全文获取类型
收费全文 | 23548篇 |
免费 | 1401篇 |
国内免费 | 1168篇 |
专业分类
电工技术 | 1344篇 |
技术理论 | 1篇 |
综合类 | 2517篇 |
化学工业 | 1055篇 |
金属工艺 | 533篇 |
机械仪表 | 1805篇 |
建筑科学 | 2415篇 |
矿业工程 | 893篇 |
能源动力 | 400篇 |
轻工业 | 663篇 |
水利工程 | 445篇 |
石油天然气 | 726篇 |
武器工业 | 190篇 |
无线电 | 2020篇 |
一般工业技术 | 1250篇 |
冶金工业 | 742篇 |
原子能技术 | 83篇 |
自动化技术 | 9035篇 |
出版年
2024年 | 12篇 |
2023年 | 141篇 |
2022年 | 245篇 |
2021年 | 381篇 |
2020年 | 384篇 |
2019年 | 314篇 |
2018年 | 318篇 |
2017年 | 449篇 |
2016年 | 547篇 |
2015年 | 530篇 |
2014年 | 1380篇 |
2013年 | 1080篇 |
2012年 | 1555篇 |
2011年 | 1878篇 |
2010年 | 1476篇 |
2009年 | 1481篇 |
2008年 | 1610篇 |
2007年 | 1842篇 |
2006年 | 1775篇 |
2005年 | 1451篇 |
2004年 | 1252篇 |
2003年 | 1230篇 |
2002年 | 980篇 |
2001年 | 793篇 |
2000年 | 629篇 |
1999年 | 497篇 |
1998年 | 383篇 |
1997年 | 292篇 |
1996年 | 215篇 |
1995年 | 223篇 |
1994年 | 130篇 |
1993年 | 90篇 |
1992年 | 77篇 |
1991年 | 88篇 |
1990年 | 65篇 |
1989年 | 68篇 |
1988年 | 36篇 |
1987年 | 23篇 |
1986年 | 30篇 |
1985年 | 37篇 |
1984年 | 24篇 |
1983年 | 18篇 |
1982年 | 12篇 |
1981年 | 21篇 |
1980年 | 11篇 |
1979年 | 12篇 |
1977年 | 8篇 |
1976年 | 4篇 |
1975年 | 6篇 |
1973年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 18 毫秒
1.
2.
《工程爆破》2022,(1):4-7
应用运动学、动力学理论建立建(构)筑物控爆坍落过程的力学模型,进而研究在非定常约束条件下坍落结构的力学特征。首次提出了采用延时起爆技术时,非自由质点系及其广义坐标应是建立在每一段位上的瞬间虚位移。在此基础上,分析求解运动过程中时控单元的质点自由度,为精确选定爆破部位及时序提供了设计理论和计算依据。同时,结合振动理论,将控爆时差、结构载荷分布调制为振动系统,形成坍落结构梁板单元的强迫振动,充分实现在运动中进一步解体、破碎其自身结构,并形成具有明显缓冲效果的下落过程。应用实践结果证明力学分析是正确的,为工程结构爆破拆除计算机辅助设计及动态模拟技术的有效应用奠定了基础。 相似文献
3.
Diffusers are widely-used to quickly dilute effluents in receiving water bodies. This study proposed a novel diffuser that pre-mixes effluent with ambient water before discharging and that uses the swirling jet to further enhance near-field dilution. The nozzle of the diffuser was examined in two ambient flow conditions: co-flow and counter-flow that are commonly-met in the environment such as oceans due to tidal effect. Physical experiments were first conducted in co-flow on its dilution performance and hydrodynamics, using heated water as the effluent. A 3-D CFD model was developed and calibrated the co-flow scenarios, and then used to investigate the diffuser in counter-flow. The results showed that the nozzle can effectively reduce the maximum temperature rise of the effluent by about 50 % before discharging. The swirling jet from the outlet has a larger shear area, half-width and entrainment rate, enabling the effluent to be rapidly diluted to a minimum of around 10 times at x/D = 6 in co-flow, whereas the dilution for conventional nozzles is about 1 because of the potential core. The flow amplification ratio (α) decreases gradually with increasing velocity ratio in co-flow but increases with increasing velocity ratio in counter-flow. The counter-flow reduces the water drawn into the device; however, the pre-dilution effect at the outlet remains stable. The near-field dilution in counter-flow was significantly enhanced than that in co-flow. Environmental regulations at outfalls and mixing zones can be more easily met using this novel diffuser. 相似文献
4.
