全文获取类型
收费全文 | 4381篇 |
免费 | 464篇 |
国内免费 | 274篇 |
专业分类
电工技术 | 414篇 |
技术理论 | 1篇 |
综合类 | 254篇 |
化学工业 | 664篇 |
金属工艺 | 315篇 |
机械仪表 | 220篇 |
建筑科学 | 188篇 |
矿业工程 | 108篇 |
能源动力 | 175篇 |
轻工业 | 240篇 |
水利工程 | 53篇 |
石油天然气 | 108篇 |
武器工业 | 52篇 |
无线电 | 772篇 |
一般工业技术 | 525篇 |
冶金工业 | 279篇 |
原子能技术 | 41篇 |
自动化技术 | 710篇 |
出版年
2024年 | 34篇 |
2023年 | 97篇 |
2022年 | 209篇 |
2021年 | 282篇 |
2020年 | 167篇 |
2019年 | 133篇 |
2018年 | 140篇 |
2017年 | 158篇 |
2016年 | 137篇 |
2015年 | 175篇 |
2014年 | 212篇 |
2013年 | 307篇 |
2012年 | 332篇 |
2011年 | 302篇 |
2010年 | 220篇 |
2009年 | 269篇 |
2008年 | 281篇 |
2007年 | 247篇 |
2006年 | 184篇 |
2005年 | 143篇 |
2004年 | 124篇 |
2003年 | 112篇 |
2002年 | 126篇 |
2001年 | 97篇 |
2000年 | 72篇 |
1999年 | 54篇 |
1998年 | 93篇 |
1997年 | 65篇 |
1996年 | 45篇 |
1995年 | 39篇 |
1994年 | 31篇 |
1993年 | 26篇 |
1992年 | 22篇 |
1991年 | 30篇 |
1990年 | 16篇 |
1989年 | 11篇 |
1988年 | 12篇 |
1987年 | 16篇 |
1986年 | 12篇 |
1985年 | 13篇 |
1984年 | 8篇 |
1983年 | 12篇 |
1982年 | 7篇 |
1980年 | 6篇 |
1979年 | 4篇 |
1978年 | 3篇 |
1976年 | 3篇 |
1975年 | 7篇 |
1973年 | 5篇 |
1972年 | 3篇 |
排序方式: 共有5119条查询结果,搜索用时 0 毫秒
61.
采用STC89C52单片机结合LM2596-5.0开关电压调节器、DS12C887时钟芯片、AT24C64串行存储器、74HC595移位寄存器以及接触式IC卡等器件,实现了对机场车辆速度的实时显示以及超速后的自行报警,并将超速情况以数据的形式存储到存储器中,可用IC卡对数据进行读取.该系统通过超速报警来提醒司机减速,从而减少车辆刮碰飞机等事件的发生. 相似文献
62.
Since a large variety of digital games have been used in many fields for educational purposes, their real functions in learning have caught much attention as well. This study first defines learning characteristics of problem-solving digital games and their corresponding cognitive levels, then designs and develops a problem-solving game in accordance to the criteria. Tasks in the game context are inter-related to each other so that players need to critically and creatively think about problem solutions. Learners’ task analyses are performed to observe four elementary learners’ gaming paths, behaviors and cognitive activities, individually and collaboratively. System documentation, video recording, researcher observation, and interviews are conducted to analyze learners’ learning strategies and their cognitive performance during the gaming process. 相似文献
63.
随着教学信息化程度的不断提高,如何对计算机机房进行科学、高效的维护和管理,在保障正常的教学和科研任务的同时,减轻机房管理员的负担,是一个重要的课题。文章从软件角度出发,分别对系统的安装和分发、硬盘还原以及四种常见的系统安全设置进行了详细探讨。 相似文献
64.
The objective of this study is to investigate whether work fatigue and physiological symptoms that high-elevation construction workers experience would be affected by the occupations. Questionnaires of demographic data and subjective fatigue symptoms as well as some physiological measurements were carried out, pre- and post-shift, on scaffolders, steel fixers, formworkers, electrician-plumbers, concreters and miscellaneous workers at a high-rise building construction site. This study found that some subjective fatigue symptoms coincide with the life style of some workers and that the extent of fatigue symptoms and physiological strains varies among different occupations of construction workers. Scaffolders, steel fixers and formworkers are categorized as physically demanding fatigue type of workers, while concreters, electrician-plumbers and miscellaneous workers as general type. The prevalence and occurrence of subjective fatigue symptoms indicate high-elevation workers have more complaints of “projection of physical impairment” than “drowsiness and dullness” and “difficulty in concentration”. Some unexpected changes (i.e., post-shift measurements are greater than pre-shift ones) in some strength tests in scaffolders and concreters were consistent with the observations of how they exercised their bodies during work shift. Considerable variation of average heart rate among occupations was found, with scaffolders the highest and concreters the lowest. This study concludes that questionnaires of subjective fatigue symptoms and some physiological measurements can be used as indicators to predict the extent of strains or hazards which construction workers encounter. In terms of management program of safety and health, more attention should be paid to those physically demanding workers, such as scaffolders, workers with lower sense of safety and health, such as miscellaneous workers, and workers with older age, such as concreters. 相似文献
65.
