全文获取类型
收费全文 | 37801篇 |
免费 | 2595篇 |
国内免费 | 25篇 |
专业分类
电工技术 | 1622篇 |
综合类 | 424篇 |
化学工业 | 11309篇 |
金属工艺 | 521篇 |
机械仪表 | 757篇 |
建筑科学 | 1625篇 |
矿业工程 | 212篇 |
能源动力 | 591篇 |
轻工业 | 3917篇 |
水利工程 | 403篇 |
石油天然气 | 96篇 |
无线电 | 2194篇 |
一般工业技术 | 5549篇 |
冶金工业 | 6192篇 |
原子能技术 | 183篇 |
自动化技术 | 4826篇 |
出版年
2023年 | 681篇 |
2022年 | 476篇 |
2021年 | 936篇 |
2020年 | 804篇 |
2019年 | 787篇 |
2018年 | 828篇 |
2017年 | 642篇 |
2016年 | 907篇 |
2015年 | 1044篇 |
2014年 | 1231篇 |
2013年 | 2100篇 |
2012年 | 1262篇 |
2011年 | 1415篇 |
2010年 | 1452篇 |
2009年 | 1630篇 |
2008年 | 1176篇 |
2007年 | 1142篇 |
2006年 | 893篇 |
2005年 | 875篇 |
2004年 | 774篇 |
2003年 | 732篇 |
2002年 | 584篇 |
2001年 | 493篇 |
2000年 | 413篇 |
1999年 | 573篇 |
1998年 | 2314篇 |
1997年 | 1433篇 |
1996年 | 1076篇 |
1995年 | 721篇 |
1994年 | 684篇 |
1993年 | 729篇 |
1992年 | 382篇 |
1991年 | 339篇 |
1990年 | 375篇 |
1989年 | 391篇 |
1988年 | 360篇 |
1987年 | 308篇 |
1986年 | 329篇 |
1985年 | 370篇 |
1984年 | 327篇 |
1983年 | 286篇 |
1982年 | 275篇 |
1981年 | 331篇 |
1980年 | 265篇 |
1979年 | 278篇 |
1977年 | 303篇 |
1976年 | 326篇 |
1975年 | 287篇 |
1974年 | 264篇 |
1973年 | 422篇 |
排序方式: 共有10000条查询结果,搜索用时 36 毫秒
71.
Dr. A. N. Danilenko V. Yu. Vetrov A. P. Dmitrochenko A. L. Leontiev E. E. Braudo V. B. Tolstoguzov 《Molecular nutrition & food research》1992,36(2):105-111
Thermodynamic properties of aqueous solutions of both native and modified legumin of broad beans (Vicia faba L.) have been examined. A restricted trypsin-induced proteolysis was used to modify protein structure. Evaluation of protein affinity to ficoll in aqueous solutions showed that modified protein possessed higher hydrophilicity. Thermodynamic properties of diluted solutions were used to predict the phase behaviour in concentrated systems containing protein and ficoll. At specific concentrations of native legumin, the system can separate in two phases, whereas in the case of modified protein the single-phase behaviour of the system was predicted for any concentrations of both components. The experimental data obtained in concentrated systems confirmed predictions of thermodynamic analysis of diluted solutions. 相似文献
72.
P. J. M. Sonnemans P. M. W. Krvers A. C. Brombacher P. C. van Beek J. E. A. Reinders 《Quality and Reliability Engineering International》2003,19(3):183-196
Often companies in the (petro‐) chemical industry claim that all possible countermeasures against potential accidents have been taken and therefore accidents are unforeseeable. In this paper we question this statement by analysing the pre‐warning signals (precursors) preceding a number of industrial accidents. 17 accidents that occurred in the (petro‐) chemical industry have been investigated by exploring FACTS, an accident database containing information about industrial accidents worldwide. This paper will demonstrate that the existence of precursor information could have been used to foresee and even prevent these accidents if a proper control action had been initiated. The accidents are analysed further, according to a control model, which was adapted from that of C. Argyris. It demonstrates the ineffectiveness of several elements of business process control loops and that the so‐called ‘double‐loop learning’ cycle is more important than the ‘single‐loop learning’ cycle if one considers safety improvement. Copyright © 2003 John Wiley & Sons, Ltd. 相似文献
73.
74.
75.
76.
Our emphasis in this paper has been on the knowledge-based and cognitive issues pertinent for improved interactions between workers and manufacturing computer systems. We believe that these techniques are as necessary and applicable to manufacturing as to any other vocation, especially as the difference in collar color of shop people becomes less noticeable in their increasing role as knowledge workers. 相似文献
77.
The transition from basic automation to flexible manufacturing is an expensive and tedious procedure. It requires meticulous planning and almost clairvoyant forecasting to insure that the initial flexibility obtained is sufficient to allow growth and expansion in the future. This paper will suggest a systematic and methodological approach to achieve optimal flexibility and describe the present results of its application to an ongoing system transformation.
Conclusions based on existing levels of completion are presented along with identification of critical and non critical flexibility requirements. The considerations and steps taken are summarized in a procedural format which may then be applied to a wide variety of system transformations. 相似文献
78.
A procedure is described by which the length of a tendon at the onset of loading is determined objectively. The procedure includes the fitting of third-order polynomial functions on the load-elongation data. The onset of loading is detected by an increasing fit of the polynomial by selective data reduction of the initial part of the load-elongation curve. The procedure results in an objective and reproducible definition of the zero strain level of a tendon. 相似文献
79.
M. Schedl Dipl.-Ing. E. Pampalk Dipl.-Ind. G. Widmer Univ.-Prof. Dr. 《e & i Elektrotechnik und Informationstechnik》2005,122(7-8):232-237
In this paper we present a general approach to the automatic content-based organization and visualization of large digital music collections. The general methodology consists in extracting musically and perceptually relevant patterns (‘features’) from the given audio recordings (e.g., mp3 files), using topology-preserving data projection methods to map the entire music collection onto two-dimensional visualization planes (possibly in a hierarchical fashion), and using a new display metaphor (the ‘Islands of Music’) to display the inherent structure of the music collection to the user. It is shown how arbitrary meta-data can be integrated into the visualization process, and how similarity according to different viewpoints can be defined and exploited. The basic methodology is briefly described, three prototype systems are presented, and a general discussion of the practical application possibilities of such technologies is offered. 相似文献
80.
Many organisations suspect that their internal security threat is more pressing than their external security threat. The internal threat is predominantly the result of poor user security behaviour. Yet, despite that, security awareness programmes often seem more likely to put users to sleep than to improve their behaviour. This article discusses the influences that affect a user's security behaviour and outlines how a well structured approach focused on improving behaviour could be an excellent way to take security slack out of an organisation and to achieve a high return for a modest, low-risk investment. 相似文献