首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   268015篇
  免费   5029篇
  国内免费   1819篇
电工技术   5534篇
技术理论   5篇
综合类   1188篇
化学工业   43616篇
金属工艺   11184篇
机械仪表   7904篇
建筑科学   6967篇
矿业工程   1696篇
能源动力   5685篇
轻工业   26907篇
水利工程   2928篇
石油天然气   6009篇
武器工业   243篇
无线电   28359篇
一般工业技术   51381篇
冶金工业   47498篇
原子能技术   5673篇
自动化技术   22086篇
  2021年   2639篇
  2019年   2231篇
  2018年   3666篇
  2017年   3632篇
  2016年   3992篇
  2015年   3029篇
  2014年   4876篇
  2013年   11893篇
  2012年   8045篇
  2011年   10620篇
  2010年   8465篇
  2009年   9047篇
  2008年   9897篇
  2007年   9967篇
  2006年   8714篇
  2005年   7625篇
  2004年   6845篇
  2003年   6401篇
  2002年   6392篇
  2001年   6477篇
  2000年   6034篇
  1999年   5978篇
  1998年   13001篇
  1997年   9658篇
  1996年   7373篇
  1995年   5590篇
  1994年   5152篇
  1993年   5002篇
  1992年   3980篇
  1991年   3795篇
  1990年   3852篇
  1989年   3806篇
  1988年   3554篇
  1987年   3052篇
  1986年   3091篇
  1985年   3503篇
  1984年   3383篇
  1983年   3121篇
  1982年   2743篇
  1981年   2938篇
  1980年   2685篇
  1979年   2870篇
  1978年   2773篇
  1977年   2860篇
  1976年   3718篇
  1975年   2473篇
  1974年   2311篇
  1973年   2348篇
  1972年   1991篇
  1971年   1791篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
An extremal self-dual doubly-even binary (n,k,d) code has a minimum weight d=4/spl lfloor/n/24/spl rfloor/+4. Of such codes with length divisible by 24, the Golay code is the only (24,12,8) code, the extended quadratic residue code is the only known (48,24,12) code, and there is no known (72,36,16) code. One may partition the search for a (48,24,12) self-dual doubly-even code into three cases. A previous search assuming one of the cases found only the extended quadratic residue code. We examine the remaining two cases. Separate searches assuming each of the remaining cases found no codes and thus the extended quadratic residue code is the only doubly-even self-dual (48,24,12) code.  相似文献   
72.
The problem of designing fibre-optic networks for local-access telecommunications generates (at least) three non-trivial subproblems. In the first of these subproblems one must determine how many fibre-optic cables (fibres) are required at either end of a street. In the next subproblem a minimum-cost network must be designed to support the fibres. The network must also provide distinct paths from either end of the street to the central exchange(s). Finally, the fibre-optic cables must be placed in protective covers. These covers are available in a number of different sizes, allowing some flexibility when covering each section of the network. In this paper we describe a dynamic programming (DP) formulation for finding a minimum-cost (protective) covering for the network (the third of the subproblems). This problem is a generalised set covering problem with side constraints and is further complicated by the introduction of fixed and variable welding costs. The DP formulation selects covers along each arc (in the network), but cannot exactly model the fixed costs and so does not guarantee optimality. We also describe an integer programming (IP) formulation for assessing the quality of the DP solutions. The cost of the networks constructed by the IP model is less than those designed using the DP model, but the saving is not significant for the problems examined (less than 0.1%). This indicates that the DP model will generally give very good solutions. Furthermore, as the problem dimensions grow, DP gives significantly better solution times than IP.  相似文献   
73.
