全文获取类型
收费全文 | 720804篇 |
免费 | 11679篇 |
国内免费 | 2259篇 |
专业分类
电工技术 | 12679篇 |
综合类 | 704篇 |
化学工业 | 109071篇 |
金属工艺 | 25912篇 |
机械仪表 | 20556篇 |
建筑科学 | 18083篇 |
矿业工程 | 2760篇 |
能源动力 | 20054篇 |
轻工业 | 68531篇 |
水利工程 | 6775篇 |
石油天然气 | 10964篇 |
武器工业 | 46篇 |
无线电 | 83527篇 |
一般工业技术 | 136203篇 |
冶金工业 | 141898篇 |
原子能技术 | 12820篇 |
自动化技术 | 64159篇 |
出版年
2022年 | 4112篇 |
2021年 | 6585篇 |
2020年 | 4923篇 |
2019年 | 6151篇 |
2018年 | 10332篇 |
2017年 | 10116篇 |
2016年 | 10788篇 |
2015年 | 7658篇 |
2014年 | 12389篇 |
2013年 | 34360篇 |
2012年 | 20064篇 |
2011年 | 27497篇 |
2010年 | 21616篇 |
2009年 | 24016篇 |
2008年 | 24757篇 |
2007年 | 24336篇 |
2006年 | 21486篇 |
2005年 | 19587篇 |
2004年 | 18786篇 |
2003年 | 18517篇 |
2002年 | 17504篇 |
2001年 | 17620篇 |
2000年 | 16309篇 |
1999年 | 17443篇 |
1998年 | 45174篇 |
1997年 | 31527篇 |
1996年 | 23931篇 |
1995年 | 17940篇 |
1994年 | 15584篇 |
1993年 | 15308篇 |
1992年 | 10884篇 |
1991年 | 10232篇 |
1990年 | 9897篇 |
1989年 | 9556篇 |
1988年 | 9001篇 |
1987年 | 7745篇 |
1986年 | 7576篇 |
1985年 | 8737篇 |
1984年 | 8090篇 |
1983年 | 7212篇 |
1982年 | 6796篇 |
1981年 | 6945篇 |
1980年 | 6521篇 |
1979年 | 6256篇 |
1978年 | 5921篇 |
1977年 | 7246篇 |
1976年 | 9554篇 |
1975年 | 5097篇 |
1974年 | 4782篇 |
1973年 | 4988篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
971.
A mass spectrometric technique combined with a double Knudsen cell was used to determine the antimony and copper activities
in the Cu-Sb binary system at 1373 K and in the two-melt composition range of the Cu−S−Sb ternary system at 1423 K. The antimony
and copper activities were calculated based on the intensity ration of the gaseous Sb and Cu species, over the unknown and
known activity samples, respectively. γ
Sb
o
were found to be 1.1×10−2 in molten copper at 1373 K, and 1.8×10−2 and 0.44 in a copper-rich phase and in a matter phase, of the Cu−S−Sb ternary system at 1423 K, respectively. These values
indicate, that antimony can be removed during the matte smelting and slagging stage of the copper smelting process. Interaction
parameters of antimony in molten copper slagging stage of the copper smelting process. Interaction parameters of antimony
in molten copper at 1423 K were calculated and found to be 10.7, −5.4, and 6.3 for ε
Sb
Sb
· ρSb
Sb, and ε
Sb
S
, respectively.
M. HINO, formerly Visiting Scientist at the University of Toronto 相似文献
972.
