首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   119795篇
  免费   16249篇
  国内免费   10957篇
电工技术   23708篇
技术理论   10篇
综合类   13301篇
化学工业   4117篇
金属工艺   2500篇
机械仪表   7651篇
建筑科学   4846篇
矿业工程   3037篇
能源动力   2740篇
轻工业   1678篇
水利工程   2352篇
石油天然气   2388篇
武器工业   1251篇
无线电   24923篇
一般工业技术   5449篇
冶金工业   1898篇
原子能技术   442篇
自动化技术   44710篇
  2024年   950篇
  2023年   2470篇
  2022年   4646篇
  2021年   5182篇
  2020年   5289篇
  2019年   3804篇
  2018年   3248篇
  2017年   3880篇
  2016年   4086篇
  2015年   4803篇
  2014年   8149篇
  2013年   7080篇
  2012年   9442篇
  2011年   9689篇
  2010年   7380篇
  2009年   7703篇
  2008年   7839篇
  2007年   8828篇
  2006年   7455篇
  2005年   6558篇
  2004年   5444篇
  2003年   4747篇
  2002年   3662篇
  2001年   3202篇
  2000年   2557篇
  1999年   2105篇
  1998年   1534篇
  1997年   1251篇
  1996年   1025篇
  1995年   784篇
  1994年   611篇
  1993年   414篇
  1992年   277篇
  1991年   187篇
  1990年   161篇
  1989年   154篇
  1988年   87篇
  1987年   48篇
  1986年   42篇
  1985年   48篇
  1984年   40篇
  1983年   34篇
  1982年   46篇
  1981年   11篇
  1980年   7篇
  1979年   12篇
  1978年   6篇
  1975年   4篇
  1959年   4篇
  1951年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
11.
在讨论MPT1327信令的集群移动通信系统与国内No.7信令的PSTN网间互连,帝现两种信令配合中,研究了集群系统的仿真模型和模拟算法,同时模拟出整个集群系统的工作情况,运行结果证实了所提方案的可行性与准确性。  相似文献   
12.
Ultrasonic waves in echographic mode, combined with autogenous shrinkage measurements, were used to study the evolution of the capillary network of reactive powder concrete (RPC) from the time after the mixing. Two characteristic porous classes have been identified: the first, between 10 and 20 nm, begins when the material reaches its solid hyperstatic state, and the second about 1 or 2 nm. The first class is associated with the porous space between the C-S-H hydrate clusters and the second with the internal porosity of the hydrate. The evolution of the active capillary radius as a function of the degree of hydration allows us to understand the strong interaction between the capillary network size and the chemical activity given by the dissipated calorimetric power curve. Indeed, the maximum point of the chemical activity marks the transition of the first class of pores to the second one. Finally, measurements of electrical conductivity through RPC samples show that after the maximum of the dissipated power, the curve of this electrical conductivity presents the same evolution as the capillary radius. As the electrical conductivity clearly depends on the evolution of the capillary network, the similarity between the results confirms our analysis in pore classes.  相似文献   
13.
The paper describes the calculation of the beam solar radiation transmission across the uniform salinity upper convecting zone (UCZ) and the salinity stratified gradient zone (GZ), when the extinction coefficient is not only wavelength but also salinity-concentration dependent, assuming that the effect of scattering to be negligible. The results are useful in determining the effects of dissolved salt ions on pure water transmission, at least according to the existing measured data in the literature.  相似文献   
14.
This paper describes the generation of adaptive gait patterns using new Central Pattern Generators (CPGs) including motor dynamic models for a quadruped robot under various environments. The CPGs act as the flexible oscillators of the joints and adjust joint angles to required values. The CPGs are interconnected with each other and sets of their coupling parameters are adjusted by a genetic algorithm so that the quadruped robot can realize stable and adequate gait patterns. Generation of gait patterns results in the formation of the CPG networks suitable for the formation of not only a straight walking pattern but also of rotating gait patterns. Experimental results demonstrate that the proposed CPG networks are effective for the automatic adjustment of the adaptive gait patterns for the tested quadruped robot under various environments. Furthermore, the target tracking control based on image processing is achieved by combining the general gait patterns. © 2006 Wiley Periodicals, Inc. Electr Eng Jpn, 155(1): 35–43, 2006; Published online in Wiley InterScience ( www.interscience.wiley.com ). DOI 10.1002/eej.20225  相似文献   
15.
To cope with the high rate of increase of power demand in the main industrialized districts in Japan, 550-kV transmission systems covering the districts have been reinforced, with most of the main power plants connected directly to these systems. Through 550-/300-kV substations, the majority of power to the districts is supplied by 300-kV systems. To limit the excess short-circuit capacity in the 300-kV systems, they tend to be reconstructed as so-called radial networks. In radial networks with high short-circuit capacity and relatively small number of transmission lines connected to the substation busbars, the rate of rise of TRV can be far higher than standard value. This paper analyzes the transient recovery voltages (TRV) in such extra-high-voltage radial networks in Japan, together with the relevant stresses to circuit-breakers during fault clearings. Future system conditions have also been introduced. As the typical rate of rise of the TRV values, more than twice that of today's standard ones are probable.  相似文献   
16.
Properly selected transformation methods obtain the most significant characteristics of metal cutting data efficiently and simplify the classification. Wavelet Transformation (WT) and Neural Networks (NN) combination was used to classify the experimental cutting force data of milling operations previously. Preprocessing (PreP) of the approximation coefficients of the WT is proposed just before the classification by using the Adaptive Resonance Theory (ART2) type NNs. Genetic Algorithm (GA) was used to estimate the weights of each coefficient of the PreP. The WT-PreP-NN (ART2) combination worked at lower vigilances by creating only a few meaningful categories without any errors. The WT-NN (ART2) combination could obtain the same error rate only if very high vigilances are used and many categories are allowed.  相似文献   
17.
The fabrication of one kind of large core area Nd3 doped silicate glass photonic crystal fiber, and demonstration of the fiber's waveguidence properties were reported. This fiber owns a random air hole distribution in the cladding. The measured minimum loss of this kind of fiber is 10 dB·m-1 at 660 nm. These fibers can sustain only a single mode at least over wavelength ranging from 660 nm to 980 nm.  相似文献   
18.
The free energies of mixing of two networks in the interpenetrating polymer network based on crosslinked polyurethane and poly(ester acrylate) have been determined by the vapour sorption method. It was established that the constituent networks in the IPN are not miscible. The introduction of fillers of different chemical nature increases the compatibility. The thermodynamic affinity of the fillers to the individual networks and IPN was estimated. It was established that when the free energy of interaction of one or both components of the IPN with the filler is negative, reinforcement leads to the formation of a compatible and equilibrium system. For fillers having no affinity to the polymers, compatibilization is observed, which is connected with slowing down of phase separation in the system in the presence of filler.  相似文献   
19.
Distinctive features of architectural-structural organization and use of memory networks are considered with the aim of choosing an optimal configuration in designing distributed computer systems.  相似文献   
20.
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and integrity at a lower computational and communication cost. This paper presents a (t, n) threshold proxy signcryption scheme in which no less than t proxy agents in the proxy group can produce the signcryption cryptogram. combines the functionality of threshold proxy signing and encryption. The proposed scheme combines the functionality of both threshold proxy signing and encryption, and provides fair protection for the sender and the proxy agents. This scheme is secure against attack of public key substitution. It also satisfies security properties such as confidentiality and authenticity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号