首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19195篇
  免费   706篇
  国内免费   44篇
电工技术   238篇
综合类   24篇
化学工业   3767篇
金属工艺   469篇
机械仪表   403篇
建筑科学   948篇
矿业工程   110篇
能源动力   600篇
轻工业   1641篇
水利工程   173篇
石油天然气   68篇
无线电   1471篇
一般工业技术   3386篇
冶金工业   3574篇
原子能技术   117篇
自动化技术   2956篇
  2023年   124篇
  2022年   210篇
  2021年   332篇
  2020年   235篇
  2019年   270篇
  2018年   368篇
  2017年   378篇
  2016年   414篇
  2015年   338篇
  2014年   514篇
  2013年   1221篇
  2012年   827篇
  2011年   1173篇
  2010年   802篇
  2009年   835篇
  2008年   936篇
  2007年   877篇
  2006年   761篇
  2005年   749篇
  2004年   599篇
  2003年   548篇
  2002年   530篇
  2001年   336篇
  2000年   310篇
  1999年   335篇
  1998年   382篇
  1997年   312篇
  1996年   347篇
  1995年   315篇
  1994年   296篇
  1993年   266篇
  1992年   262篇
  1991年   161篇
  1990年   232篇
  1989年   206篇
  1988年   168篇
  1987年   170篇
  1986年   158篇
  1985年   192篇
  1984年   199篇
  1983年   165篇
  1982年   172篇
  1981年   172篇
  1980年   145篇
  1979年   172篇
  1978年   123篇
  1977年   128篇
  1976年   174篇
  1975年   132篇
  1973年   109篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
951.
The psychopathic personality can be conceptualized as three interrelated dimensions, (a) an interpersonal style of glibness, grandiosity, and manipulation; (b) an affective disposition of callousness, lack of empathy, and unemotionality; and (c) a behavioral/lifestyle dimension of impulsivity, need for stimulation, and irresponsibility, underpinning a higher order construct, psychopathic personality. The authors used a self-report questionnaire (The Youth Psychopathic Traits Inventory) to study the importance of genetic and environmental influences on psychopathic personality traits in a sample of 1,090 monozygotic and dizygotic twin pairs, aged 16-17 years. Results showed a strong genetic influence behind the higher order "psychopathic personality" factor, underpinned by the three psychopathic personality dimensions. Over and above the effects to the higher order factor, significant unique genetic influences were also found in the callous/unemotional and in the impulsive/irresponsible dimension, but not in the grandiose/manipulative dimension. The authors propose that this latent psychopathic personality factor is a meaningful target for future etiological research. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
952.
Reduced autobiographical memory (AM) specificity is a known vulnerability factor for depression. AM specificity was investigated as a predictor of depression with the Autobiographical Memory Test (J. M. G. Williams & K. Broadbent, 1986). When baseline depression scores were partialed, reduced AM specificity to negative cue words predicted higher levels of depression at 7-month follow-up. Once rumination was taken into account by means of the Rumination on Sadness Scale (M. Conway, P. A. R. Csank, S. L. Holm, & C. K. Blake, 2000), AM specificity no longer predicted depression, suggesting that the predictive value of AM specificity observed in previous studies might be--at least partly--explained as an effect of rumination. Further mediation analyses indeed revealed support for rumination as a mediator of the relation between reduced AM specificity and poor outcome of depression. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
953.
自从20世纪50年代中期将真空灭弧室(VI)用作配电操作开关、断路器和接触器的电流分断元件以来,其作用逐步增强.在电路的开断和配电保护领域,该电气产品已经占统治地位.真空灭弧室甚至被引入到电力输送中的通断产品的领域上.真空灭弧室受到追捧的原因有:结构紧凑、适用范围广、成本低、极好的电寿命和机械寿命,以及使用方便.其中,最重要的优点是公认的高可靠性.  相似文献   
954.
This paper examines the outcomes of alternative policy targets for monetary policy in an open economy subject to terms of trade shocks and with less-than-perfect exchange-rate pass through. The central bank also learns the evolution of inflation and output growth in the design of its policy rules. We show that a Taylor rule for the interest rate, based on inflation and output gap targets, when terms of trade shocks are positive, yields more beneficial welfare distributions than comparable feedback rules based only on an inflation target. JEL classification: E5, F4  相似文献   
955.