Recently, Yang et al. proposed an efficient user identification scheme with key distribution, in which it is possible for the user to anonymously log into a system and establish a secret key shared with the system. Mangipudi and Katti later demonstrated a Deniable-of-Service (DoS) attack on the Yang et al. scheme and then proposed an improvement to withstand such an attack. However, this paper demonstrates an identity disclosure attack to show that neither schemes’ claimed user anonymity requirement can be achieved. We further propose a novel user identification scheme with key distribution preserving user anonymity for distributed computer networks. The proposed scheme not only withstands the attacks mentioned above, but also achieves the following: (i) user anonymity, (ii) key distribution, (iii) mutual authentication, and (iv) key confirmation. The performance of our scheme is of greater efficiency than that of previously proposed schemes in terms of communication costs and computational complexities. 相似文献
66.
Ming Chuang Linjie Luo Benedict J. Brown Szymon Rusinkiewicz Michael Kazhdan 《Computer Graphics Forum》2009,28(5):1475-1484
We present a novel approach for computing and solving the Poisson equation over the surface of a mesh. As in previous approaches, we define the Laplace-Beltrami operator by considering the derivatives of functions defined on the mesh. However, in this work, we explore a choice of functions that is decoupled from the tessellation. Specifically, we use basis functions (second-order tensor-product B-splines) defined over 3D space, and then restrict them to the surface. We show that in addition to being invariant to mesh topology, this definition of the Laplace-Beltrami operator allows a natural multiresolution structure on the function space that is independent of the mesh structure, enabling the use of a simple multigrid implementation for solving the Poisson equation. 相似文献
67.
Rong-Ho Lin Chun-Ling Chuang James J.H. Liou Guo-Dong Wu 《Expert systems with applications》2009,36(3):6461-6465
Association rule is a widely used data mining technique that searches through an entire data set for rules revealing the nature and frequency of relationships or associations between data entities. Supplier selection is a significant work in supply chain management. Often, there will be thousands of potential suppliers and identifying a subset of these suppliers can be a complex process of determining a satisfactory subset based on a number of factors. In this paper, the supplier selection can be viewed as the problem of mining a large database of shipment. The proposed method incorporates the extended association rule algorithm of data mining with that of set theory to find key suppliers. This research has employed a numerical example for the integrated method to develop suitable supplier clusters. The results show that the method is effective and applicable. 相似文献
68.
69.
Jianer Chen GaoCai Wang Chuang Lin Tao Wang GuoJun Wang 《Journal of Parallel and Distributed Computing》2007
Mesh networks are among the most important interconnection network topologies for large multicomputer systems. Mesh networks perform poorly in tolerating faults in the view of worst-case analysis. On the other hand, such worst cases occur very rarely in realistic situations. In this paper, we study the fault tolerance of 2-D and 3-D mesh networks under a more realistic model in which each network node has an independent failure probability. We first observe that if the node failure probability is fixed, then the connectivity probability of these mesh networks can be arbitrarily small when the network size is sufficiently large. Thus, it is practically important for multicomputer system manufacture to determine the upper bound for node failure probability when the probability of network connectivity and the network size are given. We develop a novel technique to formally derive lower bounds on the connectivity probability for 2-D and 3-D mesh networks. Our study shows that these mesh networks of practical size can tolerate a large number of faulty nodes thus are reliable enough for multicomputer systems. For example, it is formally proved that as long as the node failure probability is bounded by 0.5%, a 3-D mesh network of up to a million nodes remains connected with a probability larger than 99%. 相似文献
70.
张飚 《武汉理工大学学报(材料科学英文版)》2012,27(4):665-668
The surface condition, some properties and ion releasing behavior of cobalt-chromium (Co-Cr) dental alloy formed by selective laser melting (SLM) technique were investigated. Before porcelain fused firing, the surface condition of the Co-Cr alloy was observed using a scanning electron microscope (SEM), and then the density and hardness were examined. After porcelain fused firing, the interface of porcelain and alloy was observed, and then the metal-ion release of the samples was tested. SLM technique provides Co-Cr alloy higher hardness than casting method. After degassing-oxidation procedure and porcelain fused firing, the interface of the alloy and porcelain showed excellent combination. Co ion was more than Cr ion released from SLM Co-Cr alloy, the amounts of Co and Cr ions were safe according to ISO security criterion. Considering the properties before and after porcelain fused sintering process, SLM technique is suitable for dental Co-Cr alloy restoration. 相似文献