首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19606篇
  免费   2250篇
  国内免费   7篇
电工技术   1389篇
综合类   403篇
化学工业   8972篇
金属工艺   285篇
机械仪表   441篇
建筑科学   804篇
矿业工程   178篇
能源动力   241篇
轻工业   1951篇
水利工程   140篇
石油天然气   70篇
无线电   581篇
一般工业技术   3393篇
冶金工业   339篇
原子能技术   40篇
自动化技术   2636篇
  2023年   635篇
  2022年   348篇
  2021年   717篇
  2020年   704篇
  2019年   625篇
  2018年   603篇
  2017年   451篇
  2016年   692篇
  2015年   843篇
  2014年   910篇
  2013年   1568篇
  2012年   712篇
  2011年   638篇
  2010年   912篇
  2009年   1052篇
  2008年   571篇
  2007年   521篇
  2006年   393篇
  2005年   371篇
  2004年   308篇
  2003年   281篇
  2002年   181篇
  2001年   169篇
  1998年   218篇
  1997年   168篇
  1996年   216篇
  1995年   213篇
  1994年   176篇
  1993年   226篇
  1992年   167篇
  1990年   165篇
  1989年   184篇
  1988年   148篇
  1987年   170篇
  1986年   195篇
  1985年   177篇
  1984年   184篇
  1983年   190篇
  1982年   164篇
  1981年   211篇
  1980年   174篇
  1979年   181篇
  1977年   158篇
  1976年   158篇
  1975年   213篇
  1974年   191篇
  1973年   371篇
  1972年   215篇
  1971年   151篇
  1968年   154篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
IT/Business alignment   总被引:3,自引:2,他引:1  
Ohne Zusammenfassung
IT/Business alignment
  相似文献   
92.
93.
Thermodynamic properties of aqueous solutions of both native and modified legumin of broad beans (Vicia faba L.) have been examined. A restricted trypsin-induced proteolysis was used to modify protein structure. Evaluation of protein affinity to ficoll in aqueous solutions showed that modified protein possessed higher hydrophilicity. Thermodynamic properties of diluted solutions were used to predict the phase behaviour in concentrated systems containing protein and ficoll. At specific concentrations of native legumin, the system can separate in two phases, whereas in the case of modified protein the single-phase behaviour of the system was predicted for any concentrations of both components. The experimental data obtained in concentrated systems confirmed predictions of thermodynamic analysis of diluted solutions.  相似文献   
94.
This contribution reviews the research work performed at the Johannes Kepler University of Linz, Austria, on the development of oscillators for the microwave and millimeter wave frequency range. This work, performed by the Microelectronics Institute and the Institute for Communications and Information Engineering, covers the range from low GHz frequencies up to 61 GHz and is devoted to applications like mobile communications and sensing. The active devices are based on gallium arsenide (GaAs), silicon germanium (SiGe), and Silicon (Si) and include Gunn-devices, bipolar transistors, and CMOS-technology.  相似文献   
95.
96.
Our emphasis in this paper has been on the knowledge-based and cognitive issues pertinent for improved interactions between workers and manufacturing computer systems. We believe that these techniques are as necessary and applicable to manufacturing as to any other vocation, especially as the difference in collar color of shop people becomes less noticeable in their increasing role as knowledge workers.  相似文献   
97.
The aerodynamic behaviour of pressure transients in railway tunnels due to the passage of train are accompanied by the wave reflection between the entrance and exit of the tunnel as well as the tunnel wall and train surface. This study presents a numerical method using the Harten-Yee upwind TVD scheme to simulate compression wave transients and reflection in a railway tunnel. The strength of the compression wave generated by the entrance of a train into a tunnel emerged within the applied calculation procedure, without any special consideration of the boundary condition for the entrance or exit of the tunnel as well as the train nose and tail. Good agreements were obtained when the initial pressure rise at tunnel entrance and the process of pressure variations in a short tunnel, which were calculated by the presented numerical method, were compared with experimental data. The pressure wave reflection at the entrance and exit, the unsteady flow around the train and the transmitted wave at tunnel exit portal were simulated. The transmitted wave at the tunnel exit portal is also discussed. In addition a method to determine the non-reflective boundary condition for multi-dimensional Euler equation is given.  相似文献   
98.
The transition from basic automation to flexible manufacturing is an expensive and tedious procedure. It requires meticulous planning and almost clairvoyant forecasting to insure that the initial flexibility obtained is sufficient to allow growth and expansion in the future. This paper will suggest a systematic and methodological approach to achieve optimal flexibility and describe the present results of its application to an ongoing system transformation.

Conclusions based on existing levels of completion are presented along with identification of critical and non critical flexibility requirements. The considerations and steps taken are summarized in a procedural format which may then be applied to a wide variety of system transformations.  相似文献   

99.
In this paper we present a general approach to the automatic content-based organization and visualization of large digital music collections. The general methodology consists in extracting musically and perceptually relevant patterns (‘features’) from the given audio recordings (e.g., mp3 files), using topology-preserving data projection methods to map the entire music collection onto two-dimensional visualization planes (possibly in a hierarchical fashion), and using a new display metaphor (the ‘Islands of Music’) to display the inherent structure of the music collection to the user. It is shown how arbitrary meta-data can be integrated into the visualization process, and how similarity according to different viewpoints can be defined and exploited. The basic methodology is briefly described, three prototype systems are presented, and a general discussion of the practical application possibilities of such technologies is offered.  相似文献   
100.
Many organisations suspect that their internal security threat is more pressing than their external security threat. The internal threat is predominantly the result of poor user security behaviour. Yet, despite that, security awareness programmes often seem more likely to put users to sleep than to improve their behaviour. This article discusses the influences that affect a user's security behaviour and outlines how a well structured approach focused on improving behaviour could be an excellent way to take security slack out of an organisation and to achieve a high return for a modest, low-risk investment.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号