全文获取类型
收费全文 | 528672篇 |
免费 | 39849篇 |
国内免费 | 21759篇 |
专业分类
电工技术 | 30529篇 |
技术理论 | 55篇 |
综合类 | 34945篇 |
化学工业 | 87861篇 |
金属工艺 | 29112篇 |
机械仪表 | 32371篇 |
建筑科学 | 42111篇 |
矿业工程 | 15866篇 |
能源动力 | 14515篇 |
轻工业 | 34264篇 |
水利工程 | 9551篇 |
石油天然气 | 32311篇 |
武器工业 | 3942篇 |
无线电 | 59818篇 |
一般工业技术 | 60414篇 |
冶金工业 | 28084篇 |
原子能技术 | 5313篇 |
自动化技术 | 69218篇 |
出版年
2024年 | 2091篇 |
2023年 | 7708篇 |
2022年 | 14144篇 |
2021年 | 19748篇 |
2020年 | 14734篇 |
2019年 | 12143篇 |
2018年 | 13812篇 |
2017年 | 15729篇 |
2016年 | 14485篇 |
2015年 | 19574篇 |
2014年 | 25137篇 |
2013年 | 31059篇 |
2012年 | 32640篇 |
2011年 | 36585篇 |
2010年 | 32047篇 |
2009年 | 30695篇 |
2008年 | 29839篇 |
2007年 | 28627篇 |
2006年 | 29289篇 |
2005年 | 25913篇 |
2004年 | 17611篇 |
2003年 | 15744篇 |
2002年 | 14500篇 |
2001年 | 12986篇 |
2000年 | 12939篇 |
1999年 | 14319篇 |
1998年 | 11943篇 |
1997年 | 10001篇 |
1996年 | 9318篇 |
1995年 | 7751篇 |
1994年 | 6346篇 |
1993年 | 4583篇 |
1992年 | 3613篇 |
1991年 | 2717篇 |
1990年 | 2166篇 |
1989年 | 1797篇 |
1988年 | 1457篇 |
1987年 | 981篇 |
1986年 | 778篇 |
1985年 | 560篇 |
1984年 | 401篇 |
1983年 | 349篇 |
1982年 | 276篇 |
1981年 | 214篇 |
1980年 | 218篇 |
1979年 | 137篇 |
1978年 | 80篇 |
1977年 | 86篇 |
1976年 | 104篇 |
1973年 | 46篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
Wang Xing-kui Li Dan-xun Qu Zhao-song Wang Dian-chang Department of Hydraulic Engineering Tsinghua University Beijing China 《水动力学研究与进展(B辑)》2001,(1)
1 . INTRODUCTIONThebedloadtransporthasbeenextensivelystudiedinthepastfewdecadesandmanyformulasforpredictingbedloadtransportratehavebeenpresented(Einstein 1950 ;Meyer Peter 194 8;Bagnold 1973;Engelund 1976;Yalin 1972 ;Samaga 1986;andKarim 1998) .Whenappliedtostreamswithpartial… 相似文献
992.
威尼斯酒店是以水为主题的旅游酒店。介绍了该项目给排水工程设计中的给水、热水、排水、雨水系统 ,以及所涉及的各种消防系统。 相似文献
993.
机电排灌工程是丘陵、滨湖地区的主要灌溉设施,必须建立适应市场经济的管理新机制,确保工程良性运行和巩固发展,满足不断发展的工农业生产需要。 相似文献
994.
Synchronization attacks like random cropping and time-scale modification are very challenging problems to audio watermarking techniques. To combat these attacks, a novel content-dependent localized robust audio watermarking scheme is proposed. The basic idea is to first select steady high-energy local regions that represent music edges like note attacks, transitions or drum sounds by using different methods, then embed the watermark in these regions. Such regions are of great importance to the understanding of music and will not be changed much for maintaining high auditory quality. In this way, the embedded watermark has the potential to escape all kinds of distortions. Experimental results show strong robustness against common audio signal processing, time-domain synchronization attacks, and most distortions introduced in Stirmark for Audio. 相似文献
995.
