首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   450328篇
  免费   5857篇
  国内免费   2259篇
电工技术   9233篇
技术理论   4篇
综合类   1934篇
化学工业   68200篇
金属工艺   15734篇
机械仪表   13558篇
建筑科学   13373篇
矿业工程   1638篇
能源动力   12414篇
轻工业   46116篇
水利工程   3880篇
石油天然气   2859篇
武器工业   160篇
无线电   60594篇
一般工业技术   81789篇
冶金工业   77446篇
原子能技术   5946篇
自动化技术   43566篇
  2022年   2354篇
  2021年   4042篇
  2020年   3193篇
  2019年   3711篇
  2018年   4744篇
  2017年   4865篇
  2016年   5136篇
  2015年   4492篇
  2014年   7113篇
  2013年   21321篇
  2012年   12125篇
  2011年   16893篇
  2010年   13030篇
  2009年   14664篇
  2008年   15751篇
  2007年   15859篇
  2006年   14241篇
  2005年   13104篇
  2004年   12573篇
  2003年   12379篇
  2002年   12216篇
  2001年   12219篇
  2000年   11030篇
  1999年   11413篇
  1998年   24883篇
  1997年   18198篇
  1996年   14418篇
  1995年   11392篇
  1994年   10117篇
  1993年   9639篇
  1992年   7323篇
  1991年   6972篇
  1990年   6576篇
  1989年   6257篇
  1988年   5995篇
  1987年   5013篇
  1986年   4948篇
  1985年   6081篇
  1984年   5693篇
  1983年   4890篇
  1982年   4550篇
  1981年   4492篇
  1980年   4278篇
  1979年   4118篇
  1978年   3819篇
  1977年   4596篇
  1976年   6160篇
  1975年   3154篇
  1974年   3033篇
  1973年   2922篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
131.
132.
Pesticides     
J Sherma 《Analytical chemistry》1989,61(12):153R-165R
  相似文献   
133.
During large scale wildfires, suppression activities are carried out under the direction of an Incident Management Team (IMT). The aim of the research was to increase understanding of decision processes potentially related to IMT effectiveness. An IMT comprises four major functions: Command, Operations, Planning, and Logistics. Four methodologies were used to study IMT processes: computer simulation experiments; analyses of wildfire reports; interviews with IMT members; and cognitive ethnographic studies of IMTs. Three processes were important determinants of IMT effectiveness: information management and cognitive overload; matching component function goals to overall goals; and team metacognition to detect and counter task‐disruptive developments. These processes appear to be complex multi‐person analogues of individual Incident Command processes identified previously. The findings have implications for issues such as: creating IMTs; training IMTs; managing IMTs; and providing decision support to IMTs.  相似文献   
134.
135.
136.
137.
138.
The dynamics of a thin liquid film falling down a uniformly heated wall is studied. The model introduced by Kalliadasis et al. [J. Fluid Mech. 475 (2003) 377] for the same problem is revisited and its deficiencies, namely the prediction of a critical Reynolds number with 20% error, cured. For the energy equation a high-order Galerkin projection in terms of polynomial test functions is developed. It is shown that not only does this more refined formulation correct the critical Reynolds number, but it also gives, with an appropriate expansion close to criticality, the long-wave theory. Bifurcation diagrams for permanent solitary waves are constructed and compared with the solution branches obtained from different models. It is shown that, in all cases, the long-wave theory exhibits limit points and branch multiplicity, while the other models predict the continuing existence of solitary waves. Time-dependent computations show that the free surface and interfacial temperature approach a train of coherent structures that resemble the infinite-domain stationary solitary pulses.  相似文献   
139.
The operation of a torsional oscillator for detection, of flow-driven textural transitions in, 3He-A is described. The detection technique, tracking the shift of the resonant frequency of the torsional oscillator, allows us to observe textural changes and the presence of vortices in zero magnetic field. It relies on. the anisotropic superfluid density of 3He-A and its change due to reorientation of the Î-texture caused by counterflow.  相似文献   
140.
In this paper the problem of determining a manipulator design so that its workspace corresponds to a prescribed workspace is considered. Two different strategies, resulting in two different types of optimization problem are considered. The first strategy attempts to obtain a good overall approximation to the prescribed workspace and results in an unconstrained optimization problem. The second strategy entails designing a manipulator so that its workspace fully encloses the prescribed workspace and results in a constrained optimization problem. Two specific formulations of the constrained problem are proposed. The first constrained problem simply aims to fit the manipulator workspace as exactly as possible to the prescribed workspace, while still ensuring that the prescribed workspace is fully enclosed. The second constrained optimization formulation is used to design a manipulator, the workspace of which fully encloses the prescribed workspace, but which is also well‐conditioned throughout the workspace with respect to some performance measure. The particular manipulator used to illustrate and evaluate these formulations is a simple 2‐dof planar parallel manipulator, and the final formulation is also applied to a 3‐dof planar parallel manipulator. Although the manipulators studied here are simple, the objective of this study is to obtain a robust numerical methodology which can be extended to more practical and complex manipulators. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号