首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2140篇
  免费   82篇
  国内免费   2篇
电工技术   21篇
综合类   1篇
化学工业   358篇
金属工艺   43篇
机械仪表   42篇
建筑科学   78篇
矿业工程   9篇
能源动力   47篇
轻工业   149篇
水利工程   20篇
石油天然气   9篇
无线电   193篇
一般工业技术   401篇
冶金工业   592篇
原子能技术   19篇
自动化技术   242篇
  2023年   12篇
  2022年   23篇
  2021年   48篇
  2020年   40篇
  2019年   44篇
  2018年   52篇
  2017年   44篇
  2016年   44篇
  2015年   38篇
  2014年   53篇
  2013年   95篇
  2012年   87篇
  2011年   121篇
  2010年   98篇
  2009年   65篇
  2008年   111篇
  2007年   86篇
  2006年   75篇
  2005年   76篇
  2004年   65篇
  2003年   73篇
  2002年   51篇
  2001年   32篇
  2000年   41篇
  1999年   42篇
  1998年   58篇
  1997年   59篇
  1996年   48篇
  1995年   36篇
  1994年   51篇
  1993年   35篇
  1992年   26篇
  1991年   14篇
  1990年   31篇
  1989年   26篇
  1988年   18篇
  1987年   17篇
  1986年   16篇
  1985年   21篇
  1984年   14篇
  1983年   28篇
  1982年   15篇
  1981年   15篇
  1980年   13篇
  1979年   30篇
  1978年   17篇
  1977年   24篇
  1976年   18篇
  1974年   10篇
  1973年   10篇
排序方式: 共有2224条查询结果,搜索用时 15 毫秒
21.
22.
According to D. E. Broadbent's (1958) selective filter theory, people do not process unattended stimuli beyond the analysis of basic physical properties. This theory was later rejected on the basis of numerous findings that people identify irrelevant (and supposedly unattended) stimuli. A careful review of this evidence, however, reveals strong reasons to doubt that these irrelevant stimuli were in fact unattended. This review exposed a clear need for new experiments with tight control over the locus of attention. The authors present 5 such experiments using a priming paradigm. When steps were taken to ensure that irrelevant stimuli were not attended, these stimuli produced no priming effects. Hence, the authors found no evidence that unattended stimuli can be identified. The results support a modern version of Broadbent's selective theory, updated to reflect recent research advances. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
23.
24.
This column goes beyond previous insider analyses to identify a framework for a taxonomy of insider threats including both malicious and inadvertent actions by insiders that put organizations or their resources at some risk. The framework includes factors reflecting the organization, the individual, the information technology system, and the environment.  相似文献   
25.
26.
Explored whether males' satisfaction with an exchange relationship is more dependent on the equity of that relationship, relative to females'. 26 male and 25 female members of 1 of 3 business lead and referral clubs (1 all female, 1 primarily male, and 1 approximately equal in males and females) rated their own and others' inputs and outcomes into the exchange relationship, as well as their satisfaction with the relationship. Results indicate that satisfaction was lower in a negatively inequitable than equitable relationship and slightly lower in an equitable than positively inequitable relationship. As predicted, the relationship of equity and satisfaction was considerably more pronounced for male than female club members. Further analyses revealed that the equity-satisfaction relationship was especially (a) pronounced for males in the primarily male group and (b) weak for females in an all-female group. The latter findings suggest that the salience of the equity norm may be a joint function of the sex of both members of an exchange relationship. (13 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
27.
The electrostatic potentials for the three-dimensional structures of cholinesterases from various species were calculated, using the Delphi algorithm, on the basis of the Poisson–Boltzmann equation. We used structures for Torpedo californica and mouse acetylcholinesterase, and built homology models of the human, Bungarus fasciatus, and Drosophila melanogaster acetylcholinesterases and human butyrylcholinesterase. All these structures reveal a negative external surface potential, in the area around the entrance to the active-site gorge, that becomes more negative as the rim of the gorge is approached. Moreover, in all cases, the potential becomes increasingly more negative along the central axis running down the gorge, and is largest at the base of the gorge, near the active site. Ten key acidic residues conserved in the sequence alignments of AChE from various species, both in the surface area near the entrance of the active-site gorge and at its base, appear to be primarily responsible for these potentials. The potentials are highly correlated among the structures examined, down to sequence identities as low as 35%. This indicates that they are a conserved property of the cholinesterase family, could serve to attract the positively charged substrate into and down the gorge to the active site, and may play other roles important for cholinesterase function.  相似文献   
28.
While abundant clinical and angiographic data are available regarding features of acute or abrupt closure at the site of balloon angioplasty, little morphologic information is available. This study discusses morphologic-histologic causes for acute closure after angioplasty in 130 necropsy patients. Intimal-medial flaps, elastic recoil, and primary thrombosis were the three leading morphologic causes for closure. Data were subdivided into time categories: abrupt (< 1 day), acute (< 1 week), and early (< 1 month). Intimal-medial flaps remained the most common cause for angioplasty closure despite time from angioplasty to documented occlusion. Morphologic recognition of types and frequencies of angioplasty closure are discussed, and specific mechanical, pharmacologic, or combined treatments are reviewed.  相似文献   
29.
Lee and Batcher have designed networks that efficiently merge k separately provided sorted sequences of known lengths totalling n. We show that the design is still possible, and in fact easier to describe, if we do not make use of the lengths, or even the directions of monotonicity, of the individual sequences—the sequences can be provided in a single undelimited concatenation of length n. The depth of the simplest resulting network to sort sequences that are “k-tonic” and of length n is , generalizing Batcher's 1968 results for the extreme values of k (k=2 corresponding to merging, and k=n/2 corresponding to general sorting).The exposition is self-contained and can serve even as an introduction to sorting networks and Batcher's results.  相似文献   
30.
Using a novel second-order mobility theory that was recently developed by the authors, this article develops new lower bounds on the number of frictionless fingers required to immobilize generic planar objects. We show that any generic smooth or polygonal planar object can be immobilized with three convex fingers or fixtures that have sufficiently flat curvature. Further, if it is possible to specify the fingertip curvature, then any generic smooth or polygonal object can be immobilized with two, possibly concave, fingers. © 1995 John Wiley & Sons, Inc.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号