首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   28936篇
  免费   1129篇
  国内免费   126篇
电工技术   416篇
综合类   68篇
化学工业   5717篇
金属工艺   587篇
机械仪表   658篇
建筑科学   2050篇
矿业工程   163篇
能源动力   831篇
轻工业   2417篇
水利工程   202篇
石油天然气   80篇
武器工业   4篇
无线电   2946篇
一般工业技术   5157篇
冶金工业   3876篇
原子能技术   170篇
自动化技术   4849篇
  2023年   178篇
  2022年   178篇
  2021年   607篇
  2020年   366篇
  2019年   395篇
  2018年   596篇
  2017年   505篇
  2016年   664篇
  2015年   589篇
  2014年   821篇
  2013年   1823篇
  2012年   1382篇
  2011年   1834篇
  2010年   1326篇
  2009年   1332篇
  2008年   1591篇
  2007年   1414篇
  2006年   1237篇
  2005年   1113篇
  2004年   978篇
  2003年   898篇
  2002年   816篇
  2001年   563篇
  2000年   542篇
  1999年   600篇
  1998年   881篇
  1997年   640篇
  1996年   546篇
  1995年   465篇
  1994年   409篇
  1993年   422篇
  1992年   326篇
  1991年   276篇
  1990年   253篇
  1989年   273篇
  1988年   228篇
  1987年   218篇
  1986年   210篇
  1985年   295篇
  1984年   239篇
  1983年   206篇
  1982年   203篇
  1981年   229篇
  1980年   155篇
  1979年   168篇
  1978年   158篇
  1977年   145篇
  1976年   181篇
  1975年   133篇
  1974年   115篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
81.
Depression is a widespread disorder with devastating individual and societal consequences. Although a great deal of research and theory has focused on treatment of acute episodes, progress needs to be made in preventing the emergence of first episodes of the disorder. There has been considerable advancement in understanding psychological vulnerability factors associated with this mood disorder, especially on the basis of cognitive behavioural models and research findings based on this theoretical model. In this paper we review the concept of cognitive vulnerability, with a particular focus on what this body of research work suggests clinically for the prevention of depression. We outline, based on this science, what the effective ingredients of a prevention program could be. We also discuss some of the pragmatic aspects of developing an effective prevention program for depression. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
82.
Defining visualization education is still a work in progress. Visualization education is not just a subject within computer science. Computer scientists are not always the appropriate choice to teach visualization courses on their own. Visualization is not just mastering a set of concepts but acquiring skills. Student should learn by doing, either using one tool or a variety of tools, depending on the course's focus.  相似文献   
83.
Fundamental concepts of tension stiffening are used to explain why Branson’s equation for the effective moment of inertia Ie does not predict deflection well for fiber reinforced polymer (FRP) reinforced concrete beams. The tension stiffening component in Branson’s equation is shown to depend on the ratio of gross-to-cracked moment of inertia (Ig/Icr), and gives too much tension stiffening for beams with an Ig/Icr ratio greater than 3. FRP beams typically have an Ig/Icr ratio greater than 5, leading to a much stiffer response and underprediction of computed deflections as observed by others in the past. One common approach to computing deflection of FRP reinforced concrete beams has been to use a modified form of the Branson equation. This paper presents a rational development of appropriate modification factors needed to reduce the tension stiffening component in Branson’s original expression to realistic levels. Computed deflections using this approach give reasonable results with the right modification factor, and compare well with a more general unified approach that incorporates a realistic tension stiffening model. Comparison is made with the existing and past correction factors recommended by ACI 440 for predicting deflection of FRP beams. The method presently used by ACI 440 gives reasonable estimates of deflection for glass and carbon FRP reinforced beams. However, this method underestimates deflection of aramid FRP reinforced beams and is restricted to rectangular sections. A proposal is made for adoption of a simple modification factor that works well for all types of FRP bar and beam cross-sectional shape.  相似文献   
84.
Ultrasound was applied to a micropipette micromixer to improve dispersion of gas and liquid in a microchannel. Flow visualization using a high-speed camera was performed to examine the effect of ultrasonic irradiation on bubble generation in the microchannel. Basically, nitrogen gas was injected using a (0.5 µm ID) glass micropipette into ethanol flowing in a rectangular (100 µm×200 µm) microchannel on polydimethylsiloxane (PDMS). Gas and liquid flow rates were regulated using mass flow controllers. At aflow condition that is typical of bubbly flow, ultrasound was transmitted into the microchannel using a piezo-electric (PZT) transducer over a range of operating voltages (2 to 200 Vp-p) and frequencies (50 to 60 kHz). Images captured during the action of the PZT transducer indicate that bubble formation is influenced by ultrasound. When subjected to ultrasound above 50 Vp-p and at the resonant frequency of the PZT transducer, bubbles formed that were smaller and closer together, signifying enhanced shearing of the gas at the micropipette tip by the liquid. The observation of gas slugs occurring sooner might be attributed to the coalescence of gas bubbles that became closely spaced.  相似文献   
85.
