全文获取类型
收费全文 | 335723篇 |
免费 | 4885篇 |
国内免费 | 1931篇 |
专业分类
电工技术 | 5931篇 |
综合类 | 324篇 |
化学工业 | 45402篇 |
金属工艺 | 12251篇 |
机械仪表 | 9664篇 |
建筑科学 | 8337篇 |
矿业工程 | 686篇 |
能源动力 | 9578篇 |
轻工业 | 33284篇 |
水利工程 | 2671篇 |
石油天然气 | 2421篇 |
武器工业 | 20篇 |
无线电 | 45954篇 |
一般工业技术 | 62901篇 |
冶金工业 | 69538篇 |
原子能技术 | 4441篇 |
自动化技术 | 29136篇 |
出版年
2022年 | 1413篇 |
2021年 | 2395篇 |
2020年 | 1776篇 |
2019年 | 2217篇 |
2018年 | 3445篇 |
2017年 | 3465篇 |
2016年 | 3788篇 |
2015年 | 2888篇 |
2014年 | 4816篇 |
2013年 | 15615篇 |
2012年 | 8634篇 |
2011年 | 12464篇 |
2010年 | 9767篇 |
2009年 | 11154篇 |
2008年 | 11818篇 |
2007年 | 11917篇 |
2006年 | 11054篇 |
2005年 | 10040篇 |
2004年 | 9644篇 |
2003年 | 9400篇 |
2002年 | 8655篇 |
2001年 | 9324篇 |
2000年 | 8458篇 |
1999年 | 9341篇 |
1998年 | 24780篇 |
1997年 | 16813篇 |
1996年 | 12764篇 |
1995年 | 9278篇 |
1994年 | 8100篇 |
1993年 | 7954篇 |
1992年 | 5340篇 |
1991年 | 5118篇 |
1990年 | 4805篇 |
1989年 | 4506篇 |
1988年 | 4272篇 |
1987年 | 3340篇 |
1986年 | 3254篇 |
1985年 | 3937篇 |
1984年 | 3487篇 |
1983年 | 3171篇 |
1982年 | 2934篇 |
1981年 | 2961篇 |
1980年 | 2688篇 |
1979年 | 2465篇 |
1978年 | 2232篇 |
1977年 | 2651篇 |
1976年 | 3609篇 |
1975年 | 1844篇 |
1974年 | 1731篇 |
1973年 | 1779篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
It is not known whether impaired hematopoiesis noted during human immunodeficiency virus (HIV) infection results from infection of stem/progenitor cells or of cells of the bone marrow microenvironment. Normal adherent primary stromal layers were exposed to HIV to determine which of this mixture of endothelial cells, fibroblasts, and macrophages are susceptible to the virus. Viral p24 in supernatants was noted with monocytotropic HIV-1Ada, HIV-1Ba-L, and HIV-1JR-FL but not with lymphotropic HIV-1LAI nor HIV-1MN strain, and only stromal macrophages expressed the viral antigens. Coculture of the layers with PHA-activated normal lymphocytes failed to rescue lymphotropic virus. No p24 was produced when macrophage-depleted stromal cells were exposed to either HIV-1Ba-L or HIV-1LAI; proviral DNA was then amplified by PCR in cells exposed to either virus, though coculture with lymphocytes rescued only HIV-1Ba-L. Altogether, these data indicate that macrophages are the major targets of HIV in cultured stromal layers. As virus replication in macrophages did not affect the profile of major cytokines involved in regulating hematopoiesis, HIV infection could alter hematopoiesis by other as yet unspecified mechanisms. 相似文献
62.
Many current implementations of protocols such as the Transmission Control Protocol/Internet Protocol (TCP/IP) are inefficient because data are often accessed more frequently than necessary. Three techniques that reduce the need for memory bandwidth are proposed. The techniques are copy-on-write, page remapping, and single-copy. Afterburner, a network-independent card that provides the services that are necessary for a single-copy protocol stack, is described. The card has 1 MByte of local buffers and provides a simple interface to a variety of network link adapters, including HIPPI and asynchronous transfer mode (ATM). Afterburner can support transfers to and from the link adapter card at rates up to 1 Gbit/s. An implementation of TCP/IP that uses the features provided by Afterburner to reduce the movement of data to a single copy is discussed. Measurements of the end-to-end performance of Afterburner and the single-copy implementation of TCP/IP are presented 相似文献
63.
