首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9600篇
  免费   366篇
  国内免费   7篇
电工技术   95篇
综合类   12篇
化学工业   1935篇
金属工艺   146篇
机械仪表   185篇
建筑科学   561篇
矿业工程   19篇
能源动力   225篇
轻工业   750篇
水利工程   83篇
石油天然气   27篇
武器工业   1篇
无线电   553篇
一般工业技术   1767篇
冶金工业   2084篇
原子能技术   129篇
自动化技术   1401篇
  2023年   48篇
  2022年   106篇
  2021年   150篇
  2020年   115篇
  2019年   142篇
  2018年   185篇
  2017年   175篇
  2016年   204篇
  2015年   167篇
  2014年   264篇
  2013年   635篇
  2012年   401篇
  2011年   544篇
  2010年   376篇
  2009年   429篇
  2008年   453篇
  2007年   471篇
  2006年   449篇
  2005年   372篇
  2004年   321篇
  2003年   308篇
  2002年   251篇
  2001年   183篇
  2000年   188篇
  1999年   188篇
  1998年   201篇
  1997年   183篇
  1996年   176篇
  1995年   176篇
  1994年   146篇
  1993年   141篇
  1992年   144篇
  1991年   90篇
  1990年   94篇
  1989年   114篇
  1988年   109篇
  1987年   105篇
  1986年   107篇
  1985年   110篇
  1984年   110篇
  1983年   104篇
  1982年   65篇
  1981年   80篇
  1980年   63篇
  1979年   62篇
  1978年   78篇
  1977年   57篇
  1976年   57篇
  1975年   49篇
  1974年   46篇
排序方式: 共有9973条查询结果,搜索用时 15 毫秒
71.
A cellular automata model is used to simulate a variety of granular chute flows. The model is tested against several case studies: flow down a chute, flow past an obstacle, chute flow in which complex, counter-rotating vortices result in streamwise surface stripes and flow near a boundary. The model successfully reproduces experimental observations in all of these cases. These results lead us to propose that simple, rule-based, models such as this can improve our detailed understanding of dynamics and flow within an opaque granular bed.  相似文献   
72.
73.
74.
This paper presents the concept of a process signature for the use of online signature analysis and defect detection in the layered manufacturing (LM) of ceramic sensors and actuators. To achieve the high quality of parts built by the fused deposition of ceramics (FDC), an online process-monitoring system is implemented to detect the processing defects. Using a process signature extracted from the image of a layer captured by the monitoring system, an ideal image is created that is then compared to the original image to detect and identify the defects. Some results of signature analysis and defect detection for single-material and multi-material parts are also presented.Received: 22 July 1999, Accepted: 21 October 2001, Published online: 29 October 2003 Correspondence to: Mohsen A. JafariThis work was supported by the Office of Naval Research under grant # N-0014-96-1-1175. Ref. US Patent # S-5738817, April 14, 1998.  相似文献   
75.
Review of book: Stephen Mitchell. Can Love Last? The Fate of Romance Over Time. New York: Norton, 2002, 223 pp. Reviewed by Timothy J. Zeddies. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
76.
Working collaboratively, psychologist educators and trainers at the doctoral, internship, and postdoctoral levels; credentialers; practitioners; and students offer 8 proposals for psychologists to consider in recognizing, assessing, and intervening with problems of professional competence in students and practicing professionals. In the proposals, the authors address the following topics: definitions and categories; preparing the system; self-assessment; remediation; diversity; communication across various levels of the system; confidentiality; and ethical, regulatory, and legal underpinnings. They also propose future directions for the assessment of problems in professional competence in both students and practicing psychologists. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
77.
In many data analysis problems, it is useful to consider the data as generated from a set of unknown (latent) generators or sources. The observations we make of a system are then taken to be related to these sources through some unknown function. Furthermore, the (unknown) number of underlying latent sources may be less than the number of observations. Recent developments in independent component analysis (ICA) have shown that, in the case where the unknown function linking sources to observations is linear, such data decomposition may be achieved in a mathematically elegant manner. In this paper, we extend the general ICA paradigm to include a very flexible source model, prior constraints and conditioning on sets of intermediate variables so that ICA forms one part of a hierarchical system. We show that such an approach allows for efficient discovery of hidden representation in data and for unsupervised data partitioning.  相似文献   
78.
Data from 2 daily diary studies of stress, negative affect, and drinking were used to examine the correspondence between global self-reports of drinking to cope (DTC) and within-person stress/negative affect-drinking associations. In Study 1, 83 community-residing drinkers recorded data in nightly booklets on negative events, perceived stress, negative affect, and drinking for 60 consecutive days. In Study 2, 88 community-residing drinkers recorded data on negative events and negative interpersonal exchanges nightly and negative affect and drinking in near-real time on palmtop computers for 30 consecutive days. Both studies showed only modest correspondence between self-reported DTC and between-person differences in within-day, daily, and weekly associations between stress/negative affect and drinking. The findings indicate that individuals who report higher DTC simply may drink across a wider variety of conditions than those who report relatively lower DTC. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
79.
Legal liabilities pertaining to the identification and selection of domain experts is an issue that could adversely impact expert systems developers. Problems pertaining to flawed knowledge, improperly defined expertise, and behavioural and psychological impediments are just some of the issues. This paper examines the torts of strict products liability and negligence that system developers could incur as a result of expert-related difficulties. Parallels from legal scholars and federal and state court decisions are discussed relevant to expert system projects and developers. The paper concludes with a presentation of steps that systems developers can take to minimize potential legal liability.  相似文献   
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号