全文获取类型
收费全文 | 9029篇 |
免费 | 1051篇 |
国内免费 | 728篇 |
学科分类
工业技术 | 10808篇 |
出版年
2024年 | 37篇 |
2023年 | 107篇 |
2022年 | 155篇 |
2021年 | 189篇 |
2020年 | 272篇 |
2019年 | 218篇 |
2018年 | 202篇 |
2017年 | 284篇 |
2016年 | 285篇 |
2015年 | 352篇 |
2014年 | 495篇 |
2013年 | 498篇 |
2012年 | 606篇 |
2011年 | 647篇 |
2010年 | 539篇 |
2009年 | 617篇 |
2008年 | 545篇 |
2007年 | 735篇 |
2006年 | 599篇 |
2005年 | 515篇 |
2004年 | 455篇 |
2003年 | 428篇 |
2002年 | 350篇 |
2001年 | 266篇 |
2000年 | 266篇 |
1999年 | 191篇 |
1998年 | 151篇 |
1997年 | 156篇 |
1996年 | 129篇 |
1995年 | 89篇 |
1994年 | 106篇 |
1993年 | 74篇 |
1992年 | 46篇 |
1991年 | 49篇 |
1990年 | 21篇 |
1989年 | 25篇 |
1988年 | 21篇 |
1987年 | 13篇 |
1986年 | 4篇 |
1985年 | 11篇 |
1984年 | 8篇 |
1983年 | 6篇 |
1982年 | 7篇 |
1981年 | 7篇 |
1980年 | 11篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1974年 | 3篇 |
1962年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
2.
含缺陷压力管道经缺陷评定合乎使用后,其疲劳寿命的估计具有重要的工程意义。将整个含缺陷压力管道作为一个整体,分析了含缺陷压力管道的疲劳裂纹扩展特点,提出了相应的含缺陷压力管道疲劳寿命的计算过程,并在基于可靠性评价的基础上,给出了核压力管道的可接受失效概率,最终得到了含缺陷核压力管道疲劳寿命预测方法。 相似文献
3.
带隔板底水油藏油井临界产量计算公式 总被引:25,自引:9,他引:16
本给出了带隔板底水油藏油井的监界产量计算公式,它适用于所有带隔板底水油藏的油井。 相似文献
4.
John Watrous 《Computational Complexity》2003,12(1-2):48-84
This paper studies the space-complexity of predicting the
long-term behavior of a class of stochastic processes based on evolutions
and measurements of quantum mechanical systems. These processes
generalize a wide range of both quantum and classical space-bounded
computations, including unbounded error computations given by machines
having algebraic number transition amplitudes or probabilities.
It is proved that any space s quantum stochastic process from this class
can be simulated probabilistically with unbounded error in space O(s),
and therefore deterministically in space O(s2). 相似文献
5.
恰当选择原材料、确保铆接工序质量、重视工作电解液的配比、严控各工序成品率是提高超小型铝电解电容器投入产出一次合格率的关键。以10V-47μF(4mm×7mm)产品为例,投入产出一次合格率达94%以上。 相似文献
6.
F. Pasquarelli 《Journal of scientific computing》1995,10(3):289-304
The multidomain technique for elliptic problems, that allows the fulfillment of the interface conditions by means of a suitable combination of the continuity of the solution and of its normal derivative, is considered. Some choices of this combination are investigated and, in particular, a choice that allows the solution of the multidomain problem through two solutions for each subproblem, is proposed. The scheme has been discretized with a collocation method and some numerical tests are reported. Moreover the method is compared with the more classical Dirichlet/Neumann one as well as with the capacitance matrix method.This research has been supported by a grant from M.P.I. (40%). 相似文献
7.
Dmitri E. Nikonov George I. Bourianoff Paolo A. Gargini 《Journal of Superconductivity and Novel Magnetism》2006,19(6):497-513
Quantum limits of power dissipation in spintronic computing are estimated. A computing element composed of a single electron
in a quantum dot is considered. Dynamics of its spin due to external magnetic field and interaction with adjacent dots are
described via the Bloch equations. Spin relaxation due to magnetic noise from various sources is described as coupling to
a reservoir. Resulting dissipation of energy is calculated and is shown to be much less than the thermal limit, ∼kT per bit,
if the rate of spin relaxation is much slower than the switching rate. Clues on how to engineer an energy efficient spintronic
device are provided. 相似文献
8.
9.
Oded Goldreich 《Distributed Computing》2003,16(2-3):177-199
We survey the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems. We start by presenting some of the central tools (e.g., computational difficulty, pseudorandomness, and zero-knowledge proofs), and next turn to the treatment of encryption and signature schemes. We conclude with an extensive treatment of secure cryptographic protocols both when executed in a stand-alone manner and when many sessions of various protocols are concurrently executed and controlled by an adversary. The survey is intended for researchers in distributed computing, and assumes no prior familiarity with cryptography.Received: June 2001, Accepted: July 2002, 相似文献
10.