首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   697306篇
  免费   8284篇
  国内免费   1651篇
电工技术   12346篇
综合类   601篇
化学工业   106347篇
金属工艺   30552篇
机械仪表   22304篇
建筑科学   15743篇
矿业工程   5057篇
能源动力   17181篇
轻工业   53190篇
水利工程   8202篇
石油天然气   18037篇
武器工业   50篇
无线电   73122篇
一般工业技术   145140篇
冶金工业   125664篇
原子能技术   17764篇
自动化技术   55941篇
  2021年   6696篇
  2020年   4907篇
  2019年   6375篇
  2018年   11345篇
  2017年   11337篇
  2016年   11902篇
  2015年   7621篇
  2014年   12753篇
  2013年   31072篇
  2012年   19514篇
  2011年   26158篇
  2010年   20720篇
  2009年   23222篇
  2008年   23696篇
  2007年   23145篇
  2006年   19712篇
  2005年   17924篇
  2004年   17355篇
  2003年   17113篇
  2002年   16181篇
  2001年   16228篇
  2000年   15236篇
  1999年   15478篇
  1998年   37707篇
  1997年   26932篇
  1996年   20535篇
  1995年   15646篇
  1994年   13743篇
  1993年   13613篇
  1992年   10166篇
  1991年   9768篇
  1990年   9741篇
  1989年   9389篇
  1988年   8759篇
  1987年   8050篇
  1986年   7854篇
  1985年   8621篇
  1984年   8158篇
  1983年   7417篇
  1982年   6947篇
  1981年   7118篇
  1980年   6864篇
  1979年   6902篇
  1978年   6878篇
  1977年   7781篇
  1976年   9760篇
  1975年   6064篇
  1974年   5908篇
  1973年   5984篇
  1972年   5117篇
排序方式: 共有10000条查询结果,搜索用时 26 毫秒
81.
The Boundary Element Method (BEM) incorporating the Embedded Cell Approach (ECA) has been used to analyse the effects of constituent material properties, fibre spatial distribution and microcrack damage on the localised behaviour of transversely fractured, unidirectional fibre-reinforced composites. Three specific composites, i.e., glass fibre reinforced polyester, carbon fibre reinforced epoxy and a glass-carbon hybrid, are considered. The geometrical structures examined were perfectly periodic, uniformly spaced fibre arrangements in square and hexagonal embedded cells. In addition, numerical simulations were also conducted using embedded cells containing randomly distributed fibres. The models involve both elastic fibres and matrix, with the interfaces between the different phases being fully bonded. The results indicate that the constituent material properties (two phase composite) and spatial distribution have a significant effect on the localised stress distributions around the primary crack tip. However, the strain energy release rate associated with crack propagation is predominantly influenced by the material composition. The three-phase hybrid composite exhibited an apparent intermediate fracture toughness value, compared to the all-glass and all-carbon models. Furthermore, the strain energy release rate for the macrocrack lowers as it enters a zone of localised damage (microcracking). The presence of microcracks relaxes the stress field, which can result in a significant reduction in the energetics of the primary crack.  相似文献   
82.
Mössbauer effect measurements and physicochemical analysis demonstrate that annealing of amorphous Fe–P–Mn alloys leads to the formation of a nanocrystalline structure.  相似文献   
83.
Nucleation and growth mechanisms and kinetics of crystals of an amino acid salt were investigated in a methanol‐water system by measuring and evaluating the induction time as a function of the supersaturation ratio and temperature in batch salting out crystallization experiments. Discrimination between the possible crystallization mechanisms, and estimation of the kinetic parameters were carried out using nonlinear parameter identification. The results concerning the growth mechanism obtained were checked additionally by measuring the induction time as a function of number density of seed crystals.  相似文献   
84.