Hadjicostis C.N. Verghese G.C. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2005,51(1):210-228
This paper discusses fault tolerance in discrete-time dynamic systems, such as finite-state controllers or computer simulations, with focus on the use of coding techniques to efficiently provide fault tolerance to linear finite-state machines (LFSMs). Unlike traditional fault tolerance schemes, which rely heavily-particularly for dynamic systems operating over extended time horizons-on the assumption that the error-correcting mechanism is fault free, we are interested in the case when all components of the implementation are fault prone. The paper starts with a paradigmatic fault tolerance scheme that systematically adds redundancy into a discrete-time dynamic system in a way that achieves tolerance to transient faults in both the state transition and the error-correcting mechanisms. By combining this methodology with low-complexity error-correcting coding, we then obtain an efficient way of providing fault tolerance to k identical unreliable LFSMs that operate in parallel on distinct input sequences. The overall construction requires only a constant amount of redundant hardware per machine (but sufficiently large k) to achieve an arbitrarily small probability of overall failure for any prespecified (finite) time interval, leading in this way to a lower bound on the computational capacity of unreliable LFSMs. 相似文献
973.
Self-Adapting Linear Algebra Algorithms and Software 总被引:2,自引:0,他引:2
Demmel J. Dongarra J. Eijkhout V. Fuentes E. Petitet A. Vuduc R. Whaley R.C. Yelick K. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》2005,93(2):293-312
One of the main obstacles to the efficient solution of scientific problems is the problem of tuning software, both to the available architecture and to the user problem at hand. We describe approaches for obtaining tuned high-performance kernels and for automatically choosing suitable algorithms. Specifically, we describe the generation of dense and sparse Basic Linear Algebra Subprograms (BLAS) kernels, and the selection of linear solver algorithms. However, the ideas presented here extend beyond these areas, which can be considered proof of concept. 相似文献
974.
975.
R. M. Chapman 《Bulletin of Engineering Geology and the Environment》1985,31(1):39-50
Hartebeestfontein Gold Mining Company Limited, which produces 100 kg of gold per working day, has a mining lease area situated mainly over dolomite. A major river nearby governs the regional drainage. The formation of sinkholes and dolines, caused by fluctuations in the water table and the flow of water underground, often accelerated as the result of unavoidable or inadvertent surface activities, is common in such terranes. To maintain production, meticlous ground investigations under new installations plus periodic re-examination and stabilisation under existing ones, particularly key installations, is necessary. The local ground water behaviour pattern is controlled by three impervious major dykes and two major fissure zones, the latter draining surface water into the mine workings. Monthly water table measurements over 25 years show a steady rise to a limit over the area of one fissure zone and a drastic lowering over the other. The value of gravity techniques and thermal infra-red line scanning for cavity detection in the Hartebeestfontein context, is discussed. The procedures followed, for stabilising ground and foundations, are illustrated by means of case histories. The extension of the techniques, learnt from the stabilisation experience, to limiting water seepage into shafts sunk through dolomite, is also discussed. 相似文献
976.
P.O. Fanger B.M. Ipsen G. Langkilde B.W. Olessen N.K. Christensen S. Tanabe 《Energy and Buildings》1985,8(3):225-236
Groups of 32 and 16 subjects of both sexes were exposed in an environmental chamber to radiant asymmetry caused by a cool wall, a warm wall, and a cool ceiling. Each subject was tested individually while seated and clothed at 0.6 clo. During each 3.5-hour experiment the subject was exposed to six radiant temperature asymmetries. He was asked whether and where he experienced any local cool or warm sensation, and whether it was felt to be uncomfortable. During the entire experiment he was kept thermally neutral by changing the air temperature according to his wishes.For cool walls, warm walls, and cool ceilings curves have been established showing the percentage of dissatisfied subjects as a function of the radiant asymmetry. Radiant asymmetry at a warm wall caused less discomfort than a cool wall. A cool ceiling caused less discomfort than a warm ceiling. Accepting that 5% of the subjects may feel uncomfortable. a radiant temperature asymmetry of 10°C is allowable at a cool wall, 23°C at a warm wall, and 14°C under a cool ceiling. A previous study showed that 4°C is allowable under a warm ceiling. Radiant asymmetry had no significant impact on the operative temperatures preferred by the subjects. No significant differences were observed between the responses of men and women exposed to radiant asymmetry. 相似文献
977.
