首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4398篇
  免费   132篇
  国内免费   7篇
电工技术   59篇
综合类   16篇
化学工业   1132篇
金属工艺   81篇
机械仪表   87篇
建筑科学   303篇
矿业工程   19篇
能源动力   83篇
轻工业   580篇
水利工程   19篇
石油天然气   3篇
无线电   385篇
一般工业技术   852篇
冶金工业   471篇
原子能技术   56篇
自动化技术   391篇
  2022年   39篇
  2021年   57篇
  2020年   44篇
  2019年   58篇
  2018年   51篇
  2017年   53篇
  2016年   91篇
  2015年   95篇
  2014年   110篇
  2013年   166篇
  2012年   195篇
  2011年   182篇
  2010年   139篇
  2009年   158篇
  2008年   150篇
  2007年   168篇
  2006年   169篇
  2005年   138篇
  2004年   119篇
  2003年   100篇
  2002年   108篇
  2001年   79篇
  2000年   65篇
  1999年   78篇
  1998年   132篇
  1997年   111篇
  1996年   74篇
  1995年   73篇
  1994年   76篇
  1993年   60篇
  1992年   74篇
  1991年   58篇
  1990年   55篇
  1989年   59篇
  1988年   58篇
  1987年   68篇
  1986年   57篇
  1985年   52篇
  1984年   63篇
  1983年   55篇
  1982年   46篇
  1981年   59篇
  1980年   48篇
  1979年   47篇
  1978年   50篇
  1977年   51篇
  1976年   61篇
  1974年   40篇
  1973年   39篇
  1971年   35篇
排序方式: 共有4537条查询结果,搜索用时 15 毫秒
991.
The block-transitive point-imprimitive 2-(729,8,1) designs are classified. They all have full automorphism group of order 729.13 which is an extension of a groupN of order 729, acting regularly on points, by a group of order 13. There are, up to isomorphism, 27 designs withN elementary abelian, 13 designs withN=Z 9 3 and 427 designs withN the relatively free 3-generator, exponent 3, nilpotency class 2 group, a total of 467 designs. This classification completes the classification of block-transitive, point-imprimitive 2-(, k, 1) designs satisfying , which is the Delandtsheer-Doyen upper bound for the number of points of such designs. The only examples of block-transitive, point-imprimitive 2-(, k, 1) designs with are the 2-(729, 8, 1) designs constructed in this paper.The first three authors acknowledge the support of an Australian European Awards Program scholarship, a Deutsche Akademische Austauschdienst scholarship, and an Australian Research Council Research Fellowship, respectivelyThe authors wish to thank Brendan McKay for his independent verification of the non-isomorphism of the classes of designs found, and of their automorphism groups, using different, nauty techniques [6].  相似文献   
992.
Zusammenfassung Es wird eine Methode zur Bestimmung von 5-Methoxypsoralen in Sonnenschutzmitteln beschrieben. Nach säulenchromatographischer Reinigung wird der Extrakt mittels zweidimensionaler Dünnschichtchromatographie untersucht. Bei positiven Befunden wird das 5-Methoxypsoralen capillar-gaschromatographisch unter Verwendung von 5--Cholestan als innerem Standard quantitativ bestimmt. Die Ergebnisse werden durch Gaschromatographie-Massenspektrometrie (GC-MS) abgesichert. Die Wiederfindungsrate beträgt bei Kosmetika vom Emulsionstyp 70% und bei Sonnenölpräparaten 90%. Die Nachweisgrenze liegt je nach Probenart, zwischen 0,1 und 0,5 mg/kg.Mit dieser Methode wurden in 6 von 21 untersuchten Sonnenschutzmitteln bis zu 28 mg 5-Methoxypsoralen/kg nachgewiesen.
Determination of 5-methoxypsoralene in suntan-cosmetics
Summary A method for the determination of 5-methoxypsoralene in suntan-cosmetics is described. After liquid chromatographic clean-up, the final extract is screened by twodimensional thin layer chromatography. For positive extracts 5-methoxypsoralene is analysed quantitatively by capillary gas chromatography, using 5--cholestane as an internal standard and flame ionization detection (FID). The results were confirmed by gas chromatography-mass spectrometry (GC-MS). The recoveries for suntan-cosmetics of emulsion type were 70% and for tanning oils 90%. Detection limits of the method were 0,1 to 0,5 mg/kg, depending on the sample type.By application of this method 5-methoxypsoralene was detected in 6 of the 21 cosmetic products at levels up to 28 mg/kg.