为了分析多水库系统中两座水库之间灌溉用水的分配问题,建立了基到动态规划的神经网络模型。为了研究从一座上游水库取水在下游两座之库之间进行水量分配的问题,提出了3个状态变量和4个决策变量的改进的动态规划算法。采用神经网络模型,用3个状态变量动态规划算法得出调度原则,就所研究的多水库系统实例来说,新的动态规划神经网络模型的性能很好,将该模型的性能与临时凑合的标准调度原则和以前推荐使用的约束动态规划神经网络模型进行了比较。  相似文献   
85.
FIRE: fractal indexing with robust extensions for image databases   总被引:3,自引:0,他引:3  
As already documented in the literature, fractal image encoding is a family of techniques that achieves a good compromise between compression and perceived quality by exploiting the self-similarities present in an image. Furthermore, because of its compactness and stability, the fractal approach can be used to produce a unique signature, thus obtaining a practical image indexing system. Since fractal-based indexing systems are able to deal with the images in compressed form, they are suitable for use with large databases. We propose a system called FIRE, which is then proven to be invariant under three classes of pixel intensity transformations and under geometrical isometries such as rotations by multiples of /spl pi//2 and reflections. This property makes the system robust with respect to a large class of image transformations that can happen in practical applications: the images can be retrieved even in the presence of illumination and/or color alterations. Additionally, the experimental results show the effectiveness of FIRE in terms of both compression and retrieval accuracy.  相似文献   
86.
A general theoretical model of statistical Raman crosstalk and its impact on system performance in a multiwavelength bidirectionally pumped Raman fiber amplifier (RFA) is developed for the first time, where we have taken modulation statistics, dispersion-induced pulse walk-off and signal-induced pump depletion into account. Two kinds of statistical Raman crosstalk, from signal-induced forward-pump depletion and from signal-signal Raman interaction, are included in one model. Formulas for normalized Raman crosstalk, Raman crosstalk-induced relative intensity noise spectral density, and its variance and system performance impact in terms of Q penalty are presented for both a single-span system and a dispersion-compensated multispan wavelength-division-multiplexed (WDM) link. Based on these formulas, we numerically investigate the impact of Raman crosstalk on system performance in a three-wavelengths bidirectionally pumped 40 /spl times/ 40-Gb/s WDM system for various fiber types. In addition, Raman crosstalk in a four-wavelength bidirectionally pumped RFA was experimentally measured. The results agree well with our theory.  相似文献   
87.
A series of small–capacity units has recently been constructed in regions of oil field development and crude oil and gas condensate production to satisfy the requirements for such petroleum products as naphtha, diesel fuel, kerosene, and boiler fuel and to reduce costs for delivery of these products. There are almost no data in the technical literature, particularly in periodicals, on the construction and operation of small–capacity units. We attempt to generalize the experience of Orgeneftekhimzavody Trust in this area. We hope that this experience will be useful to specialists in the development and management of small–capacity plants.  相似文献   
88.
The interference issues related to ultrawideband (UWB) radio pose tight restrictions on the maximum data rate of UWB radio telecommunication systems. A possible solution is to reduce the required signal to interference ratio (SIR) that gives satisfactory performance to the UWB system. In this letter, we propose coded M-ary UWB radio communication systems. Two classes of convolutional codes, namely, low-rate superorthogonal codes and high-rate punctured codes are considered for this purpose. Simulation results on the bit error rate of the proposed system indicates that the system is capable to work in lower SIR's and therefore supports higher data transmission rates in a real interference environment compared to the previously proposed UWB communication systems.  相似文献   
89.
Reducible rank codes and their applications to cryptography   总被引:2,自引:0,他引:2  
We present a new family of so-called reducible rank codes which are a generalization of rank product codes . This family includes maximal rank distance (MRD) codes for lengths n>N in the field F/sub N/. We give methods for encoding and decoding reducible rank codes. A public key cryptosystem based on these codes and on the idea of a column scrambler is proposed. The column scrambler "mixes" columns of a generator (parity-check) matrix of a code. It makes the system more resistant to structural attacks such as Gibson's attacks. Possible attacks on the system are thoroughly studied. The system is found to be secure against known attacks for public keys of about 16 kbits and greater.  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号