首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   23807篇
  免费   803篇
  国内免费   83篇
电工技术   313篇
综合类   45篇
化学工业   5208篇
金属工艺   501篇
机械仪表   468篇
建筑科学   1755篇
矿业工程   161篇
能源动力   696篇
轻工业   2201篇
水利工程   190篇
石油天然气   60篇
武器工业   1篇
无线电   1550篇
一般工业技术   4292篇
冶金工业   3142篇
原子能技术   160篇
自动化技术   3950篇
  2023年   154篇
  2022年   312篇
  2021年   537篇
  2020年   318篇
  2019年   327篇
  2018年   502篇
  2017年   435篇
  2016年   536篇
  2015年   484篇
  2014年   699篇
  2013年   1524篇
  2012年   1093篇
  2011年   1535篇
  2010年   1109篇
  2009年   1069篇
  2008年   1290篇
  2007年   1124篇
  2006年   966篇
  2005年   884篇
  2004年   799篇
  2003年   712篇
  2002年   675篇
  2001年   408篇
  2000年   394篇
  1999年   439篇
  1998年   487篇
  1997年   428篇
  1996年   386篇
  1995年   333篇
  1994年   336篇
  1993年   325篇
  1992年   267篇
  1991年   234篇
  1990年   219篇
  1989年   249篇
  1988年   197篇
  1987年   199篇
  1986年   190篇
  1985年   255篇
  1984年   225篇
  1983年   189篇
  1982年   181篇
  1981年   206篇
  1980年   146篇
  1979年   159篇
  1978年   150篇
  1977年   138篇
  1976年   157篇
  1975年   126篇
  1974年   111篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
2.
Accurate numerical evaluation of integrals arising in the boundary element method is fundamental to achieving useful results via this solution technique. In this paper, a number of techniques are considered to evaluate the weakly singular integrals which arise in the solution of Laplace's equation in three dimensions and Poisson's equation in two dimensions. Both are two‐dimensional weakly singular integrals and are evaluated using (in a product fashion) methods which have recently been used for evaluating one‐dimensional weakly singular integrals arising in the boundary element method. The methods used are based on various polynomial transformations of conventional Gaussian quadrature points where the transformation polynomial has zero Jacobian at the singular point. Methods which split the region of integration into sub‐regions are considered as well as non‐splitting methods. In particular, the newly introduced and highly accurate generalized composite subtraction of singularity and non‐linear transformation approach (GSSNT) is applied to various two‐dimensional weakly singular integrals. A study of the different methods reveals complex relationships between transformation orders, position of the singular point, integration kernel and basis function. It is concluded that the GSSNT method gives the best overall results for the two‐dimensional weakly singular integrals studied. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   
3.
4.
Robust programming aims to prevent abnormal termination or unexpected actions and requires code to handle bad (invalid or absurd) inputs in a way that is consistent with the developer's intent. For example, if an internal error occurs, the program might terminate gracefully rather than simply failing, providing enough information for the programmer to debug the program and avoiding giving the user additional access or information. This article focuses on teaching these principles.  相似文献   
5.
Recently it has been discovered that a nano-porous main group oxide 12CaO·7Al2O3 (C12A7) can be converted from a wide-gap insulator to a good transparent conductor. Using ab initio modelling we explain good conductivity of this material by very small barriers for hopping of localised electrons between neighbouring positive cages. We show that optical absorption of C12A7 in infrared region and at energies higher than 2.7 eV is due to inter-cage and intra-cage electron transitions, respectively. The proposed mechanisms can be useful in further search for conducting transparent media.  相似文献   
6.
Management of multidimensional discrete data   总被引:1,自引:0,他引:1  
Spatial database management involves two main categories of data: vector and raster data. The former has received a lot of in-depth investigation; the latter still lacks a sound framework. Current DBMSs either regard raster data as pure byte sequences where the DBMS has no knowledge about the underlying semantics, or they do not complement array structures with storage mechanisms suitable for huge arrays, or they are designed as specialized systems with sophisticated imaging functionality, but no general database capabilities (e.g., a query language). Many types of array data will require database support in the future, notably 2-D images, audio data and general signal-time series (1-D), animations (3-D), static or time-variant voxel fields (3-D and 4-D), and the ISO/IEC PIKS (Programmer's Imaging Kernel System) BasicImage type (5-D). In this article, we propose a comprehensive support ofmultidimensional discrete data (MDD) in databases, including operations on arrays of arbitrary size over arbitrary data types. A set of requirements is developed, a small set of language constructs is proposed (based on a formal algebraic semantics), and a novel MDD architecture is outlined to provide the basis for efficient MDD query evaluation.  相似文献   
7.
8.
Experiments showing the frequency and amplitude of the flow induced motion of the gate for a 2- and a 4-in. swing check valve have been performed. The gate motion is due to turbulence in approach flow. We have found the dominant turbulent frequency of the approach flow is about half the natural frequency of the valves. The valves appear to be almost critically damped. Because of this, the valves respond almost as they would to a static force of the magnitude characteristic of the turbulent fluctuation in the flow. Both the dimensionless exciting force and the damping ratio have been found to be independent of valve size so the above statements are true for larger valves also. The recommended valve oscillation amplitudes and frequencies are used to calculate the wear at the shaft and at the stop. For an unpegged check valve, such as one of the 10-in. valves which was used at the San Onofre Nuclear Generation Station, it was found that shaft bearing wear would amount to 0.27 in.3/year and stop wear to 0.03 in.3/year.  相似文献   
9.
10.
'Software defined radio' (SDR) is a technology that will appear in future generations of mobile phones, i.e. following the third-generation mobile phone technology that is currently being defined and developed. Early versions of 'pragmatic' SDR will allow the terminal to be reconfigured at any level of its protocol stack. Ultimately, the 'pure' SDR technology will allow a mobile phone or terminal to have its air interface software configured or reconfigured by other software (or software parameters) that have been downloaded to the terminal, e.g. over the air, or from a remote server via the Internet and one's personal computer (PC). A number of security issues arise with downloaded code that implements the air interface functions, and these may not be obvious simply from looking at the way PC software is updated on-line today. This paper starts with an outline of the code that allows a mobile phone to operate over a particular air interface. This sets the baseline for a discussion of the security issues surrounding the change of this code from one that is fixed and downloaded once only, to code that is reconfigurable during the life of a product.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号