全文获取类型
收费全文 | 821729篇 |
免费 | 9950篇 |
国内免费 | 2642篇 |
专业分类
电工技术 | 15370篇 |
综合类 | 905篇 |
化学工业 | 122775篇 |
金属工艺 | 31892篇 |
机械仪表 | 25770篇 |
建筑科学 | 19756篇 |
矿业工程 | 4214篇 |
能源动力 | 21774篇 |
轻工业 | 67101篇 |
水利工程 | 8297篇 |
石油天然气 | 13409篇 |
武器工业 | 89篇 |
无线电 | 98929篇 |
一般工业技术 | 159912篇 |
冶金工业 | 155566篇 |
原子能技术 | 16781篇 |
自动化技术 | 71781篇 |
出版年
2021年 | 6743篇 |
2019年 | 6581篇 |
2018年 | 10885篇 |
2017年 | 11016篇 |
2016年 | 11771篇 |
2015年 | 7777篇 |
2014年 | 12850篇 |
2013年 | 38125篇 |
2012年 | 20737篇 |
2011年 | 28511篇 |
2010年 | 22738篇 |
2009年 | 25706篇 |
2008年 | 26709篇 |
2007年 | 26657篇 |
2006年 | 23799篇 |
2005年 | 21604篇 |
2004年 | 20725篇 |
2003年 | 20589篇 |
2002年 | 19608篇 |
2001年 | 19335篇 |
2000年 | 18486篇 |
1999年 | 19233篇 |
1998年 | 46941篇 |
1997年 | 33172篇 |
1996年 | 26149篇 |
1995年 | 19776篇 |
1994年 | 17666篇 |
1993年 | 17471篇 |
1992年 | 13154篇 |
1991年 | 12440篇 |
1990年 | 12157篇 |
1989年 | 11801篇 |
1988年 | 11228篇 |
1987年 | 10069篇 |
1986年 | 9810篇 |
1985年 | 11238篇 |
1984年 | 10399篇 |
1983年 | 9528篇 |
1982年 | 8813篇 |
1981年 | 9026篇 |
1980年 | 8304篇 |
1979年 | 8226篇 |
1978年 | 7987篇 |
1977年 | 9376篇 |
1976年 | 12178篇 |
1975年 | 7151篇 |
1974年 | 6798篇 |
1973年 | 6897篇 |
1972年 | 5641篇 |
1971年 | 5226篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
H. L. Du S. R. Rose Z. D. Xiang P. K. Datta X. Y. Li 《Materialwissenschaft und Werkstofftechnik》2003,34(4):421-426
The oxidation/sulphidation behaviour of a Ti‐46.7Al‐1.9W‐0.5Si alloy with a TiAl3 diffusion coating was studied in an environment of H2/H2S/H2O at 850oC. The kinetic results demonstrate that the TiAl3 coating significantly increased the high temperature corrosion resistance of Ti‐46.7Al‐1.9W‐0.5Si. The SEM, EDX, XRD and TEM analysis reveals that the formation of an Al2O3 scale on the surface of the TiAl3‐coated sample was responsible for the enhancement of the corroison resistance. The Ti‐46.7Al‐1.9W‐0.5Si alloy was also modified by Nb ion implantation. The Nb ion implanted and as received sampels were subjected to cyclic oxidation in an open air at 800oC. The Nb ion implantation not only increased the oxidation resistance but also substantially improved the adhesion of scale to the substrate. 相似文献
92.
93.
Nobel A.B. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2003,49(1):83-98
This paper considers several aspects of the sequential prediction problem for unbounded, nonstationary processes under pth power loss /spl lscr//sub p/(u,v)=|u-v|/sup p/, 1
相似文献
94.
Nucleation and growth mechanisms and kinetics of crystals of an amino acid salt were investigated in a methanol‐water system by measuring and evaluating the induction time as a function of the supersaturation ratio and temperature in batch salting out crystallization experiments. Discrimination between the possible crystallization mechanisms, and estimation of the kinetic parameters were carried out using nonlinear parameter identification. The results concerning the growth mechanism obtained were checked additionally by measuring the induction time as a function of number density of seed crystals. 相似文献
95.
Self-organized public-key management for mobile ad hoc networks 总被引:6,自引:0,他引:6
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase. 相似文献
96.
97.
This paper reports on the stability analysis of one member of a dual-channel resonant DC-DC converter family. The study is confined to the buck configuration in symmetrical operation. The output voltage of the converter is controlled by a closed loop applying constant-frequency pulsewidth modulation. The dynamic analysis reveals that a bifurcation cascade develops as a result of increasing the loop gain. The trajectory of the variable-structure piecewise-linear nonlinear system pierces through the Poincare plane at the fixed point in state space when the loop gain is small. For stability criterion the positions of the characteristic multipliers of the Jacobian matrix belonging to the Poincare map function defined around the fixed point located in the Poincare plane is applied. In addition to the stability analysis, a bifurcation diagram is developed showing the four possible states of the feedback loop: the periodic, the quasi-periodic, the subharmonic, and the chaotic states. Simulation and test results verify the theory. 相似文献
98.
This paper presents the evolution of low-frequency, high-power transcontinental transmission, starting from the first successful transatlantic link from Poldhu up to the Italian transcontinental station of Coltano. The trend toward higher and higher transmitting power, and the dead end into which wireless was heading if it were not for research in the higher frequency ranges, are pointed out. 相似文献
99.
Reducible rank codes and their applications to cryptography 总被引:2,自引:0,他引:2
Gabidulin E.M. Ourivski A.V. Honary B. Ammar B. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2003,49(12):3289-3293
We present a new family of so-called reducible rank codes which are a generalization of rank product codes . This family includes maximal rank distance (MRD) codes for lengths n>N in the field F/sub N/. We give methods for encoding and decoding reducible rank codes. A public key cryptosystem based on these codes and on the idea of a column scrambler is proposed. The column scrambler "mixes" columns of a generator (parity-check) matrix of a code. It makes the system more resistant to structural attacks such as Gibson's attacks. Possible attacks on the system are thoroughly studied. The system is found to be secure against known attacks for public keys of about 16 kbits and greater. 相似文献
100.
This article presents a graph-theoretic method for constructing low-density parity-check (LDPC) codes from connected graphs without the requirement of large girth. This method is based on finding a set of paths in a connected graph, which satisfies the constraint that any two paths in the set are either disjoint or cross each other at one and only one vertex. Two trellis-based algorithms for finding these paths are devised. Good LDPC codes of practical lengths are constructed and they perform well with iterative decoding. 相似文献