全文获取类型
收费全文 | 74118篇 |
免费 | 5435篇 |
国内免费 | 2801篇 |
专业分类
电工技术 | 3902篇 |
技术理论 | 6篇 |
综合类 | 4478篇 |
化学工业 | 12774篇 |
金属工艺 | 3982篇 |
机械仪表 | 4854篇 |
建筑科学 | 5245篇 |
矿业工程 | 2412篇 |
能源动力 | 2243篇 |
轻工业 | 4791篇 |
水利工程 | 1014篇 |
石油天然气 | 5322篇 |
武器工业 | 481篇 |
无线电 | 7728篇 |
一般工业技术 | 9487篇 |
冶金工业 | 4045篇 |
原子能技术 | 757篇 |
自动化技术 | 8833篇 |
出版年
2024年 | 302篇 |
2023年 | 1267篇 |
2022年 | 2116篇 |
2021年 | 2928篇 |
2020年 | 2216篇 |
2019年 | 1975篇 |
2018年 | 2314篇 |
2017年 | 2519篇 |
2016年 | 2090篇 |
2015年 | 2718篇 |
2014年 | 3463篇 |
2013年 | 4245篇 |
2012年 | 4370篇 |
2011年 | 4891篇 |
2010年 | 4200篇 |
2009年 | 3974篇 |
2008年 | 3878篇 |
2007年 | 3737篇 |
2006年 | 3840篇 |
2005年 | 3452篇 |
2004年 | 2299篇 |
2003年 | 2103篇 |
2002年 | 1888篇 |
2001年 | 1654篇 |
2000年 | 1821篇 |
1999年 | 2076篇 |
1998年 | 1793篇 |
1997年 | 1449篇 |
1996年 | 1421篇 |
1995年 | 1201篇 |
1994年 | 978篇 |
1993年 | 734篇 |
1992年 | 558篇 |
1991年 | 439篇 |
1990年 | 330篇 |
1989年 | 258篇 |
1988年 | 228篇 |
1987年 | 142篇 |
1986年 | 120篇 |
1985年 | 96篇 |
1984年 | 66篇 |
1983年 | 40篇 |
1982年 | 42篇 |
1981年 | 30篇 |
1980年 | 25篇 |
1979年 | 13篇 |
1977年 | 7篇 |
1976年 | 8篇 |
1975年 | 5篇 |
1945年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
裂缝性油气藏采收率:100个裂缝性油气田实例的经验总结 总被引:5,自引:2,他引:3
通过对世界上100个裂缝性油气藏的综合评价,研究储集层及流体本身的性质(包括孔隙度、渗透率、黏度、可动油比例、含水饱和度、润湿性及裂缝分布特征等)和驱动机制及油藏管理战略(优化日产量和采用不同类型的提高采收率技术)对其最终采收率的影响。将裂缝性油气藏分为4类:I类的基质几乎没有孔隙度和渗透率,裂缝是储存空间和流体流动的通道;Ⅱ类的基质有较低的孔隙度和渗透率,基质提供储存空间,裂缝提供流动通道;Ⅲ类(微孔隙)的基质具有高孔隙度和低渗透率,基质提供储存空间,裂缝提供流动通道;Ⅳ类(大孔隙)的基质具有高的孔隙度和渗透率,基质提供储存空间和流动通道,裂缝仅增加渗透率。对26个Ⅱ类油气藏和20个Ⅲ类油气藏的开采历史的研究表明:Ⅱ类油气藏的采收率受水驱强度和最优日产量控制,日产量过高会很容易破坏Ⅱ类油气藏,一些Ⅱ类油气藏如果管理得当,采收率可以很高,不需要二次或三次采油;Ⅲ类油气藏的采收率主要受岩石和流体本身性质的影响,特别是基质渗透率、流体重度、润湿性以及裂缝强度等,不进行二次或三次采油不可能完全开采,往往需要采用一些提高采收率的专门技术。以往将Ⅱ类和Ⅲ类裂缝性油气藏归为一类,认识它们的区别将有助于选择更好的开发策略。 相似文献
42.
