全文获取类型
收费全文 | 24213篇 |
免费 | 2916篇 |
国内免费 | 1641篇 |
专业分类
电工技术 | 761篇 |
技术理论 | 1篇 |
综合类 | 2499篇 |
化学工业 | 2789篇 |
金属工艺 | 955篇 |
机械仪表 | 1706篇 |
建筑科学 | 2545篇 |
矿业工程 | 790篇 |
能源动力 | 806篇 |
轻工业 | 1762篇 |
水利工程 | 323篇 |
石油天然气 | 486篇 |
武器工业 | 230篇 |
无线电 | 2689篇 |
一般工业技术 | 3951篇 |
冶金工业 | 548篇 |
原子能技术 | 120篇 |
自动化技术 | 5809篇 |
出版年
2024年 | 110篇 |
2023年 | 346篇 |
2022年 | 633篇 |
2021年 | 846篇 |
2020年 | 962篇 |
2019年 | 720篇 |
2018年 | 794篇 |
2017年 | 851篇 |
2016年 | 972篇 |
2015年 | 1058篇 |
2014年 | 1564篇 |
2013年 | 1898篇 |
2012年 | 1729篇 |
2011年 | 1800篇 |
2010年 | 1336篇 |
2009年 | 1390篇 |
2008年 | 1427篇 |
2007年 | 1688篇 |
2006年 | 1517篇 |
2005年 | 1325篇 |
2004年 | 1167篇 |
2003年 | 895篇 |
2002年 | 730篇 |
2001年 | 588篇 |
2000年 | 466篇 |
1999年 | 387篇 |
1998年 | 322篇 |
1997年 | 267篇 |
1996年 | 186篇 |
1995年 | 155篇 |
1994年 | 123篇 |
1993年 | 94篇 |
1992年 | 85篇 |
1991年 | 71篇 |
1990年 | 59篇 |
1989年 | 43篇 |
1988年 | 28篇 |
1987年 | 18篇 |
1986年 | 11篇 |
1985年 | 23篇 |
1984年 | 20篇 |
1983年 | 19篇 |
1982年 | 17篇 |
1981年 | 5篇 |
1980年 | 12篇 |
1979年 | 3篇 |
1978年 | 3篇 |
1977年 | 2篇 |
1973年 | 2篇 |
1959年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
对29个尺寸为300 mm×300 mm×600 mm的自密实再生块体混凝土棱柱体试件开展直剪性能和单轴受压性能试验研究。探讨了废旧混凝土块体取代率及特征尺寸对自密实再生块体混凝土的直剪强度、抗压强度的影响,并进一步分析了自密实再生块体混凝土棱柱体的直剪强度与抗压强度之间的关系。试验表明:自密实再生块体混凝土内新混凝土与废旧混凝土粘结良好;当自密实再生块体混凝土中的自密实混凝土强度高于废旧混凝土块体强度时,试件的直剪性能会由于废旧混凝土块体的取代率的增加而劣化;特征尺寸比介于0.22~0.44时,块体的特征尺寸对自密实再生块体混凝土直剪强度和抗压强度的影响不明显,可以近似忽略;自密实再生块体混凝土的剪压比随废旧混凝土块体取代率和特征尺寸均无显著变化,其值近似为0.1。基于试验结果,提出了棱柱体自密实再生块体混凝土试件的直剪强度计算公式,建立了直剪强度测试值与抗压强度计算值之间的关系,计算结果与试验值吻合良好。 相似文献
82.
焊接空心球节点(WHSJs)自1966年被提出以来,已经广泛地应用于空间网格结构中,至今已有55年的应用历史。由于环境的侵蚀、后期维护不到位等,焊接球节点锈蚀的现象屡见不鲜。该文针对随机锈蚀后焊接空心球节点的抗压承载力的变化规律进行了研究,基于随机有限元分析方法进行了大量的随机数值分析,研究了锈蚀深度概率分布模型对抗压承载力折减系数的影响;利用曲线拟合技术提出了折减系数下限和上限曲线的理论计算公式;通过随机有限元的大量分析结果揭示了抗压折减系数随锈蚀深度概率分布模型的变化规律;提出了用于预测抗压折减系数概率分布模型的拟合公式;通过对具有不同几何参数的焊接空心球节点的分析,得到了该文结论对不同几何尺寸下焊接球节点的适用性。研究结果表明,所提出的方法可以准确确定随机锈蚀焊接空心球节点抗压承载力折减系数的随机概率分布模型,可为随机锈蚀焊接球节点承载力的评估提供理论分析基础。 相似文献
83.
