首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6000篇
  免费   171篇
  国内免费   10篇
电工技术   89篇
综合类   5篇
化学工业   1135篇
金属工艺   117篇
机械仪表   82篇
建筑科学   318篇
矿业工程   7篇
能源动力   166篇
轻工业   397篇
水利工程   46篇
石油天然气   113篇
武器工业   1篇
无线电   419篇
一般工业技术   913篇
冶金工业   1512篇
原子能技术   56篇
自动化技术   805篇
  2021年   63篇
  2020年   61篇
  2019年   60篇
  2018年   74篇
  2017年   65篇
  2016年   78篇
  2015年   88篇
  2014年   90篇
  2013年   354篇
  2012年   214篇
  2011年   247篇
  2010年   173篇
  2009年   188篇
  2008年   232篇
  2007年   232篇
  2006年   206篇
  2005年   194篇
  2004年   170篇
  2003年   162篇
  2002年   166篇
  2001年   94篇
  2000年   99篇
  1999年   117篇
  1998年   107篇
  1997年   114篇
  1996年   126篇
  1995年   85篇
  1994年   87篇
  1993年   92篇
  1992年   98篇
  1991年   70篇
  1990年   82篇
  1989年   98篇
  1988年   81篇
  1987年   92篇
  1986年   85篇
  1985年   104篇
  1984年   112篇
  1983年   86篇
  1982年   81篇
  1981年   86篇
  1980年   65篇
  1979年   98篇
  1978年   71篇
  1977年   80篇
  1976年   69篇
  1975年   65篇
  1974年   57篇
  1973年   75篇
  1972年   54篇
排序方式: 共有6181条查询结果,搜索用时 989 毫秒
121.
This article presents ISO’s most successful information security standard ISO/IEC 27001 together with the other standards in the family of information security standards — the socalled ISO/IEC 2700x family of information security management system (ISMS) standards and guidelines. We shall take a brief look at the history and progress of these standards, where they originated from and how became the common language of organizations around the world for engaging in business securely. We shall take a tour through the different types of standard at are included in the ISMS family and how the relate and fit together and we will finally conclude with a short presentation of ISMS third party certification. The material used in this article has been derived directly from the many articles and books by Prof. Humphreys on the ISO/IEC 2700x ISMS family and they are implemented and applied in practice in business, commerce and government sectors.  相似文献   
122.
123.
Achieving stability at the site of femoral neck fracture is an important factor for callus formation in the post-operative period. However, measuring interfragmentary movement in vivo is not currently possible as telemetric screws have not been manufactured for surgical use. Understanding how the implantation of the screws can affect the stability of the fracture allows the surgeon to tailor the procedure to the patient and produce the best possible outcome. Two techniques have been developed that measure interfragmentary movement between fractured surfaces. The first was a FEA model of the proximal femur with screws represented by nodal links. Movement was quantified by the amount of relative motion occurring between paired nodes either side of the fracture. The second was a mechanical compression test of a composite femur that allowed the motion analysis of paired markers on the external surface of the femur. Movement was digitised with markers selected and displacements calculated by transforming the global coordinate system to a local system relative to the fracture plane.  相似文献   
124.
125.
In this research we examined the prediction of children’s body mass index (BMI), body weight, academic performance, social self-esteem and overall self-esteem from their IT (information technology) use, specifically, their Internet use, cell phone use and videogame playing, after controlling for the effects of gender, race, age and household income on these measures. Participants were 482 children whose average age was 12 years old. One-third was African American and two-thirds were Caucasian American. Results indicated that IT use did not predict BMI or body weight, contrary to one previous survey and the widespread belief that screen time is responsible for the obesity epidemic among our nation’s children. Instead, BMI and body weight were higher for African Americans, older children and children from lower income households. The sole and strong positive predictor of visual-spatial skills was videogame playing, which also predicted lower grade point averages (GPAs). Gender and Internet use predicted standardized test scores in reading skills. Females and children who used the Internet more had better reading skills than did males and children who used the Internet less, respectively. Implications of these findings for future research on the benefits and liabilities of IT use are discussed.  相似文献   
126.
