首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19369篇
  免费   586篇
  国内免费   43篇
电工技术   245篇
综合类   35篇
化学工业   4128篇
金属工艺   314篇
机械仪表   407篇
建筑科学   939篇
矿业工程   107篇
能源动力   597篇
轻工业   1316篇
水利工程   181篇
石油天然气   193篇
武器工业   1篇
无线电   1330篇
一般工业技术   3152篇
冶金工业   4136篇
原子能技术   188篇
自动化技术   2729篇
  2022年   229篇
  2021年   347篇
  2020年   277篇
  2019年   331篇
  2018年   389篇
  2017年   315篇
  2016年   366篇
  2015年   294篇
  2014年   412篇
  2013年   1153篇
  2012年   744篇
  2011年   958篇
  2010年   652篇
  2009年   691篇
  2008年   826篇
  2007年   816篇
  2006年   734篇
  2005年   636篇
  2004年   526篇
  2003年   525篇
  2002年   513篇
  2001年   318篇
  2000年   325篇
  1999年   318篇
  1998年   444篇
  1997年   383篇
  1996年   335篇
  1995年   346篇
  1994年   320篇
  1993年   360篇
  1992年   303篇
  1991年   229篇
  1990年   232篇
  1989年   245篇
  1988年   206篇
  1987年   247篇
  1986年   222篇
  1985年   275篇
  1984年   243篇
  1983年   216篇
  1982年   205篇
  1981年   218篇
  1980年   181篇
  1979年   199篇
  1978年   196篇
  1977年   161篇
  1976年   187篇
  1975年   185篇
  1974年   140篇
  1973年   140篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
61.
62.
63.
Critical, or national, information infrastructure protection, referred to as either CIIP or NIIP, has been highlighted as a critical factor in overall national security by the United States, the United Kingdom, India and the European Community. As nations move inexorably towards so-called ‘digital economies’, critical infrastructure depends on information systems to process, transfer, store and exchange information through the Internet. Electronic attacks such as denial of service attacks on critical information infrastructures challenge the law and raise concerns. A myriad of issues potentially plague the protection of critical information infrastructures owing to the lack of legal regulation aimed at ensuring the protection of critical information infrastructures. This paper will highlight the legal concerns that relate to the denial of service attacks on critical information infrastructures and provide an introductory overview of the law as it relates to CIIP in Australia.  相似文献   
64.
Biomarkers have enormous potential to improve patient care by establishing tests of diagnosis, prognosis, and treatment effects. Successfully translating a biomarker from discovery to clinical application demands high-quality discovery research and high-quality clinical studies for biomarker validation; however, there are additional challenges that face biomarker research in pediatrics. There are also additional characteristics of pediatric medicine that make biomarker research especially needed. This review focuses on the fundamentals of biomarkers, the additional considerations needed for applying biomarker research to children, and recommendations for advancing pediatric biomarker research.  相似文献   
65.
One approach to limiting disclosure risk in public-use microdata is to release multiply-imputed, partially synthetic data sets. These are data on actual respondents, but with confidential data replaced by multiply-imputed synthetic values. A mis-specified imputation model can invalidate inferences based on the partially synthetic data, because the imputation model determines the distribution of synthetic values. We present a practical method to generate synthetic values when the imputer has only limited information about the true data generating process. We combine a simple imputation model (such as regression) with density-based transformations that preserve the distribution of the confidential data, up to sampling error, on specified subdomains. We demonstrate through simulations and a large scale application that our approach preserves important statistical properties of the confidential data, including higher moments, with low disclosure risk.  相似文献   
66.
This article presents an automated Sentinel-1-based processing chain designed for flood detection and monitoring in near-real-time (NRT). Since no user intervention is required at any stage of the flood mapping procedure, the processing chain allows deriving time-critical disaster information in less than 45 min after a new data set is available on the Sentinel Data Hub of the European Space Agency (ESA). Due to the systematic acquisition strategy and high repetition rate of Sentinel-1, the processing chain can be set up as a web-based service that regularly informs users about the current flood conditions in a given area of interest. The thematic accuracy of the thematic processor has been assessed for two test sites of a flood situation at the border between Greece and Turkey with encouraging overall accuracies between 94.0% and 96.1% and Cohen’s kappa coefficients (κ) ranging from 0.879 to 0.910. The accuracy assessment, which was performed separately for the standard polarizations (VV/VH) of the interferometric wide swath (IW) mode of Sentinel-1, further indicates that under calm wind conditions, slightly higher thematic accuracies can be achieved by using VV instead of VH polarization data.  相似文献   
67.
This study presents monthly estimates of groundwater anomalies in a large river basin dominated by extensive floodplains, the Negro River Basin, based on the synergistic analysis using multisatellite observations and hydrological models. For the period 2003-2004, changes in water stored in the aquifer is isolated from the total water storage measured by GRACE by removing contributions of both the surface reservoir, derived from satellite imagery and radar altimetry, and the root zone reservoir simulated by WGHM and LaD hydrological models. The groundwater anomalies show a realistic spatial pattern compared with the hydrogeological map of the basin, and similar temporal variations to local in situ groundwater observations and altimetry-derived level height measurements. Results highlight the potential of combining multiple satellite techniques with hydrological modeling to estimate the evolution of groundwater storage.  相似文献   
68.
69.
This paper develops a framework for the consideration of internal markets as an alternative to information systems (IS) outsourcing. It is based on an assessment of the pros and cons of both outsourcing and of insourcing based on the internal markets approach. It is formulated in terms of the operational, tactical, and strategic impacts of the choice among the alternatives. The framework, and the propositions that are developed from it, should be useful both for researchers, who can use it for developing testable research hypotheses, and for practitioners, who may use it as a basis for developing a comprehensive set of criteria for the evaluation of these sourcing options.  相似文献   
70.
We have developed a unique device, a dynamic diamond anvil cell (dDAC), which repetitively applies a time-dependent load/pressure profile to a sample. This capability allows studies of the kinetics of phase transitions and metastable phases at compression (strain) rates of up to 500 GPa/s (approximately 0.16 s(-1) for a metal). Our approach adapts electromechanical piezoelectric actuators to a conventional diamond anvil cell design, which enables precise specification and control of a time-dependent applied load/pressure. Existing DAC instrumentation and experimental techniques are easily adapted to the dDAC to measure the properties of a sample under the varying load/pressure conditions. This capability addresses the sparsely studied regime of dynamic phenomena between static research (diamond anvil cells and large volume presses) and dynamic shock-driven experiments (gas guns, explosive, and laser shock). We present an overview of a variety of experimental measurements that can be made with this device.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号