以“创新、协调、绿色、开放、共享”为内核的新发展理念,是对马克思主义发展理念的继承和发扬,极具时代精神,富含问题意识,为高校思想政治教育发展、教育教学改革实践提供了强大的理论支撑。本文以“通信原理”为例,阐述了新发展理念在课程改革中的思路和方法,实现了思想政治教育与专业基础课程有机融合,为深化高校教学改革、创新人才培养模式提供了思路。 相似文献
5.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method. 相似文献
6.
We conceptualized security-related stress (SRS) and proposed a theoretical model linking SRS, discrete emotions, coping response, and information security policy (ISP) compliance. We used an experience sampling design, wherein 138 professionals completed surveys. We observed that SRS had a positive association with frustration and fatigue, and these negative emotions were associated with neutralization of ISP violations. Additionally, frustration and fatigue make employees more likely to follow through on their rationalizations of ISP violations by decreased ISP compliance. Our findings provide evidence that neutralization is not a completely stable phenomenon but can vary within individuals from one time point to another. 相似文献
7.
The Curriculum Vitae (CV, also referred to as “résumé”) is an established representation of a person's academic and professional history. A typical CV is comprised of multiple sections associated with spatio‐temporal, nominal, hierarchical, and ordinal data. The main task of a recruiter is, given a job application with specific requirements, to compare and assess CVs in order to build a short list of promising candidates to interview. Commonly, this is done by viewing CVs in a side‐by‐side fashion. This becomes challenging when comparing more than two CVs, because the reader is required to switch attention between them. Furthermore, there is no guarantee that the CVs are structured similarly, thus making the overview cluttered and significantly slowing down the comparison process. In order to address these challenges, in this paper we propose “CV3”, an interactive exploration environment offering users a new way to explore, assess, and compare multiple CVs, to suggest suitable candidates for specific job requirements. We validate our system by means of domain expert feedback whose results highlight both the efficacy of our approach and its limitations. We learned that CV3 eases the overall burden of recruiters thereby assisting them in the selection process. 相似文献
8.
Joanna Paliszkiewicz 《Journal of Computer Information Systems》2019,59(3):211-217
ABSTRACTThe purpose of this study was to examine the influence of trust variables (trust: competence, trust: benevolence, trust: integrity) on leadership regarding the organization’s information security policy (ISP) compliance. An instrument with four constructs was used to collect data from 474 non-management subjects from various organizations in the USA. Collected data were analyzed through multiple regression procedure. Results revealed that all trust variables (trust: competence, trust: benevolence, trust: integrity) were influential in predicting the leadership regarding the organization’s ISP compliance. The findings are discussed and implications for practice are outlined. Conclusion, limitations, and recommendations for future research are drawn. 相似文献
10.
目的采用液相色谱及气相色谱技术,对白兰地及白酒香精的香气成分进行检测,分析香精与真酒样的相似程度。方法通过高效液相色谱及气相色谱检测,得到3批次白兰地香精及6批次白兰地真酒样的18种香气成分数据,通过气相色谱检测,得到2批次白酒香精及6批次白酒真酒样的14种香气成分数据,数据经过归一化处理后,使用SPSS22.0软件,进行聚类分析(clusteringanalysis)和主成分分析(principal component analysis, PCA)。结果经过聚类分析及主成分分析,均能将香精与真酒样进行区分。结论利用部分香气成分数据结合多元统计分析,能够区分香精及真酒样,为鉴别真假酒技术提供新思路。 相似文献