The objective of the current research is to model trends in video game playing, overall computer use, and communication technology use in a longitudinal sample of youths, aged 11-16 over a 3-year interval. In addition, individual difference characteristics that may be predictive of these trends were included, namely, socio-demographic characteristics (gender, ethnicity, and parental income) and personality characteristics (self-esteem, the Big Five personality factors). Findings suggested that youth increased their overall computer and communication technology use but decreased their videogame playing over time. Many individual differences predicted mean levels of these technologies with fewer predicting slopes. Conclusions, implications, and limitations are discussed.  相似文献   
127.
In this paper, we present a simple and robust method for self-correction of camera distortion using single images of scenes which contain straight lines. Since the most common distortion can be modelled as radial distortion, we illustrate the method using the Harris radial distortion model, but the method is applicable to any distortion model. The method is based on transforming the edgels of the distorted image to a 1-D angular Hough space, and optimizing the distortion correction parameters which minimize the entropy of the corresponding normalized histogram. Properly corrected imagery will have fewer curved lines, and therefore less spread in Hough space. Since the method does not rely on any image structure beyond the existence of edgels sharing some common orientations and does not use edge fitting, it is applicable to a wide variety of image types. For instance, it can be applied equally well to images of texture with weak but dominant orientations, or images with strong vanishing points. Finally, the method is performed on both synthetic and real data revealing that it is particularly robust to noise.  相似文献   
128.
A self-organizing peer-to-peer system is built upon an application level overlay, whose topology is independent of an underlying physical network. A well-routed message path in such systems may result in a long delay and excessive traffic due to the mismatch between logical and physical networks. In order to solve this problem, we present a family of Peer-exchange Routing Optimization Protocols (PROP) to reconstruct the overlay. It includes two policies: PROP-G for generic condition and PROP-O for optimized one. Both theoretical analysis and simulation experiments show that these two protocols greatly reduce the average latency of the overlay and achieve a better logical topology with low overhead. Their overall performance can be further improved if combined with other recent approaches. Specifically, PROP-G can be easily applied to both structured and unstructured systems without the loss of their primary characteristics, such as efficient routing and anonymity. PROP-O, on the other hand, is more efficient, especially in a heterogenous environment where nodes have different processing capabilities.
Edward ChanEmail:
  相似文献   
129.
This paper presents an implementation of the watermarking method proposed by Venkatesan et al. in their paper [R. Venkatesan, V. Vazirani, S. Sinha, A graph theoretic approach to software watermarking, in: Fourth International Information Hiding Workshop, Pittsburgh, PA, 2001]. An executable program is marked by the addition of code for which the topology of the control-flow graph encodes a watermark. We discuss issues that were identified during construction of an actual implementation that operates on Java bytecode. We present two algorithms for splitting a watermark number into a redundant set of pieces and an algorithm for turning a watermark number into a control-flow graph. We measure the size and time overhead of watermarking, and evaluate the algorithm against a variety of attacks.  相似文献   
130.
The use of separate transport and economic models in urban planning provides a limited view of economic impacts, restricts the testing of network design options and lengthens the planning process. Furthermore, the standard methodology for economic appraisal assumes partial economic equilibrium and cannot determine the distribution of impacts from the transport sector to households. Computable general equilibrium (CGE) models can capture general equilibrium effects and measure welfare at the household level, but mostly lack integration with transport models and do not represent all trip generators. This paper develops an integrated traffic assignment and spatial CGE model in nonlinear complementarity form, casted as a framework for economic appraisal of urban transport projects. The CGE submodel generates commuting, shopping and leisure trips as inputs into the transport submodel, which then assigns trips to the network according to user equilibrium. The resulting travel times then feed back into household prices and freight margins. Households and firms fully account for travel times in decisions on where to shop, how much labour to supply and where to source production inputs. Calibration and applications of the model are demonstrated for 14 regions and 2 industries across Sydney using GAMS/PATH on the NEOS server. The welfare of various network improvements is measured using equivalent variations. The model can be calibrated to external strategic transport models, and be extended to simulate additional trip generators and land-use.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号