全文获取类型
收费全文 | 29324篇 |
免费 | 2930篇 |
国内免费 | 1436篇 |
专业分类
电工技术 | 1912篇 |
综合类 | 2041篇 |
化学工业 | 4475篇 |
金属工艺 | 1606篇 |
机械仪表 | 1929篇 |
建筑科学 | 2336篇 |
矿业工程 | 989篇 |
能源动力 | 920篇 |
轻工业 | 2213篇 |
水利工程 | 602篇 |
石油天然气 | 1603篇 |
武器工业 | 267篇 |
无线电 | 3484篇 |
一般工业技术 | 3571篇 |
冶金工业 | 1253篇 |
原子能技术 | 366篇 |
自动化技术 | 4123篇 |
出版年
2024年 | 168篇 |
2023年 | 653篇 |
2022年 | 1234篇 |
2021年 | 1718篇 |
2020年 | 1314篇 |
2019年 | 1089篇 |
2018年 | 1117篇 |
2017年 | 1187篇 |
2016年 | 1078篇 |
2015年 | 1558篇 |
2014年 | 1783篇 |
2013年 | 2036篇 |
2012年 | 2124篇 |
2011年 | 2062篇 |
2010年 | 1760篇 |
2009年 | 1705篇 |
2008年 | 1641篇 |
2007年 | 1485篇 |
2006年 | 1423篇 |
2005年 | 1184篇 |
2004年 | 831篇 |
2003年 | 607篇 |
2002年 | 583篇 |
2001年 | 453篇 |
2000年 | 447篇 |
1999年 | 483篇 |
1998年 | 374篇 |
1997年 | 313篇 |
1996年 | 286篇 |
1995年 | 235篇 |
1994年 | 204篇 |
1993年 | 115篇 |
1992年 | 96篇 |
1991年 | 80篇 |
1990年 | 58篇 |
1989年 | 51篇 |
1988年 | 34篇 |
1987年 | 31篇 |
1986年 | 28篇 |
1985年 | 7篇 |
1984年 | 9篇 |
1983年 | 6篇 |
1982年 | 8篇 |
1981年 | 10篇 |
1980年 | 7篇 |
1976年 | 2篇 |
1973年 | 1篇 |
1972年 | 1篇 |
1959年 | 3篇 |
1951年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
131.
Applied Intelligence - Accurate traffic flow prediction is crucial for the development of intelligent transportation. It can not only effectively avoid traffic congestion and other traffic... 相似文献
132.
Due to air turbulence, large areas of coal will fall when the special coal-transportation trains pass the tunnel exits and entrances. Aiming at the problems of low efficiency and high cost of manual cleaning for long distance coal cleaning in the tunnel, a new railway tunnel fallen coal dust collection device which was composed of a main conveying coal feeding pipe and multiple branch pipes of coal suction was designed. It was used to clean the small particles and lightweight railway tunnel fallen coal. Firstly, the gas-solid two-phase flow model based on the Euler-Lagrange approach for the design of the main conveying coal feeding pipe was established in the coal conveying pipelines. Secondly, the effect of the coal particles' incident angle and multiple branch pipe spacing on the main coal conveying pipe flow field, which was based on Fluent finite element simulation software, was studied. What was more, the optimal angle of incidence and the optimal value of the number of branch coal suction pipe, which was installed on the main conveying pipe, were analyzed. Finally, the finite element simulation was verified by field test. Simulation and experimental results showed that it was more conducive to the railway tunnel fallen coal transportation when coal particles' incident angle was less than 45° and the branch pipe spacing was in the vicinity of 750 mm. For that when incident angle was less than 45°, the main conveying coal pipe pressure-drop became weaker and particle flow could obtain large horizontal transport velocity. And when the branch pipe spacing was in the vicinity of 750 mm, the horizontal transport velocity had a smaller fluctuation range and the transportation of coal was larger than that of the other groups. The research results are of great significance to improve the structure of the main conveying coal pipe, increase the efficiency of tunnel coal conveying and optimize the railway tunnel coal dust collection device. 相似文献
133.
Meng Fanbin Wang Ying Wang Qiang Xu Xiaoling Jiang Man Zhou Xuesong He Ping Zhou Zuowan 《Nano Research》2018,11(7):3958-3958
Nano Research - The first author, Fanbin Meng, and the second author, Ying Wang, contributed equally to this work was unfortunately forgotten to write on the first pages of the main text and the... 相似文献
134.
135.
在满足机构许用压力角条件下,采用0.618法最优确定盘状摆动凸轮机械的最小基圆半径。 相似文献
136.
依据"高等学校计算机科学与技术专业发展战略研究报告暨专业规范关于计算机专业人才培养模式的指导意见",针对洛阳理工学院自身特点,文章讨论计算机学科课程教学模式改革途径、青年教师培养模式、建立工程实践能力培养基地方案,设计了专业课程与实践项目对接、科技创新项目开发过程资源管理、开发实验室预约为一体的工程实践管理软件平台,为培养计算机专业工程型与应用型人才进行了有益的探索与研究。 相似文献
137.
Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication
channel between tag and reader. In this paper, we analyze two recently proposed RFID authentication protocols. Both protocols
are vulnerable to tag information leakage and untraceability attacks. For the attack on the first protocol, the adversary
only needs to eavesdrop on the messages between reader and tag, and then perform an XOR operation. To attack the second protocol
successfully, the adversary may execute a series of carefully designed challenges to determine the tag’s identification. 相似文献
138.
Let γ(G) denote the domination number of a digraph G and let Cm□Cn denote the Cartesian product of Cm and Cn, the directed cycles of length m,n?2. In this paper, we determine the exact values: γ(C2□Cn)=n; γ(C3□Cn)=n if , otherwise, γ(C3□Cn)=n+1; if , otherwise, . 相似文献
139.
就目前实验室建设上、管理上的存在的难题进行了分析,介绍了目前主要的虚拟化技术,提出了基于虚拟化技术的实验室建设构想,为学校的实验室建设提供了新的思路. 相似文献
140.
Meng T Entezari A Smith B Möller T Weiskopf D Kirkpatrick AE 《IEEE transactions on visualization and computer graphics》2011,17(10):1420-1432
The Body-Centered Cubic (BCC) and Face-Centered Cubic (FCC) lattices have been analytically shown to be more efficient sampling lattices than the traditional Cartesian Cubic (CC) lattice, but there has been no estimate of their visual comparability. Two perceptual studies (each with N = 12 participants) compared the visual quality of images rendered from BCC and FCC lattices to images rendered from the CC lattice. Images were generated from two signals: the commonly used Marschner-Lobb synthetic function and a computed tomography scan of a fish tail. Observers found that BCC and FCC could produce images of comparable visual quality to CC, using 30-35 percent fewer samples. For the images used in our studies, the L(2) error metric shows high correlation with the judgement of human observers. Using the L(2) metric as a proxy, the results of the experiments appear to extend across a wide range of images and parameter choices. 相似文献