The Boundary Element Method (BEM) incorporating the Embedded Cell Approach (ECA) has been used to analyse the effects of constituent material properties, fibre spatial distribution and microcrack damage on the localised behaviour of transversely fractured, unidirectional fibre-reinforced composites. Three specific composites, i.e., glass fibre reinforced polyester, carbon fibre reinforced epoxy and a glass-carbon hybrid, are considered. The geometrical structures examined were perfectly periodic, uniformly spaced fibre arrangements in square and hexagonal embedded cells. In addition, numerical simulations were also conducted using embedded cells containing randomly distributed fibres. The models involve both elastic fibres and matrix, with the interfaces between the different phases being fully bonded. The results indicate that the constituent material properties (two phase composite) and spatial distribution have a significant effect on the localised stress distributions around the primary crack tip. However, the strain energy release rate associated with crack propagation is predominantly influenced by the material composition. The three-phase hybrid composite exhibited an apparent intermediate fracture toughness value, compared to the all-glass and all-carbon models. Furthermore, the strain energy release rate for the macrocrack lowers as it enters a zone of localised damage (microcracking). The presence of microcracks relaxes the stress field, which can result in a significant reduction in the energetics of the primary crack.  相似文献   
74.
The oxidation/sulphidation behaviour of a Ti‐46.7Al‐1.9W‐0.5Si alloy with a TiAl3 diffusion coating was studied in an environment of H2/H2S/H2O at 850oC. The kinetic results demonstrate that the TiAl3 coating significantly increased the high temperature corrosion resistance of Ti‐46.7Al‐1.9W‐0.5Si. The SEM, EDX, XRD and TEM analysis reveals that the formation of an Al2O3 scale on the surface of the TiAl3‐coated sample was responsible for the enhancement of the corroison resistance. The Ti‐46.7Al‐1.9W‐0.5Si alloy was also modified by Nb ion implantation. The Nb ion implanted and as received sampels were subjected to cyclic oxidation in an open air at 800oC. The Nb ion implantation not only increased the oxidation resistance but also substantially improved the adhesion of scale to the substrate.  相似文献   
75.
76.
Self-organized public-key management for mobile ad hoc networks   总被引:6,自引:0,他引:6  
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase.  相似文献   
77.
This study examined reciprocal relationships between collective efficacy and team performance over a season of competition in women's intercollegiate ice hockey within weekends where the opponent was constant for 2 games. Collective efficacy beliefs within 12 teams were assessed prior to both games for at least 7 weekends. Team performance indexes produced an overall measure of performance for each game. The average influence of Saturday collective efficacy on Saturday performance was moderate and positive after controlling for Friday performance. The average influence of Friday performance on Saturday collective efficacy was small and positive after removing the influence of Friday collective efficacy from Friday performance. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
78.
The growth of the Internet and of various intranets has spawned a wealth of online services, most of which are implemented on local-area clusters using remote invocation (for example, remote procedure call/remote method invocation) among manually placed application components. Component placement can be a significant challenge for large-scale services, particularly when application resource needs are workload dependent. Automatic component placement has the potential to maximize overall system throughput. The key idea is to construct (offline) a mapping between input workload and individual-component resource consumption. Such mappings, called component profiles, then support high-performance placement. Preliminary results on an online auction benchmark based on J2EE (Java 2 Platform, Enterprise Edition) suggest that profile-driven tools can identify placements that achieve near-optimal overall throughput.  相似文献   
79.
80.
This article, the first of three articles on the synthesis of rice processing plants, focuses on the development of simplified mathematical models necessary for use in optimizing rice processing plants. The second concentrates on the optimal synthesis of a rice plant and the third on the sensitivity of the optimization to uncertainty in model parameters. Existing models for rice processing unit operations are not suitable for flowsheet optimization and new models need to be developed to overcome numerical difficulties that occur in optimization applications, specifically in mixed integer nonlinear programming (MINLP) applications. Simplified models of the drying, cooling, and tempering units are developed. In addition head rice yield models, used as a quality indicator, energy consumption, and economic models were also developed. Naturally, the new models exhibit some mismatch with respect to the existing models from which they were developed. However, a sensitivity analysis, presented in Part III, has shown that the optimal flowsheet structure was not sensitive to a lack of fit between the simplified and complex models. The simplified models were found adequate to be appropriate for use at the synthesis stage.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号