首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   244428篇
  免费   2717篇
  国内免费   430篇
电工技术   4347篇
综合类   258篇
化学工业   39825篇
金属工艺   9417篇
机械仪表   7453篇
建筑科学   5642篇
矿业工程   1398篇
能源动力   5231篇
轻工业   25051篇
水利工程   2497篇
石油天然气   5105篇
武器工业   32篇
无线电   25321篇
一般工业技术   45201篇
冶金工业   46298篇
原子能技术   5968篇
自动化技术   18531篇
  2021年   2134篇
  2019年   2059篇
  2018年   3544篇
  2017年   3468篇
  2016年   3738篇
  2015年   2280篇
  2014年   3950篇
  2013年   10336篇
  2012年   6256篇
  2011年   8464篇
  2010年   6659篇
  2009年   7348篇
  2008年   7726篇
  2007年   7852篇
  2006年   7002篇
  2005年   6166篇
  2004年   5905篇
  2003年   5675篇
  2002年   5758篇
  2001年   5631篇
  2000年   5438篇
  1999年   5374篇
  1998年   12764篇
  1997年   9017篇
  1996年   6951篇
  1995年   5391篇
  1994年   4795篇
  1993年   4674篇
  1992年   3709篇
  1991年   3420篇
  1990年   3629篇
  1989年   3519篇
  1988年   3339篇
  1987年   2935篇
  1986年   2967篇
  1985年   3406篇
  1984年   3251篇
  1983年   2931篇
  1982年   2757篇
  1981年   2843篇
  1980年   2747篇
  1979年   2652篇
  1978年   2709篇
  1977年   2971篇
  1976年   3861篇
  1975年   2390篇
  1974年   2255篇
  1973年   2392篇
  1972年   1982篇
  1971年   1865篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
981.
A method for high-performance, software testing, called mutant unification, is described. The method is designed to support program mutation on parallel machines based on the single instruction multiple data stream (SIMD) paradigm. Several parameters that affect the performance of unification have been identified and their effect on the time to completion of a mutation test cycle and speedup has been studied. Program mutation analysis provides an effective means for determining the reliability of large software systems and a systematic method for measuring the adequacy of test data. However, it is likely that testing large software systems using mutation is computation bound and prohibitive on traditional sequential machines. Current, implementations of mutation tools are unacceptably slow and are only suitable for testing relatively small programs. The proposed unification method provides a practical alternative to the current approaches. The method also opens up a new application domain for SIMD machines  相似文献   
982.
A new method is proposed and an algorithm is developed for two-wire channel routing in a two-layer board, with horizontal interconnections made in one layer and vertical interconnections in the other layer.Translated from Kibernetika, No. 3, pp. 32–35, May–June, 1991.  相似文献   
983.
984.
A novel technique for both online and offline computation is presented. With this technique, a reconstruction analysis in elementary particle physics, otherwise prohibitively long, has been accomplished. It will be used online in an upcoming Fermilab experiment to reconstruct more than 100000 events per second and to trigger on the basis of that information. The technique delivers 40 gigaoperations per second, has a bandwidth on the order of gigabytes per second, and has a modest cost. An overview of the program, details of the system, and performance measurements are presented  相似文献   
985.
This paper presents some improvements to the load flow solution in rectangular coordinates. First, in an attempt to use as linear a model as possible, both the nodal equations and the bus constraints are retained. The Newton-Raphson (NR) method is then applied to the enlarged set of equations, and written in terms of bus voltages and currents. This scheme, combined with a simple procedure to handle PV buses, leads to a computationally efficient algorithm, particularly advantageous in the presence of zero-injection buses. Experimental results are provided comparing the performance of the proposed approach with that of the conventional formulation  相似文献   
986.
Thermogravimetry and pyrolysis in combination with gas chromatography and infrared spectroscopy were the experimental techniques applied to the thermal degradation of cinnamoylated poly(vinyl alcohol) samples, constituted from vinyl alcohol-vinyl cinnamate photocrosslinkable copolymers. The thermal decomposition products include gases, liquids and solids. The gases are formed from saturated and unsaturated volatile hydrocarbons C1? C4, carbon monoxide and carbon dioxide. The liquid fraction includes aromatic hydrocarbons and some oxygenated organic compounds. The solid product identified in the greatest amount was cinnamic acid. The content in the thermal decomposition products varies considerably both with copolymer composition and temperature.  相似文献   
987.
Cold cracking of structural steel weldments is a well-characterized, well-documented, and well-understood failure mechanism. Extensive effort has been put forth to recognize the welding and materials selection parameters that are conducive to cold cracking; however, these engineering efforts have not fully eliminated the occurrence of such failures. This article describes cold cracking failure specifically related to the construction industry. This particular failure was successfully identified prior to final erection of the structural member, and the weld was successfully reworked. These actions potentially prevented a serious catastrophic event that could have occurred have occurred either later in the construction process or possibly during the use of the building. Individual welding parameters, such as electrode/wire selection, joint design, and pre/postheating, played a role in the failure, and a number of human factors relating to the actual fabrication practices also contributed to the failure process.  相似文献   
988.
Ice observations, results, and conclusions are summarized for the March 1987 Labrador Ice Margin Experiment (LIMEX'87), an international oceanographic study conducted in the pack ice of the Grand Banks area off the coast of Newfoundland. Included are the ice extent, flow size and thickness, ice kinematics and rheology, ice microwave properties, oceanic properties under the ice, and penetration of swell into the ice  相似文献   
989.
In our one-semester course at the US Military Academy in New York, we educate roughly 800 undergraduates from nontechnical fields each year on intermediate-level IT skills. We place our students in an isolated virtual-computing environment, give them hands-on experience with a variety of attack vectors that hackers use to exploit vulnerabilities, and provide them with a multidimensional framework for understanding and mitigating risks. As a result of this educational experience, our students are better able to internalize the concepts we teach and end up with an increased realization of the actions required to protect crucial resources.  相似文献   
990.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号