首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   41900篇
  免费   3635篇
  国内免费   1957篇
电工技术   2442篇
技术理论   2篇
综合类   3165篇
化学工业   7332篇
金属工艺   2428篇
机械仪表   2648篇
建筑科学   3225篇
矿业工程   1154篇
能源动力   1168篇
轻工业   2871篇
水利工程   816篇
石油天然气   2059篇
武器工业   358篇
无线电   4630篇
一般工业技术   5185篇
冶金工业   1887篇
原子能技术   413篇
自动化技术   5709篇
  2024年   173篇
  2023年   633篇
  2022年   976篇
  2021年   1505篇
  2020年   1151篇
  2019年   1034篇
  2018年   1136篇
  2017年   1219篇
  2016年   1067篇
  2015年   1562篇
  2014年   1868篇
  2013年   2291篇
  2012年   2474篇
  2011年   2588篇
  2010年   2437篇
  2009年   2431篇
  2008年   2275篇
  2007年   2294篇
  2006年   2454篇
  2005年   2002篇
  2004年   1511篇
  2003年   1645篇
  2002年   1960篇
  2001年   1639篇
  2000年   1143篇
  1999年   1170篇
  1998年   888篇
  1997年   737篇
  1996年   698篇
  1995年   587篇
  1994年   445篇
  1993年   353篇
  1992年   279篇
  1991年   194篇
  1990年   156篇
  1989年   126篇
  1988年   105篇
  1987年   62篇
  1986年   45篇
  1985年   30篇
  1984年   30篇
  1983年   21篇
  1982年   21篇
  1981年   17篇
  1980年   25篇
  1979年   9篇
  1978年   4篇
  1977年   3篇
  1976年   8篇
  1951年   3篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
本文通过对庄河地区水资源的分析及未来需水量的预测,计算其区域余水量。以确定区域经济的规划。  相似文献   
2.
The focused ion beam technique was employed to investigate the atmospheric corrosion morphology of AZ91D. It was found that the α matrix of the alloy was preferentially corroded in the areas adjacent to intermetallic phases. The most interesting finding was that the corrosion products in corrosion cavities were pelletlike, which has never been reported before.  相似文献   
3.
1 Introduction Propylene as an important feedstock for organic chemicals is mainly originated from steam cracking and catalytic cracking processes. During the FCC process the propylene content varies with the FCC catalyst and process technology adopted, resulting in significant difference in propylene concentration in the cracked product——LPG. The conventional FCC pro- cess generally gives a propylene yield of around 4%, while the FCC process with maximization of propylene yield can in…  相似文献   
4.
在充分调研阵列声波测井分波提取方法的基础上,针对阿特拉斯公司的交叉多极子阵列声波测井(XMACⅡ)提供的单极波形信息,研究纵波时差提取及高分辨率处理方法。首先利用相关-互功谱法高精度地提取纵波时差,然后针对XMACⅡ仪器的接收阵列,研究组合子阵列的方法,形成共发射子阵列和共接收子阵列,最后利用子阵列对提取的纵波时差做高分辨率处理。处理现场实际测井资料,并将高分辨率处理成果与引进的eXpress软件处理成果、实测的国产高分辨率声波(纵波)测井曲线及岩心纵波时差对比分析,表明该方法提取的纵波时差曲线的纵向分辨率有很大提高,时差计算准确可靠,提取的单极纵波时差与国产高分辨率声波时差及岩心纵波时差的平均相对误差均小于7%。该方法具有较高的实用价值和广阔的应用前景。  相似文献   
5.
含硫化氢气井钻井过程中的腐蚀因素与防护研究   总被引:1,自引:0,他引:1  
在含硫气井的钻井过程中对于HRC大于22的钻具钢材除了腐蚀疲劳之外,在pH值小于9的环境中会发生硫化物应力腐蚀破裂,这种破坏比腐蚀疲劳更突然、更快,使钻杆大量损坏。含硫气井在钻井过程中,由于湿硫化氢的出现,常常会出现油管、套管、钻井设备、钻井仪器以及对支持保护管柱的水泥环柱等腐蚀和损坏问题,为此,阐述了湿硫化氢的腐蚀特点、机理,归纳总结了影响腐蚀的因素,综述了如何在这些方面防止其腐蚀,使损失减小,为指导油管、套管防腐工程实践提供了依据。建议在钻井过程中采用碱性钻井液,其pH值可到9或更高(至pH值12),以减缓或防止钻井过程中电化学从硫化物应力腐蚀破裂;含硫气井用的钻杆应该间歇使用。钻杆停用堆置时间可使其放氢,使钻杆恢复韧性,防止硫化物应力腐蚀断裂。  相似文献   
6.
