全文获取类型
收费全文 | 7255篇 |
免费 | 992篇 |
国内免费 | 847篇 |
专业分类
电工技术 | 670篇 |
综合类 | 799篇 |
化学工业 | 372篇 |
金属工艺 | 124篇 |
机械仪表 | 306篇 |
建筑科学 | 517篇 |
矿业工程 | 137篇 |
能源动力 | 155篇 |
轻工业 | 135篇 |
水利工程 | 287篇 |
石油天然气 | 191篇 |
武器工业 | 85篇 |
无线电 | 828篇 |
一般工业技术 | 514篇 |
冶金工业 | 130篇 |
原子能技术 | 66篇 |
自动化技术 | 3778篇 |
出版年
2024年 | 25篇 |
2023年 | 110篇 |
2022年 | 123篇 |
2021年 | 152篇 |
2020年 | 166篇 |
2019年 | 220篇 |
2018年 | 159篇 |
2017年 | 226篇 |
2016年 | 257篇 |
2015年 | 277篇 |
2014年 | 391篇 |
2013年 | 453篇 |
2012年 | 506篇 |
2011年 | 530篇 |
2010年 | 425篇 |
2009年 | 493篇 |
2008年 | 544篇 |
2007年 | 641篇 |
2006年 | 491篇 |
2005年 | 460篇 |
2004年 | 366篇 |
2003年 | 309篇 |
2002年 | 275篇 |
2001年 | 210篇 |
2000年 | 184篇 |
1999年 | 171篇 |
1998年 | 138篇 |
1997年 | 133篇 |
1996年 | 116篇 |
1995年 | 91篇 |
1994年 | 102篇 |
1993年 | 72篇 |
1992年 | 54篇 |
1991年 | 53篇 |
1990年 | 22篇 |
1989年 | 31篇 |
1988年 | 22篇 |
1987年 | 15篇 |
1986年 | 6篇 |
1985年 | 15篇 |
1984年 | 8篇 |
1983年 | 9篇 |
1982年 | 7篇 |
1981年 | 6篇 |
1980年 | 6篇 |
1979年 | 3篇 |
1976年 | 4篇 |
1975年 | 3篇 |
1974年 | 3篇 |
1962年 | 2篇 |
排序方式: 共有9094条查询结果,搜索用时 0 毫秒
1.
2.
含缺陷压力管道经缺陷评定合乎使用后,其疲劳寿命的估计具有重要的工程意义。将整个含缺陷压力管道作为一个整体,分析了含缺陷压力管道的疲劳裂纹扩展特点,提出了相应的含缺陷压力管道疲劳寿命的计算过程,并在基于可靠性评价的基础上,给出了核压力管道的可接受失效概率,最终得到了含缺陷核压力管道疲劳寿命预测方法。 相似文献
3.
4.
带隔板底水油藏油井临界产量计算公式 总被引:25,自引:9,他引:16
本给出了带隔板底水油藏油井的监界产量计算公式,它适用于所有带隔板底水油藏的油井。 相似文献
5.
John Watrous 《Computational Complexity》2003,12(1-2):48-84
This paper studies the space-complexity of predicting the
long-term behavior of a class of stochastic processes based on evolutions
and measurements of quantum mechanical systems. These processes
generalize a wide range of both quantum and classical space-bounded
computations, including unbounded error computations given by machines
having algebraic number transition amplitudes or probabilities.
It is proved that any space s quantum stochastic process from this class
can be simulated probabilistically with unbounded error in space O(s),
and therefore deterministically in space O(s2). 相似文献
6.
F. Pasquarelli 《Journal of scientific computing》1995,10(3):289-304
The multidomain technique for elliptic problems, that allows the fulfillment of the interface conditions by means of a suitable combination of the continuity of the solution and of its normal derivative, is considered. Some choices of this combination are investigated and, in particular, a choice that allows the solution of the multidomain problem through two solutions for each subproblem, is proposed. The scheme has been discretized with a collocation method and some numerical tests are reported. Moreover the method is compared with the more classical Dirichlet/Neumann one as well as with the capacitance matrix method.This research has been supported by a grant from M.P.I. (40%). 相似文献
7.
Dmitri E. Nikonov George I. Bourianoff Paolo A. Gargini 《Journal of Superconductivity and Novel Magnetism》2006,19(6):497-513
Quantum limits of power dissipation in spintronic computing are estimated. A computing element composed of a single electron
in a quantum dot is considered. Dynamics of its spin due to external magnetic field and interaction with adjacent dots are
described via the Bloch equations. Spin relaxation due to magnetic noise from various sources is described as coupling to
a reservoir. Resulting dissipation of energy is calculated and is shown to be much less than the thermal limit, ∼kT per bit,
if the rate of spin relaxation is much slower than the switching rate. Clues on how to engineer an energy efficient spintronic
device are provided. 相似文献
8.
9.
10.
Oded Goldreich 《Distributed Computing》2003,16(2-3):177-199
We survey the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems. We start by presenting some of the central tools (e.g., computational difficulty, pseudorandomness, and zero-knowledge proofs), and next turn to the treatment of encryption and signature schemes. We conclude with an extensive treatment of secure cryptographic protocols both when executed in a stand-alone manner and when many sessions of various protocols are concurrently executed and controlled by an adversary. The survey is intended for researchers in distributed computing, and assumes no prior familiarity with cryptography.Received: June 2001, Accepted: July 2002, 相似文献