全文获取类型
收费全文 | 40261篇 |
免费 | 4744篇 |
国内免费 | 3925篇 |
专业分类
电工技术 | 3890篇 |
技术理论 | 2篇 |
综合类 | 6935篇 |
化学工业 | 1788篇 |
金属工艺 | 840篇 |
机械仪表 | 2870篇 |
建筑科学 | 2650篇 |
矿业工程 | 830篇 |
能源动力 | 835篇 |
轻工业 | 2422篇 |
水利工程 | 1053篇 |
石油天然气 | 874篇 |
武器工业 | 517篇 |
无线电 | 5326篇 |
一般工业技术 | 3881篇 |
冶金工业 | 897篇 |
原子能技术 | 497篇 |
自动化技术 | 12823篇 |
出版年
2024年 | 181篇 |
2023年 | 556篇 |
2022年 | 1008篇 |
2021年 | 1056篇 |
2020年 | 1135篇 |
2019年 | 1025篇 |
2018年 | 1044篇 |
2017年 | 1256篇 |
2016年 | 1387篇 |
2015年 | 1460篇 |
2014年 | 2173篇 |
2013年 | 2444篇 |
2012年 | 2828篇 |
2011年 | 3042篇 |
2010年 | 2394篇 |
2009年 | 2593篇 |
2008年 | 2660篇 |
2007年 | 3069篇 |
2006年 | 2723篇 |
2005年 | 2409篇 |
2004年 | 2005篇 |
2003年 | 1667篇 |
2002年 | 1365篇 |
2001年 | 1175篇 |
2000年 | 1024篇 |
1999年 | 849篇 |
1998年 | 690篇 |
1997年 | 597篇 |
1996年 | 547篇 |
1995年 | 493篇 |
1994年 | 433篇 |
1993年 | 302篇 |
1992年 | 278篇 |
1991年 | 228篇 |
1990年 | 205篇 |
1989年 | 185篇 |
1988年 | 120篇 |
1987年 | 73篇 |
1986年 | 37篇 |
1985年 | 37篇 |
1984年 | 29篇 |
1983年 | 36篇 |
1982年 | 26篇 |
1981年 | 14篇 |
1980年 | 16篇 |
1979年 | 11篇 |
1978年 | 7篇 |
1977年 | 6篇 |
1976年 | 7篇 |
1965年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 7 毫秒
71.
小浪底水电厂位于多泥沙的黄河干流上,水轮机活动导叶会因磨损过大而严重漏水,在水轮机的设计上必须考虑这个因素;同时,为适应混水发电,小浪底水电厂机组采用了筒阀。文中介绍了筒阀的结构特点、功能及控制原理等,并对其在现场的实际应用情况进行了分析。 相似文献
72.
Claudio Arbib Fabrizio Marinelli 《International Journal of Flexible Manufacturing Systems》2003,15(4):333-354
A cook has to prepare n cakes using an oven with two racks. According to the recipe, the i-th cake has to be baked for exactly a
i minutes. Cakes to be cooked are taken from a table and carried to the oven, and once cooked are carried back to the table by means of a trolley that can carry two cakes at a time. What is the minimum number q
* of round trips required of the cook? This problem has application to the operation scheduling of transportation systems and to material cutting. A different problem arises according to whether the cook accepts or not to stay near the oven for awhile with the trolley. If the trolley cannot be idle at the oven, an optimum schedule with no oven idle-time always exists: consequently, the trolley schedule is trivial, and the problem is transformed into a set packing. For this case, we propose and test a heuristic method which generates all of the promising columns of the set packing, and solves the resulting problem by branch-and-bound. Instead, if the trolley can be idle at the oven for a limited amount of time, a problem arises to find an optimal schedule of the trolley: in this case we show how to use a scaling technique in order to obtain a very good feasible solution by the method above. 相似文献
73.
聚合物冷拉过程的流函数分析 总被引:1,自引:1,他引:0
汪凌云 《高分子材料科学与工程》1995,11(5):7-10
用流函数法分析了聚合物拉伸成形时,颈缩的发生和扩展过程,文中论证了采用流函数法的优越性和适用性,并将流函数法计算结果和有限元法计算结果作了对比。 相似文献
74.
本文运用“软科学”一即通过建立数学模型,进行系统分析和系统优化,阐述对蒸汽管网优化运行的方法及原理,达到提高供热效率及节能降耗的目的. 相似文献
75.
76.
本文研究了加法复合布尔函数和乘法复合布尔函数,在平衡性、k次项系数、K次扩散准则(PC)、相关免疫 性(CI)、Walsh谱、代数次数、小项分布等方面得到了一批新结果。 相似文献
77.
William Kent 《Computer Standards & Interfaces》1991,13(1-3):201-206
OSQL is the object-oriented database language developed for the Iris object-oriented database management system at Hewlett-Packard Laboratories. Its three fundamental constructs are objects, types, and functions. This paper provides an overview of the underlying concepts and some important features of OSQL. 相似文献
78.
79.
Stephen M. Matyas 《Journal of Cryptology》1991,3(2):113-136
A method is presented for controlling cryptographic key usage based on control vectors. Each cryptographic key has an associated control vector that defines the permitted uses of the key within the cryptographic system. At key generation, the control vector is cryptographically coupled to the key by way of a special encryption process. Each encrypted key and control vector are stored and distributed within the cryptographic system as a single token. Decryption of a key requires respecification of the control vector. As part of the decryption process, the cryptographic hardware verifies that the requested use of the key is authorized by the control vector. This article focuses mainly on the use of control vectors in cryptosystems based on the Data Encryption Algorithm. 相似文献
80.
In this paper we introduce an empirical Bayes procedure for estimating an unknown parameter, say θ. This procedure gives the empirical Bayes estimator for θ and its associated minimum posterior risk in closed forms without estimating the unknown prior density function of θ. In such procedure the posterior probability density function of θ is not required. A sufficient statistic for θ with conditional probability density function in the one parameter exponential family is required. Instead of estimating the unknown prior density function, the marginal density function of the sufficient statistic must be estimated. As special cases the empirical Bayes estimators and their respective minimum posterior risks of the failure rate for the exponential distribution, the unknown scale parameters of Weibull and gamma distributions are obtained in simple forms as special cases. Numerical results and a simulation study are introduced to (i) investigate how the number of available past experiments and the sample size of each influence the accuracy of the empirical Bayes estimator, (ii) make a comparison between the presented procedure and the Bayes procedure when the prior probability density function of the parameter θ is gamma. 相似文献