This paper presents the large-eddy simulation of the lid-driven cubic cavity flow by the spectral element method (SEM) using the dynamic model. Two spectral filtering techniques suitable for these simulations have been implemented. Numerical results for Reynolds number Re=12,000 are showing very good agreement with other experimental and DNS results found in the literature.  相似文献   
956.
Towed-aerial cable systems are often used for towing decoys from aircraft and for collecting electromagnetic data from low altitudes. Airborne cable systems are typically controlled by maneuvering the aircraft, which can limit the safe altitude of the towed-sensor package. In this paper, a real-time optimal control strategy for controlling a towed-cable system is proposed that uses cable winch control to control the altitude of the towed-body. The controller is based on a receding horizon control approach, where the aircraft senses the terrain profile ahead of the towed-body with a relatively short time horizon. This information is sent to the controller, which updates the cable winch reel acceleration to safely avoid colliding with the terrain, while keeping the towed-sensor close to the desired altitude for obtaining good measurements. The controller is developed for a simplified system model and implemented in a multibody cable system model that incorporates cable flexibility and elasticity.  相似文献   
957.
A virtual machine monitor (VMM) allows a single computer to run two or more operating systems at the same time. VMMs are relatively simple and are typically built to high assurance standards, which means that the quality of isolation provided by a virtual machine monitor is usually greater than that which can be achieved with a general-purpose operating system. This paper discusses how the flexibility afforded by multiple OS environments and the robust isolation provided by a virtual machine monitor can be used to improve client PC security. A prototype system is also described.This paper is neither a product announcement nor an official Microsoft position paper, but rather it is a discussion of interesting configuration options that can be constructed using existing Microsoft and third-party products: in this case two or more operating systems running in conjunction with a virtual machine monitor.  相似文献   
958.
The accuracy of a non-pixel-based skeletonization method is largely dependent on the contour information chosen as input. When using a Constrained Delaunay Triangulation to construct an object's skeleton, a number of contour pixels must be chosen as a basis for triangulation. This paper presents a new method of selecting these contour pixels. A new method for measuring skeletonization error is proposed, which quantifies the deviation of a skeleton segment from the true medial axis of a stroke in an image. The goal of the proposed algorithm is to reduce this error to an acceptable level, whilst retaining the superior efficiencies of previous non-pixel-based techniques. Experimental results show that the proposed method is adept at following the medial axis of an image, and is capable of producing a skeleton that is confirmed by a human's perception of the image. It is also computationally efficient and robust against noise.  相似文献   
959.
The problems of robust stability and robust stabilization of uncertain linear systems with distributed delay occurring in the state variables are studied in this paper. The essential requirement for the uncertainties is that they are norm-bounded with known bounds. Conditions for the robust stability of distributed time delay systems are given and a design method for the robust stabilizing control law of the uncertain systems is presented. The proposed method is applied to the stabilization of combustion in the chamber of a liquid monopropellant rocket motor. It is found that the combustion can be robustly stabilized when the two parameters pressure exponent γ and maximal time lag r vary in specified intervals, respectively.  相似文献   
960.
When evaluating new protocols and algorithms it is often desirable to be able to rapidly build a specialized simulator from scratch. The advantage of this approach is that software designers can avoid the often‐steep learning curve associated with using existing simulators, and that specialized simulators can have significant computational advantages over general‐purpose programs. The drawback is that simulators can be complex to develop and debug. This paper describes our experiences developing SESAME, a Java‐based simulator designed to analyze multicast protocol performance. By using an appropriate set of design patterns we were able to rapidly develop a reusable and easy‐to‐implement framework for multicast algorithm and protocol analysis. We developed several useful approaches for rapid simulation development, including a multicast visualization tool and techniques for simulating concurrent processing within a computer network that substantially simplified code development and maintenance. Owing to performance concerns, we also ran an extensive series of performance tests of different priority queue implementations. Our design approach and the lessons that we learned in developing SESAME can be applied to rapid simulation development in general. Further, our performance results suggest that by using commercial off‐the‐shelf Java development environments it is possible to obtain sufficient performance for many time‐sensitive applications such as discrete event simulation. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号