全文获取类型
收费全文 | 598823篇 |
免费 | 32337篇 |
国内免费 | 16332篇 |
专业分类
电工技术 | 24952篇 |
技术理论 | 45篇 |
综合类 | 25478篇 |
化学工业 | 94887篇 |
金属工艺 | 28406篇 |
机械仪表 | 29528篇 |
建筑科学 | 33964篇 |
矿业工程 | 12042篇 |
能源动力 | 16751篇 |
轻工业 | 52057篇 |
水利工程 | 8772篇 |
石油天然气 | 24851篇 |
武器工业 | 2799篇 |
无线电 | 70905篇 |
一般工业技术 | 83521篇 |
冶金工业 | 63970篇 |
原子能技术 | 6930篇 |
自动化技术 | 67634篇 |
出版年
2023年 | 5655篇 |
2022年 | 9667篇 |
2021年 | 15151篇 |
2020年 | 11409篇 |
2019年 | 9873篇 |
2018年 | 12070篇 |
2017年 | 13259篇 |
2016年 | 12619篇 |
2015年 | 15719篇 |
2014年 | 20811篇 |
2013年 | 32377篇 |
2012年 | 29183篇 |
2011年 | 34524篇 |
2010年 | 29432篇 |
2009年 | 29184篇 |
2008年 | 29279篇 |
2007年 | 28348篇 |
2006年 | 28065篇 |
2005年 | 24901篇 |
2004年 | 18954篇 |
2003年 | 17554篇 |
2002年 | 16329篇 |
2001年 | 15676篇 |
2000年 | 14912篇 |
1999年 | 16032篇 |
1998年 | 23287篇 |
1997年 | 17312篇 |
1996年 | 14227篇 |
1995年 | 11202篇 |
1994年 | 9477篇 |
1993年 | 8100篇 |
1992年 | 5998篇 |
1991年 | 5276篇 |
1990年 | 4729篇 |
1989年 | 4320篇 |
1988年 | 4065篇 |
1987年 | 3067篇 |
1986年 | 2861篇 |
1985年 | 3377篇 |
1984年 | 2970篇 |
1983年 | 2687篇 |
1982年 | 2463篇 |
1981年 | 2452篇 |
1980年 | 2289篇 |
1979年 | 2084篇 |
1978年 | 1889篇 |
1977年 | 2193篇 |
1976年 | 2747篇 |
1975年 | 1589篇 |
1973年 | 1564篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
993.
994.
关于粒子加速器人身辐射安全联锁系统设计原则的建议 总被引:2,自引:2,他引:0
本文讨论了在粒子加速器上的联锁系统设计中应遵循的一些原则,其中建立隔离区、“失效导致安全(Fail-safe)”,使用“硬件”、“多重联锁”、设置急停开关等是最重要的。 相似文献
995.
996.
997.
Statistics on the backscatter coefficient σ0 from the Ku -band Seasat-A Satellite Scatterometer (SASS) collected over the world's land surfaces are presented. This spaceborne scatterometer provided data on σ0 between latitude 80° S and 80° N at incidence angles up to 70°. The global statistics of vertical (V ) and horizontal (H ) polarization backscatter coefficients for 10° bands in latitude are presented for incidence angles between 20° and 70° and compared with the Skylab and ground spectrometer results. Global images of the time-averaged V polarization σ0 at a 45° incidence angle and its dependence on the incidence angle are presented and compared to a generalized map of the terrain type. Global images of the differences between the V an H polarization backscatter coefficients are presented and discussed. The most inhomogeneous region, which contains the deserts of North Africa and the Arabian Peninsula, is studied in greater detail and compared with the terrain type 相似文献
998.
Emmerich M.T.M. Giannakoglou K.C. Naujoks B. 《Evolutionary Computation, IEEE Transactions on》2006,10(4):421-439
This paper presents and analyzes in detail an efficient search method based on evolutionary algorithms (EA) assisted by local Gaussian random field metamodels (GRFM). It is created for the use in optimization problems with one (or many) computationally expensive evaluation function(s). The role of GRFM is to predict objective function values for new candidate solutions by exploiting information recorded during previous evaluations. Moreover, GRFM are able to provide estimates of the confidence of their predictions. Predictions and their confidence intervals predicted by GRFM are used by the metamodel assisted EA. It selects the promising members in each generation and carries out exact, costly evaluations only for them. The extensive use of the uncertainty information of predictions for screening the candidate solutions makes it possible to significantly reduce the computational cost of singleand multiobjective EA. This is adequately demonstrated in this paper by means of mathematical test cases and a multipoint airfoil design in aerodynamics. 相似文献
999.
介绍了基于策略的网络管理的概念和当前的研究状况,在策略定义、冲突检测和系统安全问题等方面进行了讨论,提出了一种适合基于策略的网络管理的结构方案,并分析了该方案的合理性。 相似文献
1000.
Bloomfield R.E. Guerra S. Miller A. Masera M. Weinstock C.B. 《Security & Privacy, IEEE》2006,4(3):66-68
Critical systems are aptly named - from electric power to water and gas to the telephone system and the Internet, they're all critical to some aspect of our daily lives. We're a networked society and as such, it's important to both know whether critical systems are trustworthy and be able to communicate, review, and debate the level of trust achieved in them. In the safety domain, explicit safety cases are increasingly required by law, regulations, and standards. In this article, we outline what a small, international group of experts, spanning various disciplines in safety, security, reliability, and critical infrastructure, been doing with the International Working Group on Assurance Cases (for Security), what we hope to achieve, and where we go next. 相似文献