首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   293146篇
  免费   5494篇
  国内免费   2027篇
电工技术   6633篇
综合类   2261篇
化学工业   43150篇
金属工艺   11785篇
机械仪表   10370篇
建筑科学   9117篇
矿业工程   1693篇
能源动力   7422篇
轻工业   24891篇
水利工程   3045篇
石油天然气   5748篇
武器工业   278篇
无线电   38696篇
一般工业技术   54284篇
冶金工业   48267篇
原子能技术   5846篇
自动化技术   27181篇
  2022年   2042篇
  2021年   3151篇
  2020年   2391篇
  2019年   2762篇
  2018年   4261篇
  2017年   4481篇
  2016年   4584篇
  2015年   3428篇
  2014年   5487篇
  2013年   13131篇
  2012年   8504篇
  2011年   10976篇
  2010年   8744篇
  2009年   9620篇
  2008年   10391篇
  2007年   10319篇
  2006年   9544篇
  2005年   8716篇
  2004年   7962篇
  2003年   7694篇
  2002年   7335篇
  2001年   7269篇
  2000年   7062篇
  1999年   7218篇
  1998年   15166篇
  1997年   11039篇
  1996年   8869篇
  1995年   7037篇
  1994年   6206篇
  1993年   6020篇
  1992年   4856篇
  1991年   4438篇
  1990年   4279篇
  1989年   3938篇
  1988年   3758篇
  1987年   3264篇
  1986年   3142篇
  1985年   3664篇
  1984年   3427篇
  1983年   3062篇
  1982年   2879篇
  1981年   2971篇
  1980年   2778篇
  1979年   2658篇
  1978年   2504篇
  1977年   2952篇
  1976年   3566篇
  1975年   2320篇
  1974年   2318篇
  1973年   2325篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
This paper extends an analysis developed for tubular permanent-magnet machines to account for the effect of fringing associated with the finite length of the ferromagnetic armature core. The magnetic field distribution, established by using an analytical technique formulated in the cylindrical coordinate system, provides an accurate means of evaluating the effect of the fringing flux on the thrust force and the back-electromotive force. Finite-element calculations confirm the analytically derived results. In Part II of the paper, the analysis is used to predict the cogging force that results from end effects and to facilitate minimization of the force.  相似文献   
52.
53.
Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence. When the user departs, the token and device lose contact and the device secures itself. We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep. Our evaluation shows this is done without inconveniencing the user, while imposing a minimal performance overhead  相似文献   
54.
High-performance circular probe-fed stacked patch antenna designs are explored through the use of numerical optimization. New trends are sought to aid understanding and to suggest novel solutions. We describe the optimization technique, present a new design trend relating efficiency and bandwidth to the choice of substrate dielectric, and propose and demonstrate a novel, optimized antenna achieving 33% bandwidth whilst maintaining greater than 80% surface wave efficiency.  相似文献   
55.
On the capacities of bipartite Hamiltonians and unitary gates   总被引:2,自引:0,他引:2  
We consider interactions as bidirectional channels. We investigate the capacities for interaction Hamiltonians and nonlocal unitary gates to generate entanglement and transmit classical information. We give analytic expressions for the entanglement generating capacity and entanglement-assisted one-way classical communication capacity of interactions, and show that these quantities are additive, so that the asymptotic capacities equal the corresponding 1-shot capacities. We give general bounds on other capacities, discuss some examples, and conclude with some open questions.  相似文献   
56.
Membrane separation technology represents an alternative way to achieve biomass retention in anaerobic bioreactors for wastewater treatment. Due to high biomass concentrations of anaerobic reactors, cake formation is likely to represent a major cause of flux decline. In the presented research, experiments are performed on the effect of biomass concentration and level of gas sparging on the hydraulic capacity of a submerged anaerobic membrane bioreactor. Both parameters significantly affected the hydraulic capacity, with biomass exerting the most pronounced effect. After 50 days of continuous operation the critical flux remained virtually unchanged, despite an increase in membrane resistance, suggesting that biomass characteristics and hydraulic conditions determine the bio-layer formation rather than the membrane's fouling level. The concept of bio-layer management is introduced to describe the programmed combination of actions performed in order to control the formation of biomass layer over membranes.  相似文献   
57.
Grapevine powdery mildew ( Erysiphe necator) affects grape yield and fruit quality worldwide. Managers of conventional vineyards rely mainly on synthetic fungicides and sulfur to control powdery mildew, while in organic vineyards sulfur is the main control agent, often in rotation with canola-based oils, bicarbonates and biological control agents. The efficacy of those materials has not been evaluated critically under field conditions in Australia. Accordingly, a range of materials showing most promise in previous greenhouse trials (Crisp et al. 2006 Australian Journal of Grape and Wine Research 12 , pp. 192–202) were assessed via field trials in commercial vineyards. Applications of either milk or whey (alone, or mixed with a canola oil-based product), as well as applications of potassium bicarbonate (commercial formulation), all reduced the severity of powdery mildew compared with untreated vines. Eight applications of a 1:10 dilution of milk, 45 g/L whey powder or programs comprising rotations of potassium bicarbonate plus oil and whey, applied at 10–14 day intervals, reduced the severity of powdery mildew to levels not significantly different from that on vines sprayed with sulfur (wettable powder, 3–6 g/L). However, the relative control of powdery mildew by the test materials in field trials was dependent on the susceptibility of the grapevine cultivar and the extent of spray coverage achieved. In vineyards where highly susceptible cultivars were planted, and spray coverage was compromised, the resultant control of powdery mildew was reduced; and sometimes to commercially unacceptable levels.  相似文献   
58.
由PDS的特点入手,结合工程实践的应用情况,阐明了3D软件可以更广泛的应用于配管的设计中,强调了以3D模型为中心开展设计和管理的新模式.  相似文献   
59.
Recent studies revealed that organic acids such as citric and oxalic acids seemed to be more promising as chemical extracting agents for removal of heavy metals from contaminated sludge, since they are biodegradable and can attain a higher metal extraction efficiency at mildly acidic pH compared to other extracting agents. Results of a lab-scale study on the efficiency of citric acid in the extraction of chromium (Cr), copper (Cu), lead (Pb), nickel (Ni) and zinc (Zn) from anaerobically digested sludge, revealed that citric acid seemed to be highly effective in extracting Cr (at 100%), Cu (at 88%), Ni (at 98%) and Zn (at 100%) at pH 2.33, mostly at 5 days leaching time except for Cu and Zn, which are at 1 day and 2 h contact times respectively. Lead removal at the same pH was also high at 95% but at a longer leaching time of 11 days. At pH 3, citric acid seemed to be highly effective in extracting Pb (at 100%) at 1 day leaching time, although higher removals were also attained for Ni (70%) and Zn (80%) at only 2 h leaching time. Chemical speciation studies showed that Cr, Cu and Ni in the sludge sample seem to predominate in residual fractions, while Pb and Zn were found mostly bound to organic and inorganic matter forms, hence the potential of the sludge for land application.  相似文献   
60.
Robust programming aims to prevent abnormal termination or unexpected actions and requires code to handle bad (invalid or absurd) inputs in a way that is consistent with the developer's intent. For example, if an internal error occurs, the program might terminate gracefully rather than simply failing, providing enough information for the programmer to debug the program and avoiding giving the user additional access or information. This article focuses on teaching these principles.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号