M. Lipow 《Quality and Reliability Engineering International》1985,1(1):27-35
This paper presents a demonstration of a methodology for fault removal during software development. The methodology encompasses the entire development history, from system and software requirements generation to system test. Thus it considers not only the faults during software testing after formal configuration controls have been invoked, but also the faults discovered prior to that phase: during system and software requirements generation, preliminary design, detailed design and code and unit testing. The agents for fault discovery used in verification and validation are called activities, techniques and tools (AT & Ts) in this paper, each having a certain maximum potential or capability for fault discovery. The AT & Ts considered include the usual specification review activities, and also certain tools not normally applied in ‘standard’ software development, such as automated requirements aids. Application of the methodology yields numbers of residual faults as of each phase of development, including those remaining to be discovered during operations and maintenance. Some previous experience and data on residual faults correspond to these results, indicating that the methodology and choice of parameters are reasonable. The methodology also allows one to calculate a relative loss due to delay in fault discovery, which, as is well known, rises rapidly when faults are not discovered during the phase in which they are generated. 相似文献
978.
A method for the rapid and quantitative determination of aflatoxin B1 from small quantities of liver, around 1-2 g, is described. The extraction procedure involves acidification to pH 2 of the aqueous liver homogenates, extraction with chloroform: acetone and HPLC-fluorimetric detection after derivatization with trifluoroacetic acid. Quantitative recovery of aflatoxin B1 from chick liver was achieved and detection at levels of 0.2-1 ppb was proved feasible. The aflatoxin B1 concentration in chick liver after oral administration is also shown. 相似文献
979.
This paper sets out to share BT's leadership and experience by determining the identity management opportunities and issues,
then document the lessons learnt in previous deployments and recommend strategies for all types and sizes of organisation.
Today's ICT environment has created a mixed approach to access management across sectors. Browser-based any time, anywhere,
anyone access, coupled with the business need to access more systems and services across a changing infrastructure of distributed
platforms and networked services, has changed the administrative landscape. Enterprises are being forced to add administrative
support staff or invest in technology-driven process change. At the same time, users are undergoing significant change, creating
new expectations in service quality. Moreover, regulatory bodies are demanding confirmation that processes granting access
are controlled and documented. In this world of increasing demands, complexity and expectation, the service management tools,
techniques and options available to improve user access management are as varied and numerous as the issues faced by management
in their deployment.
Identity management is widely heralded as an opportunity to improve the end user experience, reduce costs, improve security
and deliver regulatory compliance — but is often misunderstood. Projects regularly fail to achieve the expected benefits.
These failures are the result of expectations being inappropriately set, deployment of solutions turning out to be more complex
or taking longer than expected, and/or products selected before required functionality has been determined.
For the larger more mature organisations, or those organisations that are the amalgamation of mergers and acquisitions, the
dilemma is where to start and what approach to take. 相似文献
980.
J Alemany J Comas C Turon M D Balaguer M Poch M A Puig J Bou 《Water science and technology》2005,51(10):179-186
The identification of adequate wastewater treatment for small communities is a complex problem since it demands a combination of data from different sources, such as aspects of the community and landscape, the receiving environment and the available wastewater treatment technologies. The Catalan Water Agency (Agència Catalana de l'Aigua) considered using an EDSS (Environmental Decision Support System) as a tool to help water managers select the most adequate treatment for the urban wastewater of nearly 3,500 small communities in Catalonia (Spain). From that moment, EDSS was applied to all the river basins in Catalonia. In this paper the authors present the results obtained for the 76 small communities located in one of these river basins: the Fluvia River Basin. The characteristics of the community used in the reasoning process of the EDSS, the list of selected wastewater treatment alternatives, the technical environmental justification for the selected treatments and the reasons for discarding, favouring or disadvantaging them are presented. Finally, some results for the Fluvia River Basin are compared with those obtained in other Catalan river basins with different characteristics in order to evaluate which are the significant features in identifying adequate wastewater treatments. 相似文献