首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4793篇
  免费   216篇
  国内免费   6篇
电工技术   41篇
综合类   3篇
化学工业   1065篇
金属工艺   65篇
机械仪表   53篇
建筑科学   193篇
矿业工程   7篇
能源动力   83篇
轻工业   643篇
水利工程   69篇
石油天然气   33篇
武器工业   1篇
无线电   296篇
一般工业技术   795篇
冶金工业   1065篇
原子能技术   38篇
自动化技术   565篇
  2023年   22篇
  2022年   91篇
  2021年   142篇
  2020年   69篇
  2019年   72篇
  2018年   95篇
  2017年   113篇
  2016年   125篇
  2015年   112篇
  2014年   166篇
  2013年   244篇
  2012年   246篇
  2011年   327篇
  2010年   238篇
  2009年   218篇
  2008年   270篇
  2007年   263篇
  2006年   250篇
  2005年   178篇
  2004年   148篇
  2003年   148篇
  2002年   131篇
  2001年   95篇
  2000年   70篇
  1999年   92篇
  1998年   134篇
  1997年   108篇
  1996年   99篇
  1995年   62篇
  1994年   73篇
  1993年   72篇
  1992年   54篇
  1991年   32篇
  1990年   51篇
  1989年   44篇
  1988年   30篇
  1987年   38篇
  1986年   27篇
  1985年   29篇
  1984年   15篇
  1983年   23篇
  1982年   19篇
  1981年   13篇
  1980年   22篇
  1979年   17篇
  1978年   12篇
  1977年   21篇
  1976年   19篇
  1974年   14篇
  1973年   11篇
排序方式: 共有5015条查询结果,搜索用时 0 毫秒
91.
Despite their decade of deployment, educational digital libraries have not achieved sustained use in elementary and secondary schools in the United States. Barriers to accessing the Internet and computers have been widely targeted by myriad initiatives, but efforts aimed at bridging this first-level “digital divide” have not led to increased use of the Internet and digital library resources in U.S. classrooms. In fact, such programs have revealed additional divides that affect educators’ use. This paper examines the additional digital divide levels and proposes a new framework for understanding technology innovation in schools that can improve development and outreach approaches by digital library developers.  相似文献   
92.
Secure routing protocols for mobile ad hoc networks provide the required functionality for proper network operation. If the underlying routing protocol cannot be trusted to follow the protocol operations, additional trust layers, such as authentication, cannot be obtained. Threat models drive analysis capabilities, affecting how we evaluate trust. Current attacker threat models limit the results obtained during protocol security analysis over ad hoc routing protocols. Developing a proper threat model to evaluate security properties in mobile ad hoc routing protocols presents a significant challenge. If the attacker strength is too weak, we miss vital security flaws. If the attacker strength is too strong, we cannot identify the minimum required attacker capabilities needed to break the routing protocol. In this paper we present an adaptive threat model to evaluate route discovery attacks against ad hoc routing protocols. Our approach enables us to evaluate trust in the ad hoc routing process and allows us to identify minimum requirements an attacker needs to break a given routing protocol.  相似文献   
93.
Hollow poly (vinylpyrrolidone) (PVP) + TiO2 and polypyrrole (core)/PVP (sheath) nanofibers were successfully electrospun using hydrodynamic fluid focusing. Utilizing a two-dimensional fluid focusing technique previously applied to aqueous solutions, intersecting microchannels cast in (poly)dimethylsiloxane were utilized to dynamically center core fluids in immiscible sheath fluids prior to electrospinning at the channel outlet. Advantages of using microfluidic channel networks for the electrospinning of composite nanofibers include spatiotemporal control over input reagents, ease of fabrication and the ability to focus the core stream into sheath layer without the need of complex co-annular nozzles.  相似文献   
94.