This paper analyzes probability of bit-error (Pe) performance of asynchronous bandlimited direct-sequence code-division multiple-access systems with binary phase-shift keying spreading. The two present methods of Pe analysis under bandwidth-efficient pulse shaping: the often-cited standard Gaussian approximation and the characteristic function (CF) method suffer from either a low accuracy in regions of low Pe (< 10-3) or a prohibitively large computational complexity. The paper presents an alternate method of Pe analysis with moderate computational complexity and high accuracy based on a key observation. A sequence of chip decision statistics (whose sum yields a bit statistic) forms a stationary, m-dependent sequence when conditioned on the chip delay and phase offset of each interfering signal. This observation permits the generalization of the improved Gaussian approximation previously derived for the rectangular pulse and the derivation of a numerically efficient approximation based on the CF method. Numerical examples of systems using the square-root raised-cosine and IS-95 pulses illustrate THE P e performance, user capacity and the accuracy of the proposed method 相似文献
64.
65.
N.C. Knowles 《Nuclear Engineering and Design》1989,116(1)
Geomechanical aspects of the storage of radioactive waste in salt formations have been studied extensively using finite element methods over the last 20 years. In consequence a range of computer programs and associated modelling techniques have been assembled. The paper is based on a benchmark exercise to compare the predictive abilities of a number of these programs and highlights the difficulties of making reliable a-priori estimates of long term behaviour. 相似文献
66.
Experiments showing the frequency and amplitude of the flow induced motion of the gate for a 2- and a 4-in. swing check valve have been performed. The gate motion is due to turbulence in approach flow. We have found the dominant turbulent frequency of the approach flow is about half the natural frequency of the valves. The valves appear to be almost critically damped. Because of this, the valves respond almost as they would to a static force of the magnitude characteristic of the turbulent fluctuation in the flow. Both the dimensionless exciting force and the damping ratio have been found to be independent of valve size so the above statements are true for larger valves also. The recommended valve oscillation amplitudes and frequencies are used to calculate the wear at the shaft and at the stop. For an unpegged check valve, such as one of the 10-in. valves which was used at the San Onofre Nuclear Generation Station, it was found that shaft bearing wear would amount to 0.27 in.3/year and stop wear to 0.03 in.3/year. 相似文献
67.
This paper deals with the technical feasibility and economic viability of a grid connected wind-energy conversion system (WECS) used to cover the energy demand of an average habitable dwelling. The various parts of the wind-energy system are described and the useful electrical energy production is determined using a simulation program based on the Monte Carlo method. An economic analysis of the WEC system is performed using a computerized assessment tool. Important financial indices are calculated and financial scenarios investigated. 相似文献
68.
Liang Y.C. Wenjiang Zeng Pick Hong Ong Zhaoxia Gao Jun Cai Balasubramanian N. 《Electron Device Letters, IEEE》2002,23(12):700-703
In this letter, a concise process technology is proposed for the first time to enable the fabrication of good quality three-dimensional (3-D) suspended radio frequency (RF) micro-inductors on bulk silicon, without utilizing the lithography process on sidewall and trench-bottom patterning. Samples were fabricated to demonstrate the applicability of the proposed process technology. 相似文献
69.
'Software defined radio' (SDR) is a technology that will appear in future generations of mobile phones, i.e. following the third-generation mobile phone technology that is currently being defined and developed. Early versions of 'pragmatic' SDR will allow the terminal to be reconfigured at any level of its protocol stack. Ultimately, the 'pure' SDR technology will allow a mobile phone or terminal to have its air interface software configured or reconfigured by other software (or software parameters) that have been downloaded to the terminal, e.g. over the air, or from a remote server via the Internet and one's personal computer (PC). A number of security issues arise with downloaded code that implements the air interface functions, and these may not be obvious simply from looking at the way PC software is updated on-line today. This paper starts with an outline of the code that allows a mobile phone to operate over a particular air interface. This sets the baseline for a discussion of the security issues surrounding the change of this code from one that is fixed and downloaded once only, to code that is reconfigurable during the life of a product. 相似文献
70.