首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2980篇
  免费   40篇
电工技术   35篇
综合类   3篇
化学工业   394篇
金属工艺   82篇
机械仪表   72篇
建筑科学   89篇
矿业工程   10篇
能源动力   43篇
轻工业   227篇
水利工程   21篇
石油天然气   3篇
无线电   306篇
一般工业技术   317篇
冶金工业   1132篇
原子能技术   14篇
自动化技术   272篇
  2021年   22篇
  2018年   25篇
  2017年   26篇
  2016年   27篇
  2015年   19篇
  2014年   29篇
  2013年   95篇
  2012年   46篇
  2011年   66篇
  2010年   66篇
  2009年   69篇
  2008年   75篇
  2007年   83篇
  2006年   91篇
  2005年   87篇
  2004年   67篇
  2003年   65篇
  2002年   70篇
  2001年   66篇
  2000年   61篇
  1999年   80篇
  1998年   269篇
  1997年   169篇
  1996年   120篇
  1995年   87篇
  1994年   86篇
  1993年   74篇
  1992年   46篇
  1991年   32篇
  1990年   65篇
  1989年   62篇
  1988年   54篇
  1987年   48篇
  1986年   45篇
  1985年   44篇
  1984年   47篇
  1983年   39篇
  1982年   39篇
  1981年   35篇
  1980年   30篇
  1979年   26篇
  1978年   23篇
  1977年   41篇
  1976年   72篇
  1975年   21篇
  1974年   25篇
  1973年   22篇
  1972年   20篇
  1971年   23篇
  1968年   19篇
排序方式: 共有3020条查询结果,搜索用时 31 毫秒
81.
Refinement algebras are abstract algebras for reasoning about programs in a total correctness framework. We extend a reduct of von Wright’s demonic refinement algebra with two operators for modelling enabledness and termination of programs. We show how the operators can be used for expressing relations between programs and apply the algebra to reasoning about action systems.  相似文献   
82.
We study comparisons of several treatments with a common control when it is believed a priori that the treatment means, μi, are at least as large as the control mean, μ0. In this setting, which is called a tree ordering, we study multiple comparisons that determine whether μi>μ0 or μi=μ0 for each treatment. The classical procedure by Dunnett (1955) and the step-down and step-up techniques by [Dunnett and Tamhane, 1991] and [Dunnett and Tamhane, 1992] are well known. The results in Marcus and Talpaz (1992) provide multiple comparisons based on the maximum likelihood estimates restricted by the tree ordering. We also study two-stage procedures that consist of the likelihood ratio test of homogeneity with the alternative constrained by the tree ordering followed by two-sample t comparisons with possibly different critical values for the two-sample comparisons. Marcus et al. (1976) discuss the use of closed tests in such situations and propose using a closed version of the restricted likelihood ratio test. We describe step-down versions of the Marcus-Talpaz, the two-stage, and the likelihood ratio procedures, as well as a closed version of the Marcus-Talpaz multiple comparison procedure. Using Monte Carlo techniques, we study the familywise errors and powers of these procedures and make some recommendations concerning techniques that perform well for all tree ordered mean vectors.  相似文献   
83.
The need to protect US critical infrastructures has been the primary motivation behind two of the US Federal Government’s security education initiatives: the National Security Agency’s Centers of Academic Excellence in Information Assurance Education (CAE/IAE) programme, and the National Science Foundation’s Federal Cyber Service: Scholarship for Service (SFS) programme. This article assesses the strength of these education programmes with respect to improving the level of critical infrastructure security.  相似文献   
84.
