全文获取类型
收费全文 | 4302篇 |
免费 | 355篇 |
国内免费 | 270篇 |
专业分类
电工技术 | 216篇 |
综合类 | 364篇 |
化学工业 | 19篇 |
金属工艺 | 12篇 |
机械仪表 | 128篇 |
建筑科学 | 305篇 |
矿业工程 | 50篇 |
能源动力 | 76篇 |
轻工业 | 23篇 |
水利工程 | 80篇 |
石油天然气 | 12篇 |
武器工业 | 9篇 |
无线电 | 810篇 |
一般工业技术 | 164篇 |
冶金工业 | 313篇 |
原子能技术 | 5篇 |
自动化技术 | 2341篇 |
出版年
2024年 | 5篇 |
2023年 | 31篇 |
2022年 | 61篇 |
2021年 | 74篇 |
2020年 | 119篇 |
2019年 | 59篇 |
2018年 | 85篇 |
2017年 | 106篇 |
2016年 | 117篇 |
2015年 | 147篇 |
2014年 | 260篇 |
2013年 | 317篇 |
2012年 | 283篇 |
2011年 | 319篇 |
2010年 | 298篇 |
2009年 | 292篇 |
2008年 | 425篇 |
2007年 | 410篇 |
2006年 | 325篇 |
2005年 | 286篇 |
2004年 | 221篇 |
2003年 | 155篇 |
2002年 | 94篇 |
2001年 | 67篇 |
2000年 | 65篇 |
1999年 | 50篇 |
1998年 | 32篇 |
1997年 | 28篇 |
1996年 | 27篇 |
1995年 | 31篇 |
1994年 | 20篇 |
1993年 | 7篇 |
1992年 | 5篇 |
1991年 | 7篇 |
1990年 | 9篇 |
1989年 | 7篇 |
1988年 | 6篇 |
1987年 | 4篇 |
1986年 | 7篇 |
1984年 | 7篇 |
1982年 | 7篇 |
1981年 | 4篇 |
1980年 | 4篇 |
1979年 | 3篇 |
1973年 | 4篇 |
1966年 | 5篇 |
1959年 | 2篇 |
1956年 | 6篇 |
1955年 | 6篇 |
1954年 | 2篇 |
排序方式: 共有4927条查询结果,搜索用时 281 毫秒
991.
Reviews the book, Outcomes assessment in clinical practice edited by Lloyd I. Sederer and Barbara Dickey. This book is a timely publication dealing with the urgent and imperative situation in health care delivery, especially in the area of mental health services. There are four Sections in the book. Section I is titled Integrating Outcomes Assessment into Clinical Practice. This section conveys in a rational and reasonable sequence the definition, impetus, history, scope, process, and current crisis-like status of mental health care, in terms of its financing, its validity, and its effectiveness. Section II is called Instruments of Outcomes Assessment and contains sixteen chapters, each describing a different instrument of assessment. Section III optimistically proclaimed a future improvement of health care delivery and access. These five chapters were exciting, but require a most open and direct acknowledgement of the need for protection of patients and therapists in this field. Complementing Section II is Section IV which contains the Appendices. According to the reviewer, this book has the potential to advance the practice of psychotherapy. But presenting it as a means to satisfy so many volatile and uncontrolled social, political, economic, and other forces can lead to its corruption. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
992.
综合业务接入平台的一种实现方法 总被引:2,自引:1,他引:1
为支持综合业务,研究了综合业务接入平台的技术体制,提出了基于ATM及STM技术实现的可行性及必要性内部信号结构采用ATM信元共享总线及ST-BUS双总线方式;介绍了实现该平台的硬件及软件组成,重点描述了用于该平台的路由协议及时钟方式。 相似文献
993.
基于Web Services的证书验证系统的模型框架 总被引:2,自引:0,他引:2
在分析了目前已有的学历学位证书验证系统的现状的基础上,构建了三级结构的节点通信结构,并且对节点设计方法做了详细分析,提出了一种基于Web Services系统模型框架,并对其进行了模拟实现。结果证明提出的模型框架是可行的,并且对基于Web Services的分布式检索的研究有一定的借鉴意义。 相似文献
994.
Introduces this special issue of Rehabilitation Psychology. This special issue was conceptualized as an effort to bring to the journal's readership an understanding of some of the basic concerns in traumatic brain injury (TBI) rehabilitation from the psychologist's perspective. This issue begins with an overview of the various acute and postacute services in TBI rehabilitation, proceeds to discuss the roles and functions of the psychologist within the TBI rehabilitation setting (principally the postacute setting), and then addresses a range of issues related to assessment and intervention. Because of space limitations, we could not fully cover all the issues in these areas. We certainly believe, however, that the selected authors made ambitious and credible efforts with their assigned topics. The reader, seeking to examine better this disability area and current psychosocial treatment interventions, receives a wealth of practical material and references for further review. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
995.
随着网络技术的融合、移动电话的进一步普及和各种新业务的不断推出,移动数据增值业务在运营商整体业务中所占的比例越来越大。因此,SP在整个移动增值业务价值链上占据着越来越重要的地位。但是,一些SP为了获得短期的利益,在业务和服务的提供中做出了损害用户利益的事情,分析了SP违规的表现形式、成因及其危害,指出规范SP行为的策略。 相似文献
996.
本文概括介绍了近两年来国外数据通信业务和网络技术的发展动向及信息高速公路(宽带网)开发情况,内容主要有计算机网络的发展、多媒体技术、Internet以及网络基础设施建设。 相似文献
997.
《Computer Communications》1995,18(12):921-928
A language for security services base modelling is developed and presented. The security services base is defined according to security mechanisms defined in the OSI security framework. Elements of this base are modelled with corresponding channels. For each channel, a set of productions is introduced which form a grammar of a language. The language is suitable for formal synthesis and analysis of secure architectures. The method presented in this paper is not limited to cryptographic algorithms; any other security mechanisms can also be incorporated. Furthermore, the method can be used easily for machine processing. 相似文献
998.
200号业务近一两年在我国许多大城市迅速发展。北京电信在发展200号业务时,注重市场调研和培育,积极开拓新业务领域。本文首先介绍了北京200号业务的开放情况,然后叙述了业务的编号规则、组网方案、平台技术以及200号业务今后的发展趋势。 相似文献
999.
Community-dwelling individuals (n = 143, 73-98 years old) were assessed to consider if their use of task-specific control strategies predicted hospital outcomes in the subsequent 2 years. The authors were interested in whether men and women facing health-induced task restrictions benefited equally from the use of primary- and secondary-control strategies. Gender interacted with primary-control strategies; men's more frequent use of these proactive strategies generally related to fewer hospital admissions. Gender also interacted with secondary-control strategies; women's more frequent use of compensatory (self-protective) strategies corresponded to fewer hospital admissions and shorter hospital stay durations. Taken together, our findings suggest that men benefit by adopting certain primary-control strategies and women benefit by adopting certain compensatory secondary-control strategies. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
1000.
本文从寻呼编码格式、寻呼编码特性以及寻呼系统结构三方面对ERMES、FLEX和APOC三种高速寻呼编码方案加以比较,指出各自的优缺点。 相似文献