全文获取类型
收费全文 | 17827篇 |
免费 | 2312篇 |
国内免费 | 1134篇 |
专业分类
电工技术 | 2032篇 |
技术理论 | 6篇 |
综合类 | 2194篇 |
化学工业 | 706篇 |
金属工艺 | 126篇 |
机械仪表 | 462篇 |
建筑科学 | 3002篇 |
矿业工程 | 681篇 |
能源动力 | 486篇 |
轻工业 | 1421篇 |
水利工程 | 1345篇 |
石油天然气 | 584篇 |
武器工业 | 93篇 |
无线电 | 1373篇 |
一般工业技术 | 1277篇 |
冶金工业 | 1120篇 |
原子能技术 | 151篇 |
自动化技术 | 4214篇 |
出版年
2024年 | 59篇 |
2023年 | 284篇 |
2022年 | 624篇 |
2021年 | 788篇 |
2020年 | 838篇 |
2019年 | 614篇 |
2018年 | 649篇 |
2017年 | 622篇 |
2016年 | 879篇 |
2015年 | 793篇 |
2014年 | 1422篇 |
2013年 | 1459篇 |
2012年 | 1490篇 |
2011年 | 1523篇 |
2010年 | 1162篇 |
2009年 | 1163篇 |
2008年 | 1135篇 |
2007年 | 1229篇 |
2006年 | 1140篇 |
2005年 | 776篇 |
2004年 | 653篇 |
2003年 | 508篇 |
2002年 | 369篇 |
2001年 | 262篇 |
2000年 | 192篇 |
1999年 | 139篇 |
1998年 | 96篇 |
1997年 | 66篇 |
1996年 | 55篇 |
1995年 | 30篇 |
1994年 | 36篇 |
1993年 | 26篇 |
1992年 | 20篇 |
1991年 | 21篇 |
1990年 | 21篇 |
1989年 | 21篇 |
1988年 | 13篇 |
1987年 | 5篇 |
1986年 | 8篇 |
1985年 | 12篇 |
1984年 | 8篇 |
1983年 | 7篇 |
1982年 | 8篇 |
1981年 | 7篇 |
1979年 | 7篇 |
1978年 | 4篇 |
1976年 | 7篇 |
1964年 | 3篇 |
1963年 | 3篇 |
1961年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 14 毫秒
91.
The scope of the paper is the assessment of the technical risk involved in long-term operation of power units. Detailed analyses have been conducted for steam turbine components. The sources and consequences of risk have been identified and the probability of turbine components failure calculated. The quantitative assessment of the risk has been made and possibilities of its reduction discussed. 相似文献
92.
O. L. Perevozchikova V. G. Tul'chinskii A. V. Kharchenko 《Cybernetics and Systems Analysis》2003,39(4):501-508
A statistical learning model is considered within the framework of the theory of uniform convergence of frequencies of errors in the case where the convergence is violated as a result of increasing the informativeness of training examples. Drawbacks of nonconstructive refinements of Vapnik-Chervonenkis estimates based on an assumption on the distribution law of violations are shown. A new approach to obtaining constructive estimates for mass data sets is proposed. 相似文献
93.
van der Ploeg Eleonore; Dorresteijn Sasja M.; Kleber Rolf J. 《Canadian Metallurgical Quarterly》2003,8(2):157
Workers in medium- or high-risk professions are often confronted with critical incidents at the workplace. The impact of these acute stressors may be serious and enduring. Many workers also experience chronic job stressors, such as work overload or role conflicts. This study examined the frequently neglected relationship of acute and chronic stressors with self-reported health symptoms, such as posttraumatic responses, fatigue, and burnout. This association was investigated in a sample of forensic doctors in the Netherlands (N = 84). It was found that the more traumatic events the respondents experienced, the more problems they reported in coping with the traumatic events. Chronic job stressors were associated with posttraumatic responses (intrusions and avoidances) and with burnout and fatigue. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
94.
Psychologists are often asked to testify in court. However, concerns have been expressed in both the legal and psychological literatures about the quality of these services. This article presents survey results comparing the practice patterns of generally licensed psychologists with those of specialist forensic diplomates in providing risk evaluations. Results suggest that general clinicians frequently perform these evaluations, but forensic diplomates use more modern risk instruments, are more aware of the scientific literature, and provide the court with more information about the scientific basis of their testimony. The implication of these results for legal professionals, psychologist training, and practice are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
95.
ERP的实施与风险防范 总被引:3,自引:0,他引:3
在管理应用的广度方面,ERP超越了MRP的应用范围。文中指出了实施ERP系统的步骤及ERP实施中应注意的问题,强调企业有必要对风险有充分认识,建立一套行之有效的风险管理机制,从而提高了ERP系统的实施成功率,最终提高企业的管理水平。 相似文献
96.
浅谈施工企业如何提高投标报价能力 总被引:2,自引:0,他引:2
本文就施工企业如何提高投标报价能力,从编制企业施工定额、建立成本数据库、做好投标工作、加强施工过程管理、建立风险管理系统等几个方面提出一些建议。 相似文献
97.
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer
(OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a
new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel
technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the
design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general
portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is
the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting
mobile agents not only is possible, but also can be implemented efficiently.
This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval
Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399
and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper
was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003.
Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position
at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical
Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases,
and wireless networks. On the theoretical side, he is interested in cryptography and game theory.
Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile
computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS)
at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received
his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998
and 2001). 相似文献
98.
房地产投资的主要风险与防范策略 总被引:2,自引:2,他引:0
对房地产投资的风险进行了分析研究,并针对各个风险因素提出了具体的应对措施,同时就房地产投资风险的防范策略进行了深入探讨,以提高房地产投资的经济效益。 相似文献
99.
内部控制是一个由企业董事会、管理层和其他员工实施的,为实现企业经营的效果和效率目标、财务报告的可靠性目标和舍规性目标提供合理保证的过程。有效地建设以及有力地执行内控制度,对石油企业发展过程中有效地避免风险的发生起着非常重要的作用。但是,由于种种原因,油田企业目前的内部控制体系还不成熟,还存在着一些建设上的不足和执行上的不力。同时,企业员工普遍对内部控制还存在着一些认识误区,这就要求我们必须努力学习内控知识,加强内控知识培训,充分调动企业全体员工建设和雏护内部控制体系的积极性和自觉性,使得内控可以真正发挥其防范风险的作用。 相似文献
100.
本文主要从选择卡伦水库实行洪水风险调度的依据、水库洪水控制标准、调度原则及效益等方面论述卡伦水库实行洪水风险调度的重大意义。特别强调在水库洪水调度过程中适度承担风险,必须确保工程安全运行、科学调度,加强管理,依法防洪,合理蓄水,要正确把握水库安全度汛与水资源合理利用的关系,正确处理防洪与兴利的关系,正确处理风险与效益的关系,充分发挥水库的综合效益。适度承担风险进行水库洪水调度,既充分利用雨洪资源,又尽最大可能变水害为水利,实现雨洪资源化,达到人、水与自然和谐共处,促进经济社会协调发展。 相似文献