首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5130篇
  免费   360篇
  国内免费   19篇
电工技术   39篇
综合类   2篇
化学工业   1065篇
金属工艺   97篇
机械仪表   116篇
建筑科学   249篇
矿业工程   10篇
能源动力   160篇
轻工业   409篇
水利工程   68篇
石油天然气   17篇
无线电   407篇
一般工业技术   1252篇
冶金工业   721篇
原子能技术   9篇
自动化技术   888篇
  2024年   9篇
  2023年   58篇
  2022年   97篇
  2021年   171篇
  2020年   144篇
  2019年   147篇
  2018年   170篇
  2017年   160篇
  2016年   199篇
  2015年   156篇
  2014年   252篇
  2013年   337篇
  2012年   396篇
  2011年   490篇
  2010年   310篇
  2009年   260篇
  2008年   343篇
  2007年   301篇
  2006年   255篇
  2005年   209篇
  2004年   165篇
  2003年   133篇
  2002年   144篇
  2001年   87篇
  2000年   64篇
  1999年   42篇
  1998年   46篇
  1997年   42篇
  1996年   39篇
  1995年   27篇
  1994年   35篇
  1993年   29篇
  1992年   22篇
  1991年   14篇
  1990年   14篇
  1989年   17篇
  1988年   9篇
  1987年   10篇
  1986年   11篇
  1985年   15篇
  1984年   8篇
  1983年   7篇
  1982年   10篇
  1981年   7篇
  1980年   6篇
  1979年   6篇
  1978年   4篇
  1977年   13篇
  1975年   4篇
  1973年   3篇
排序方式: 共有5509条查询结果,搜索用时 15 毫秒
21.
Examined the use of an intervention for reducing unawareness of memory deficits in 3 male adults (aged 20–25 yrs) with brain injury. High predicted test scores on a brief multiparametric memory test, relative to actual test scores, were considered underestimations of symptom severity (unawareness). An estimation technique, feedback, and explicit positive reinforcement for decreases in discrepancies between predicted and actual scores were used to reduce unawareness. Differences between Ss' predicted and actual scores decreased over time following treatment for all Ss. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
22.
Infrequent captures of invasive, non-native grass carp (Ctenopharyngodon idella) have occurred in Lake Erie over the last 30+ years, with recent evidence suggesting wild reproduction in the lake’s western basin (WB) is occurring. Information on grass carp movements in the Laurentian Great Lakes is lacking, but an improved understanding of large-scale movements and potential areas of aggregation will help inform control strategies and risk assessment if grass carp spread to other parts of Lake Erie and other Great Lakes. Twenty-three grass carp captured in Lake Erie’s WB were implanted with acoustic transmitters and released. Movements were monitored with acoustic receivers deployed throughout Lake Erie and elsewhere in the Great Lakes. Grass carp dispersed up to 236 km, with approximately 25% of fish dispersing greater than 100 km from their release location. Mean daily movements ranged from <0.01 to 2.49 km/day, with the highest daily averages occurring in the spring and summer. The Sandusky, Detroit, and Maumee Rivers, and Plum Creek were the most heavily used WB tributaries. Seventeen percent of grass carp moved into Lake Erie’s central or eastern basins, although all fish eventually returned to the WB. One fish emigrated from Lake Erie through the Huron-Erie Corridor and into Lake Huron. Based on our results, past assessments may have underestimated the potential for grass carp to spread in the Great Lakes. We recommend focusing grass carp control efforts on Sandusky River and Plum Creek given their high use by tagged fish, and secondarily on Maumee and Detroit Rivers.  相似文献   
23.
Recent years have seen a growing call for inquiry-based learning in science education, and mobile technologies are perceived as increasingly valuable tools to support this approach. However, there is a lack of understanding of mobile technology-supported inquiry-based learning (mIBL) in secondary science education. More evidence-based, nuanced insights are needed into how using mobile technologies might facilitate students' engagement with various levels of inquiry and enhance their science learning. We, therefore, conducted a robust systematic literature review (SLR) of the research articles on mIBL in secondary school science education that have been published from 2000 to 2019. We reviewed and analysed 31 empirical studies (34 articles) to explore the types of mIBL, and the benefits and constraints of mIBL in secondary school science education. The findings of this SLR suggest new research areas for further exploration and provide implications for science teachers' selection, use and design of mIBL approaches in their teaching.  相似文献   
24.
Journal of Logic, Language and Information - Despite the incremental nature of Dynamic Syntax (DS), the semantic grounding of it remains that of predicate logic, itself grounded in set theory, so...  相似文献   
25.
