首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   399349篇
  免费   11288篇
  国内免费   6120篇
电工技术   10972篇
技术理论   4篇
综合类   5877篇
化学工业   54530篇
金属工艺   16214篇
机械仪表   13803篇
建筑科学   13305篇
矿业工程   2596篇
能源动力   11278篇
轻工业   40629篇
水利工程   4267篇
石油天然气   5276篇
武器工业   798篇
无线电   52895篇
一般工业技术   68932篇
冶金工业   71922篇
原子能技术   5165篇
自动化技术   38294篇
  2023年   1774篇
  2022年   3605篇
  2021年   5184篇
  2020年   3929篇
  2019年   3874篇
  2018年   5354篇
  2017年   5611篇
  2016年   5765篇
  2015年   5855篇
  2014年   8395篇
  2013年   19848篇
  2012年   13693篇
  2011年   17899篇
  2010年   14717篇
  2009年   15842篇
  2008年   16599篇
  2007年   16273篇
  2006年   14910篇
  2005年   13118篇
  2004年   11878篇
  2003年   11222篇
  2002年   10416篇
  2001年   10811篇
  2000年   9490篇
  1999年   10063篇
  1998年   25215篇
  1997年   17184篇
  1996年   13024篇
  1995年   9518篇
  1994年   8271篇
  1993年   8084篇
  1992年   5423篇
  1991年   5206篇
  1990年   4867篇
  1989年   4539篇
  1988年   4290篇
  1987年   3356篇
  1986年   3271篇
  1985年   3944篇
  1984年   3491篇
  1983年   3174篇
  1982年   2937篇
  1981年   2969篇
  1980年   2705篇
  1979年   2465篇
  1978年   2230篇
  1977年   2651篇
  1976年   3612篇
  1975年   1846篇
  1973年   1782篇
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
61.
It is not known whether impaired hematopoiesis noted during human immunodeficiency virus (HIV) infection results from infection of stem/progenitor cells or of cells of the bone marrow microenvironment. Normal adherent primary stromal layers were exposed to HIV to determine which of this mixture of endothelial cells, fibroblasts, and macrophages are susceptible to the virus. Viral p24 in supernatants was noted with monocytotropic HIV-1Ada, HIV-1Ba-L, and HIV-1JR-FL but not with lymphotropic HIV-1LAI nor HIV-1MN strain, and only stromal macrophages expressed the viral antigens. Coculture of the layers with PHA-activated normal lymphocytes failed to rescue lymphotropic virus. No p24 was produced when macrophage-depleted stromal cells were exposed to either HIV-1Ba-L or HIV-1LAI; proviral DNA was then amplified by PCR in cells exposed to either virus, though coculture with lymphocytes rescued only HIV-1Ba-L. Altogether, these data indicate that macrophages are the major targets of HIV in cultured stromal layers. As virus replication in macrophages did not affect the profile of major cytokines involved in regulating hematopoiesis, HIV infection could alter hematopoiesis by other as yet unspecified mechanisms.  相似文献   
62.
Summary The synthesis of new high optical abrasion resistance coating materials has been undertaken by functionalizing melamine and tris(m-aminophenyl)phosphine oxide with a triethoxysilane containing reagent. These highly functionalized compounds have been used for coating a bis-phenol-A polycarbonate substrate by the sol-gel method. Preliminary data shows the abrasion resistance of the polymer substrate is considerably improved when it is coated by these optically clear materials.  相似文献   
63.
Many current implementations of protocols such as the Transmission Control Protocol/Internet Protocol (TCP/IP) are inefficient because data are often accessed more frequently than necessary. Three techniques that reduce the need for memory bandwidth are proposed. The techniques are copy-on-write, page remapping, and single-copy. Afterburner, a network-independent card that provides the services that are necessary for a single-copy protocol stack, is described. The card has 1 MByte of local buffers and provides a simple interface to a variety of network link adapters, including HIPPI and asynchronous transfer mode (ATM). Afterburner can support transfers to and from the link adapter card at rates up to 1 Gbit/s. An implementation of TCP/IP that uses the features provided by Afterburner to reduce the movement of data to a single copy is discussed. Measurements of the end-to-end performance of Afterburner and the single-copy implementation of TCP/IP are presented  相似文献   
64.
