全文获取类型
收费全文 | 72773篇 |
免费 | 5926篇 |
国内免费 | 2066篇 |
专业分类
电工技术 | 4232篇 |
技术理论 | 12篇 |
综合类 | 5101篇 |
化学工业 | 11892篇 |
金属工艺 | 3840篇 |
机械仪表 | 4358篇 |
建筑科学 | 5391篇 |
矿业工程 | 2072篇 |
能源动力 | 2161篇 |
轻工业 | 6887篇 |
水利工程 | 1433篇 |
石油天然气 | 3586篇 |
武器工业 | 565篇 |
无线电 | 7873篇 |
一般工业技术 | 8334篇 |
冶金工业 | 3124篇 |
原子能技术 | 880篇 |
自动化技术 | 9024篇 |
出版年
2025年 | 237篇 |
2024年 | 1512篇 |
2023年 | 1468篇 |
2022年 | 2070篇 |
2021年 | 2942篇 |
2020年 | 2476篇 |
2019年 | 2105篇 |
2018年 | 2127篇 |
2017年 | 2274篇 |
2016年 | 2185篇 |
2015年 | 2827篇 |
2014年 | 3490篇 |
2013年 | 4258篇 |
2012年 | 4682篇 |
2011年 | 5012篇 |
2010年 | 4455篇 |
2009年 | 4261篇 |
2008年 | 4275篇 |
2007年 | 3947篇 |
2006年 | 3759篇 |
2005年 | 3259篇 |
2004年 | 2263篇 |
2003年 | 1854篇 |
2002年 | 1834篇 |
2001年 | 1519篇 |
2000年 | 1415篇 |
1999年 | 1504篇 |
1998年 | 1225篇 |
1997年 | 1024篇 |
1996年 | 903篇 |
1995年 | 781篇 |
1994年 | 636篇 |
1993年 | 483篇 |
1992年 | 397篇 |
1991年 | 282篇 |
1990年 | 180篇 |
1989年 | 177篇 |
1988年 | 164篇 |
1987年 | 93篇 |
1986年 | 92篇 |
1985年 | 57篇 |
1984年 | 40篇 |
1983年 | 27篇 |
1982年 | 31篇 |
1981年 | 26篇 |
1980年 | 27篇 |
1979年 | 19篇 |
1977年 | 6篇 |
1976年 | 12篇 |
1975年 | 12篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
81.
Background The accelerator-driven subcritical transmuta-tion system(ADS)is an advanced technology for the harmless disposal of nuclear waste.A theoretical analy... 相似文献
82.
83.
Cheng Wang Jian-Hao Tan Xiao-Xia Huang Yi-Xing Lu Lin Wang Wen-Cheng Fang Zhen-Tang Zhao 《核技术(英文版)》2021,32(9):84-93
To further improve the performance of acceler-ators, the first cryogenic normal-conducting RF gun in China was designed and manufactured. As a new and attractiv... 相似文献
84.
85.
In this study,by changing both pier diameters and particle sizes of sand bed in flume experiments,the scour process around cylindrical bridge piers under an ice... 相似文献
86.
Yinian Feng Bo Zhang Chen Zhi Ke Liu Weilong Liu Fang Shen Chuanqi Qiao Jicong Zhang Yong Fan Xiaobo Yang 《中国通信》2021,(5):210-220
With the successful demonstration of terahertz (THz) high-speed wireless data transmission,the THz frequencies are now becoming a worth candidate for post-5G wi... 相似文献
87.
88.
A staggered distribution of vegetation is very common in nature,which might significantly affect the flow structure.To investigate its impact,three rows of stag... 相似文献
89.
Lei Wang Xiaoqing Gong Yongqin Zhang Pengfei Xu Xiaojiang Chen Dingyi Fang Xia Zheng Jun Guo 《Multimedia Tools and Applications》2018,77(3):2973-2990
Chinese calligraphy is a unique visual art, and and is one of the material basis of China’s traditional cultural heritage. However, time had caused the old calligraphy works to weathering and damages, so it is necessary to utilize advanced technologies to protect those works. One of those technologies is digital imaging, and the obtained images by digital imaging can preserve the visual information of calligraphy works better, furthermore, they can be used in further researches. While the basic works for those researches are to extract the artistic features which include two elements, i.e., form and spirit. However, most of the existing methods only extract the form and ignore the characters’ spirit, especially they are insensitive to the slight variation in complex ink strokes. To solve these problems, this paper proposes an extraction method based on regional guided flter (RGF) with reference images, which is generated by KNN matting and used as the input image for RGF. Since RGF is sensitive to the slight variation of ink, so the detailed information of the inside of strokes can be detected better. Besides, unlike the past works, which filter the whole strokes, RGF filters the inside of strokes and edges in different windows respectively, which results in that the edges are preserved accurately. Results from a deployment of several famous Chinese calligraphy works demonstrate that our method can extract more accurate and complete form and spirit with lower error rate. 相似文献
90.
As an effective supplement to traditional security solutions, reputation mechanism, which can encourage cooperation among individual entities and minimize the damage mainly resulted from insider attacks, has received much concern by the research community. In this article, a negative multinomial reputation model for self-organized networks is proposed. Compared with binary parameter based binomial reputation model, our model is featured with multiple parameters which can depict objective facts more precisely and accurately. Moreover, free from fixed increment on parameters in binomial model, the increment in our model can be 2 or more, which makes our model flexible and suitable for more practical applications such as networks with sleep mechanisms. Through three metrics of measurement, i.e. convergence time to detecting malicious entities, success rate of malicious entities, and success rate of benign entities, our model shows a better performance in the simulations and excels in these three aspects. 相似文献