Perturbation analysis and control of two-class stochastic fluid models for communication networks 总被引:2,自引:0,他引:2
Cassandras C.G. Gang Sun Panayiotou C.G. Wardi Y. 《Automatic Control, IEEE Transactions on》2003,48(5):770-782
This paper uses stochastic fluid models (SFMs) for the control and optimization (rather than performance analysis) of communication network nodes processing two classes of traffic: one is uncontrolled and the other is subject to threshold-based buffer control. We derive gradient estimators for packet loss and workload related performance metrics with respect to threshold parameters. These estimators are shown to be unbiased and directly observable from a sample path without any knowledge of underlying stochastic characteristics of the traffic processes. This renders them computable in online environments and easily implementable for network management and control. We further demonstrate their use in buffer control problems where our SFM-based estimators are evaluated based on data from an actual system. 相似文献
43.
Zhishou Zhang Qibin Sun Wai-Choong Wong John Apostolopoulos Susie Wee 《Multimedia, IEEE Transactions on》2007,9(2):320-331
This paper proposes an optimized content-aware authentication scheme for JPEG-2000 streams over lossy networks, where a received packet is consumed only when it is both decodable and authenticated. In a JPEG-2000 codestream, some packets are more important than others in terms of coding dependency and image quality. This naturally motivates allocating more redundant authentication information for the more important packets in order to maximize their probability of authentication and thereby minimize the distortion at the receiver. Towards this goal, with the awareness of its corresponding image content, we formulate an optimization framework to compute an authentication graph to maximize the expected media quality at the receiver, given specific authentication overhead and knowledge of network loss rate. System analysis and experimental results demonstrate that the proposed scheme achieves our design goal in that the rate-distortion (R-D) curve of the authenticated image is very close to the R-D curve when no authentication is required 相似文献
44.
45.
46.
The strengths of two graphite/epoxy notched laminate systems with a softening strip were investigated. The softening strip was created by replacing the 0°-graphite/epoxy plies by a glass/epoxy composite. Experimental results indicated that the use of softening strips could significantly increase the laminate strength. Analysis was performed with finite elements developed using the classical laminated plate theory and was shown to be adequate. A simple point-stress failure criterion was used to predict the strength of notched laminates with softening strips and the result was found to be satisfactory. 相似文献
47.
本文介绍了笔者设计并实现的一种新型的面向对象的程序设计语言,着重讨论了在设计过程中采用的新的概念,并和其它类似语言作了比较. 相似文献
48.
用单透镜变换由多模光纤出射的大功率Nd:YAG激光束的特性 总被引:1,自引:0,他引:1
根据理论假设,通过选取单透镜的参数和位置,计算说明了单透镜使经由多模光纤出射的大功率Nd:YAG激光束的发射角压缩,光束聚焦效率提高,光束截面场为高斯分布;文中的计算结果符合已知规律,从而说明了理论假设的正确性。 相似文献
49.
50.
Sun Qing-Ping Guo Tian-Fu Li Xue-Jun Zhang Xing 《International Journal of Fracture》1996,78(3-4):315-330
Numerical study by the finite element method (FEM) is performed to investigate the effect of dual-scale microstructure on the toughness of laminar zirconia composite. The computation is based on the micromechanics constitutive model of polycrystal transformation plasticity developed by Sun et al. [10] where both transformation induced shear and softening effects during autocatalytic transformation are taken into account. The numerical simulation presented in this paper successfully reproduced the experimentally observed two effects of the dual-scale microstructure on the toughness of laminar zirconia composite, i.e., the truncation of the elongated transformation frontal zone that forms in single phase Ce-ZrO2 and the propagation of the transformation zone along the layers normal to the crack plane. Quantitative analysis on the role of microstructure in transformation toughening of laminar zirconia composite is first carried out in the present work which will provide a starting point for the microstructural design of this novel advanced composite in the future.Presented at the Far East Fracture Group (FEFG) International Symposium on Fracture and Strength of Solids. 4–7 July 1994 in Xi'an, China. 相似文献