首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9690篇
  免费   304篇
  国内免费   8篇
电工技术   115篇
综合类   6篇
化学工业   1759篇
金属工艺   172篇
机械仪表   200篇
建筑科学   493篇
矿业工程   15篇
能源动力   260篇
轻工业   968篇
水利工程   125篇
石油天然气   42篇
无线电   848篇
一般工业技术   1723篇
冶金工业   1973篇
原子能技术   66篇
自动化技术   1237篇
  2023年   39篇
  2022年   71篇
  2021年   136篇
  2020年   104篇
  2019年   119篇
  2018年   139篇
  2017年   162篇
  2016年   147篇
  2015年   166篇
  2014年   225篇
  2013年   552篇
  2012年   413篇
  2011年   530篇
  2010年   366篇
  2009年   405篇
  2008年   524篇
  2007年   459篇
  2006年   395篇
  2005年   398篇
  2004年   331篇
  2003年   314篇
  2002年   294篇
  2001年   194篇
  2000年   178篇
  1999年   180篇
  1998年   351篇
  1997年   253篇
  1996年   246篇
  1995年   172篇
  1994年   161篇
  1993年   175篇
  1992年   109篇
  1991年   85篇
  1990年   106篇
  1989年   138篇
  1988年   102篇
  1987年   95篇
  1986年   88篇
  1985年   107篇
  1984年   90篇
  1983年   90篇
  1982年   79篇
  1981年   91篇
  1980年   61篇
  1979年   68篇
  1978年   58篇
  1977年   85篇
  1976年   86篇
  1975年   54篇
  1974年   40篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
Air combat scenarios present unique problems where the solution is not obvious. An advanced networked simulation environment can be used to train high-level cognitive air combat skills such as problem solving. A problem in the development of principled and construct oriented assessment is related to determining the level of specificity of the assessment. We present a detailed discussion of the definition of critical competencies associated with combat mission problem solving performance, and we describe our approach to develop and implement an embedded performance assessment system that maps outcomes to these competencies. Finally, we discuss the implications for our approach for comprehensive assessment and discuss our goals for an evaluation of the competency-based approach to assessment.  相似文献   
42.
43.
A one–dimensional, transient thermal degradation heat transfer model for the response of composite materials when exposed to fire is presented. The model can handle layers of different materials. Material properties are functions of temperature. The reaction can be specified using Arrhenius‐type parameters or by inputting a density–temperature relationship determined by any experimental technique such as thermogravimetric analysis. The model is validated against the experimental data presented in Boyer's 1984 dissertation. Overall, the model provides excellent agreement with the experimental data. It is shown that very little difference is found between results arrived at by Arrhenius kinetics and results obtained by specifying the easier to measure density–temperature relationship. From this it is concluded that this technique is a viable alternative to Arrhenius‐type models. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
44.
    
  相似文献   
45.
The potential performance of implant free heterostructure In0.3Ga0.7As channel MOSFETs with gate lengths of 30, 20, and 15 nm is investigated using state-of-the-art Monte Carlo (MC) device simulations. The simulations are carefully calibrated against the electron mobility and sheet density measured on fabricated III-V MOSFET structures with a high-kappa dielectric. The MC simulations show that the 30 nm gate length implant free MOSFET can deliver a drive current of 2174 muA/mum at 0.7 V supply voltage. The drive current increases to 2542 muA/mum in the 20 nm gate length device, saturating at 2535 muA/mum in the 15 nm gate length one. When quantum confinement corrections are included into MC simulations, they have a negligible effect on the drive current in the 30 and 20 nm gate length transistors but lower the 15 nm gate length device drive current at 0.7 V supply voltage by 10%. When compared to equivalent Si based MOSFETs, the implant free heterostructure MOSFETs can deliver a very high performance at low supply voltage, making them suitable for low-power high-performance CMOS applications  相似文献   
46.
Abstract. Certification is one criterion that employers seek when hiring network professionals. Many employers assume a certified network professional is better able to manage networked resources than is a non-certified counterpart. Therefore, employers often offer a monetary premium to attract certified network professionals. By measuring end-user perceptions, the current study empirically assesses the popular industry assumption that certified network professionals are more adept managers of network resources than those individuals who are not certified network professionals. Analyses of a data derived from 299 end-users of 11 separate local area networks indicate no statistically significant difference exists between the capabilities of certified network professionals and non-certified network professionals.  相似文献   
47.
Primer walking of cloned DNA is a standard research tool. It has been used in the past to determine the sequence of individual clones of interest. With the expansion of DNA sequencing capacity the need to be able to walk larger numbers of clones has become necessary. Our laboratory is a mid-sized genomics facility. In conjunction with the Advanced Biomedical Computing Center (ABCC) we have developed methods for automating the primer selection, DNA sequencing, contig assembly and sequence analysis for clones arrayed in microtiter format. This approach has allowed us to walk 475 clones (five microtiter plates) selected from a cDNA library.  相似文献   
48.
Today, with the increasing popularity of multicore processors, one approach to optimizing the processor's performance is to reduce the execution times of individual applications running on each core by designing and implementing more powerful cores. Another approach, which is the polar opposite of the first, optimizes the processor's performance by running a larger number of applications on a correspondingly larger number of cores, albeit simpler ones. The difference between these two approaches is that the former focuses on reducing the latency of individual applications or threads (it optimizes the processor's single-threaded performance), whereas the latter focuses on reducing the latency of the applications' threads taken as a group (it optimizes the processor's multithreaded performance). The panel, from the 2007 Workshop on Computer Architecture Research Directions, discusses the relevant issues.  相似文献   
49.
In this paper, one kind of intermittency generated by a discontinuous system is studied. Although this system, which is composed of two switched subsystems coupled with a high strength, is nonsmooth, the mechanism of this kind of intermittency can be analyzed with several explicit relations between the intermittency characteristics and the system control parameters. In particular, estimates of "steady-state" values of the system (in the laminar phases) and a critical value for this intermittency can be derived, which are helpful in relevant control systems design. Moreover, some power laws for the observed intermittency are obtained and discussed  相似文献   
50.
Trust for Ubiquitous,Transparent Collaboration   总被引:1,自引:0,他引:1  
Shand  Brian  Dimmock  Nathan  Bacon  Jean 《Wireless Networks》2004,10(6):711-721
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号