全文获取类型
收费全文 | 20175篇 |
免费 | 2223篇 |
国内免费 | 18篇 |
专业分类
电工技术 | 1409篇 |
综合类 | 415篇 |
化学工业 | 8951篇 |
金属工艺 | 295篇 |
机械仪表 | 456篇 |
建筑科学 | 746篇 |
矿业工程 | 199篇 |
能源动力 | 195篇 |
轻工业 | 1902篇 |
水利工程 | 168篇 |
石油天然气 | 86篇 |
无线电 | 682篇 |
一般工业技术 | 3303篇 |
冶金工业 | 1121篇 |
原子能技术 | 67篇 |
自动化技术 | 2421篇 |
出版年
2023年 | 628篇 |
2022年 | 319篇 |
2021年 | 669篇 |
2020年 | 680篇 |
2019年 | 602篇 |
2018年 | 594篇 |
2017年 | 424篇 |
2016年 | 653篇 |
2015年 | 813篇 |
2014年 | 852篇 |
2013年 | 1556篇 |
2012年 | 624篇 |
2011年 | 530篇 |
2010年 | 846篇 |
2009年 | 1007篇 |
2008年 | 525篇 |
2007年 | 507篇 |
2006年 | 356篇 |
2005年 | 358篇 |
2004年 | 314篇 |
2003年 | 264篇 |
2002年 | 186篇 |
2001年 | 191篇 |
1998年 | 411篇 |
1997年 | 289篇 |
1996年 | 315篇 |
1995年 | 270篇 |
1994年 | 242篇 |
1993年 | 300篇 |
1992年 | 193篇 |
1991年 | 166篇 |
1990年 | 189篇 |
1989年 | 217篇 |
1988年 | 179篇 |
1987年 | 189篇 |
1986年 | 222篇 |
1985年 | 208篇 |
1984年 | 198篇 |
1983年 | 209篇 |
1982年 | 189篇 |
1981年 | 224篇 |
1980年 | 198篇 |
1979年 | 202篇 |
1977年 | 187篇 |
1976年 | 195篇 |
1975年 | 223篇 |
1974年 | 215篇 |
1973年 | 390篇 |
1972年 | 235篇 |
1971年 | 162篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
Three-dimensional, turbulent fluid flow analysis with computational methods has emerged as a viable tool in the design process
of engine components for passenger cars. If applied in the early stages of the component development such analysis can help
reduce the product development time drastically, and may support the design engineer to evaluate several competing design
aspects before product completion. However the grid generation for complex geometries still poses a difficult and time consuming
taks which strongly influences the accuracy of the numerical solution. The present paper studies the numerical solution of
the flow in an inlet-manifold of a five-cylinder engine with two intake-ports for each cylinder. A fast and reliable grid
generation technique is discussed in detail. The finite volume based Navier-Stokes solver with schemes of first and second
order accuracy for the convective terms is used. Numerical results at several mass flow rates and different boundary conditions
at the intake ports are compared with measurements. Finally, the computational results are discussed with respect to their
applicability to support the design process of an inlet-manifold. 相似文献
92.
Long-Evans rats with electrolytic hippocampal ablations exhibited chronic impairment in performance on a spatial delayed nonmatching-to-sample task in the arms of a T-maze. The same rats exhibited only mild deficits, which disappeared with practice, in dispositional memory-dependent discrimination in the stem. Both types of discrimination were learned rapidly preoperatively with no marked positive or negative interaction between types of discrimination. The present results suggest that hippocampal lesions in rats have far more serious consequences on the performance of representational memory-dependent tasks than similar lesions in monkeys. In agreement with our past studies, the present experiment demonstrated that dispositional and representational memory systems in rodents have at least partially distinct anatomical substrates in brain. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
93.
IT/Business alignment 总被引:3,自引:2,他引:1
Dr. Alexander Teubner 《WIRTSCHAFTSINFORMATIK》2006,48(5):368-371
94.
