全文获取类型
收费全文 | 39149篇 |
免费 | 4026篇 |
国内免费 | 1467篇 |
专业分类
电工技术 | 10488篇 |
技术理论 | 2篇 |
综合类 | 2823篇 |
化学工业 | 5428篇 |
金属工艺 | 1501篇 |
机械仪表 | 865篇 |
建筑科学 | 5871篇 |
矿业工程 | 1628篇 |
能源动力 | 835篇 |
轻工业 | 2386篇 |
水利工程 | 2030篇 |
石油天然气 | 1793篇 |
武器工业 | 131篇 |
无线电 | 2341篇 |
一般工业技术 | 1725篇 |
冶金工业 | 1323篇 |
原子能技术 | 419篇 |
自动化技术 | 3053篇 |
出版年
2024年 | 123篇 |
2023年 | 374篇 |
2022年 | 912篇 |
2021年 | 1149篇 |
2020年 | 1026篇 |
2019年 | 793篇 |
2018年 | 690篇 |
2017年 | 933篇 |
2016年 | 1072篇 |
2015年 | 1283篇 |
2014年 | 2867篇 |
2013年 | 1989篇 |
2012年 | 3079篇 |
2011年 | 3255篇 |
2010年 | 2566篇 |
2009年 | 2600篇 |
2008年 | 2376篇 |
2007年 | 2843篇 |
2006年 | 2769篇 |
2005年 | 2255篇 |
2004年 | 1810篇 |
2003年 | 1700篇 |
2002年 | 1354篇 |
2001年 | 1150篇 |
2000年 | 969篇 |
1999年 | 709篇 |
1998年 | 445篇 |
1997年 | 317篇 |
1996年 | 267篇 |
1995年 | 238篇 |
1994年 | 145篇 |
1993年 | 92篇 |
1992年 | 84篇 |
1991年 | 57篇 |
1990年 | 50篇 |
1989年 | 37篇 |
1988年 | 48篇 |
1987年 | 32篇 |
1986年 | 35篇 |
1985年 | 35篇 |
1984年 | 35篇 |
1983年 | 14篇 |
1982年 | 15篇 |
1981年 | 13篇 |
1980年 | 5篇 |
1979年 | 4篇 |
1977年 | 4篇 |
1976年 | 3篇 |
1957年 | 4篇 |
1955年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
IKE协议的安全性分析 总被引:1,自引:0,他引:1
在简略介绍IKE协议RFC2409工作机制的基础上,对协议现有的安全问题进行了分析,并针对协议阶段1中主模式与积极模式下身份保护存在的问题提出了协议修改建议,对阶段1中安全联盟建立的可靠性进行了探讨以加强协议抵御DoS攻击的能力。 相似文献
32.
Resilient optical networks are predominately designed to protect against single failures of fiber links. But in larger networks, operators also see dual failures. As the capacity was planned for single failures, disconnections can occur by dual failures even if enough topological connectivity is provided. In our approach the design of the network minimizes the average loss caused by dual failures, while single failures are still fully survived. High dual failure restorability is the primary aim, capacity is optimized in a second step. For WDM networks with full wavelength conversion, we formulate mixed integer linear programming models for dedicated path protection, shared (backup) path protection, and path rerouting with and without stub-release. For larger problem instances in path rerouting, we propose two heuristics. Computational results indicate that the connectivity is of much more importance for high restorability values than the overall protection capacity. Shared protection has similar restorability levels as dedicated protection while the capacity is comparable to rerouting. Rerouting surpasses the protection mechanisms in restorability and comes close to 100% dual failure survivability. Compared to single failure planning, both shared path protection and rerouting need significantly more capacity in dual failure planning. 相似文献
33.
In this letter, a new sharing mechanism, SRLG sharing, is proposed, which allows the links of the same shared risk link group (SRLG) in a primary light tree to share protections in WDM optical networks. In previous studies, how to share spare resources with SRLG constraints has not been studied in multicast optical networks. In this letter, considering SRLG sharing, we propose a novel algorithm –multicast with SRLG sharing (MSS)– to establish a protection light tree. Finally, the algorithm MSS and the algorithm multicast with no SRLG sharing (MNSS) are compared through a simulation to show that our new sharing scheme of SRLG sharing is more efficient than that of no SRLG sharing in terms of spare resource utilization and blocking probability. 相似文献
34.
35.
J. B. Quinn G. E. Schumacher L. W. Schultheis 《Journal of Failure Analysis and Prevention》2004,4(1):41-46
Several days after heart surgery, a patient discovered his upper right canine tooth had broken at the root. Such tooth damage,
recognized post-operatively, is usually assumed to be caused by blunt mechanical force from an instrument used by the anesthesiologist
during placement of a breathing tube at the start of surgery.
In this case, the patient had saved the crown portion of the broken tooth, and it was possible to examine the root fracture
characteristics. The curvature and direction of the crack path and natural tooth situation suggested that failure could be
described through a cantilever beam model. This was confirmed when a whole extracted sample tooth was embedded and broken
by a measured force in a manner consistent with the model. The resulting fracture surface matched that of the patient’s broken
canine tooth. However, the high load and force direction necessary to fracture the root was inconsistent with forces applied
during the anesthesia procedure. The failure analysis and further investigation indicated tooth clenching on the breathing
tube during recovery was the likely cause of fracture.
This paper presents an alternate explanation for intubation-related dental injury, demonstrates the practicality of fractographic
analysis of biological materials, and introduces a methodology for simulating in vitro tooth settings for mechanical testing. 相似文献
36.
37.
介绍新型低压抽屉式开关柜的结构性能和特点,并与早期低压柜作了比较。阐述了新型低压抽屉式开关柜在冶金系统应用中的几点改进情况。 相似文献
38.
环境保护地理信息系统的设计 总被引:8,自引:0,他引:8
本文主要介绍基于计算机网络的通用型环境保护地理信息系统的功能和实现方法。 相似文献
39.
本文针对微机型漏电保护装置在工业运行环境下,可能遇到的干扰进行了分析,并提出了从硬件到软件一系列行之有效的抗干扰措施。 相似文献
40.
屏蔽暂堵技术在青西地区的应用 总被引:3,自引:0,他引:3
对玉门油田青西地区裂缝性储层的保护方法 ,最有效的技术手段就是利用屏蔽暂堵技术。根据该地区储层岩性不同 ,分别选用聚磺、金属离子、阳离子钻井液体系 ,在原浆的基础上加入EP - 2、LF - 1和硅油消泡剂 ,配制成屏蔽暂堵钻井液体系。通过室内试验 :屏蔽暂堵钻井液体系API失水小于 5ml,HTHP失水小于 13ml,岩心渗透率恢复值大于 70 % ,起到了良好的屏蔽暂堵效果。经完井试油发现 ,储层污染明显减小 ,产量与邻井相比有大幅度提高 相似文献