全文获取类型
收费全文 | 9690篇 |
免费 | 304篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 115篇 |
综合类 | 6篇 |
化学工业 | 1759篇 |
金属工艺 | 172篇 |
机械仪表 | 200篇 |
建筑科学 | 493篇 |
矿业工程 | 15篇 |
能源动力 | 260篇 |
轻工业 | 968篇 |
水利工程 | 125篇 |
石油天然气 | 42篇 |
无线电 | 848篇 |
一般工业技术 | 1723篇 |
冶金工业 | 1973篇 |
原子能技术 | 66篇 |
自动化技术 | 1237篇 |
出版年
2023年 | 39篇 |
2022年 | 71篇 |
2021年 | 136篇 |
2020年 | 104篇 |
2019年 | 119篇 |
2018年 | 139篇 |
2017年 | 162篇 |
2016年 | 147篇 |
2015年 | 166篇 |
2014年 | 225篇 |
2013年 | 552篇 |
2012年 | 413篇 |
2011年 | 530篇 |
2010年 | 366篇 |
2009年 | 405篇 |
2008年 | 524篇 |
2007年 | 459篇 |
2006年 | 395篇 |
2005年 | 398篇 |
2004年 | 331篇 |
2003年 | 314篇 |
2002年 | 294篇 |
2001年 | 194篇 |
2000年 | 178篇 |
1999年 | 180篇 |
1998年 | 351篇 |
1997年 | 253篇 |
1996年 | 246篇 |
1995年 | 172篇 |
1994年 | 161篇 |
1993年 | 175篇 |
1992年 | 109篇 |
1991年 | 85篇 |
1990年 | 106篇 |
1989年 | 138篇 |
1988年 | 102篇 |
1987年 | 95篇 |
1986年 | 88篇 |
1985年 | 107篇 |
1984年 | 90篇 |
1983年 | 90篇 |
1982年 | 79篇 |
1981年 | 91篇 |
1980年 | 61篇 |
1979年 | 68篇 |
1978年 | 58篇 |
1977年 | 85篇 |
1976年 | 86篇 |
1975年 | 54篇 |
1974年 | 40篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
Developing competency-based methods for near-real-time air combat problem solving assessment 总被引:1,自引:0,他引:1
Air combat scenarios present unique problems where the solution is not obvious. An advanced networked simulation environment can be used to train high-level cognitive air combat skills such as problem solving. A problem in the development of principled and construct oriented assessment is related to determining the level of specificity of the assessment. We present a detailed discussion of the definition of critical competencies associated with combat mission problem solving performance, and we describe our approach to develop and implement an embedded performance assessment system that maps outcomes to these competencies. Finally, we discuss the implications for our approach for comprehensive assessment and discuss our goals for an evaluation of the competency-based approach to assessment. 相似文献
42.
43.
A one–dimensional, transient thermal degradation heat transfer model for the response of composite materials when exposed to fire is presented. The model can handle layers of different materials. Material properties are functions of temperature. The reaction can be specified using Arrhenius‐type parameters or by inputting a density–temperature relationship determined by any experimental technique such as thermogravimetric analysis. The model is validated against the experimental data presented in Boyer's 1984 dissertation. Overall, the model provides excellent agreement with the experimental data. It is shown that very little difference is found between results arrived at by Arrhenius kinetics and results obtained by specifying the easier to measure density–temperature relationship. From this it is concluded that this technique is a viable alternative to Arrhenius‐type models. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
44.
45.
Kalna K. Wilson J. A. Moran D. A. J. Hill R. J. W. Long A. R. Droopad R. Passlack M. Thayne I. G. Asenov A. 《Nanotechnology, IEEE Transactions on》2007,6(1):106-112
The potential performance of implant free heterostructure In0.3Ga0.7As channel MOSFETs with gate lengths of 30, 20, and 15 nm is investigated using state-of-the-art Monte Carlo (MC) device simulations. The simulations are carefully calibrated against the electron mobility and sheet density measured on fabricated III-V MOSFET structures with a high-kappa dielectric. The MC simulations show that the 30 nm gate length implant free MOSFET can deliver a drive current of 2174 muA/mum at 0.7 V supply voltage. The drive current increases to 2542 muA/mum in the 20 nm gate length device, saturating at 2535 muA/mum in the 15 nm gate length one. When quantum confinement corrections are included into MC simulations, they have a negligible effect on the drive current in the 30 and 20 nm gate length transistors but lower the 15 nm gate length device drive current at 0.7 V supply voltage by 10%. When compared to equivalent Si based MOSFETs, the implant free heterostructure MOSFETs can deliver a very high performance at low supply voltage, making them suitable for low-power high-performance CMOS applications 相似文献
46.
Abstract. Certification is one criterion that employers seek when hiring network professionals. Many employers assume a certified network professional is better able to manage networked resources than is a non-certified counterpart. Therefore, employers often offer a monetary premium to attract certified network professionals. By measuring end-user perceptions, the current study empirically assesses the popular industry assumption that certified network professionals are more adept managers of network resources than those individuals who are not certified network professionals. Analyses of a data derived from 299 end-users of 11 separate local area networks indicate no statistically significant difference exists between the capabilities of certified network professionals and non-certified network professionals. 相似文献
47.
Claudia Stewart Nicole Lum Robert Hill Robert Stephens Paul Rudnick Lynn Rassmussen 《Journal of The Association for Laboratory Automation》2003,8(2):64-65
Primer walking of cloned DNA is a standard research tool. It has been used in the past to determine the sequence of individual clones of interest. With the expansion of DNA sequencing capacity the need to be able to walk larger numbers of clones has become necessary. Our laboratory is a mid-sized genomics facility. In conjunction with the Advanced Biomedical Computing Center (ABCC) we have developed methods for automating the primer selection, DNA sequencing, contig assembly and sequence analysis for clones arrayed in microtiter format. This approach has allowed us to walk 475 clones (five microtiter plates) selected from a cDNA library. 相似文献
48.
Today, with the increasing popularity of multicore processors, one approach to optimizing the processor's performance is to reduce the execution times of individual applications running on each core by designing and implementing more powerful cores. Another approach, which is the polar opposite of the first, optimizes the processor's performance by running a larger number of applications on a correspondingly larger number of cores, albeit simpler ones. The difference between these two approaches is that the former focuses on reducing the latency of individual applications or threads (it optimizes the processor's single-threaded performance), whereas the latter focuses on reducing the latency of the applications' threads taken as a group (it optimizes the processor's multithreaded performance). The panel, from the 2007 Workshop on Computer Architecture Research Directions, discusses the relevant issues. 相似文献
49.
Chen Q. Hong Y. Chen G. Hill D. J. 《IEEE transactions on circuits and systems. I, Regular papers》2006,53(12):2692-2704
In this paper, one kind of intermittency generated by a discontinuous system is studied. Although this system, which is composed of two switched subsystems coupled with a high strength, is nonsmooth, the mechanism of this kind of intermittency can be analyzed with several explicit relations between the intermittency characteristics and the system control parameters. In particular, estimates of "steady-state" values of the system (in the laminar phases) and a critical value for this intermittency can be derived, which are helpful in relevant control systems design. Moreover, some power laws for the observed intermittency are obtained and discussed 相似文献
50.
Trust for Ubiquitous,Transparent Collaboration 总被引:1,自引:0,他引:1
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information. 相似文献