全文获取类型
收费全文 | 348086篇 |
免费 | 27557篇 |
国内免费 | 13736篇 |
专业分类
电工技术 | 21711篇 |
技术理论 | 42篇 |
综合类 | 33864篇 |
化学工业 | 35605篇 |
金属工艺 | 14756篇 |
机械仪表 | 26192篇 |
建筑科学 | 61883篇 |
矿业工程 | 16288篇 |
能源动力 | 11194篇 |
轻工业 | 20468篇 |
水利工程 | 14231篇 |
石油天然气 | 15533篇 |
武器工业 | 4680篇 |
无线电 | 21610篇 |
一般工业技术 | 28982篇 |
冶金工业 | 14063篇 |
原子能技术 | 2314篇 |
自动化技术 | 45963篇 |
出版年
2024年 | 1238篇 |
2023年 | 3996篇 |
2022年 | 7428篇 |
2021年 | 9972篇 |
2020年 | 9837篇 |
2019年 | 7569篇 |
2018年 | 7176篇 |
2017年 | 9029篇 |
2016年 | 10932篇 |
2015年 | 11937篇 |
2014年 | 24117篇 |
2013年 | 20985篇 |
2012年 | 24716篇 |
2011年 | 27198篇 |
2010年 | 21137篇 |
2009年 | 21763篇 |
2008年 | 19796篇 |
2007年 | 23903篇 |
2006年 | 21118篇 |
2005年 | 18501篇 |
2004年 | 15218篇 |
2003年 | 13620篇 |
2002年 | 10972篇 |
2001年 | 9198篇 |
2000年 | 7727篇 |
1999年 | 6048篇 |
1998年 | 4502篇 |
1997年 | 3924篇 |
1996年 | 3211篇 |
1995年 | 2654篇 |
1994年 | 2212篇 |
1993年 | 1568篇 |
1992年 | 1245篇 |
1991年 | 953篇 |
1990年 | 736篇 |
1989年 | 679篇 |
1988年 | 441篇 |
1987年 | 340篇 |
1986年 | 236篇 |
1985年 | 303篇 |
1984年 | 268篇 |
1983年 | 207篇 |
1982年 | 161篇 |
1981年 | 109篇 |
1980年 | 119篇 |
1979年 | 72篇 |
1978年 | 33篇 |
1977年 | 33篇 |
1975年 | 23篇 |
1959年 | 35篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
通信技术的发展,通信网络结构日益复杂,一个网络中会同时存在PDH、SDH、ATM、DWDM、无线业务和IP等多种技术。使用传统网管系统已无法胜任,只有应用针对多厂商、多技术网络的集中网管系统才能满足管理要求。现提出了一种新型的针对多厂商、多技术网络的集中网管软件的设计模型及实现方法,并详细讨论了各模块的数据结构、实现功能,以及用Java实现该软件的具体方法。特别根据网管任务的实际需要,提出了故障屏蔽的概念及实现方法。经仿真试验,证明该网管软件已达到设计要求。 相似文献
992.
室内设计中绿色设计的功效 总被引:1,自引:0,他引:1
绿色设计是一种将功能主义与可持续发展思想相结合的设计。文中就其形成的背景、设计原理及在室内设计领域中的应用进行一些探讨。 相似文献
993.
Trust for Ubiquitous,Transparent Collaboration 总被引:1,自引:0,他引:1
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information. 相似文献
994.
Claudio Sacchi Gianluca Gera Carlo S. Regazzoni 《International Journal of Satellite Communications and Networking》2004,22(2):193-215
This paper aims at focusing on the aspects concerning the physical layer design for an innovative satellite communication experiment. Such an experiment, denoted by the acronym DAVID–DCE (Data and Video Interactive Distribution—Data Collection Experiment) is based on the exploitation of the W‐band (75–110 GHz) for high‐bit‐rate satellite transmission. The potential advantages of using of the W‐band are mainly related to the great bandwidth availability, and to the absence of interference. Moreover, an expected result of the experiment is a substantive improvement in the communication system's performances in the presence of meteorological phenomena (e.g. rain) as compared with the more conventional Ka‐band satellite transmission. On the other hand, problems to be faced concern the non‐ideal behaviours of hardware devices employed for high‐frequency digital transmission. In particular, carrier recovery and timing recovery are the most crucial signal‐processing tasks to be carefully considered in the design of the physical level of the system, because they considerably suffer from hardware impairments. The purpose of this work is to illustrate the proposed solutions in terms of the most critical modulation, demodulation and synchronization design issues, together with the effects of non‐ideal behaviours of hardware components on BER performances. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
995.
介绍了电子设计自动化EDA (ElectricalDesignAutomation)技术的基本特点 ,以红外遥控为例 ,提出了一种PLD (可编程逻辑器件 )解码电路 ,并用ispLSI10 6 0实现 ,该电路原理简单、设计方便、工作可靠 ,可用于以键盘扫描为输入方式的智能仪器中。 相似文献
996.
挡土墙在工程建设中较为常见,其类型取决于工程场地的地形、地质条件,针对不同类型的挡土墙,以实 例加以剖析,分析其工况,总结其设计要点及体会。 相似文献
997.
998.
Over the past few years, the field of architecture has witnessed revolutionary changes in design. The recent completions of Frank O. Gehry’s projects brought unprecedented attention to complex-shaped, nonconventional design. In following these latest trends, the author has been drawn to the issue concerning the structural systems currently being adopted in realizing these complicated designs. It is perhaps inevitable that the traditional structural systems, comprised of structural elements suitable for use in conventional linear shapes, face tremendous challenges and limitations in building such complicated designs. In this context, this research consists of proposing a new alternative by employing “boundary structures with continuously changing curvature,” which follow the complex-curved envelope surface, as well as fabricating an experimental model made of polymer composite materials with computer-aided design/computer-aided engineering/computer-aided manufacturing technologies. Consequently, the study aims at offering architects unprecedented freedom in design and a new paradigm for realizing their creative ideas. 相似文献
999.
供水工程输水隧洞钻爆设计与施工 总被引:1,自引:1,他引:0
介绍了采用钻焊法开挖深圳市东部供水工程输水隧洞的掏槽方式,光面爆破参数,装药结构及钻爆作业安排等参数。在近4年的工程实践中,取得了良好的爆破效果和明显的经济效益。 相似文献
1000.
本文讨论了在航天飞行器的空间交会对接(RVD)技术中采用激光雷达敏感器的可行性。提出在航天飞行器的自主交会对接技术中,应采用一种简单、实用的单目标系统。 相似文献