全文获取类型
收费全文 | 3558篇 |
免费 | 93篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 39篇 |
综合类 | 2篇 |
化学工业 | 680篇 |
金属工艺 | 63篇 |
机械仪表 | 65篇 |
建筑科学 | 144篇 |
矿业工程 | 23篇 |
能源动力 | 76篇 |
轻工业 | 267篇 |
水利工程 | 27篇 |
石油天然气 | 14篇 |
无线电 | 339篇 |
一般工业技术 | 597篇 |
冶金工业 | 840篇 |
原子能技术 | 37篇 |
自动化技术 | 443篇 |
出版年
2022年 | 35篇 |
2021年 | 61篇 |
2020年 | 42篇 |
2019年 | 32篇 |
2018年 | 40篇 |
2017年 | 39篇 |
2016年 | 63篇 |
2015年 | 42篇 |
2014年 | 63篇 |
2013年 | 204篇 |
2012年 | 99篇 |
2011年 | 149篇 |
2010年 | 104篇 |
2009年 | 128篇 |
2008年 | 114篇 |
2007年 | 107篇 |
2006年 | 104篇 |
2005年 | 106篇 |
2004年 | 112篇 |
2003年 | 85篇 |
2002年 | 72篇 |
2001年 | 52篇 |
2000年 | 57篇 |
1999年 | 79篇 |
1998年 | 145篇 |
1997年 | 105篇 |
1996年 | 94篇 |
1995年 | 68篇 |
1994年 | 66篇 |
1993年 | 75篇 |
1992年 | 63篇 |
1991年 | 53篇 |
1990年 | 43篇 |
1989年 | 60篇 |
1988年 | 53篇 |
1987年 | 46篇 |
1986年 | 53篇 |
1985年 | 57篇 |
1984年 | 59篇 |
1983年 | 38篇 |
1982年 | 39篇 |
1981年 | 50篇 |
1980年 | 36篇 |
1979年 | 39篇 |
1978年 | 38篇 |
1977年 | 47篇 |
1976年 | 56篇 |
1975年 | 23篇 |
1974年 | 28篇 |
1973年 | 21篇 |
排序方式: 共有3656条查询结果,搜索用时 8 毫秒
51.
Floris Bex Henry Prakken Chris Reed Douglas Walton 《Artificial Intelligence and Law》2003,11(2-3):125-165
This paper studies the modelling of legal reasoning about evidence within general theories of defeasible reasoning and argumentation. In particular, Wigmore's method for charting evidence and its use by modern legal evidence scholars is studied in order to give a formal underpinning in terms of logics for defeasible argumentation. Two notions turn out to be crucial, viz. argumentation schemes and empirical generalisations. 相似文献
52.
In 1984, computing firms saw integrated voice/data terminals (IVDTs) as the solution to the proliferation of new forms of executive communication. The Sydis VoiceStation was hailed as the best of this new class of office machine but, like all IVDTs, it failed. Sydis succumbed to "integration stress," one danger of product development driven by the urge to integrate traditionally discrete functions. Sydis also failed from poor integration of financial and market actors. 相似文献
53.
54.
当证监会第二天就找上门来希望合作之前,中科院软件学院院长潘辛平博士并没有预料到他写的“建设金融科技中心”的提案会有这么强的反馈。潘辛平说:“他们希望我们能够在科研、测试、认证和监管方面和我们全面合作,并且提供足够的人才和项目。”事实上,从担任中科院软件学院院长的那一天起,在中国金融科技界享有盛誉的潘辛平就明确了自己的工程化人才教育模式。他认为,工程教育应该比工学教育更加关注流程化、标准化、团队作 相似文献
55.
The objectives of an organization in combination with the formal policy together underpin the strategic direction that any organization will take. We all know that security begins with policy – in other words the rules of play. If policy is sound then the appropriate security measures can be implemented to protect the activities required to achieve the stated objectives as well as maintain the information assurance requirements – availability, integrity, authentication, confidentiality and non-repudiation. 相似文献
56.
57.
Ray E.Henry C.L.Shieh 《华东电力》2008,36(2):12-15
美国火电厂烟气排放限值及控制技术在过去的37年内不断发展进步.受限制的排放物越来越多,而且对每种污染物的限值日益严格.总结了当今美国使用的排放限值及控制技术,并展望了未来的排放限值及潜在的排放控制技术. 相似文献
58.
The rise in popularity of mobile devices has led to a parallel growth in the size of the app store market, intriguing several research studies and commercial platforms on mining app stores. App store reviews are used to analyze different aspects of app development and evolution. However, app users’ feedback does not only exist on the app store. In fact, despite the large quantity of posts that are made daily on social media, the importance and value that these discussions provide remain mostly unused in the context of mobile app development. In this paper, we study how Twitter can provide complementary information to support mobile app development. By analyzing a total of 30,793 apps over a period of six weeks, we found strong correlations between the number of reviews and tweets for most apps. Moreover, through applying machine learning classifiers, topic modeling and subsequent crowd-sourcing, we successfully mined 22.4% additional feature requests and 12.89% additional bug reports from Twitter. We also found that 52.1% of all feature requests and bug reports were discussed on both tweets and reviews. In addition to finding common and unique information from Twitter and the app store, sentiment and content analysis were also performed for 70 randomly selected apps. From this, we found that tweets provided more critical and objective views on apps than reviews from the app store. These results show that app store review mining is indeed not enough; other information sources ultimately provide added value and information for app developers. 相似文献
59.
In this concise paper the phase-lock loop (PLL) steady state characteristics for bandpass types of modulating spectra are determined. The usual assumption that the intermediate frequency (IF) bandwidth is wide compared with PLL bandwidth is not made. The characteristics are determined from measurements on an experimental system and from theoretical calculations using a quasi-linear model (QLM) of the PLL. Experimental data are compared to theoretical data to determine the accuracy of the QLM over the PLL parameter space. The experimental results are used to provide design data and to arrive at conclusions concerning threshold, multiplier output variance, phase error variance, output signal-to-noise ratio, and signal distortion. 相似文献
60.
Dawei Wang Wei Ding Henry Lo Tomasz Stepinski Josue Salazar Melissa Morabito 《Applied Intelligence》2013,39(4):772-781
The technique of Hotspot Mapping is widely used in analysing the spatial characteristics of crimes. The spatial distribution of crime is considered to be related with a variety of socio-economic and crime opportunity factors. But existing methods usually focus on the target crime density as input without utilizing these related factors. In this study, we introduce a new crime hotspot mapping tool—Hotspot Optimization Tool (HOT). HOT is an application of spatial data miming to the field of hotspot mapping. The key component of HOT is the Geospatial Discriminative Patterns (GDPatterns) concept, which can capture the differences between two classes in a spatial dataset. Experiments are done using a real world dataset from a northeastern city in the United States and the pros and cons of utilizing related factors in hotspot mapping are discussed. Comparison studies with the Hot Spot Analysis tool implemented by Esri ArcMap 10.1 validate that HOT is capable of accurately mapping crime hotspots. 相似文献