This paper deals with microfluidic studies for lab-on-a-chip development. The first goal was to develop microsystems immediately usable by biologists for complex protocol integrations. All fluid operations are performed on nano-liter droplet independently handled solely by electrowetting on dielectric (EWOD) actuation. A bottom-up architecture was used for chip design due to the development and validation of elementary fluidic designs, which are then assembled. This approach speeds up development and industrialization while minimizing the effort in designing and simplifying chip-fluidic programming. Dispensing reproducibility for 64 nl droplets obtained a CV below 3% and mixing time was only a few seconds. Ease of the integration was demonstrated by performing on chip serial dilutions of 2.8-folds, four times. The second part of this paper concerns the development of new innovative fluidic functions in order to extend EWOD-actuated digital fluidics’ capabilities. Experiments of particle dispensing by EWOD droplet handling are reported. Finally, work is shown concerning the coupling of EWOD actuation and magnetic fields for magnetic bead manipulation.  相似文献   
95.
Gram-positive streptococci are non-motile, chain-forming bacteria commonly found in the normal oral and bowel flora of warm-blooded animals. Over the past decade, a proteomic approach combining 2-DE and MS has been used to systematically map the cellular, surface-associated and secreted proteins of human pathogenic streptococcal species. The public availability of complete streptococcal genomic sequences and the amalgamation of proteomic, genomic and bioinformatic technologies have recently facilitated the identification of novel streptococcal vaccine candidate antigens and therapeutic agents. The objective of this review is to examine the constituents of the streptococcal cell wall and secreted proteome, the mechanisms of transport of surface and secreted proteins, and describe the current methodologies employed for the identification of novel surface-displayed proteins and potential vaccine antigens.  相似文献   
96.
Although developments on software agents have led to useful applications in automation of routine tasks such as electronic mail filtering, there is a scarcity of research that empirically evaluates the performance of a software agent versus that of a human reasoner, whose problem-solving capabilities the agent embodies. In the context of a game of a chance, namely Yahtzee©, we identified strategies deployed by expert human reasoners and developed a decision tree for agent development. This paper describes the computer implementation of the Yahtzee game as well as the software agent. It also presents a comparison of the performance of humans versus an automated agent. Results indicate that, in this context, the software agent embodies human expertise at a high level of fidelity.  相似文献   
97.
Knowledge is increasingly recognized as the key resource of business. Digital networks provide access to vast amounts of data and information but knowledge management tools and systems are required to translate this in a meaningful way. Knowledge management initiatives are unlikely to be successful unless they are integrated with business strategy, and related to the development of the core capabilities of the organisation. Sharing the discovery and synthesis of intellectual activity involves the creation of knowledge communities of practice. There is much evidence of commercially inspired corporate initiatives in this direction across all industrial sectors: leveraging existing intellectual capital; sharing best practice across multiple locations; data mining to build customer relationships; and creating knowledge networks to allow state–of–the–art solutions in professional services.  相似文献   
98.
99.
This paper describes a set of visual cues of contact designed to improve the interactive manipulation of virtual objects in industrial assembly/maintenance simulations. These visual cues display information of proximity, contact and effort between virtual objects when the user manipulates a part inside a digital mock-up. The set of visual cues encloses the apparition of glyphs (arrow, disk, or sphere) when the manipulated object is close or in contact with another part of the virtual environment. Light sources can also be added at the level of contact points. A filtering technique is proposed to decrease the number of glyphs displayed at the same time. Various effects--such as change in color, change in size, and deformation of shape- can be applied to the glyphs as a function of proximity with other objects or amplitude of the contact forces. A preliminary evaluation was conducted to gather the subjective preference of a group of participants during the simulation of an automotive assembly operation. The collected questionnaires showed that participants globally appreciated our visual cues of contact. The changes in color appeared to be preferred concerning the display of distances and proximity information. Size changes and deformation effects appeared to be preferred in terms of perception of contact forces between the parts. Last, light sources were selected to focus the attention of the user on the contact areas.  相似文献   
100.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号