全文获取类型
收费全文 | 22231篇 |
免费 | 2460篇 |
国内免费 | 1000篇 |
专业分类
电工技术 | 2296篇 |
技术理论 | 6篇 |
综合类 | 2385篇 |
化学工业 | 1175篇 |
金属工艺 | 283篇 |
机械仪表 | 594篇 |
建筑科学 | 3800篇 |
矿业工程 | 964篇 |
能源动力 | 1081篇 |
轻工业 | 1805篇 |
水利工程 | 2030篇 |
石油天然气 | 923篇 |
武器工业 | 314篇 |
无线电 | 1017篇 |
一般工业技术 | 1799篇 |
冶金工业 | 1681篇 |
原子能技术 | 341篇 |
自动化技术 | 3197篇 |
出版年
2024年 | 34篇 |
2023年 | 354篇 |
2022年 | 701篇 |
2021年 | 914篇 |
2020年 | 1010篇 |
2019年 | 1124篇 |
2018年 | 743篇 |
2017年 | 740篇 |
2016年 | 979篇 |
2015年 | 899篇 |
2014年 | 1646篇 |
2013年 | 1849篇 |
2012年 | 1667篇 |
2011年 | 1841篇 |
2010年 | 1378篇 |
2009年 | 1403篇 |
2008年 | 1269篇 |
2007年 | 1372篇 |
2006年 | 1322篇 |
2005年 | 958篇 |
2004年 | 764篇 |
2003年 | 624篇 |
2002年 | 493篇 |
2001年 | 358篇 |
2000年 | 248篇 |
1999年 | 191篇 |
1998年 | 132篇 |
1997年 | 94篇 |
1996年 | 95篇 |
1995年 | 61篇 |
1994年 | 68篇 |
1993年 | 47篇 |
1992年 | 29篇 |
1991年 | 27篇 |
1990年 | 27篇 |
1989年 | 33篇 |
1988年 | 28篇 |
1987年 | 19篇 |
1986年 | 19篇 |
1985年 | 13篇 |
1984年 | 15篇 |
1983年 | 12篇 |
1982年 | 11篇 |
1981年 | 7篇 |
1980年 | 9篇 |
1979年 | 7篇 |
1975年 | 4篇 |
1965年 | 14篇 |
1964年 | 4篇 |
1961年 | 6篇 |
排序方式: 共有10000条查询结果,搜索用时 18 毫秒
1.
2.
从总风险控制的角度,提出了事故工况下场内工作人员剂量与辐射风险接受准则,并建立了相应的评估方法。以典型压水堆核电厂为例,采用概率安全分析(PSA)的全范围事故序列进行验证评价,评估了典型压水堆核电厂事故后场内工作人员的辐射剂量与辐射致死风险。通过验证结果可知,事故后场内工作人员总的辐射致死风险远低于公众由于自然灾害、疾病、交通事故及不同行业的总死亡风险值;事故后工作人员在燃料厂房进行操作时的辐射致死风险占比最高,故工作人员在燃料厂房进行相关操作时,可提前制定相应的辐射防护措施来降低辐射风险;工作群组中其他人员和意外受照人员事故后辐射致死风险占比较高,可通过采用气面罩等方式对气载放射性进行防护以降低其辐射风险。相应的分析结果可为后续核电厂事故后处理方案的制定和事故后场内工作人员辐射防护措施的制定提供借鉴。 相似文献
3.
公众对核电的态度受各种信息的影响,信息源可信度是说服力的重要决定因素。在我国,核安全监管机构、核电企业和专家是主要的核信息发布源,研究不同信息源可信度对公众核电态度的影响对核电的可持续发展十分重要。本研究基于源可信度理论,考察了公众对不同信源的可信度认知,构建了核电公众接受回归模型并开展实证研究。研究发现,不同源的可信度对核电认知和态度的影响存在差异。监管机构可信度通过感知利益和感知风险影响公众接受;核电企业可信度对公众接受影响不显著;专家可信度直接积极影响公众接受度,但对感知利益和感知风险影响不显著。感知风险和感知利益直接显著影响公众接受度。研究结果可为核电领域的风险沟通提供依据。 相似文献
4.
《The Journal of Strategic Information Systems》2022,31(4):101743
Research has extensively investigated the rationale of firm diversity from the economic perspective, but little is known about how such a strategy may affect information security. The present study is the first to examine how firm diversity is relevant to firms’ likelihood to experience data breaches (i.e., data breach risk). Drawing from the strands of literature on information security, diversification, and resource-based view, we propose hypotheses on the relationship between firm diversity and data breach risk, as well as the boundary conditions of this relationship. On the basis of a twelve-year sample of publicly-listed firms, our analysis provides evidence to support the negative association between firm diversity and data breach risk. Our analysis also delineates conditions under which the effects of firm diversity can intervene to reduce the data breach risk invoked, such as under related diversity and when managers are managerially capable. For academics, our research accentuates an intriguing but unexamined benefit of firm diversity because it relates to information security. For practicing professionals, this research highlights the significant impact of firms’ operational structure on information security. 相似文献
5.
