全文获取类型
收费全文 | 682031篇 |
免费 | 8951篇 |
国内免费 | 2182篇 |
专业分类
电工技术 | 12382篇 |
综合类 | 558篇 |
化学工业 | 102744篇 |
金属工艺 | 25508篇 |
机械仪表 | 19554篇 |
建筑科学 | 18355篇 |
矿业工程 | 2802篇 |
能源动力 | 17992篇 |
轻工业 | 64402篇 |
水利工程 | 6285篇 |
石油天然气 | 8100篇 |
武器工业 | 22篇 |
无线电 | 82833篇 |
一般工业技术 | 127914篇 |
冶金工业 | 130333篇 |
原子能技术 | 12467篇 |
自动化技术 | 60913篇 |
出版年
2021年 | 4858篇 |
2019年 | 4507篇 |
2018年 | 7308篇 |
2017年 | 7487篇 |
2016年 | 7981篇 |
2015年 | 5909篇 |
2014年 | 9811篇 |
2013年 | 31223篇 |
2012年 | 16771篇 |
2011年 | 23772篇 |
2010年 | 18689篇 |
2009年 | 21374篇 |
2008年 | 22213篇 |
2007年 | 22574篇 |
2006年 | 19798篇 |
2005年 | 18442篇 |
2004年 | 17871篇 |
2003年 | 17419篇 |
2002年 | 16720篇 |
2001年 | 16773篇 |
2000年 | 15812篇 |
1999年 | 16674篇 |
1998年 | 39866篇 |
1997年 | 28737篇 |
1996年 | 22519篇 |
1995年 | 17203篇 |
1994年 | 15332篇 |
1993年 | 14882篇 |
1992年 | 11099篇 |
1991年 | 10652篇 |
1990年 | 10154篇 |
1989年 | 9982篇 |
1988年 | 9534篇 |
1987年 | 8254篇 |
1986年 | 8087篇 |
1985年 | 9671篇 |
1984年 | 8990篇 |
1983年 | 8113篇 |
1982年 | 7467篇 |
1981年 | 7578篇 |
1980年 | 7079篇 |
1979年 | 7021篇 |
1978年 | 6752篇 |
1977年 | 8006篇 |
1976年 | 10813篇 |
1975年 | 5794篇 |
1974年 | 5589篇 |
1973年 | 5535篇 |
1972年 | 4535篇 |
1971年 | 4123篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
981.
This paper describes the elastic response of a block sample of compressible Chicago glacial clay under a variety of stresses and its relationship with the deformation characteristics at relatively large strains. The elastic shear stiffness was obtained from bender element tests during consolidation and shearing in drained triaxial stress probe tests. An empirical correlation was established based on the elastic shear stiffness in a preyield condition. By comparing the empirical correlation with the measured elastic shear stiffness in the stress region during probing, the changes of elastic shear stiffness were investigated. The departure of elastic shear stiffness from values computed by the empirical relation based on K0 loading directly relates to the yielding characteristics of the clay. The large-scale change of soil structure at yielding alters the well-established relationship between the elastic shear stiffness and stresses in the preyield condition. The mechanical yielding response of clays can be detected based on the systematic analysis of the elastic shear wave velocities. 相似文献
982.
William D. Tape John B. Kennedy Murty K. S. Madugula 《Canadian Metallurgical Quarterly》2007,11(1):91-98
The current methods of connecting the flanges of precast double tee members, and their respective short comings in specific situations, are described. A new carbon fiber-reinforced polymer (CFRP) flange-to-flange connection is proposed to eliminate the problems associated with repair requirements for the current connections. Design expressions for the currently used mechanical anchorage and the proposed CFRP connection are presented. A comparative calculation for the two systems is given. 相似文献
983.
B. G. Clarke 《Canadian Metallurgical Quarterly》2007,133(2):107-115
This paper describes a module that was introduced into a civil engineering degree program with the help of professional engineers. The aim was to develop a bridge between the world of learning and professional practice by putting students in the role of consulting engineers working with industry to produce a feasible solution to a real inquiry from a client. The module is placed in context by comparing the goals of accredited civil engineering programs in the United Kingdom and America, by describing how it is linked to the degree program and by explaining the matrix developed to identify the skills the students needed to demonstrate their ability to practice as professional engineers. Details of the module are given with examples of student work and feedback. 相似文献
984.
985.
We show new upper bounds for problems in the W-hierarchy of fixed-parameter complexity. A crucial ingredient of our proofs
is an extension to the W-RAM model, which permits more-powerful operations but remains equivalent to the original. We use
the extended model to give new upper bounds for Subsetsum, Maximum Irredundant Set, and various problems concerning intersection
of finite-state machines. 相似文献
986.
J. L. Díez J. L. Navarro A. Sala 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2007,11(10):973-983
In this work, simple modifications on the cost index of particular local-model fuzzy clustering algorithms are proposed in
order to improve the readability of the resulting models. The final goal is simultaneously providing local linear models (reasonably
close to the plant’s Jacobian) and clustering in the input space so that desirable characteristics (regarding final model
accuracy, and convexity and smoothness of the cluster membership functions) are improved with respect to other proposals in
literature. Some examples illustrate the proposed approach. 相似文献
987.
In this article, we describe a knowledge-based controlled platform using program supervision techniques. This platform eases
the creation and the configuration of video surveillance systems. Several issues need to be addressed to provide a correct
system configuration: (1) to choose, among a library of programs, those which are best satisfying a given user request, (2)
to assign a correct value for each program parameter, (3) to evaluate performances and to guarantee a performance rate which
is satisfactory regarding end-user requirements. This platform is composed of three main components: the library of programs,
the knowledge base and the control component. The knowledge is either given by experts or learnt by the system. The control
is generic in the sense that it is independent of any application. To validate this platform, we have built and evaluated
six video surveillance systems which are featured with three properties: adaptability, reliability and real-time processing. 相似文献
988.
Networkable Windows-based operating system devices present information security challenges to both vendors and users of such devices. This article highlights some of those threats and offers measures to improve the link between a firm's business strategy, its operational activities, and its information security strategy. 相似文献
989.
The entire IT security industry is an accident: an artifact of how the computer industry developed. Computers are hard to use, and you need an IT department staffed with experts to make it work. IT security is critical, but there's no earthly reason why users need to know what an intrusion detection system with stateful protocol analysis is, or why it's helpful in spotting SQL injection attacks. As IT fades into the background and becomes just another utility, users will simply expect it to work. The details of how it works won't matter. 相似文献
990.