首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2298篇
  免费   7篇
  国内免费   2篇
电工技术   8篇
化学工业   96篇
金属工艺   5篇
机械仪表   12篇
建筑科学   12篇
矿业工程   3篇
能源动力   4篇
轻工业   18篇
水利工程   1篇
石油天然气   5篇
无线电   44篇
一般工业技术   41篇
冶金工业   1980篇
原子能技术   4篇
自动化技术   74篇
  2022年   3篇
  2018年   4篇
  2017年   8篇
  2016年   8篇
  2015年   6篇
  2014年   7篇
  2013年   23篇
  2012年   12篇
  2011年   11篇
  2010年   10篇
  2009年   15篇
  2008年   15篇
  2007年   22篇
  2006年   12篇
  2005年   15篇
  2004年   8篇
  2003年   13篇
  2002年   5篇
  2001年   8篇
  2000年   11篇
  1999年   53篇
  1998年   595篇
  1997年   306篇
  1996年   216篇
  1995年   125篇
  1994年   103篇
  1993年   106篇
  1992年   22篇
  1991年   32篇
  1990年   27篇
  1989年   41篇
  1988年   42篇
  1987年   36篇
  1986年   35篇
  1985年   25篇
  1984年   5篇
  1983年   8篇
  1982年   16篇
  1981年   11篇
  1980年   24篇
  1979年   6篇
  1978年   8篇
  1977年   61篇
  1976年   141篇
  1975年   3篇
  1973年   5篇
  1971年   3篇
  1967年   3篇
  1937年   3篇
  1905年   2篇
排序方式: 共有2307条查询结果,搜索用时 0 毫秒
51.
The largest human exposure to N-nitrosamines is in the industrial section. Leather tanners are exposed to N-nitrosodimethylamine at levels up to 47 microgram/m3, corresponding to 440 microgram/person/day. Workers in the curing area of tire factories are exposed to N-nitrosomorpholine at levels up to 27 microgram/m3, corresponding to a intake of 250 microgram/person/day. These industrial exposures are considerably greater than exposure via foodstuffs, beer, cosmetics, cutting fluids and herbicides.  相似文献   
52.
A computer program has been written in PL/I to check the correctness of proofs in an axiomatic theory. A notation for the statements of the theory is described. Application examples are provided.  相似文献   
53.
54.
55.
Morphological details of calcium silicate hydrate (C–S–H) stemming from the hydration process of Portland cement (PC) phases are crucial for understanding the PC‐based systems but are still only partially known. Here we introduce the first soft X‐ray ptychographic imaging of tricalcium silicate (C3S) hydration products. The results are compared using both scanning transmission X‐ray and electron transmission microscopy data. The evidence shows that ptychography is a powerful method to visualize the details of outer and inner product C–S–H of fully hydrated C3S, which have fibrillar and an interglobular structure with average void sizes of 20 nm, respectively. The high‐resolution ptychrography image enables us to perform morphological quantification of C–S–H, and, for the first time, to possibly distinguish the contributions of inner and outer product C–S–H to the small angle scattering of cement paste. The results indicate that the outer product C–S–H is mainly responsible for the q?3 regime, whereas the inner product C–S–H transitions to a q?2 regime. Various hypotheses are discussed to explain these regimes.  相似文献   
56.
People express their opinions about things like products, celebrities and services using social media channels. The analysis of these textual contents for sentiments is a gold mine for marketing experts as well as for research in humanities, thus automatic sentiment analysis is a popular area of applied artificial intelligence. The chief objective of this paper is to investigate automatic sentiment analysis on social media contents over various text sources and languages. The comparative findings of the investigation may give useful insights to artificial intelligence researchers who develop sentiment analyzers for a new textual source. To achieve this, we describe supervised machine learning based systems which perform sentiment analysis and we comparatively evaluate them on seven publicly available English and Hungarian databases, which contain text documents taken from Twitter and product review sites. We discuss the differences among these text genres and languages in terms of document- and target-level sentiment analysis.  相似文献   
57.
Performance evaluation of Web proxy cache replacement policies   总被引:10,自引:0,他引:10  
Martin  Rich  Tai 《Performance Evaluation》2000,39(1-4):149-164
The continued growth of the World-Wide Web and the emergence of new end-user technologies such as cable modems necessitate the use of proxy caches to reduce latency, network traffic and Web server loads. In this paper we analyze the importance of different Web proxy workload characteristics in making good cache replacement decisions. We evaluate workload characteristics such as object size, recency of reference, frequency of reference, and turnover in the active set of objects. Trace-driven simulation is used to evaluate the effectiveness of various replacement policies for Web proxy caches. The extended duration of the trace (117 million requests collected over 5 months) allows long term side effects of replacement policies to be identified and quantified.

Our results indicate that higher cache hit rates are achieved using size-based replacement policies. These policies store a large number of small objects in the cache, thus increasing the probability of an object being in the cache when requested. To achieve higher byte hit rates a few larger files must be retained in the cache. We found frequency-based policies to work best for this metric, as they keep the most popular files, regardless of size, in the cache. With either approach it is important that inactive objects be removed from the cache to prevent performance degradation due to pollution.  相似文献   

58.
One‐way constraints have been incorporated in many graphical user interface toolkits because they are simple to learn, easy to write, and can express many types of useful graphical relationships. This paper is an evaluative paper that examines users' experience with one‐way constraints in two user interface development toolkits, Garnet and Amulet, over a 15‐year time span. The lessons gained from this examination can help guide the design of future constraint systems. The most important lessons are that (1) constraints should be allowed to contain arbitrary code that is written in the underlying toolkit language and does not require any annotations, such as parameter declarations, (2) constraints are difficult to debug and better debugging tools are needed, and (3) programmers will readily use one‐way constraints to specify the graphical layout of an application, but must be carefully and time‐consumingly trained to use them for other purposes. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
59.
The present study estimated the unique contribution of self-efficacy to work-related performance controlling for personality (the Big 5 traits), intelligence or general mental ability, and job or task experience. Results, based on a meta-analysis of the relevant literatures, revealed that overall, across all studies and moderator conditions, the contribution of self-efficacy relative to purportedly more distal variables is relatively small. Within moderator categories, there were several cases in which self-efficacy made unique contributions to work-related performance. For example, self-efficacy predicted performance in jobs or tasks of low complexity but not those of medium or high complexity, and self-efficacy predicted performance for task but not job performance. Overall, results suggest that the predictive validity of self-efficacy is attenuated in the presence of individual differences, though this attenuation does depend on the context. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
60.
We describe the development of a term-rewriting system for indefinite integration; it is also called a rule-based evaluation system. The development is separated into modules, and we describe the module for a wide class of integrands containing the tangent function.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号