全文获取类型
收费全文 | 41900篇 |
免费 | 3635篇 |
国内免费 | 1957篇 |
专业分类
电工技术 | 2442篇 |
技术理论 | 2篇 |
综合类 | 3165篇 |
化学工业 | 7332篇 |
金属工艺 | 2428篇 |
机械仪表 | 2648篇 |
建筑科学 | 3225篇 |
矿业工程 | 1154篇 |
能源动力 | 1168篇 |
轻工业 | 2871篇 |
水利工程 | 816篇 |
石油天然气 | 2059篇 |
武器工业 | 358篇 |
无线电 | 4630篇 |
一般工业技术 | 5185篇 |
冶金工业 | 1887篇 |
原子能技术 | 413篇 |
自动化技术 | 5709篇 |
出版年
2024年 | 173篇 |
2023年 | 633篇 |
2022年 | 976篇 |
2021年 | 1505篇 |
2020年 | 1151篇 |
2019年 | 1034篇 |
2018年 | 1136篇 |
2017年 | 1219篇 |
2016年 | 1067篇 |
2015年 | 1562篇 |
2014年 | 1868篇 |
2013年 | 2291篇 |
2012年 | 2474篇 |
2011年 | 2588篇 |
2010年 | 2437篇 |
2009年 | 2431篇 |
2008年 | 2275篇 |
2007年 | 2294篇 |
2006年 | 2454篇 |
2005年 | 2002篇 |
2004年 | 1511篇 |
2003年 | 1645篇 |
2002年 | 1960篇 |
2001年 | 1639篇 |
2000年 | 1143篇 |
1999年 | 1170篇 |
1998年 | 888篇 |
1997年 | 737篇 |
1996年 | 698篇 |
1995年 | 587篇 |
1994年 | 445篇 |
1993年 | 353篇 |
1992年 | 279篇 |
1991年 | 194篇 |
1990年 | 156篇 |
1989年 | 126篇 |
1988年 | 105篇 |
1987年 | 62篇 |
1986年 | 45篇 |
1985年 | 30篇 |
1984年 | 30篇 |
1983年 | 21篇 |
1982年 | 21篇 |
1981年 | 17篇 |
1980年 | 25篇 |
1979年 | 9篇 |
1978年 | 4篇 |
1977年 | 3篇 |
1976年 | 8篇 |
1951年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
2.
Ye Wan Jun Tan Guangling Song Chuanwei Yan 《Metallurgical and Materials Transactions A》2006,37(7):2313-2316
The focused ion beam technique was employed to investigate the atmospheric corrosion morphology of AZ91D. It was found that
the α matrix of the alloy was preferentially corroded in the areas adjacent to intermetallic phases. The most interesting
finding was that the corrosion products in corrosion cavities were pelletlike, which has never been reported before. 相似文献
3.
Qin Song Zou Xubiao Zhong Yan Zhang Zhongdong 《中国炼油与石油化工》2006,(1):31-35
1 Introduction Propylene as an important feedstock for organic chemicals is mainly originated from steam cracking and catalytic cracking processes. During the FCC process the propylene content varies with the FCC catalyst and process technology adopted, resulting in significant difference in propylene concentration in the cracked product——LPG. The conventional FCC pro- cess generally gives a propylene yield of around 4%, while the FCC process with maximization of propylene yield can in… 相似文献
4.
在充分调研阵列声波测井分波提取方法的基础上,针对阿特拉斯公司的交叉多极子阵列声波测井(XMACⅡ)提供的单极波形信息,研究纵波时差提取及高分辨率处理方法。首先利用相关-互功谱法高精度地提取纵波时差,然后针对XMACⅡ仪器的接收阵列,研究组合子阵列的方法,形成共发射子阵列和共接收子阵列,最后利用子阵列对提取的纵波时差做高分辨率处理。处理现场实际测井资料,并将高分辨率处理成果与引进的eXpress软件处理成果、实测的国产高分辨率声波(纵波)测井曲线及岩心纵波时差对比分析,表明该方法提取的纵波时差曲线的纵向分辨率有很大提高,时差计算准确可靠,提取的单极纵波时差与国产高分辨率声波时差及岩心纵波时差的平均相对误差均小于7%。该方法具有较高的实用价值和广阔的应用前景。 相似文献
5.