油罐液位温度自动检测系统及其程序设计 总被引:1,自引:1,他引:0
本文介绍了燃油火力发电厂油罐液位及温度数据的计算机数据自动采集及处理系统的结构和基于WINDOWS的可视化程序设计方法,该系统结构简单,成本低,采用RS-485数据接口可视现2千米内的数据通讯,是中小企业实现自动化管理的最佳解决方案。 相似文献
996.
997.
Thermal maturation of Swedish Alum Shale kerogen and bitumen has been determined from core samples from Eastern and Central Sweden. In samples from Eastern Sweden (Öland and Gotland), the kerogen and bitumen are thermally immature with respect to petroleum generation. In some areas of Central Sweden (Närke, ÖstergÖtland, and Kinnekulle in VästergÖtland), the kerogen is immature, whereas the bitumen is marginally mature to mature. In other areas of Central Sweden (Halleberg-Hunneberg in VästergÖtland), the kerogen is supermature and the bitumen mature. This suggests that bitumen from a mature source-rock has migrated into the Alum Shales of Central Sweden. Migration in Central Sweden is further evidenced by the occurrence of obviously-migrated bituments in vugs and voids in the organicpoor Ordovician limestone overlying the Alum Shale in Central Sweden, and in concretions within the Alum Shale itself. Based on biomarker distributions of extracted bitumen, Alum Shale kerogen pyrolysate and obviously-migrated oils, and the fact that the Alum Shale in most of the areas studied is the only petroleum source-rock extant, it is suggested that the migrated bitumen in Central Sweden is from the Alum Shale itself. Bitumen has migrated from areas where the Alum Shale is in close proxmity to Permo-Carboniferous intrusions, such as Halleberg-Hunneberg, into nearby areas such as Närke and ÖstergÖtland, where there is no evidence of intrusion and the indigenous organic matter is thermally immature. Other areas, where Alum Shales were associated with intrusions and consequently sourced oil, may have been eroded away. There are producing wells on the island of Gotland, where the Alum Shale is also thermally immature. It is therefore assumed that heating which was responsible for generating Gotland's oil was very localized (such as by an intrusion) or that the oil has migrated from a thermally moremature, distant area. On the basis of reservoir rock porosity, and the fact that the Alum Shale of Gotland contains no migrated component, localized heating is favored. 相似文献
998.
本文引入L-,l-连通度的概念,把Rosenfeld等人建立的三维数字拓扑模糊化;并在三维地震处理中找到了它的应用模型. 相似文献
999.
Computers for symbolic processing 总被引:1,自引:0,他引:1
Wah B.W. Lowrie M.B. Li G.-J. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1989,77(4):509-540
A detailed survey on the motivations, design, applications, current status, and limitations of computers designed for symbolic processing is provided. Symbolic processing computations are performed at the word, relation, or meaning levels, and the knowledge used in symbolic applications may be fuzzy, uncertain, indeterminate, and ill represented. Various techniques for knowledge representation and processing are discussed from both the designers' and users' points of view. The design and choice of a suitable language for symbolic processing and the mapping of applications into a software architecture are then considered. The process of refining the application requirements into hardware and software architectures is treated, and state-of-art sequential and parallel computers designed for symbolic processing are discussed 相似文献
1000.
Stephen Shaoyi Liao Huai Qing Wang Qiu Dan Li Wei Yi Liu 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》2006,36(3):660-671
This paper presents a new method for learning Bayesian networks from functional dependencies (FD) and third normal form (3NF) tables in relational databases. The method sets up a linkage between the theory of relational databases and probabilistic reasoning models, which is interesting and useful especially when data are incomplete and inaccurate. The effectiveness and practicability of the proposed method is demonstrated by its implementation in a mobile commerce system. 相似文献