首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   559篇
  免费   6篇
电工技术   8篇
化学工业   44篇
金属工艺   20篇
机械仪表   64篇
建筑科学   49篇
矿业工程   18篇
能源动力   3篇
轻工业   1篇
水利工程   10篇
石油天然气   30篇
无线电   22篇
一般工业技术   109篇
冶金工业   133篇
原子能技术   42篇
自动化技术   12篇
  2022年   7篇
  2021年   13篇
  2019年   5篇
  2018年   26篇
  2017年   22篇
  2016年   25篇
  2015年   8篇
  2014年   19篇
  2013年   25篇
  2012年   18篇
  2011年   24篇
  2010年   13篇
  2009年   12篇
  2008年   22篇
  2007年   14篇
  2006年   12篇
  2005年   23篇
  2004年   13篇
  2003年   12篇
  2002年   8篇
  2001年   12篇
  2000年   7篇
  1999年   10篇
  1998年   11篇
  1994年   5篇
  1993年   6篇
  1992年   6篇
  1991年   7篇
  1988年   8篇
  1986年   7篇
  1985年   12篇
  1984年   6篇
  1983年   5篇
  1981年   6篇
  1980年   6篇
  1979年   5篇
  1978年   7篇
  1977年   8篇
  1976年   5篇
  1975年   12篇
  1973年   8篇
  1972年   6篇
  1971年   6篇
  1970年   4篇
  1969年   7篇
  1968年   7篇
  1966年   6篇
  1965年   4篇
  1960年   4篇
  1959年   6篇
排序方式: 共有565条查询结果,搜索用时 593 毫秒
1.
Journal of Communications Technology and Electronics - A new design of wavelets based on the convolution of a compactly supported function with a rectangular pulse is proposed and theoretically...  相似文献   
2.
3.
4.
Translated from Atomnaya Énergiya, Vol. 73, No. 5, pp. 350–354, November, 1992.  相似文献   
5.
The ARM-Uchet computerized system is considered, which is intended for accounting, planning, and monitoring for metrological support to an organization and has been implemented on an IBM PC AT. Schemes are given for the basic modes of operation and for the software suites, as well as the database structure.Translated from Izmeritel'naya Tekhnika, No. 7, pp. 70–71, July, 1994.  相似文献   
6.
7.
The theoretical analysis has demonstrated that the width of a pulse from a detector can be reduced by using an inductive-resistive load. A criterion for selecting parameters of the electric load based on the shape of the frequency characteristic has been suggested. Optimal resonant frequencies and Q-factors for transducers from the TsTSNV-1 ceramics have been determined.  相似文献   
8.
A. A. Bochvar All-Union Scientific-Research Institute of Standardization in Machine Engineering. Moscow Engineering Physics Institute. Translated from Atomnaya énergiya, Vol. 77, No. 2, pp. 123–129, August, 1994.  相似文献   
9.
Conclusions 1. In the investigated loams loosely bound water occupies no more than 3% of the total volume of their pores. 2. In fully saturated clayey soil, a "pore pressure peak" is absent after application of the load. On the graph of further dissipation of Δp with respect to the square root of time for △σ/△1j>1/2 there is a straight portion. 3. An implicit relation has been proposed which satisfactorily describes the viscosity properties of clayey soils over the entire range of their possible compression rates in the stabilized and nonstabilized states. 4. An analysis method was worked out for one-dimensional consolidation of a water-saturated clayey base, which takes into account in an integrated way its bedding, the loading rate, the geometric nonlinearity, and the variability of the soil compressibility, viscosity, and permeability. The analysis was performed numerically and by means of a computer program. Comparison of the analysis results by the program with established and well-known experimental laws as well as with test data for the "Ol’gino" site showed that the proposed analysis method reliably describes the process of one-dimensional consolidation of water-saturated clayey soils. VNIIOSP Institute. Translated from Osnovaniya, Fundamenty i Mekhanika Gruntov, No. 3 pp. 21–24, May–June, 1991.  相似文献   
10.
To defend oneself against botnet attacks, one must have tools that make it possible to investigate the processes occurring on all stages of the lifecycle of botnets (propagation, control, attack) and possess defense mechanisms that can counteract botnets. A simulation-based approach to the investigation of botnets and the corresponding defense mechanisms is proposed. The simulation is performed using a special software environment developed by the authors. The architecture of this environment and the libraries needed to create models of botnets and defense mechanisms are described. Experimental data demonstrating the capabilities of the simulation environment for studying various stages of the botnet lifecycle and the efficiency of the corresponding defense mechanisms are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号