含硫化氢气井钻井过程中的腐蚀因素与防护研究 总被引:1,自引:0,他引:1
在含硫气井的钻井过程中对于HRC大于22的钻具钢材除了腐蚀疲劳之外,在pH值小于9的环境中会发生硫化物应力腐蚀破裂,这种破坏比腐蚀疲劳更突然、更快,使钻杆大量损坏。含硫气井在钻井过程中,由于湿硫化氢的出现,常常会出现油管、套管、钻井设备、钻井仪器以及对支持保护管柱的水泥环柱等腐蚀和损坏问题,为此,阐述了湿硫化氢的腐蚀特点、机理,归纳总结了影响腐蚀的因素,综述了如何在这些方面防止其腐蚀,使损失减小,为指导油管、套管防腐工程实践提供了依据。建议在钻井过程中采用碱性钻井液,其pH值可到9或更高(至pH值12),以减缓或防止钻井过程中电化学从硫化物应力腐蚀破裂;含硫气井用的钻杆应该间歇使用。钻杆停用堆置时间可使其放氢,使钻杆恢复韧性,防止硫化物应力腐蚀断裂。 相似文献
6.
Depending on whether bidirectional links or unidirectional links are used for communications, the network topology under a
given range assignment is either an undirected graph referred to as the bidirectional topology, or a directed graph referred
to as the unidirectional topology. The Min-Power Bidirectional (resp., Unidirectional) k-Node Connectivity problem seeks a range assignment of minimum total power subject to the constraint that the produced bidirectional
(resp. unidirectional) topology is k-vertex connected. Similarly, the Min-Power Bidirectional (resp., Unidirectional) k-Edge Connectivity problem seeks a range assignment of minimum total power subject to the constraint the produced bidirectional
(resp., unidirectional) topology is k-edge connected.
The Min-Power Bidirectional Biconnectivity problem and the Min-Power Bidirectional Edge-Biconnectivity problem have been studied
by Lloyd et al. [23]. They show that range assignment based the approximation algorithm of Khuller and Raghavachari [18],
which we refer to as Algorithm KR, has an approximation ratio of at most 2(2 – 2/n)(2 + 1/n) for Min-Power Bidirectional Biconnectivity, and range assignment based on the approximation algorithm of Khuller and Vishkin [19],
which we refer to as Algorithm KV, has an approximation ratio of at most 8(1 – 1/n) for Min-Power Bidirectional Edge-Biconnectivity.
In this paper, we first establish the NP-hardness of Min-Power Bidirectional (Edge-) Biconnectivity. Then we show that Algorithm KR has an approximation ratio of at most 4 for both Min-Power Bidirectional Biconnectivity and Min-Power Unidirectional Biconnectivity,
and Algorithm KV has an approximation ratio of at most 2k for both Min-Power Bidirectional k-Edge Connectivity and Min-Power Unidirectional k-Edge Connectivity. We also propose a new simple constant-approximation algorithm for both Min-Power Bidirectional Biconnectivity
and Min-Power Unidirectional Biconnectivity. This new algorithm applies only to Euclidean instances, but is best suited for
distributed implementation.
A preliminary version of this work appeared in the proceedings of the 2nd International Conference on AD-HOC Network and Wireless
(Adhoc-Now 2003).
Research performed in part while visiting the Max-Plank-Institut fur Informatik.
Gruia Calinescu is an Assistant Professor of Computer Science at the Illinois Institute of Technology since 2000. He held postdoc or visiting
researcher positions at DIMACS, University of Waterloo, and Max-Plank Institut fur Informatik. Gruia has a Diploma from University
of Bucharest and a Ph.D. from Georgia Insitute of Technology. His research interests are in the area of algorithms.
Peng-Jun Wan has joined the Computer Science Department at Illinois Institute of Technology in 1997 and has been an Associate Professor
since 2004. He received his Ph.D. in Computer Science from University of Minnesota in 1997, M.S. in Operations Research and
Control Theory from Chinese Academy of Science in 1993, and B.S. in Applied Mathematics from Tsinghua University in 1990.
His research interests include optical networks and wireless networks. 相似文献
7.
Xiang Cao Sheng Zhong 《Communications Letters, IEEE》2006,10(8):580-581
Lin et al., (2003) proposed a remote user authentication scheme for multi-server architecture. In this paper, we breaks this scheme by giving an attack. Our attack allows an adversary to impersonate any user in the system, as long as a single authentication message of that user is observed. 相似文献
8.
9.
10.
Bong Keun Kim Wan Kyun Chung 《Industrial Electronics, IEEE Transactions on》2003,50(6):1207-1216
Disturbance-observer (DOB)-based controller design is one of the most popular methods in the field of motion control. In this paper, the generalized disturbance compensation framework, named the robust internal-loop compensator (RIC) is introduced and an advanced design method of a DOB is proposed based on the RIC. The mixed sensitivity optimization problem, which is the main issue of DOB design, is also solved through the parametrization of the DOB in the RIC framework. Differently from conventional methods, the Q-filter is separated from the mixed sensitivity optimization problem and a systematic design law for the DOB is proposed. This guarantees the robustness and optimality of the DOB and enables the design for unstable plants. 相似文献