Adil Hussain Seh Jehad F. Al-Amri Ahmad F. Subahi Md Tarique Jamal Ansari Rajeev Kumar Mohammad Ubaidullah Bokhari Raees Ahmad Khan 《计算机、材料和连续体(英文)》2022,70(1):469-489
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The cyber invaders continuously penetrate the E-Health data because of the high cost of the data on the dark web. Therefore, security assessment of healthcare web-based applications demands immediate intervention mechanisms to weed out the threats of cyber-attacks. The aim of this work is to provide efficient and effective healthcare web application security assessment. The study has worked with the hybrid computational model of Multi-Criteria Decision Making (MCDM) based on Analytical Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal-Solutions (TOPSIS) under the Hesitant Fuzzy (HF) environment. Hesitant fuzzy sets provide effective solutions to address decision making problems where experts counter hesitation to make a decision. The proposed research endeavor will support designers and developers in identifying, selecting and prioritizing the best security attributes for web applications’ development. The empirical analysis concludes that Robustness got highest priority amongst the assessed security attributes set followed by Encryption, Authentication, Limit Access, Revoke Access, Data Validation, and Maintain Audit Trail. The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the web application security. The study also establishes guidelines which the developers can refer for the identification and prioritization of security attributes to build more secure and trustworthy web-based applications. 相似文献
6.
Combined with equipment activities such as combat readiness, training, exercises and management, it is proposed that the design of equipment in-service assessment subjects should follow the principles of combination, stage and operability. Focusing on the design of equipment in-service assessment subjects, a design method for in-service assessment subjects based on the combination of trial and training mode is proposed. Based on the actual use of high-equipment use management and training and the established indicator system, the army’s bottom-level equipment activity subjects and bottom-level assessments are combined. The indicators are mapped and analyzed. Through multiple rounds of iterations, the mapping relationship between in-service assessment indicators and military equipment activity subjects is established. Finally, the equipment activity subjects whose data is collected (reflecting the underlying assessment indicators) are generated in-service assessment subjects. The orthogonal test method is used to optimize the samples in the assessment subjects to form an in-service assessment implementation plan. Taking a certain type of armored infantry fighting vehicle as an example, the sample optimization design of the initially generated in-service assessment subjects is analyzed. It provides methods and ideas to carry out in-service assessment work. 相似文献
7.
Flavonoids are a class of phytochemical molecules abundant in many plants, fruits, vegetables, and leaves.
Flavonoids possess a series of significant biological activities, including anticancer, antioxidant, antiviral, and antiinflammatory properties. They become an important source of dietary supplements and natural health products.
Though many studies confirmed the safety of flavonoids, the potential toxicity of flavonoids is still a remarkable field
of research to be explored. The enthusiasm for flavonoids expressed by the public has sometimes overlooked their
toxicity and also consumed the flavonoids exceeding the body requirements. The current review focused on the
potential toxicity of flavonoids to make the public consume flavonoids with caution. This review summarizes the
current toxicity which has been reported in vivo and in vitro experiments. The toxicity involves carcinogenicity and
mutation, liver and kidney toxicity, and the influence on the thyroid and reproductive function and intestinal flora
disorders. The mechanism of toxicity is fully complicated, and current evidence indicates that natural flavonoid
glycosides act on different targets with different doses in vivo and in vitro experiments. Though most kinds of
flavonoids are considered safe, flavonoids proposed as food supplements need to be assessed their tolerable upper
intake level as there have been reports of toxic flavonoids. 相似文献
8.
随着我国现代化进程的加快,对油气资源的需求也越来越高,油气开发是一个综合性的过程,涉及的内容也比较多,联合站是油气开采过程中重要组成部分,对于整个油气开采的稳定性有着重要的作用,受多方面因素影响,联合站运行过程中存在一些危险因素,如果联合站运行不稳定,不仅不利于油气开采,还会对操作人员的生命安全造成威胁。也正是基于这种情况,需要对联合站危险因素进行分析,采取合适的安全管理对策,最大程度上确保联合站运行的稳定性。 相似文献
9.
骨质疏松是2型糖尿病(type 2 diabetes mellitus, T2DM)常见并发症之一,近期研究表明T2DM治疗药物胰高血糖素样肽-1受体激动剂(glucagon-like peptide-1 receptor agonists, GLP-1RAs)可以促进骨形成抑制骨吸收,提示这类降糖药物可能使合并骨质疏松和高骨折风险的T2DM患者获益,但其潜在机制尚不完全清楚,并且不同的GLP-1RAs表现出不同的骨骼效应及分子机制。本文将对几种不同GLP-1RAs对骨代谢的影响进行综述。 相似文献
10.
由于暴雨和高潮位的共同影响,沿海城市更容易遭受内涝灾害。暴雨和高潮位影响区域致灾因子划分是减灾措施布设的重要因素。本文提出了致灾因子区划方法,并进行了区划方法的效果分析。以海口市主城区为例,基于城市暴雨污水及流域雨洪管理建模软件构建一二维耦合城市内涝模型,计算不同组合工况下的淹没水深和淹没范围,将内涝区域划分为降雨影响区、潮汐影响区和共同影响区,并对三个区域进行了减灾措施优化分析。结果表明,潮汐影响区、共同影响区和降雨影响区距海岸线逐渐变远;降雨影响区布设蓄水池的效益要明显优于潮汐影响区,而潮汐影响区布设止回阀的效益要优于降雨影响区。因此,通过内涝区域划分可以更高效地布设防涝措施。 相似文献