  相似文献   
993.
994.
The China Seismo-Electromagnetic Satellite (CSES) is the first platform of China’s earthquake observation system in space and the first satellite of China’s geophysical field detection missions. The high precision magnetometer (HPM), which contains two fluxgate sensors and a coupled dark state magnetometer (CDSM), measures the vector of the Earth’s magnetic field with a bandwidth from DC to 15 Hz. The two fluxgate sensors are in a gradiometer configuration in order to reduce satellite interferences. Additionally, the CDSM sensor measures the scalar value of the magnetic field with higher accuracy and stability. Several data processing and calibration methods have been prepared to get accurate vector magnetic field data. This includes the calibration of each of the three sensors, the absolute vector correction algorithm, the spacecraft magnetic interference elimination and the coordinate transformation method. Also the instrument performances based on ground calibration activities are shown in this article.  相似文献   
995.
Luther  Wolfram  Otten  Werner 《Reliable Computing》1997,3(3):249-258
In this note we derive explicit a priori error bounds for the approximation error and error accumulation of the descending Landen transform. Our results apply to incomplete elliptic integral of the first kind and give the framework to calculate error bounds in the representation of Jacobi's Zeta- and Theta-function.  相似文献   
996.
The response of an anchored spinning frictionless liquid bridge to different pitching top and/or bottom excitation has been determined. The free surface displacement is obtained for synchronous, counter-excited and one-sided pitching excitation as a function of the dimensionless forcing frequency . The contactlines at the rim of the upper and lower discs are considered to be anchored. In synchronous pitching excitation only the even resonances show response peaks, while in a counter-excited system only odd resonances appear, which is in contrast to axial excitation modes. For one-sided excitation, all reasonances appear. Because of the different natural frequencies in direction of spin and opposite to it double peaks are present in the responses.  相似文献   
997.
The representativity problem of laser Doppler anemometer wind measurements in the boundary layer under different atmospheric conditions has been investigated theoretically and experimentally. The calculations of the mean wind-velocity measurement errors for the surface layer under different types of thermal stratification and for the boundary layer under neutral conditions have been carried out. The theoretical conclusions are confirmed by the experimental results.  相似文献   
998.
999.
We present an approach for hybrid systems that combines the advantages of component-based modeling (e.g., reduced model complexity) with the advantages of formal verification (e.g., guaranteed contract compliance). Component-based modeling can be used to split large models into multiple component models with local responsibilities to reduce modeling complexity. Yet, this only helps the analysis if verification proceeds one component at a time. In order to benefit from the decomposition of a system into components for both modeling and verification purposes, we prove that the safety of compatible components implies safety of the composed system. We implement our composition theorem as a tactic in the KeYmaera X theorem prover, allowing automatic generation of a KeYmaera X proof for the composite system from proofs for the components without soundness-critical changes to KeYmaera X. Our approach supports component contracts (i.e., input assumptions and output guarantees for each component) that characterize the magnitude and rate of change of values exchanged between components. These contracts can take into account what has changed between two components in a given amount of time since the last exchange of information.  相似文献   
1000.
Security and privacy policies address consumer concerns related to security and privacy in e-commerce websites. As these policies represent only the vendor’s perspective, often there exists a mismatch between the stated and desired policy. Based on transaction cost theory, we speculate that business-to-business (B2B) and business-to-consumer (B2C) e-commerce customers use their transaction cost savings in order to obtain varying levels of security and privacy. These differences are bound to be reflected in the security and privacy policies of e-commerce companies. Therefore, in this paper, we perform a comparative content analysis of the security and privacy policies in B2C and B2B e-commerce. Results show that B2B vendors are more concerned about security than their B2C counterparts, while B2C vendors are anxious about intimacy and restriction privacy. Our findings have important implications for e-commerce consumers and vendors as individual and corporate consumers have varying concerns while transacting online. Individual consumers are concerned about maintaining security and intimacy privacy, whereas corporate users are anxious about regulatory issues. Therefore, B2C vendors should incorporate stringent measures dedicated to confidentiality and protection of consumer data as well as enhance intimacy privacy in their security policies, while their B2B counterparts should focus on enhancing restriction privacy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号