首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3411篇
  免费   107篇
  国内免费   4篇
电工技术   61篇
综合类   6篇
化学工业   1039篇
金属工艺   66篇
机械仪表   36篇
建筑科学   208篇
矿业工程   31篇
能源动力   41篇
轻工业   417篇
水利工程   12篇
石油天然气   4篇
无线电   173篇
一般工业技术   464篇
冶金工业   499篇
原子能技术   39篇
自动化技术   426篇
  2022年   28篇
  2021年   39篇
  2020年   30篇
  2019年   34篇
  2018年   53篇
  2017年   47篇
  2016年   73篇
  2015年   90篇
  2014年   88篇
  2013年   127篇
  2012年   129篇
  2011年   167篇
  2010年   113篇
  2009年   125篇
  2008年   126篇
  2007年   146篇
  2006年   124篇
  2005年   120篇
  2004年   107篇
  2003年   75篇
  2002年   73篇
  2001年   55篇
  2000年   60篇
  1999年   62篇
  1998年   128篇
  1997年   89篇
  1996年   95篇
  1995年   73篇
  1994年   77篇
  1993年   62篇
  1992年   54篇
  1991年   49篇
  1990年   40篇
  1989年   45篇
  1988年   28篇
  1987年   38篇
  1986年   33篇
  1985年   45篇
  1984年   36篇
  1983年   39篇
  1982年   36篇
  1981年   32篇
  1980年   35篇
  1978年   27篇
  1977年   38篇
  1976年   43篇
  1975年   42篇
  1974年   22篇
  1973年   28篇
  1970年   31篇
排序方式: 共有3522条查询结果,搜索用时 296 毫秒
71.
For many years, public transportation systems have been an essential part of day-to-day life and so the principle of needing a “ticket” has been familiar to generations of travellers. However as technology has advanced it has become possible to make use of electronic tickets that have significant advantages both for travellers and for the transport system operators. There has been a lot of recent publicity regarding weaknesses in some electronic ticket solutions; which whilst based on some solid facts tend to suggest that transport ticket security and fraud control is primarily a smart card/RFID technology issue. However this cannot be the case as systems exist that do not use such technology; or use it along side legacy systems. This paper will consider technology problems, but will first establish the bigger picture of transport ticketing and will finally make suggestions for future evolution of such systems.  相似文献   
72.
A national multicentre study was performed to investigate the prevalent use of "alternative medicine", here called "non-proven therapies (NPT)", applied among Norwegian cancer patients. Of 911 patients invited to take part in the study, 642 were included in the analysis. Demographic characteristics were collected for all patients. The participating physicians gave information about the patients' clinical characteristics. Among 630 evaluable patients, 20% had been or were present users of NPTs for their oncological disease. The preferred methods were healing by hand and faith healing. Herbs, vitamins, diets and Iscador were other popular methods. As many as 40% of the users of NPTs had used NPTs earlier for non-malignant diseases. Elderly patients were less likely to use NPTs. Use was high in the northern part of Norway.  相似文献   
73.
Comprehensive analyses of the atomic structure using advanced analytical transmission electron microscopy-based methods combined with atom probe tomography confirm the presence of distinct glass–glass interfaces in a columnar Cu-Zr nanoglass synthesized by magnetron sputtering. These analyses provide first-time in-depth characterization of sputtered film nanoglasses and indicate that glass–glass interfaces indeed present an amorphous phase with reduced mass density as compared to the neighboring amorphous regions. Moreover, dedicated analyses of the diffusion kinetics by time-of-flight secondary ion mass spectroscopy (ToF SIMS) prove significantly enhanced diffusivity, suggesting fast transport along the low density glass–glass interfaces. The present results further indicate that sputter deposition is a feasible technique for reliable production of nanoglasses and that some of the concepts proposed for this new class of glassy materials are applicable.  相似文献   
74.
75.
The prevalence of 18 selected bacterial species was assessed by means of "checkerboard" DNA-DNA hybridisation in a group of 12 Saudi-Arabian adolescents with Papillon-Lefèvre syndrome. A total of 36 tooth sites were investigated. The patients exhibited severe periodontal disease with deep pockets. All 12 patients harboured the putative bacterial pathogens P. intermedia, F. nucleatum, P. micros and S. intermedius while T. denticola, B. forsythus, P. nigrescens, E. corrodens, S. noxia and C. rectus were recovered from 11 patients. P. gingivalis was recovered from 9 patients and 18 sites while corresponding figures for A. actinomycetemcomitans were 8 and 19, respectively. A number of the investigated species (B. forsythus, T. denticola, P. intermedia, C rectus) reached high levels (> or =10(6) cells) in more than 1/2 of the patients. On the other hand, bacteria such as A. actinomycetemcomitans and P. gingivalis were infrequently encountered at high levels in these subgingival samples. In conclusion, the analysis failed to demonstrate a PLS-specific profile of the subgingival infection, since the bacterial composition of the sampled sites closely resembled that characterising deep pockets in adult periodontitis patients.  相似文献   
76.
