全文获取类型
收费全文 | 8995篇 |
免费 | 319篇 |
国内免费 | 39篇 |
专业分类
电工技术 | 121篇 |
综合类 | 22篇 |
化学工业 | 2100篇 |
金属工艺 | 167篇 |
机械仪表 | 230篇 |
建筑科学 | 573篇 |
矿业工程 | 31篇 |
能源动力 | 171篇 |
轻工业 | 772篇 |
水利工程 | 54篇 |
石油天然气 | 11篇 |
武器工业 | 1篇 |
无线电 | 591篇 |
一般工业技术 | 1444篇 |
冶金工业 | 1520篇 |
原子能技术 | 70篇 |
自动化技术 | 1475篇 |
出版年
2023年 | 58篇 |
2022年 | 120篇 |
2021年 | 143篇 |
2020年 | 105篇 |
2019年 | 119篇 |
2018年 | 168篇 |
2017年 | 110篇 |
2016年 | 191篇 |
2015年 | 191篇 |
2014年 | 249篇 |
2013年 | 563篇 |
2012年 | 397篇 |
2011年 | 544篇 |
2010年 | 410篇 |
2009年 | 389篇 |
2008年 | 432篇 |
2007年 | 420篇 |
2006年 | 363篇 |
2005年 | 312篇 |
2004年 | 291篇 |
2003年 | 221篇 |
2002年 | 227篇 |
2001年 | 173篇 |
2000年 | 165篇 |
1999年 | 157篇 |
1998年 | 258篇 |
1997年 | 196篇 |
1996年 | 159篇 |
1995年 | 140篇 |
1994年 | 122篇 |
1993年 | 136篇 |
1992年 | 130篇 |
1991年 | 75篇 |
1990年 | 92篇 |
1989年 | 79篇 |
1988年 | 94篇 |
1987年 | 66篇 |
1986年 | 54篇 |
1985年 | 79篇 |
1984年 | 94篇 |
1983年 | 60篇 |
1982年 | 66篇 |
1981年 | 83篇 |
1980年 | 68篇 |
1979年 | 85篇 |
1978年 | 68篇 |
1977年 | 67篇 |
1976年 | 56篇 |
1975年 | 58篇 |
1973年 | 47篇 |
排序方式: 共有9353条查询结果,搜索用时 15 毫秒
61.
In Deutschland geh?rt der Einsatz von NEDAP-Wahlcomputern in immer mehr Gemeinden zum Alltag. Durch Untersuchungen zur Sicherheit
und Manipulierbarkeit konnten Erkenntnisse gewonnen werden, mit welchen Methoden manipulierte Software in den Wahlcomputer
eingebracht und Hardwarekomponenten ausgetauscht werden k?nnen. Dadurch ist erstmals eine Beurteilung der Eignung der NEDAP-Wahlcomputer
hinsichtlich der Anforderungen an manipulationsfeste, nachvollziehbare und transparente Wahlen m?glich. 相似文献
62.
CMOS scaling into the nanometer regime 总被引:11,自引:0,他引:11
Yuan Taur Buchanan D.A. Wei Chen Frank D.J. Ismail K.E. Shih-Hsien Lo Sai-Halasz G.A. Viswanathan R.G. Wann H.-J.C. Wind S.J. Hon-Sum Wong 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1997,85(4):486-504
Starting with a brief review on 0.1-μm (100 nm) CMOS status, this paper addresses the key challenges in further scaling of CMOS technology into the nanometer (sub-100 nm) regime in light of fundamental physical effects and practical considerations. Among the issues discussed are: lithography, power supply and threshold voltage, short-channel effect, gate oxide, high-field effects, dopant number fluctuations and interconnect delays. The last part of the paper discusses several alternative or unconventional device structures, including silicon-on-insulator (SOI), SiGe MOSFET's, low-temperature CMOS, and double-gate MOSFET's, which may lead to the outermost limits of silicon scaling 相似文献
63.
V.D. Sandberg L. Bayliss M. Dugan J.S. Frank T. Gordon G. Hart C.M. Hoffman G.E. Hogan H.S. Matis G.H. Sanders H.P. Von Gunten 《Nuclear instruments & methods in physics research. Section A, Accelerators, spectrometers, detectors and associated equipment》1985,234(3):512-516
A circuit is described that determines the average of the transit time of light from an event in a scintillation counter to the two ends of that counter. The design offers superior time resolution and a novel gating scheme that significantly reduces circuit dead-time. 相似文献
64.
In general, the performance of a KE penetrator against most targets increases with velocity regardless of the particular penetrator-target interaction mode. It is possible to show that there exists an optimum velocity which maximizes the performance of an impacting penetrator for a given expenditure of kinetic energy. Simple graphical methods are described that determine the optimum velocity from general performance-velocity plots. These graphical methods may also be applied to experimental data alone. In addition, simple analytic models which describe the velocity dependent penetration/perforation performance of KE penetrators are examined and extended. These models may be used to explicitly assess the influence of parameters such as target strength and density and penetrator mass, strength and density. For some of the models in this analysis, the explicit relations between the optimum striking velocity for a specific kinetic energy value and the penetrator-target parameters are described. 相似文献
65.
Frank Rees 《Computer Fraud & Security》1998,1998(3):11
Much of what has been written in Australia about the protection of computer programs has been inspired by high profile cases concerning the boundaries of copyright protection. The Australian law firm Clayton Utz says that there has been little discussion about other types of legal protection for computer programs, and as a consequence, other intellectual property laws should not be overlooked. 相似文献
66.
67.
A robustness analysis and synthesis for incomplete nonlinear decoupling for a class of nonlinear systems is discussed. Rigid and elastic-joint robot models belong to this class. For the elastic case, a transformation facilitates the robustness analysis under a weak assumption. Charts with H
1- and H
- norms of closed-loop disturbance transfer functions of the nonlinear-decoupled system are presented for a robust pole assignment. 相似文献
68.
Monroe William S. Skidmore Frank M. Odaibo David G. Tanik Murat M. 《Neural computing & applications》2021,33(11):6027-6038
Neural Computing and Applications - In the medical imaging domain, nonlinear warping has enabled pixel-by-pixel mapping of one image dataset to a reference dataset. This co-registration of data... 相似文献
69.
Phan Alex Truong Phuong Schade Christoph Vasan Aditya Friend James Talke Frank E. 《Microsystem Technologies》2021,27(6):2473-2479
Microsystem Technologies - “Zero drift” behavior of an optical intraocular pressure sensor is studied using an analytical model based on the deflection of a circular membrane. Results... 相似文献
70.
Certain tasks, such as formal program development and theorem proving, fundamentally rely upon the manipulation of higher-order objects such as functions and predicates. Computing tools intended to assist in performing these tasks are at present inadequate in both the amount of knowledge they contain (i.e., the level of support they provide) and in their ability to learn (i.e., their capacity to enhance that support over time). The application of a relevant machine learning technique—explanation-based generalization (EBG)—has thus far been limited to first-order problem representations. We extend EBG to generalize higher-order values, thereby enabling its application to higher-order problem encodings.Logic programming provides a uniform framework in which all aspects of explanation-based generalization and learning may be defined and carried out. First-order Horn logics (e.g., Prolog) are not, however, well suited to higher-order applications. Instead, we employ Prolog, a higher-order logic programming language, as our basic framework for realizing higher-order EBG. In order to capture the distinction between domain theory and training instance upon which EBG relies, we extend Prolog with the necessity operator of modal logic. We develop a meta-interpreter realizing EBG for the extended language, Prolog, and provide examples of higher-order EBG. 相似文献