This paper analyzes probability of bit-error (Pe) performance of asynchronous bandlimited direct-sequence code-division multiple-access systems with binary phase-shift keying spreading. The two present methods of Pe analysis under bandwidth-efficient pulse shaping: the often-cited standard Gaussian approximation and the characteristic function (CF) method suffer from either a low accuracy in regions of low Pe (< 10-3) or a prohibitively large computational complexity. The paper presents an alternate method of Pe analysis with moderate computational complexity and high accuracy based on a key observation. A sequence of chip decision statistics (whose sum yields a bit statistic) forms a stationary, m-dependent sequence when conditioned on the chip delay and phase offset of each interfering signal. This observation permits the generalization of the improved Gaussian approximation previously derived for the rectangular pulse and the derivation of a numerically efficient approximation based on the CF method. Numerical examples of systems using the square-root raised-cosine and IS-95 pulses illustrate THE P e performance, user capacity and the accuracy of the proposed method  相似文献   
65.
66.
Geomechanical aspects of the storage of radioactive waste in salt formations have been studied extensively using finite element methods over the last 20 years. In consequence a range of computer programs and associated modelling techniques have been assembled. The paper is based on a benchmark exercise to compare the predictive abilities of a number of these programs and highlights the difficulties of making reliable a-priori estimates of long term behaviour.  相似文献   
67.
Experiments showing the frequency and amplitude of the flow induced motion of the gate for a 2- and a 4-in. swing check valve have been performed. The gate motion is due to turbulence in approach flow. We have found the dominant turbulent frequency of the approach flow is about half the natural frequency of the valves. The valves appear to be almost critically damped. Because of this, the valves respond almost as they would to a static force of the magnitude characteristic of the turbulent fluctuation in the flow. Both the dimensionless exciting force and the damping ratio have been found to be independent of valve size so the above statements are true for larger valves also. The recommended valve oscillation amplitudes and frequencies are used to calculate the wear at the shaft and at the stop. For an unpegged check valve, such as one of the 10-in. valves which was used at the San Onofre Nuclear Generation Station, it was found that shaft bearing wear would amount to 0.27 in.3/year and stop wear to 0.03 in.3/year.  相似文献   
68.
G. C. Bakos   《Applied Energy》2002,72(3-4):609-619
This paper deals with the technical feasibility and economic viability of a grid connected wind-energy conversion system (WECS) used to cover the energy demand of an average habitable dwelling. The various parts of the wind-energy system are described and the useful electrical energy production is determined using a simulation program based on the Monte Carlo method. An economic analysis of the WEC system is performed using a computerized assessment tool. Important financial indices are calculated and financial scenarios investigated.  相似文献   
69.
In this letter, a concise process technology is proposed for the first time to enable the fabrication of good quality three-dimensional (3-D) suspended radio frequency (RF) micro-inductors on bulk silicon, without utilizing the lithography process on sidewall and trench-bottom patterning. Samples were fabricated to demonstrate the applicability of the proposed process technology.  相似文献   
70.
'Software defined radio' (SDR) is a technology that will appear in future generations of mobile phones, i.e. following the third-generation mobile phone technology that is currently being defined and developed. Early versions of 'pragmatic' SDR will allow the terminal to be reconfigured at any level of its protocol stack. Ultimately, the 'pure' SDR technology will allow a mobile phone or terminal to have its air interface software configured or reconfigured by other software (or software parameters) that have been downloaded to the terminal, e.g. over the air, or from a remote server via the Internet and one's personal computer (PC). A number of security issues arise with downloaded code that implements the air interface functions, and these may not be obvious simply from looking at the way PC software is updated on-line today. This paper starts with an outline of the code that allows a mobile phone to operate over a particular air interface. This sets the baseline for a discussion of the security issues surrounding the change of this code from one that is fixed and downloaded once only, to code that is reconfigurable during the life of a product.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号