This investigation determined the influence of testosterone and neurobehavioral disinhibition (ND) on risk for substance use disorder (SUD). Testosterone level during puberty was hypothesized to promote social dominance associated with norm-violating behavior that, in turn, predisposes individuals to use of illicit drugs and, subsequently, SUD. Using a prospective paradigm, the authors recruited 179 boys (mean age=11.62 years, SD=0.88) and followed up when participants were ages 12-14, 16, 19, and 22. Results indicated that social dominance/norm-violating behavior (SD/NVB) at age 16 mediated the association between testosterone level (ages 12-14) and SUD (age 22). In addition, SD/NVB mediated the association between ND and SUD. These findings suggest that development of SUD is influenced by androgen-dependent and neurobehavioral processes via a social motivational style characterized by SD/NVB. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
86.
Ready-to-drinks (RTDs) are composed of an alcoholic component and a soft-drink base and are primarily consumed by a youth market. The authors explored whether liking and experience with an RTD soft-drink base predicts liking for the RTD. Participants (N=350) from ages 12 to 30 years sampled 3 RTDs and their respective soft-drink and alcoholic components. For milk- and fruit-based RTDs, liking for and familiarity with their soft-drink base was the best predictor of liking for and familiarity with the RTD itself. For the Coke-based RTD, familiarity with and liking for bourbon best predicted familiarity with and liking for the RTD. All of these effects were consistent across blind and nonblind testing. The authors' results suggest that where there is perceptual similarity between the RTD and its soft-drink base, these beverages may provide an easy transition into alcohol consumption for novice drinkers. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
87.
A good understanding of environmental effects on structural modal properties is essential for reliable performance of vibration-based damage diagnosis methods. In this paper, a method of combining principal component analysis (PCA) and support vector regression (SVR) technique is proposed for modeling temperature-caused variability of modal frequencies for structures instrumented with long-term monitoring systems. PCA is first applied to extract principal components from the measured temperatures for dimensionality reduction. The predominant feature vectors in conjunction with the measured modal frequencies are then fed into a support vector algorithm to formulate regression models that may take into account thermal inertia effect. The research is focused on proper selection of the hyperparameters to obtain SVR models with good generalization performance. A grid search method with cross validation and a heuristic method are utilized for determining the optimal values of SVR hyperparameters. The proposed method is compared with the method directly using measurement data to train SVR models and the multivariate linear regression (MLR) method through the use of long-term measurement data from a cable-stayed bridge. It is shown that PCA-compressed features make the training and validation of SVR models more efficient in both model accuracy and computational costs, and the formulated SVR model performs much better than the MLR model in generalization performance. When continuously measured data is available, the SVR model formulated taking into account thermal inertia effect can achieve more accurate prediction than that without considering thermal inertia effect.  相似文献   
88.
We prove that the one-dimensional sandpile prediction problem is in LOGDCFL, a subset of AC1. The previously best known upper bound on the ACi-scale was AC2. Furthermore, we prove that the one-dimensional sandpile prediction problem is hard for TC0 and thus not in AC1-ε for any constant ε > 0.  相似文献   
89.
This paper proposes an optimized content-aware authentication scheme for JPEG-2000 streams over lossy networks, where a received packet is consumed only when it is both decodable and authenticated. In a JPEG-2000 codestream, some packets are more important than others in terms of coding dependency and image quality. This naturally motivates allocating more redundant authentication information for the more important packets in order to maximize their probability of authentication and thereby minimize the distortion at the receiver. Towards this goal, with the awareness of its corresponding image content, we formulate an optimization framework to compute an authentication graph to maximize the expected media quality at the receiver, given specific authentication overhead and knowledge of network loss rate. System analysis and experimental results demonstrate that the proposed scheme achieves our design goal in that the rate-distortion (R-D) curve of the authenticated image is very close to the R-D curve when no authentication is required  相似文献   
90.
Multichannel security protocols transmit messages over multiple communication channels, taking into account each channel's security properties. Our first intentional use of these protocols goes back to a 1999 article that proposed physical contact for imprinting as opposed to the wireless channel used in subsequent operations. Only later did we understand three key points. First, explicit use of multiple channels in the same protocol can offer significant advantages for both security and usability. Second, explicitly stating the properties of the channel on which each protocol message is transmitted is useful for understanding one's own protocol in greater depth and therefore for addressing subtle vulnerabilities early on. Third, multichannel protocols existed long before we recognized them as such - think of the courier handcuffed to the briefcase carrying the code book that will later protect postal or telegraphic traffic. The paper presents a security protocol that exploit additional transmissions over lower-capacity channels, typically found in ubicomp environments, that offer a different combination of security properties.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号