首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3565篇
  免费   38篇
  国内免费   6篇
电工技术   12篇
综合类   1篇
化学工业   252篇
金属工艺   23篇
机械仪表   45篇
建筑科学   95篇
矿业工程   6篇
能源动力   55篇
轻工业   204篇
水利工程   15篇
石油天然气   4篇
无线电   210篇
一般工业技术   273篇
冶金工业   2212篇
原子能技术   26篇
自动化技术   176篇
  2023年   16篇
  2022年   20篇
  2021年   29篇
  2020年   33篇
  2019年   28篇
  2018年   24篇
  2017年   23篇
  2016年   36篇
  2015年   16篇
  2014年   37篇
  2013年   74篇
  2012年   53篇
  2011年   81篇
  2010年   54篇
  2009年   36篇
  2008年   57篇
  2007年   69篇
  2006年   64篇
  2005年   51篇
  2004年   44篇
  2003年   53篇
  2002年   48篇
  2001年   46篇
  2000年   36篇
  1999年   88篇
  1998年   619篇
  1997年   391篇
  1996年   262篇
  1995年   151篇
  1994年   122篇
  1993年   117篇
  1992年   35篇
  1991年   34篇
  1990年   37篇
  1989年   46篇
  1988年   41篇
  1987年   32篇
  1986年   36篇
  1985年   39篇
  1984年   27篇
  1983年   13篇
  1982年   25篇
  1981年   35篇
  1980年   46篇
  1979年   17篇
  1978年   20篇
  1977年   78篇
  1976年   146篇
  1975年   17篇
  1974年   18篇
排序方式: 共有3609条查询结果,搜索用时 15 毫秒
101.
We report here that BODIPY 505/515, a green lipophilic fluorescent dye, serves as an excellent vital stain for the oil-containing lipid bodies of live algal cells. BODIPY 505/515 vital staining can be used in combination with fluorescent activated cell sorting to detect and isolate algal cells possessing high lipid content.  相似文献   
102.
The increasing need for hybrid Knowledge-Based Systems (KBS) that accommodate more complex applications has led to the need for new verification concerns that are more specific to the hybrid representation using objects and rule-based inference. Traditionally, verification of expert systems has focused solely on rule-based inference systems. Hybrid KBSs present additional verification problems not found in traditional rule-based systems. This paper is an investigation into the anomalies that may be present in a hybrid representation that warrant detection for the verification of the KBS. Many anomalies are due to the interaction of the component parts of the hybrid KBS. For example, subsumption anomalies arise due to an interaction between inheritance of objects and rule-based inference. In this paper, we extend the context of subsumption anomalies and introduce additional types of anomalies that may be present in the KBS. The goal of this research is to make hybrid KBSs more reliable by detecting such anomalies.  相似文献   
103.
Quantitative reconstruction of volumetric flaws near a surface of an elastic solid has been carried out experimentally by analyzing the scattered ultrasonic waves. The inverse Born approximation (developed for flaws in bulk materials) was tested for the first time in the determination of the size, shape, and orientation of near-surface flaws. We have studied spherical solid inclusions at various depths below the surface. In addition we examined an approximately 2:1 prolate spheroidal inclusion which was located one major axis below the surface. The determination of the flaw's size, shape, and orientation in terms of an equivalent ellipsoid is realized by performing nonlinear least-squares iteration of the one-dimensional Born inversion results obtained at various scattering directions within a finite aperture. The reconstruction is in good agreement with the actual parameters of the flaw.  相似文献   
104.
The objective of this study was to identify how physiological measures relate to self-reported vehicle seating discomfort. Twelve subjects of varied anthropometric characteristics were enrolled in the study. Subjects sat in two seats over a 2-h period and were evaluated via three physiological measures (near-infrared spectroscopy, electromyography and pressure mapping) yielding six testing sessions. Subjective discomfort surveys were recorded before and after each session for nine regions of the body. Conditional classification discomfort models were developed through dichotomised physiological responses and anthropometry to predict subjective discomfort in specific body locations. Models revealed that subjects taller than 171 cm with reduced blood oxygenation in the biceps femoris or constant, low-level muscle activity in the trapezius tended to report discomfort in the lower extremities or neck, respectively. Subjects weighing less than 58 kg with reduced blood oxygenation in the biceps femoris or unevenly distributed pressure patterns tended to report discomfort in the buttocks. The sensitivities and specificities of cross-validated models ranged between 0.69 and 1.00.  相似文献   
105.
Model-driven engineering introduces additional challenges for controlling and managing software evolution. Today, tools exist for generating model editors and for managing models with transformation, validation, merging and weaving. There is limited support, however, for model migration—a development activity in which instance models are updated in response to metamodel evolution. In this paper, we propose conservative copy—a style of model transformation that we believe is well-suited to model migration—and Epsilon Flock—a compact model-to-model transformation language tailored for model migration. The proposed structures are evaluated by comparing the conciseness of model migration strategies written in different styles of transformation language, using several examples of evolution taken from UML and the graphical modelling framework.  相似文献   
106.
107.
108.
Teachers’ knowledge of computer-related ergonomics in education will have an effect on the learning process and the work practices of their students. However little is known about teacher education in this area. The study aimed to investigate the sources and nature of secondary school teachers’ education about computer-related ergonomics. It also investigated the use of computers by secondary school children. The study included all secondary schools in the Republic of Ireland. The findings suggest that computers are widely available and are used frequently by students and teachers. However, there is evidence that teachers are not receiving information on computer-related ergonomics. Teachers were generally dissatisfied with this and would welcome information on the subject. The study discusses the implications of the findings and makes recommendations to meet the needs of the teachers.  相似文献   
109.
110.
Two main security threats exist for DNS in the context of query/response transactions. Attackers can spoof authoritative name servers responding to DNS queries and alter DNS responses in transit through man-in-the-middle attacks, and alter the DNS responses stored in caching name servers. The IETF has defined the digital signature-based DNSSEC for protecting DNS query/response transactions through a series of requests for comments.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号