全文获取类型
收费全文 | 8359篇 |
免费 | 480篇 |
国内免费 | 9篇 |
专业分类
电工技术 | 114篇 |
综合类 | 23篇 |
化学工业 | 2189篇 |
金属工艺 | 242篇 |
机械仪表 | 147篇 |
建筑科学 | 591篇 |
矿业工程 | 98篇 |
能源动力 | 282篇 |
轻工业 | 592篇 |
水利工程 | 50篇 |
石油天然气 | 20篇 |
武器工业 | 1篇 |
无线电 | 661篇 |
一般工业技术 | 1728篇 |
冶金工业 | 463篇 |
原子能技术 | 48篇 |
自动化技术 | 1599篇 |
出版年
2024年 | 15篇 |
2023年 | 117篇 |
2022年 | 208篇 |
2021年 | 330篇 |
2020年 | 199篇 |
2019年 | 210篇 |
2018年 | 231篇 |
2017年 | 267篇 |
2016年 | 351篇 |
2015年 | 293篇 |
2014年 | 377篇 |
2013年 | 596篇 |
2012年 | 533篇 |
2011年 | 717篇 |
2010年 | 506篇 |
2009年 | 475篇 |
2008年 | 484篇 |
2007年 | 424篇 |
2006年 | 379篇 |
2005年 | 303篇 |
2004年 | 252篇 |
2003年 | 186篇 |
2002年 | 165篇 |
2001年 | 102篇 |
2000年 | 96篇 |
1999年 | 114篇 |
1998年 | 123篇 |
1997年 | 95篇 |
1996年 | 86篇 |
1995年 | 51篇 |
1994年 | 59篇 |
1993年 | 37篇 |
1992年 | 47篇 |
1991年 | 26篇 |
1990年 | 39篇 |
1989年 | 23篇 |
1988年 | 28篇 |
1987年 | 27篇 |
1986年 | 23篇 |
1985年 | 20篇 |
1984年 | 29篇 |
1983年 | 17篇 |
1982年 | 18篇 |
1981年 | 15篇 |
1980年 | 20篇 |
1978年 | 12篇 |
1977年 | 16篇 |
1976年 | 26篇 |
1975年 | 13篇 |
1969年 | 11篇 |
排序方式: 共有8848条查询结果,搜索用时 12 毫秒
81.
One of congress’ goals for 2007 was for 80% of all tax and informational returns to be filed electronically. However, to date
that lofty goal has fallen well short. This research proposes a model of e-filing adoption. To test the model a survey is
administered to 260 participants. The instrument assesses citizen perceptions of trust, risk and optimism bias. Structural
equation modeling is used to evaluate the relationships between these three concepts and intention to use. The results indicate
that trust of the Internet, trust of the e-filer, perceived risk and optimism bias all have an impact on intention to use
e-filing. Implications for practice and research are discussed. 相似文献
82.
Making changes to software systems can prove costly and it remains a challenge to understand the factors that affect the costs
of software evolution. This study sought to identify such factors by investigating the effort expended by developers to perform
336 change tasks in two different software organizations. We quantitatively analyzed data from version control systems and
change trackers to identify factors that correlated with change effort. In-depth interviews with the developers about a subset
of the change tasks further refined the analysis. Two central quantitative results found that dispersion of changed code and
volatility of the requirements for the change task correlated with change effort. The analysis of the qualitative interviews
pointed to two important, underlying cost drivers: Difficulties in comprehending dispersed code and difficulties in anticipating
side effects of changes. This study demonstrates a novel method for combining qualitative and quantitative analysis to assess
cost drivers of software evolution. Given our findings, we propose improvements to practices and development tools to manage
and reduce the costs. 相似文献
83.
Dennis Heinson York Yannikos Frederik Franke Christian Winter Markus Schneider 《Datenschutz und Datensicherheit - DuD》2010,34(2):75-79
Der Einsatz von Informationstechnologie (IT) in Organisationen bietet viele M?glichkeiten des Missbrauchs. Besch?ftigte k?nnen
sich die besonderen Eigenschaften der IT zunutze machen, um sich etwa in gesch?ftssch?digender Weise Vorteile zu verschaffen.
Gleichzeitig erm?glicht IT aber auch, verbotene Handlungen aufzuspüren und zu belegen (IT-Forensik). Der Beitrag beschreibt
die technische Praxis von IT-forensischen Analysen und geht auf damit verbundene rechtliche Fragestellungen ein. 相似文献
84.