Reasoning about change is a central issue in research on human and robot planning. We study an approach to reasoning about action and change in a dynamic logic setting and provide a solution to problems which are related to the Frame problem. Unlike most work on the frame problem the logic described in this paper is monotonic. It (implicitly) allows for the occurrence of actions of multiple agents by introducing non-stationary notions of waiting and test. The need to state a large number of frame axioms is alleviated by introducing a concept of chronological preservation to dynamic logic. As a side effect, this concept permits the encoding of temporal properties in a natural way. We compare the relative merits of our approach and non-monotonic approaches as regards different aspects of the frame problem. Technically, we show that the resulting extended systems of propositional dynamic logic preserve (weak) completeness, finite model property and decidability.  相似文献   
77.
The SHARC framework for data quality in Web archiving   总被引:1,自引:0,他引:1  
Web archives preserve the history of born-digital content and offer great potential for sociologists, business analysts, and legal experts on intellectual property and compliance issues. Data quality is crucial for these purposes. Ideally, crawlers should gather coherent captures of entire Web sites, but the politeness etiquette and completeness requirement mandate very slow, long-duration crawling while Web sites undergo changes. This paper presents the SHARC framework for assessing the data quality in Web archives and for tuning capturing strategies toward better quality with given resources. We define data quality measures, characterize their properties, and develop a suite of quality-conscious scheduling strategies for archive crawling. Our framework includes single-visit and visit?Crevisit crawls. Single-visit crawls download every page of a site exactly once in an order that aims to minimize the ??blur?? in capturing the site. Visit?Crevisit strategies revisit pages after their initial downloads to check for intermediate changes. The revisiting order aims to maximize the ??coherence?? of the site capture(number pages that did not change during the capture). The quality notions of blur and coherence are formalized in the paper. Blur is a stochastic notion that reflects the expected number of page changes that a time-travel access to a site capture would accidentally see, instead of the ideal view of a instantaneously captured, ??sharp?? site. Coherence is a deterministic quality measure that counts the number of unchanged and thus coherently captured pages in a site snapshot. Strategies that aim to either minimize blur or maximize coherence are based on prior knowledge of or predictions for the change rates of individual pages. Our framework includes fairly accurate classifiers for change predictions. All strategies are fully implemented in a testbed and shown to be effective by experiments with both synthetically generated sites and a periodic crawl series for different Web sites.  相似文献   
78.
In interactive theorem proving practice a significant amount of time is spent on unsuccessful proof attempts of wrong conjectures. An automatic method that reveals them by generating finite counter examples would offer an extremely valuable support for a proof engineer by saving his time and effort. In practice, such counter examples tend to be small, so usually there is no need to search for big instances. Most definitions of functions or predicates on infinite structures do not preserve the semantics if a transition to arbitrary finite substructures is made. We propose constraints which guarantee a correct axiomatization on finite structures and present an approach which uses the Alloy Analyzer to generate finite instances of theories in the theorem prover KIV. It is evaluated on the library of basic data types as well as on some challenging case studies in KIV. The technique is implemented using the Kodkod constraint solver which is a successor of Alloy.  相似文献   
79.
Micro injection molded polymeric parts coated with functional thin films/layers show off the promising applications in microsystems area. But the unfavorable and unavoidable defect of weld line in micro injection molding part leads to detrimental mechanical and surface properties. The possibility of the functional thin film for enhancing micro injection molded weld lines was investigated. Two typical coating materials (aluminum and titanium) with various film thicknesses (400, 600, 800 nm) were deposited on one side of the micro injection molded weld line tensile sample via physical vapor deposition (PVD) method. The coated micro weld line samples were characterized by tensile tests. The results show that PVD films of aluminum and titanium can reinforce the strength and stiffness of micro injection molded weld line, even at thin thickness levels. But when the film thickness is increasing, the weaker adhesion between metallic films and polymers decreased the PVD films’ enhancing performance for micro weld line mechanical properties due to the degradation of polymers related to longer time exposure under high temperature.  相似文献   
80.
Im Bereich des Sozialdatenschutzes besteht im Zusammenhang mit dem Besch?ftigtendatenschutz ein gesetzgeberischer Handlungsbedarf. Die Regierungsparteien haben sich im Koalitionsvertrag darauf geeinigt, dass nach Jahren der Diskussion der Besch?ftigtendatenschutz in einem Kapitel des BDSG geregelt werden soll. Hier kann die Frage dahingestellt bleiben, ob nicht eine bereichsspezifische Regelung effektiver w?re. Eine Verbindung zwischen Besch?ftigtendatenschutz und Sozialdatenschutz wurde jedenfalls bisher nicht ins Visier genommen. Eine solche Verknüpfung ist jedoch notwendig, wie die nachfolgend aufgezeigten Konfliktfelder und der nachfolgend geschilderte Fall beispielhaft zeigen. Sie deuten die datenschutzrechtlichen Schwierigkeiten an, die durch das Fehlen eines Besch?ftigtendatenschutzgesetzes für Besch?ftigte im Bereich der Jugendhilfe entstehen k?nnen. Anschlie?end sollen sachgerechte Antworten ausgelotet werden. Sie führen gleichzeitig zu der kritischen Frage nach der Zust?ndigkeit von Aufsichtsbeh?rden und Landesdatenschutzbeauftragten in F?llen, in denen die T?tigkeit ?ffentlicher (hier Jugendamt und Heimaufsicht) und nicht-?ffentlicher Stellen (hier freie Tr?ger der Jugendhilfe) eng aufeinander abgestimmt werden muss.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号