Improving user experience is becoming something of a rallying call in human–computer interaction but experience is not a unitary thing. There are varieties of experiences, good and bad, and we need to characterise these varieties if we are to improve user experience. In this paper we argue that enchantment is a useful concept to facilitate closer relationships between people and technology. But enchantment is a complex concept in need of some clarification. So we explore how enchantment has been used in the discussions of technology and examine experiences of film and cell phones to see how enchantment with technology is possible. Based on these cases, we identify the sensibilities that help designers design for enchantment, including the specific sensuousness of a thing, senses of play, paradox and openness, and the potential for transformation. We use these to analyse digital jewellery in order to suggest how it can be made more enchanting. We conclude by relating enchantment to varieties of experience.An earlier version of this paper was presented at Chi’2004 Fringe.  相似文献   
85.
The growth of defects called watertrees in cross-linked polyethylene power-insulated cables is poorly understood. We characterized the watertree structure on artificially aged samples. The resolution of the observations was improved by contrasting watertrees with rhodamine, a fluorescent probe and using epifluorescence microscopy. Both video-enhanced microscopy and confocal laser scanning microscopy provided evidence that watertrees are constituted of continuous microchannels. Their diameter is irregular and ranges between 0.6 and 0.2 m, and maybe less. They form a complex three-dimensional array that is accurately depicted.  相似文献   
86.
The paper describes CIRAS (Confidential Incident Reporting and Analysis System), a confidential reporting system developed by the authors in collaboration with ScotRail, the Health and Safety Executive, Railtrack and the (now defunct) British Rail Board. After a two-year pilot/developmental study with ScotRail during 1995–97, the system is now subscribed to by all but one of the major train operating companies, rail infrastructure and maintenance companies with a presence in Scotland; plus a developing profile in the rest of the UK.  CIRAS gathers data in three ways: (i) from an initial report form or telephone call, (ii) from a structured follow-up telephone questionnaire, and (iii) from an in-depth interview with a researcher (telephone or face-to-face, according to priority). The interviews bring to light details of personal motive, and of intended/unintended actions, which are not commonly found on company-run databases because of their association with disciplinary procedures. Information is processed through a human factors model and fed back to the companies involved, in disidentified form, to take corrective action.  The basic structure of the human-factors model is described; data are presented on reports received to date which have been processed through this model. The system has recently been recommended by a UK Parliamentary Committee and by Railtrack Safety and Standards Directorate for extension to the UK network as a whole.  相似文献   
87.
88.
89.
A major development in online retailing is the significant increase in the number of traditional “offline” retailers extending their brands online. Many of these retail/e-tail firms are attempting to leverage channel synergies by allowing customers to purchase products over the internet and then pick their orders up at one of the firm's local stores. This paper proposes that the firm presents only a subset of its stores to online customers as available pickup locations, rather than simply listing all local stores with inventory. By doing so, the firm can protect stores with critically low inventory levels and thereby reduce backorder costs. Specifically, we develop and evaluate a dynamic pickup site inclusion policy that incorporates real-time information to specify which of the firm's e-fulfillment locations should be presented at online checkout. Computational results indicate that managing in-store demand via such policies can decrease total cost (holding, backorder, and lost or redirected pickup sale costs) by as much as 18% over allowing customers to pick online orders up from any site with available inventory. The percentage of pickup sales and customers' sensitivity to travel are critical in determining the magnitude of the benefit.  相似文献   
90.
Sexually transmitted infections (STIs) continue to pose a threat to the public health in the United States. Many sexual behaviors increase an individual’s risk of STI contraction. Chief among these are having unprotected sex, having sex with multiple partners, and either paying for sex or having sex for pay. The present study used General Social Survey (GSS) data from 2000, 2002, and 2004 to explore the association between exposure to internet pornography and these STI risk behaviors among adult US males. After controlling for demographic and individual difference covariates, internet pornography consumption was positively associated with having sex with multiple partners, engaging in paid sex, and having had extramarital sex. Internet pornography consumption was unrelated to having unprotected sex. Subsequent GSSs have not asked participants about exposure to internet pornography. As the GSS is the only ongoing, full-probability, national survey assessing social beliefs and behaviors, the present report provides unique insight into the risky sexual behavior patterns of adult male internet pornography consumers in the United States.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号