全文获取类型
收费全文 | 1963篇 |
免费 | 27篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 26篇 |
综合类 | 5篇 |
化学工业 | 460篇 |
金属工艺 | 31篇 |
机械仪表 | 38篇 |
建筑科学 | 101篇 |
矿业工程 | 21篇 |
能源动力 | 34篇 |
轻工业 | 158篇 |
水利工程 | 10篇 |
石油天然气 | 12篇 |
无线电 | 144篇 |
一般工业技术 | 256篇 |
冶金工业 | 334篇 |
原子能技术 | 13篇 |
自动化技术 | 348篇 |
出版年
2022年 | 13篇 |
2020年 | 11篇 |
2019年 | 15篇 |
2018年 | 18篇 |
2016年 | 18篇 |
2015年 | 20篇 |
2014年 | 26篇 |
2013年 | 100篇 |
2012年 | 47篇 |
2011年 | 82篇 |
2010年 | 59篇 |
2009年 | 77篇 |
2008年 | 82篇 |
2007年 | 73篇 |
2006年 | 71篇 |
2005年 | 63篇 |
2004年 | 62篇 |
2003年 | 63篇 |
2002年 | 62篇 |
2001年 | 49篇 |
2000年 | 34篇 |
1999年 | 42篇 |
1998年 | 34篇 |
1997年 | 40篇 |
1996年 | 47篇 |
1995年 | 30篇 |
1994年 | 47篇 |
1993年 | 24篇 |
1992年 | 30篇 |
1991年 | 26篇 |
1990年 | 25篇 |
1989年 | 27篇 |
1988年 | 23篇 |
1987年 | 32篇 |
1986年 | 20篇 |
1985年 | 24篇 |
1984年 | 43篇 |
1983年 | 29篇 |
1982年 | 29篇 |
1981年 | 30篇 |
1980年 | 20篇 |
1979年 | 31篇 |
1978年 | 20篇 |
1977年 | 30篇 |
1976年 | 20篇 |
1975年 | 25篇 |
1974年 | 15篇 |
1973年 | 18篇 |
1972年 | 11篇 |
1971年 | 12篇 |
排序方式: 共有1991条查询结果,搜索用时 15 毫秒
31.
Fred Cohen 《Network Security》2000,2000(11):16-18
Networks dominate today's computing landscape and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
32.
The human visual system has the remarkable ability to largely recognize objects invariant of their position, rotation, and scale. A good interpretation of neurobiological findings involves a computational model that simulates signal processing of the visual cortex. In part, this is likely achieved step by step from early to late areas of visual perception. While several algorithms have been proposed for learning feature detectors, only few studies at hand cover the issue of biologically plausible learning of such invariance. In this study, a set of Hebbian learning rules based on calcium dynamics and homeostatic regulations of single neurons is proposed. Their performance is verified within a simple model of the primary visual cortex to learn so-called complex cells, based on a sequence of static images. As a result, the learned complex-cell responses are largely invariant to phase and position. 相似文献
33.
Fred Cohen 《Network Security》2003,2003(6):18-20
Networks dominate today's computing landscape and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
34.
Welkowitz Joan; Welkowitz Lawrence A.; Struening Elmer; Hellman Fred; Guardino Mary 《Canadian Metallurgical Quarterly》2004,41(1):69
Questionnaire data from 2,033 participants in the National Anxiety Disorders Screening Day sample were used to assess the presence of panic and comorbid anxiety problems. These participants were selected from more than 15,000 attendees on the basis of never having received treatment for a psychiatric disorder and meeting screening criteria for panic disorder. With each comorbid anxiety problem (generalized anxiety disorder, posttraumatic stress disorder, social phobia, and obsessive-compulsive disorder), participants had a corresponding increase in interference in daily living as well as readiness to seek treatment. The addition of generalized anxiety or depression with panic symptoms resulted in marked increases in interference scores. Clinical treatment implications for panic disorder are discussed in terms of the effects of comorbid anxiety problems. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
35.
