permit to select the best compromise between performance and reliability for N-Drift MOS transistor. 相似文献
188.
A new spreadsheet-cell-object-oriented algorithm for the first-order reliability method is proposed and illustrated for cases with correlated nonnormals and explicit and implicit performance functions. The new approach differs from the writers earlier algorithm by obviating the need for computations of equivalent normal means and equivalent normal standard deviations. It obtains the solution faster and is more efficient, robust, and succinct. Other advantages include ease of initialization prior to constrained optimization, ease of randomization of initial values for checking robustness, and fewer required optimization constraints during spreadsheet-automated search for the design point. Two cases with implicit performance functions, namely an asymmetrically loaded beam on Winkler medium and a strut with complex supports are analyzed using the new approach and discussed. Comparisons are also made between the proposed approach and that based on Rosenblatt transformation. 相似文献
189.
In this article, we describe a knowledge-based controlled platform using program supervision techniques. This platform eases
the creation and the configuration of video surveillance systems. Several issues need to be addressed to provide a correct
system configuration: (1) to choose, among a library of programs, those which are best satisfying a given user request, (2)
to assign a correct value for each program parameter, (3) to evaluate performances and to guarantee a performance rate which
is satisfactory regarding end-user requirements. This platform is composed of three main components: the library of programs,
the knowledge base and the control component. The knowledge is either given by experts or learnt by the system. The control
is generic in the sense that it is independent of any application. To validate this platform, we have built and evaluated
six video surveillance systems which are featured with three properties: adaptability, reliability and real-time processing. 相似文献
190.
The entire IT security industry is an accident: an artifact of how the computer industry developed. Computers are hard to use, and you need an IT department staffed with experts to make it work. IT security is critical, but there's no earthly reason why users need to know what an intrusion detection system with stateful protocol analysis is, or why it's helpful in spotting SQL injection attacks. As IT fades into the background and becomes just another utility, users will simply expect it to work. The details of how it works won't matter. 相似文献