Dr. A. N. Danilenko V. Yu. Vetrov A. P. Dmitrochenko A. L. Leontiev E. E. Braudo V. B. Tolstoguzov 《Molecular nutrition & food research》1992,36(2):105-111
Thermodynamic properties of aqueous solutions of both native and modified legumin of broad beans (Vicia faba L.) have been examined. A restricted trypsin-induced proteolysis was used to modify protein structure. Evaluation of protein affinity to ficoll in aqueous solutions showed that modified protein possessed higher hydrophilicity. Thermodynamic properties of diluted solutions were used to predict the phase behaviour in concentrated systems containing protein and ficoll. At specific concentrations of native legumin, the system can separate in two phases, whereas in the case of modified protein the single-phase behaviour of the system was predicted for any concentrations of both components. The experimental data obtained in concentrated systems confirmed predictions of thermodynamic analysis of diluted solutions. 相似文献
95.
96.
Our emphasis in this paper has been on the knowledge-based and cognitive issues pertinent for improved interactions between workers and manufacturing computer systems. We believe that these techniques are as necessary and applicable to manufacturing as to any other vocation, especially as the difference in collar color of shop people becomes less noticeable in their increasing role as knowledge workers. 相似文献
97.
Prof. Dipl.-Ing. Dr.techn. Si-min Zeng Prof. Dr. Walter Gretler 《Forschung im Ingenieurwesen》1995,61(11-12):304-315
The aerodynamic behaviour of pressure transients in railway tunnels due to the passage of train are accompanied by the wave reflection between the entrance and exit of the tunnel as well as the tunnel wall and train surface. This study presents a numerical method using the Harten-Yee upwind TVD scheme to simulate compression wave transients and reflection in a railway tunnel. The strength of the compression wave generated by the entrance of a train into a tunnel emerged within the applied calculation procedure, without any special consideration of the boundary condition for the entrance or exit of the tunnel as well as the train nose and tail. Good agreements were obtained when the initial pressure rise at tunnel entrance and the process of pressure variations in a short tunnel, which were calculated by the presented numerical method, were compared with experimental data. The pressure wave reflection at the entrance and exit, the unsteady flow around the train and the transmitted wave at tunnel exit portal were simulated. The transmitted wave at the tunnel exit portal is also discussed. In addition a method to determine the non-reflective boundary condition for multi-dimensional Euler equation is given. 相似文献
98.
The transition from basic automation to flexible manufacturing is an expensive and tedious procedure. It requires meticulous planning and almost clairvoyant forecasting to insure that the initial flexibility obtained is sufficient to allow growth and expansion in the future. This paper will suggest a systematic and methodological approach to achieve optimal flexibility and describe the present results of its application to an ongoing system transformation.
Conclusions based on existing levels of completion are presented along with identification of critical and non critical flexibility requirements. The considerations and steps taken are summarized in a procedural format which may then be applied to a wide variety of system transformations. 相似文献
99.
M. Schedl Dipl.-Ing. E. Pampalk Dipl.-Ind. G. Widmer Univ.-Prof. Dr. 《e & i Elektrotechnik und Informationstechnik》2005,122(7-8):232-237
In this paper we present a general approach to the automatic content-based organization and visualization of large digital music collections. The general methodology consists in extracting musically and perceptually relevant patterns (‘features’) from the given audio recordings (e.g., mp3 files), using topology-preserving data projection methods to map the entire music collection onto two-dimensional visualization planes (possibly in a hierarchical fashion), and using a new display metaphor (the ‘Islands of Music’) to display the inherent structure of the music collection to the user. It is shown how arbitrary meta-data can be integrated into the visualization process, and how similarity according to different viewpoints can be defined and exploited. The basic methodology is briefly described, three prototype systems are presented, and a general discussion of the practical application possibilities of such technologies is offered. 相似文献
100.
Many organisations suspect that their internal security threat is more pressing than their external security threat. The internal threat is predominantly the result of poor user security behaviour. Yet, despite that, security awareness programmes often seem more likely to put users to sleep than to improve their behaviour. This article discusses the influences that affect a user's security behaviour and outlines how a well structured approach focused on improving behaviour could be an excellent way to take security slack out of an organisation and to achieve a high return for a modest, low-risk investment. 相似文献