全文获取类型
收费全文 | 6335篇 |
免费 | 535篇 |
国内免费 | 390篇 |
专业分类
电工技术 | 640篇 |
综合类 | 670篇 |
化学工业 | 55篇 |
金属工艺 | 17篇 |
机械仪表 | 157篇 |
建筑科学 | 655篇 |
矿业工程 | 92篇 |
能源动力 | 198篇 |
轻工业 | 48篇 |
水利工程 | 164篇 |
石油天然气 | 49篇 |
武器工业 | 11篇 |
无线电 | 903篇 |
一般工业技术 | 401篇 |
冶金工业 | 345篇 |
原子能技术 | 7篇 |
自动化技术 | 2848篇 |
出版年
2024年 | 17篇 |
2023年 | 55篇 |
2022年 | 102篇 |
2021年 | 131篇 |
2020年 | 192篇 |
2019年 | 127篇 |
2018年 | 163篇 |
2017年 | 167篇 |
2016年 | 213篇 |
2015年 | 214篇 |
2014年 | 380篇 |
2013年 | 456篇 |
2012年 | 418篇 |
2011年 | 450篇 |
2010年 | 438篇 |
2009年 | 412篇 |
2008年 | 553篇 |
2007年 | 555篇 |
2006年 | 454篇 |
2005年 | 396篇 |
2004年 | 320篇 |
2003年 | 247篇 |
2002年 | 141篇 |
2001年 | 123篇 |
2000年 | 104篇 |
1999年 | 78篇 |
1998年 | 46篇 |
1997年 | 45篇 |
1996年 | 38篇 |
1995年 | 39篇 |
1994年 | 34篇 |
1993年 | 15篇 |
1992年 | 7篇 |
1991年 | 15篇 |
1990年 | 12篇 |
1989年 | 11篇 |
1988年 | 8篇 |
1987年 | 5篇 |
1986年 | 9篇 |
1985年 | 3篇 |
1984年 | 7篇 |
1982年 | 7篇 |
1981年 | 5篇 |
1980年 | 4篇 |
1979年 | 3篇 |
1973年 | 4篇 |
1966年 | 5篇 |
1956年 | 6篇 |
1955年 | 6篇 |
1954年 | 2篇 |
排序方式: 共有7260条查询结果,搜索用时 31 毫秒
31.
景电高扬程灌区水价改革实践及思考 总被引:1,自引:0,他引:1
水价是水商品价值的体现。由于多方面的原因,水价改革的进程与水商品生产经营的市场化供求关系还不相适应,致使现行水价不能体现水资源的市场需求价值。回顾总结景电灌区水价调整改革的实践,可以为西北高扬程灌区水价改革提供借鉴。 相似文献
32.
Comments on the original article, The dismantling of our health system: Strategies for the survival of psychological practice by Nicholas A. Cummings (see record 1986-22651-001). In response to this article, the current author says "no, no, no!" He believes that "survival with this degree of compromise amounts to doing anything for a buck." (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
33.
34.
Domenico Ferrari 《Multimedia Systems》1998,6(3):179-185
The research done by the Tenet Group in multimedia networking has reached a point where it may be useful to reflect on the
significance of its results for the current debate on how integrated-services internetworks should be designed. Such reflections
constitute the main subject of this paper. The principles of the work and the conclusions reached so far by the Tenet researchers
are discussed in the light of the conflict between the two major technologies being proposed to build future information infrastructures:
namely, the Internet and the ATM technologies. The Tenet approach suggests one feasible way for resolving the conflict to
the advantage of all the users of those infrastructures. This paper discusses various fundamental aspects of integrated-services
network design: the choice of the service model, the type of charging policy to be adopted, and the selection of a suitable
architecture. 相似文献
35.
36.
37.
Transmission pricing has become a major issue in the discussions about the deregulated electricity markets.Consequently,open access to the transmission system is one of the basic topics to allow competition among participants in the energy market.Transmission costs have an important impact on relative competition among participants in the energy market as well as on short-and long-term economic efficiencies of the whole electricity industry,although they represent only close to 10% of the energy market price.This paper deals with the design and tests of a transmission pricing method based on the optimal circuit prices derived from the economically adapted network(EAN).Prices derived from the EAN have the advantage of being in tune with the maximum revenue allowed to the owner of transmission assets and simplifying the optimal allocation of transmission costs among participants.Beginning from the conceptual design,the proposed method is tested on a three-bus network and on the IEEE 24-bus reliability test system. 相似文献
38.
软件服务外包作为一个新型的软件产业方兴未艾,这种贸易方式加强了国际间的合作与区域性产业的互补。作为中国的近邻日本,这种互补方式的优势显得尤为突出。但是,由于中国外包企业的竞争力较弱、技术力量不够雄厚、企业规模尚未形成等弱点存在,大大制约着中国软件服务外包业的进一步发展。特别是随着诸多新兴接包国家和地区的崛起,使得中国所面临的竞争进一步加大,从前的低成本优势将得到削弱。这些都严重地制约着中国软件服务外包行业的健康发展。有序地调整以低端为主的产业结构,提高自主创新能力,加大服务外包在国家IT(Information Technology)产业中的比重,从而增强核心竞争力。 相似文献
39.
Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework is developed by means of a methodology based on a heuristic theory that incorporates knowledge generated by existing works as well as the experience of their implementation. The paper presents the design details of the framework, which consists of three stages: identification of data security requirements, management of data security risks and evaluation of data security performance in CCS. 相似文献
40.
文章提出了一种基于虚拟化的服务备份技术,该技术能够以较低的成本投入实现在提供的服务崩溃时迅速恢复服务,提高用户对服务的满意度,同时,文章对就影响该技术实现效果的服务备份速度、服务恢复速度、负载均衡三个因素进行了研究,提出了解决方案。 相似文献