Douglas A Stow Allen Hope David Verbyla Fred Huemmrich Charles Racine Kenneth Tape Kenji Yoshikawa Brian Noyle David Douglas Gensuo Jia Donald Walker Aaron Petersen Ranga Myneni 《Remote sensing of environment》2004,89(3):281-308
The objective of this paper is to review research conducted over the past decade on the application of multi-temporal remote sensing for monitoring changes of Arctic tundra lands. Emphasis is placed on results from the National Science Foundation Land-Air-Ice Interactions (LAII) program and on optical remote sensing techniques. Case studies demonstrate that ground-level sensors on stationary or moving track platforms and wide-swath imaging sensors on polar orbiting satellites are particularly useful for capturing optical remote sensing data at sufficient frequency to study tundra vegetation dynamics and changes for the cloud prone Arctic. Less frequent imaging with high spatial resolution instruments on aircraft and lower orbiting satellites enable more detailed analyses of land cover change and calibration/validation of coarser resolution observations.The strongest signals of ecosystem change detected thus far appear to correspond to expansion of tundra shrubs and changes in the amount and extent of thaw lakes and ponds. Changes in shrub cover and extent have been documented by modern repeat imaging that matches archived historical aerial photography. NOAA Advanced Very High Resolution Radiometer (AVHRR) time series provide a 20-year record for determining changes in greenness that relates to photosynthetic activity, net primary production, and growing season length. The strong contrast between land materials and surface waters enables changes in lake and pond extent to be readily measured and monitored. 相似文献
36.
Design and management of residential subdivisions are described using a case study in Regina, Saskatchewan. Capital, operation and maintenance costs of physical services and fuel costs for intra-subdivision trips are compared for four subdivision layouts using the procedures. The solar superblock layout is the lowest subdivision layout. Future procedures to assist subdivision design engineers and planners are summarized. 相似文献
37.
A variety of quantitative techniques (such as capital budgeting or linear programming) may be understood more fully by students when they are able to work through relatively simple applications of the techniques by hand. Unfortunately, such manual computations are inherently susceptible to arithmetic errors. The authors propose that students use the electronic spreadsheet to work out these types of problems during their initial learning stage. An advantage of the electronic spreadsheet for this purpose is the automatic calculation of data by the program thereby eliminating the usual arithmetic errors. As long as appropriate formulas are correctly entered into the spreadsheet, the results should be correct.The method presented by the authors does not yield general solutions to capital budgeting or to linear programming problems. Rather, the methodology requires the student to think through the solution process while removing some of the usual drudgery and potential inaccuracies of manual solutions. 相似文献
38.
Fred Avolio 《计算机安全》2005,(11):68-69
现在,在看过论坛的大量文章之后,相信您已经对无线LAN(无线局域网,WLAN)采取了敬而远之的态度。至少,您已经对WLAN产生了怀疑——这并不是一件坏事情。Rik描述了Wep的缺陷,Corey描述了如何将无线访问点转移到DMZ中,而Dave指出应该将它们彻底地放到外面。不过,还没有人说应该完全舍弃WLAN,这是出于两个非常有说服力的理由。首先,WLAN在某些场合非常有用;其次,您完全可以不必听我们的。您已经知道WLAN在办公室的用处。但是,它在家里有什么用呢?正如许多人所指出的,“无线”的价格很便宜,而且确实行之有效(我在撰写本文时,就是通过… 相似文献
39.
Fred Cohen 《Network Security》2000,2000(8):11-16
Networks dominate today’s computing landscape and commercial, technical protection is lagging behind attack technology. As a result, protection program success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
40.
It is easy to give a list of cognitive processes. They are things like learning, memory, concept formation, reasoning, maybe emotion, and so on. It is not easy to say, of these things that are called cognitive, what makes them so? Knowing the answer is one very important reason to be interested in the mark of the cognitive. In this paper, consider some answers that we think do not work and then offer one of our own which ties cognition to actions explained via the having of reasons. 相似文献