首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17827篇
  免费   2312篇
  国内免费   1134篇
电工技术   2032篇
技术理论   6篇
综合类   2194篇
化学工业   706篇
金属工艺   126篇
机械仪表   462篇
建筑科学   3002篇
矿业工程   681篇
能源动力   486篇
轻工业   1421篇
水利工程   1345篇
石油天然气   584篇
武器工业   93篇
无线电   1373篇
一般工业技术   1277篇
冶金工业   1120篇
原子能技术   151篇
自动化技术   4214篇
  2024年   59篇
  2023年   284篇
  2022年   624篇
  2021年   788篇
  2020年   838篇
  2019年   614篇
  2018年   649篇
  2017年   622篇
  2016年   879篇
  2015年   793篇
  2014年   1422篇
  2013年   1459篇
  2012年   1490篇
  2011年   1523篇
  2010年   1162篇
  2009年   1163篇
  2008年   1135篇
  2007年   1229篇
  2006年   1140篇
  2005年   776篇
  2004年   653篇
  2003年   508篇
  2002年   369篇
  2001年   262篇
  2000年   192篇
  1999年   139篇
  1998年   96篇
  1997年   66篇
  1996年   55篇
  1995年   30篇
  1994年   36篇
  1993年   26篇
  1992年   20篇
  1991年   21篇
  1990年   21篇
  1989年   21篇
  1988年   13篇
  1987年   5篇
  1986年   8篇
  1985年   12篇
  1984年   8篇
  1983年   7篇
  1982年   8篇
  1981年   7篇
  1979年   7篇
  1978年   4篇
  1976年   7篇
  1964年   3篇
  1963年   3篇
  1961年   3篇
排序方式: 共有10000条查询结果,搜索用时 14 毫秒
91.
The scope of the paper is the assessment of the technical risk involved in long-term operation of power units. Detailed analyses have been conducted for steam turbine components. The sources and consequences of risk have been identified and the probability of turbine components failure calculated. The quantitative assessment of the risk has been made and possibilities of its reduction discussed.  相似文献   
92.
A statistical learning model is considered within the framework of the theory of uniform convergence of frequencies of errors in the case where the convergence is violated as a result of increasing the informativeness of training examples. Drawbacks of nonconstructive refinements of Vapnik-Chervonenkis estimates based on an assumption on the distribution law of violations are shown. A new approach to obtaining constructive estimates for mass data sets is proposed.  相似文献   
93.
Workers in medium- or high-risk professions are often confronted with critical incidents at the workplace. The impact of these acute stressors may be serious and enduring. Many workers also experience chronic job stressors, such as work overload or role conflicts. This study examined the frequently neglected relationship of acute and chronic stressors with self-reported health symptoms, such as posttraumatic responses, fatigue, and burnout. This association was investigated in a sample of forensic doctors in the Netherlands (N = 84). It was found that the more traumatic events the respondents experienced, the more problems they reported in coping with the traumatic events. Chronic job stressors were associated with posttraumatic responses (intrusions and avoidances) and with burnout and fatigue. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
94.
Psychologists are often asked to testify in court. However, concerns have been expressed in both the legal and psychological literatures about the quality of these services. This article presents survey results comparing the practice patterns of generally licensed psychologists with those of specialist forensic diplomates in providing risk evaluations. Results suggest that general clinicians frequently perform these evaluations, but forensic diplomates use more modern risk instruments, are more aware of the scientific literature, and provide the court with more information about the scientific basis of their testimony. The implication of these results for legal professionals, psychologist training, and practice are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
95.
ERP的实施与风险防范   总被引:3,自引:0,他引:3  
在管理应用的广度方面,ERP超越了MRP的应用范围。文中指出了实施ERP系统的步骤及ERP实施中应注意的问题,强调企业有必要对风险有充分认识,建立一套行之有效的风险管理机制,从而提高了ERP系统的实施成功率,最终提高企业的管理水平。  相似文献   
96.
浅谈施工企业如何提高投标报价能力   总被引:2,自引:0,他引:2  
本文就施工企业如何提高投标报价能力,从编制企业施工定额、建立成本数据库、做好投标工作、加强施工过程管理、建立风险管理系统等几个方面提出一些建议。  相似文献   
97.
Verifiable Distributed Oblivious Transfer and Mobile Agent Security   总被引:1,自引:0,他引:1  
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting mobile agents not only is possible, but also can be implemented efficiently. This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399 and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003. Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases, and wireless networks. On the theoretical side, he is interested in cryptography and game theory. Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS) at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998 and 2001).  相似文献   
98.
房地产投资的主要风险与防范策略   总被引:2,自引:2,他引:0  
李庆文 《山西建筑》2007,33(27):246-247
对房地产投资的风险进行了分析研究,并针对各个风险因素提出了具体的应对措施,同时就房地产投资风险的防范策略进行了深入探讨,以提高房地产投资的经济效益。  相似文献   
99.
内部控制是一个由企业董事会、管理层和其他员工实施的,为实现企业经营的效果和效率目标、财务报告的可靠性目标和舍规性目标提供合理保证的过程。有效地建设以及有力地执行内控制度,对石油企业发展过程中有效地避免风险的发生起着非常重要的作用。但是,由于种种原因,油田企业目前的内部控制体系还不成熟,还存在着一些建设上的不足和执行上的不力。同时,企业员工普遍对内部控制还存在着一些认识误区,这就要求我们必须努力学习内控知识,加强内控知识培训,充分调动企业全体员工建设和雏护内部控制体系的积极性和自觉性,使得内控可以真正发挥其防范风险的作用。  相似文献   
100.
本文主要从选择卡伦水库实行洪水风险调度的依据、水库洪水控制标准、调度原则及效益等方面论述卡伦水库实行洪水风险调度的重大意义。特别强调在水库洪水调度过程中适度承担风险,必须确保工程安全运行、科学调度,加强管理,依法防洪,合理蓄水,要正确把握水库安全度汛与水资源合理利用的关系,正确处理防洪与兴利的关系,正确处理风险与效益的关系,充分发挥水库的综合效益。适度承担风险进行水库洪水调度,既充分利用雨洪资源,又尽最大可能变水害为水利,实现雨洪资源化,达到人、水与自然和谐共处,促进经济社会协调发展。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号