Depending on whether bidirectional links or unidirectional links are used for communications, the network topology under a given range assignment is either an undirected graph referred to as the bidirectional topology, or a directed graph referred to as the unidirectional topology. The Min-Power Bidirectional (resp., Unidirectional) k-Node Connectivity problem seeks a range assignment of minimum total power subject to the constraint that the produced bidirectional (resp. unidirectional) topology is k-vertex connected. Similarly, the Min-Power Bidirectional (resp., Unidirectional) k-Edge Connectivity problem seeks a range assignment of minimum total power subject to the constraint the produced bidirectional (resp., unidirectional) topology is k-edge connected. The Min-Power Bidirectional Biconnectivity problem and the Min-Power Bidirectional Edge-Biconnectivity problem have been studied by Lloyd et al. [23]. They show that range assignment based the approximation algorithm of Khuller and Raghavachari [18], which we refer to as Algorithm KR, has an approximation ratio of at most 2(2 – 2/n)(2 + 1/n) for Min-Power Bidirectional Biconnectivity, and range assignment based on the approximation algorithm of Khuller and Vishkin [19], which we refer to as Algorithm KV, has an approximation ratio of at most 8(1 – 1/n) for Min-Power Bidirectional Edge-Biconnectivity. In this paper, we first establish the NP-hardness of Min-Power Bidirectional (Edge-) Biconnectivity. Then we show that Algorithm KR has an approximation ratio of at most 4 for both Min-Power Bidirectional Biconnectivity and Min-Power Unidirectional Biconnectivity, and Algorithm KV has an approximation ratio of at most 2k for both Min-Power Bidirectional k-Edge Connectivity and Min-Power Unidirectional k-Edge Connectivity. We also propose a new simple constant-approximation algorithm for both Min-Power Bidirectional Biconnectivity and Min-Power Unidirectional Biconnectivity. This new algorithm applies only to Euclidean instances, but is best suited for distributed implementation. A preliminary version of this work appeared in the proceedings of the 2nd International Conference on AD-HOC Network and Wireless (Adhoc-Now 2003). Research performed in part while visiting the Max-Plank-Institut fur Informatik. Gruia Calinescu is an Assistant Professor of Computer Science at the Illinois Institute of Technology since 2000. He held postdoc or visiting researcher positions at DIMACS, University of Waterloo, and Max-Plank Institut fur Informatik. Gruia has a Diploma from University of Bucharest and a Ph.D. from Georgia Insitute of Technology. His research interests are in the area of algorithms. Peng-Jun Wan has joined the Computer Science Department at Illinois Institute of Technology in 1997 and has been an Associate Professor since 2004. He received his Ph.D. in Computer Science from University of Minnesota in 1997, M.S. in Operations Research and Control Theory from Chinese Academy of Science in 1993, and B.S. in Applied Mathematics from Tsinghua University in 1990. His research interests include optical networks and wireless networks.  相似文献   
7.
Lin et al., (2003) proposed a remote user authentication scheme for multi-server architecture. In this paper, we breaks this scheme by giving an attack. Our attack allows an adversary to impersonate any user in the system, as long as a single authentication message of that user is observed.  相似文献   
8.
一种基于空间到达角的卫星电子侦察信号分选方法   总被引:1,自引:0,他引:1  
在建立简化的卫星电子侦察空间模型的基础上,提出了一种利用空间到达角分选卫星电子侦察信号的新方法。通过仿真实验验证了这种方法的可行性。该方法可用于密集信号的预处理。  相似文献   
9.
介绍了在波分复用(WDM)系统中分布式光纤拉曼放大器(FRA)的理论分析模型。在此基础上,对增益平坦设计所需考虑的因素进行了分析;最后通过试验证明了它的有效性。  相似文献   
10.
Disturbance-observer (DOB)-based controller design is one of the most popular methods in the field of motion control. In this paper, the generalized disturbance compensation framework, named the robust internal-loop compensator (RIC) is introduced and an advanced design method of a DOB is proposed based on the RIC. The mixed sensitivity optimization problem, which is the main issue of DOB design, is also solved through the parametrization of the DOB in the RIC framework. Differently from conventional methods, the Q-filter is separated from the mixed sensitivity optimization problem and a systematic design law for the DOB is proposed. This guarantees the robustness and optimality of the DOB and enables the design for unstable plants.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号