首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   23548篇
  免费   1401篇
  国内免费   1168篇
电工技术   1344篇
技术理论   1篇
综合类   2517篇
化学工业   1055篇
金属工艺   533篇
机械仪表   1805篇
建筑科学   2415篇
矿业工程   893篇
能源动力   400篇
轻工业   663篇
水利工程   445篇
石油天然气   726篇
武器工业   190篇
无线电   2020篇
一般工业技术   1250篇
冶金工业   742篇
原子能技术   83篇
自动化技术   9035篇
  2024年   12篇
  2023年   141篇
  2022年   245篇
  2021年   381篇
  2020年   384篇
  2019年   314篇
  2018年   318篇
  2017年   449篇
  2016年   547篇
  2015年   530篇
  2014年   1380篇
  2013年   1080篇
  2012年   1555篇
  2011年   1878篇
  2010年   1476篇
  2009年   1481篇
  2008年   1610篇
  2007年   1842篇
  2006年   1775篇
  2005年   1451篇
  2004年   1252篇
  2003年   1230篇
  2002年   980篇
  2001年   793篇
  2000年   629篇
  1999年   497篇
  1998年   383篇
  1997年   292篇
  1996年   215篇
  1995年   223篇
  1994年   130篇
  1993年   90篇
  1992年   77篇
  1991年   88篇
  1990年   65篇
  1989年   68篇
  1988年   36篇
  1987年   23篇
  1986年   30篇
  1985年   37篇
  1984年   24篇
  1983年   18篇
  1982年   12篇
  1981年   21篇
  1980年   11篇
  1979年   12篇
  1977年   8篇
  1976年   4篇
  1975年   6篇
  1973年   3篇
排序方式: 共有10000条查询结果,搜索用时 18 毫秒
1.
《工程爆破》2022,(4):78-84
介绍了在包头市某工程实施管道穿越黄河施工中,采用爆破法处理卡钻的经验。针对深水环境条件及钻杆内径小不宜采用集团装药的条件,确定采用"小直径爆破筒,钻杆内部装药"的爆破方案,阐述了爆破设计及施工注意事项。可供类似工程参考。  相似文献   
2.
《工程爆破》2022,(1):4-7
应用运动学、动力学理论建立建(构)筑物控爆坍落过程的力学模型,进而研究在非定常约束条件下坍落结构的力学特征。首次提出了采用延时起爆技术时,非自由质点系及其广义坐标应是建立在每一段位上的瞬间虚位移。在此基础上,分析求解运动过程中时控单元的质点自由度,为精确选定爆破部位及时序提供了设计理论和计算依据。同时,结合振动理论,将控爆时差、结构载荷分布调制为振动系统,形成坍落结构梁板单元的强迫振动,充分实现在运动中进一步解体、破碎其自身结构,并形成具有明显缓冲效果的下落过程。应用实践结果证明力学分析是正确的,为工程结构爆破拆除计算机辅助设计及动态模拟技术的有效应用奠定了基础。  相似文献   
3.
Diffusers are widely-used to quickly dilute effluents in receiving water bodies. This study proposed a novel diffuser that pre-mixes effluent with ambient water before discharging and that uses the swirling jet to further enhance near-field dilution. The nozzle of the diffuser was examined in two ambient flow conditions: co-flow and counter-flow that are commonly-met in the environment such as oceans due to tidal effect. Physical experiments were first conducted in co-flow on its dilution performance and hydrodynamics, using heated water as the effluent. A 3-D CFD model was developed and calibrated the co-flow scenarios, and then used to investigate the diffuser in counter-flow. The results showed that the nozzle can effectively reduce the maximum temperature rise of the effluent by about 50 % before discharging. The swirling jet from the outlet has a larger shear area, half-width and entrainment rate, enabling the effluent to be rapidly diluted to a minimum of around 10 times at x/D = 6 in co-flow, whereas the dilution for conventional nozzles is about 1 because of the potential core. The flow amplification ratio (α) decreases gradually with increasing velocity ratio in co-flow but increases with increasing velocity ratio in counter-flow. The counter-flow reduces the water drawn into the device; however, the pre-dilution effect at the outlet remains stable. The near-field dilution in counter-flow was significantly enhanced than that in co-flow. Environmental regulations at outfalls and mixing zones can be more easily met using this novel diffuser.  相似文献   
4.
以“创新、协调、绿色、开放、共享”为内核的新发展理念,是对马克思主义发展理念的继承和发扬,极具时代精神,富含问题意识,为高校思想政治教育发展、教育教学改革实践提供了强大的理论支撑。本文以“通信原理”为例,阐述了新发展理念在课程改革中的思路和方法,实现了思想政治教育与专业基础课程有机融合,为深化高校教学改革、创新人才培养模式提供了思路。  相似文献   
5.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method.  相似文献   
6.
We conceptualized security-related stress (SRS) and proposed a theoretical model linking SRS, discrete emotions, coping response, and information security policy (ISP) compliance. We used an experience sampling design, wherein 138 professionals completed surveys. We observed that SRS had a positive association with frustration and fatigue, and these negative emotions were associated with neutralization of ISP violations. Additionally, frustration and fatigue make employees more likely to follow through on their rationalizations of ISP violations by decreased ISP compliance. Our findings provide evidence that neutralization is not a completely stable phenomenon but can vary within individuals from one time point to another.  相似文献   
7.
The Curriculum Vitae (CV, also referred to as “résumé”) is an established representation of a person's academic and professional history. A typical CV is comprised of multiple sections associated with spatio‐temporal, nominal, hierarchical, and ordinal data. The main task of a recruiter is, given a job application with specific requirements, to compare and assess CVs in order to build a short list of promising candidates to interview. Commonly, this is done by viewing CVs in a side‐by‐side fashion. This becomes challenging when comparing more than two CVs, because the reader is required to switch attention between them. Furthermore, there is no guarantee that the CVs are structured similarly, thus making the overview cluttered and significantly slowing down the comparison process. In order to address these challenges, in this paper we propose “CV3”, an interactive exploration environment offering users a new way to explore, assess, and compare multiple CVs, to suggest suitable candidates for specific job requirements. We validate our system by means of domain expert feedback whose results highlight both the efficacy of our approach and its limitations. We learned that CV3 eases the overall burden of recruiters thereby assisting them in the selection process.  相似文献   
8.
ABSTRACT

The purpose of this study was to examine the influence of trust variables (trust: competence, trust: benevolence, trust: integrity) on leadership regarding the organization’s information security policy (ISP) compliance. An instrument with four constructs was used to collect data from 474 non-management subjects from various organizations in the USA. Collected data were analyzed through multiple regression procedure. Results revealed that all trust variables (trust: competence, trust: benevolence, trust: integrity) were influential in predicting the leadership regarding the organization’s ISP compliance. The findings are discussed and implications for practice are outlined. Conclusion, limitations, and recommendations for future research are drawn.  相似文献   
9.
10.
目的采用液相色谱及气相色谱技术,对白兰地及白酒香精的香气成分进行检测,分析香精与真酒样的相似程度。方法通过高效液相色谱及气相色谱检测,得到3批次白兰地香精及6批次白兰地真酒样的18种香气成分数据,通过气相色谱检测,得到2批次白酒香精及6批次白酒真酒样的14种香气成分数据,数据经过归一化处理后,使用SPSS22.0软件,进行聚类分析(clusteringanalysis)和主成分分析(principal component analysis, PCA)。结果经过聚类分析及主成分分析,均能将香精与真酒样进行区分。结论利用部分香气成分数据结合多元统计分析,能够区分香精及真酒样,为鉴别真假酒技术提供新思路。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号