This paper proposes a new method for calculating a bound on the gain of a system comprising a linear time invariant part and a static nonlinear part, which is odd, bounded, zero at zero and has a restriction on its slope. The nonlinear part is also assumed to be sector bounded, with the sector bound being (possibly) different from that implied by the slope restriction. The computation of the gain bound is found by solving a set of linear matrix inequalities, which arise from an integral quadratic constraint formulation of a multiplier problem involving both Zames‐Falb and Popov multipliers. Examples illustrate the effectiveness of the results, and comparisons are made against the state‐of‐the‐art. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   
26.
Breakdowns in complex systems often occur as a result of system elements interacting in unanticipated ways. In systems with human operators, human–automation interaction associated with both normative and erroneous human behavior can contribute to such failures. Model-driven design and analysis techniques provide engineers with formal methods tools and techniques capable of evaluating how human behavior can contribute to system failures. This paper presents a novel method for automatically generating task analytic models encompassing both normative and erroneous human behavior from normative task models. The generated erroneous behavior is capable of replicating Hollnagel's zero-order phenotypes of erroneous action for omissions, jumps, repetitions, and intrusions. Multiple phenotypical acts can occur in sequence, thus allowing for the generation of higher order phenotypes. The task behavior model pattern capable of generating erroneous behavior can be integrated into a formal system model so that system safety properties can be formally verified with a model checker. This allows analysts to prove that a human–automation interactive system (as represented by the model) will or will not satisfy safety properties with both normative and generated erroneous human behavior. We present benchmarks related to the size of the statespace and verification time of models to show how the erroneous human behavior generation process scales. We demonstrate the method with a case study: the operation of a radiation therapy machine. A potential problem resulting from a generated erroneous human action is discovered. A design intervention is presented which prevents this problem from occurring. We discuss how our method could be used to evaluate larger applications and recommend future paths of development.  相似文献   
27.
For any angle α<2π, we show that any connected communication graph that is induced by a set P of n transceivers using omni-directional antennas of radius 1, can be replaced by a strongly connected communication graph, in which each transceiver in P is equipped with a directional antenna of angle α and radius r dir, for some constant r dir=r dir(α). Moreover, the new communication graph is a c-spanner of the original graph, for some constant c=c(α), with respect to number of hops.  相似文献   
28.
Career visual searchers such as radiologists and airport security screeners strive to conduct accurate visual searches, but despite extensive training, errors still occur. A key difference between searches in radiology and airport security is the structure of the search task: Radiologists typically scan a certain number of medical images (fixed objective), and airport security screeners typically search X-rays for a specified time period (fixed duration). Might these structural differences affect accuracy? We compared performance on a search task administered either under constraints that approximated radiology or airport security. Some displays contained more than one target because the presence of multiple targets is an established source of errors for career searchers, and accuracy for additional targets tends to be especially sensitive to contextual conditions. Results indicate that participants searching within the fixed objective framework produced more multiple-target search errors; thus, adopting a fixed duration framework could improve accuracy for career searchers.  相似文献   
29.
Linear models are commonly used to identify trends in data. While it is an easy task to build linear models using pre‐selected variables, it is challenging to select the best variables from a large number of alternatives. Most metrics for selecting variables are global in nature, and thus not useful for identifying local patterns. In this work, we present an integrated framework with visual representations that allows the user to incrementally build and verify models in three model spaces that support local pattern discovery and summarization: model complementarity, model diversity, and model representivity. Visual representations are designed and implemented for each of the model spaces. Our visualizations enable the discovery of complementary variables, i.e., those that perform well in modeling different subsets of data points. They also support the isolation of local models based on a diversity measure. Furthermore, the system integrates a hierarchical representation to identify the outlier local trends and the local trends that share similar directions in the model space. A case study on financial risk analysis is discussed, followed by a user study.  相似文献   
30.
Ideological groups use the Internet to deliver their messages unhindered by the constraints of traditional media. We examined how ideological groups promote their worldview through their websites. Using the elaboration likelihood model (ELM), this research used trained coders to examine the websites of nonideological groups (n = 37), nonviolent ideological groups (n = 36), and violent ideological groups (n = 32) for credibility, persuasion processing cues, and interactivity factors. Results of this study found that the websites of violent ideological groups use more fear appeals, were less interactive, and were the least credible of the 3 groups. All 3 groups used more central cues than peripheral suggesting they focused on evidence for their arguments rather than emotion.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号