首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3558篇
  免费   93篇
  国内免费   5篇
电工技术   39篇
综合类   2篇
化学工业   680篇
金属工艺   63篇
机械仪表   65篇
建筑科学   144篇
矿业工程   23篇
能源动力   76篇
轻工业   267篇
水利工程   27篇
石油天然气   14篇
无线电   339篇
一般工业技术   597篇
冶金工业   840篇
原子能技术   37篇
自动化技术   443篇
  2022年   35篇
  2021年   61篇
  2020年   42篇
  2019年   32篇
  2018年   40篇
  2017年   39篇
  2016年   63篇
  2015年   42篇
  2014年   63篇
  2013年   204篇
  2012年   99篇
  2011年   149篇
  2010年   104篇
  2009年   128篇
  2008年   114篇
  2007年   107篇
  2006年   104篇
  2005年   106篇
  2004年   112篇
  2003年   85篇
  2002年   72篇
  2001年   52篇
  2000年   57篇
  1999年   79篇
  1998年   145篇
  1997年   105篇
  1996年   94篇
  1995年   68篇
  1994年   66篇
  1993年   75篇
  1992年   63篇
  1991年   53篇
  1990年   43篇
  1989年   60篇
  1988年   53篇
  1987年   46篇
  1986年   53篇
  1985年   57篇
  1984年   59篇
  1983年   38篇
  1982年   39篇
  1981年   50篇
  1980年   36篇
  1979年   39篇
  1978年   38篇
  1977年   47篇
  1976年   56篇
  1975年   23篇
  1974年   28篇
  1973年   21篇
排序方式: 共有3656条查询结果,搜索用时 8 毫秒
51.
This paper studies the modelling of legal reasoning about evidence within general theories of defeasible reasoning and argumentation. In particular, Wigmore's method for charting evidence and its use by modern legal evidence scholars is studied in order to give a formal underpinning in terms of logics for defeasible argumentation. Two notions turn out to be crucial, viz. argumentation schemes and empirical generalisations.  相似文献   
52.
In 1984, computing firms saw integrated voice/data terminals (IVDTs) as the solution to the proliferation of new forms of executive communication. The Sydis VoiceStation was hailed as the best of this new class of office machine but, like all IVDTs, it failed. Sydis succumbed to "integration stress," one danger of product development driven by the urge to integrate traditionally discrete functions. Sydis also failed from poor integration of financial and market actors.  相似文献   
53.
软件EMBA诞生     
Henry 《程序员》2004,(8):12-12
2004年7月16日,孙伟沉浸在忙碌和兴奋之中。这位美国迈阿密佛罗里达州立大学终身教授的获得者现在是北京航空航天大学软件学院的院长,他喜欢接受挑战性的工作。自从他担任这一职位以来,他一直试图将北航软件学院塑造成为更具有特色的国际性学院,如今,他的这一理想又迈出了更为坚实的一步:北航软件学院将与美国卡内基-梅隆大学和美国项目管理学院签署协议,联手培养硕士级软件营销管理人才,这也是中国第一个软件营销专业。专程为这一专业成立而从美国赶来的 CMM 认证核心创始人之一、  相似文献   
54.
Henry 《程序员》2004,(8):13-13
当证监会第二天就找上门来希望合作之前,中科院软件学院院长潘辛平博士并没有预料到他写的“建设金融科技中心”的提案会有这么强的反馈。潘辛平说:“他们希望我们能够在科研、测试、认证和监管方面和我们全面合作,并且提供足够的人才和项目。”事实上,从担任中科院软件学院院长的那一天起,在中国金融科技界享有盛誉的潘辛平就明确了自己的工程化人才教育模式。他认为,工程教育应该比工学教育更加关注流程化、标准化、团队作  相似文献   
55.
The objectives of an organization in combination with the formal policy together underpin the strategic direction that any organization will take. We all know that security begins with policy – in other words the rules of play. If policy is sound then the appropriate security measures can be implemented to protect the activities required to achieve the stated objectives as well as maintain the information assurance requirements – availability, integrity, authentication, confidentiality and non-repudiation.  相似文献   
56.
57.
美国火电厂烟气排放限值及控制技术在过去的37年内不断发展进步.受限制的排放物越来越多,而且对每种污染物的限值日益严格.总结了当今美国使用的排放限值及控制技术,并展望了未来的排放限值及潜在的排放控制技术.  相似文献   
58.
The rise in popularity of mobile devices has led to a parallel growth in the size of the app store market, intriguing several research studies and commercial platforms on mining app stores. App store reviews are used to analyze different aspects of app development and evolution. However, app users’ feedback does not only exist on the app store. In fact, despite the large quantity of posts that are made daily on social media, the importance and value that these discussions provide remain mostly unused in the context of mobile app development. In this paper, we study how Twitter can provide complementary information to support mobile app development. By analyzing a total of 30,793 apps over a period of six weeks, we found strong correlations between the number of reviews and tweets for most apps. Moreover, through applying machine learning classifiers, topic modeling and subsequent crowd-sourcing, we successfully mined 22.4% additional feature requests and 12.89% additional bug reports from Twitter. We also found that 52.1% of all feature requests and bug reports were discussed on both tweets and reviews. In addition to finding common and unique information from Twitter and the app store, sentiment and content analysis were also performed for 70 randomly selected apps. From this, we found that tweets provided more critical and objective views on apps than reviews from the app store. These results show that app store review mining is indeed not enough; other information sources ultimately provide added value and information for app developers.  相似文献   
59.
In this concise paper the phase-lock loop (PLL) steady state characteristics for bandpass types of modulating spectra are determined. The usual assumption that the intermediate frequency (IF) bandwidth is wide compared with PLL bandwidth is not made. The characteristics are determined from measurements on an experimental system and from theoretical calculations using a quasi-linear model (QLM) of the PLL. Experimental data are compared to theoretical data to determine the accuracy of the QLM over the PLL parameter space. The experimental results are used to provide design data and to arrive at conclusions concerning threshold, multiplier output variance, phase error variance, output signal-to-noise ratio, and signal distortion.  相似文献   
60.
The technique of Hotspot Mapping is widely used in analysing the spatial characteristics of crimes. The spatial distribution of crime is considered to be related with a variety of socio-economic and crime opportunity factors. But existing methods usually focus on the target crime density as input without utilizing these related factors. In this study, we introduce a new crime hotspot mapping tool—Hotspot Optimization Tool (HOT). HOT is an application of spatial data miming to the field of hotspot mapping. The key component of HOT is the Geospatial Discriminative Patterns (GDPatterns) concept, which can capture the differences between two classes in a spatial dataset. Experiments are done using a real world dataset from a northeastern city in the United States and the pros and cons of utilizing related factors in hotspot mapping are discussed. Comparison studies with the Hot Spot Analysis tool implemented by Esri ArcMap 10.1 validate that HOT is capable of accurately mapping crime hotspots.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号