Jiang Wang Chunlei Liu Christian LeinenbachUlrich E. Klotz Peter J. UggowitzerJörg F. Löffler 《Calphad》2011,35(1):82-94
The Cu-Sn-Ti ternary system has been studied via experiments and thermodynamic modelling. In the experimental section, the composition of the alloys was selected based on the preliminary calculations and available literature data. Metallography, scanning electron microscopy and electron probe microanalysis were employed to analyse alloy samples prepared by arc-melting after annealing at 800 °C for 760 h. Solid phase relations at 800 °C were established. In contrast to earlier reports, the CuSn3Ti5 phase was interpreted as a binary intermetallic compound (Sn3Ti5) with extended Cu solubility. In the modelling section, three binary sub-systems were critically evaluated and updated according to the new experimental data and theoretical calculations reported in literature. According to their crystal structures and homogeneity ranges, appropriate sublattice models were proposed for SnTi3,SnTi2,Sn3Ti5 and Sn5Ti6. A set of self-consistent thermodynamic parameters for the Cu-Sn-Ti ternary system was obtained by considering the present experimental results and reported experimental information. The calculated results compare with the available experimental data to validate the present thermodynamic assessment. 相似文献
85.
Antonio de la Oliva Ignacio Soto Albert Banchs Johannes Lessmann Christian Niephaus Telemaco MeliaAuthor vitae 《Computer Standards & Interfaces》2011,33(6):556-564
The IEEE 802.21 standard facilitates media independent handovers by providing higher layer mobility management functions with common service primitives for all technologies. Right after the base specification was published, several voices rose up in the working group advocating to broaden the scope of IEEE 802.21 beyond handovers. This paper aims at updating the reader with the main challenges and functionalities required to create a Media Independence Service Layer, through the analysis of scenarios which are being discussed within the working group: 1) Wireless Coexistence, and 2) Heterogeneous Wireless Multihop Backhaul Networks. 相似文献
86.
87.
The input-state linear horizon (ISLH) for a nonlinear discrete-time system is defined as the smallest number of time steps it takes the system input to appear nonlinearly in the state variable. In this paper, we employ the latter concept and show that the class of constraint admissible N-step affine state-feedback policies is equivalent to the associated class of constraint admissible disturbance-feedback policies, provided that N is less than the system’s ISLH. The result generalizes a recent result in [Goulart, P. J., Kerrigan, E. C., Maciejowski, J. M. (2006). Optimization over state feedback policies for robust control with constraints. Automatica, 42(4), 523-533] and is significant because it enables one: (i) to determine a constraint admissible state-feedback policy by employing well-known convex optimization techniques; and (ii) to guarantee robust recursive feasibility of a class of model predictive control (MPC) policies by imposing a suitable terminal constraint. In particular, we propose an input-to-state stabilizing MPC policy for a class of nonlinear systems with bounded disturbance inputs and mixed polytopic constraints on the state and the control input. At each time step, the proposed MPC policy requires the solution of a single convex quadratic programme parameterized by the current system state. 相似文献
88.
This paper presents a product dynamic model and design for X solution (DFX) developed in C++ with the OpenCASCADE geometric kernel, allowing the designer not only to get feedback on the viability of his design choices but also to collect data for process and task planning, maintenance and end-of-life strategy planning. The implemented method evaluates automatically both the efficiency factors and the incompatibilities between development characteristics in order to optimize the design of the product for multiple domains. The framework of this DFX solution, based on the product data structure, consists of imposing integration constraints concerning the development process during the entire design product process. In this paper, simple assemblies are used as brief examples to demonstrate the application of the proposed integrated design solution, its effectiveness to improve the design for X and collecting useful data for entire lifecycle duration. The method developed has been formalized with the NIAM model. 相似文献
89.
Christian Collberg Andrew Huntwork Edward Carter Gregg Townsend Michael Stepp 《Information and Software Technology》2009,51(1):56-67
This paper presents an implementation of the watermarking method proposed by Venkatesan et al. in their paper [R. Venkatesan, V. Vazirani, S. Sinha, A graph theoretic approach to software watermarking, in: Fourth International Information Hiding Workshop, Pittsburgh, PA, 2001]. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We present two algorithms for splitting a watermark number into a redundant set of pieces and an algorithm for turning a watermark number into a control-flow graph. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks. 相似文献
90.