84.
Li Li 《Materials Science and Engineering: A》2011,528(24):7178-7185
Microstructural evolution and texture of a cast Mg-9Gd-4Y-0.6Zr ingot under hot compression were studied in this paper. Post-deforming microstructures were characterized by optical microscopy, scanning electron microscopy and transmission electron microscopy, while crystallographic orientation information was obtained from X-Ray macro-texture measurement and EBSD micro-texture analysis. Dynamic recrystallization (DRX) initiated from the deformation bands (DB) forming on original grain boundaries; the DB became widen with continuously conversion of low-angle-boundary grains into high-angle-boundary grains. The tendency of strain localization increased with Z parameter. The macro-texture analysis indicates that uniaxial compression yielded out the randomized basal texture component. This texture component was found to be strengthened with increasing Z parameter. The micro-texture analysis shows that the deviation from the ideal basal texture arose from orientated growth within DBs. Moreover, the localization deformation promoted dynamic precipitation within DBs, which inhibited the development of DRX. 相似文献
85.
In this investigation, hot compression tests were performed at 900 °C ? 1100 °C and strain rate of 0.001 ? 0.1 s?1 to study hot deformation behavior and flow stress model of 4130 steel. Based on the classical stress–dislocation relations and the kinematics of the dynamic recrystallization, the flow stress constitutive equations of the work hardening‐dynamical recovery period and dynamical recrystallization period were established for 4130 steel, respectively. The validity of the model was demonstrated by comparing the experimental data with the numerical results. The agreement of this comparison is quite reasonable. 相似文献
86.
87.
Cooperative detection and protection for Interest flooding attacks in named data networking 下载免费PDF全文
Kun Ding Yun Liu Hsin‐Hung Cho Han‐Chieh Chao Timothy K. Shih 《International Journal of Communication Systems》2016,29(13):1968-1980
Named data networking (NDN) is a new emerging architecture for future network, which may be a substitute of the current TCP/IP‐based network, for the content‐oriented data request mode becoming the future trend of development. The security of NDN has attracted much attention, as an implementation of next‐generation Internet architecture. Although NDN is immune to most current attack, it cannot resist the distributed denial of service like attack – Interest flooding attack (IFA) – effectively. IFA takes advantages of the forwarding mechanism of NDN, flooding a large number of malicious Interest packets at quite a high rate, and exploits the network resources, which may cause the paralysis of the network. Taking into account the severity of the destruction, we propose an algorithm to counter such new type of attack. We analyze three properties of IFA, and use them to judge and filter Interest packets. Vector space model and Markov model are used in our method to realize a cooperative detection. Meanwhile, we present the retransmission forwarding mechanism to ensure legitimate user request. The ndnSIM module of ns3 is used for the corresponding simulation, and results of the simulation will be given to show the effectiveness of our algorithm. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
88.
本文讨论了16kbit/s分带自适应(SB—APC)预测语音压缩编码系统中的正交镜象滤波器(QMF)的原理和设计过程,并给出了实现QMF的硬件和软件结构。 相似文献
89.
The decentralized cryptocurrency which was based on block chain has been thought the most successful one in history.In the system,public keys were used as the users’ accounts which guaranteed the anonymity in real transactions.However,all the transaction information was recorded in the block chain,it was a potential threat for users’ privacy which might leak the payment information.Moreover,to avoid double-spending,it was agreed that the transaction on the target block was valid only if another k blocks were generated after the target one.The long waiting time reduced the efficiency of the payment system.A model of payment system based on a proxy-cryptocurrency was proposed,and a solution based on blind signature techniques was proposed.The scheme introduced a proxy in the payment phase,by which transaction confirmation time could be reduced and the transaction efficiency could be improved.Meanwhile,the system implements better anonymity,namely as the privacy protection function. 相似文献
90.
针对合成孔径雷达系统,提出一种多模式数字接收机频域脉冲压缩模块设计方案。不同模式的脉冲压缩设置了不同的工作周期以及脉冲扫频时宽和带宽,从而实现了不同距离分辨率和探测距离,满足了不同用户的需求。首先在MATLAB平台上完成了对FPGA实现流程的仿真,并对不同模式参数进行了验证。然后在Quartus软件平台下联合Modelsim完成了功能仿真。测试方面,分别利用了放在对FPGA的只读存储器中的MATLAB模拟回波数据和信号发生器产生的模拟回波进行板级测试。仿真与测试结果表明,设计实现了4种模式的中频信号的频域脉冲压缩,并证明了该方案的可行性。 相似文献