全文获取类型
收费全文 | 2055篇 |
免费 | 15篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 20篇 |
化学工业 | 202篇 |
金属工艺 | 11篇 |
机械仪表 | 24篇 |
建筑科学 | 134篇 |
矿业工程 | 1篇 |
能源动力 | 50篇 |
轻工业 | 123篇 |
水利工程 | 14篇 |
石油天然气 | 4篇 |
无线电 | 137篇 |
一般工业技术 | 147篇 |
冶金工业 | 1104篇 |
原子能技术 | 12篇 |
自动化技术 | 88篇 |
出版年
2022年 | 9篇 |
2021年 | 9篇 |
2019年 | 11篇 |
2018年 | 9篇 |
2017年 | 10篇 |
2016年 | 9篇 |
2015年 | 12篇 |
2014年 | 20篇 |
2013年 | 49篇 |
2012年 | 25篇 |
2011年 | 41篇 |
2010年 | 27篇 |
2009年 | 25篇 |
2008年 | 30篇 |
2007年 | 28篇 |
2006年 | 35篇 |
2005年 | 24篇 |
2004年 | 31篇 |
2003年 | 21篇 |
2002年 | 22篇 |
2001年 | 28篇 |
2000年 | 26篇 |
1999年 | 47篇 |
1998年 | 333篇 |
1997年 | 173篇 |
1996年 | 153篇 |
1995年 | 76篇 |
1994年 | 81篇 |
1993年 | 66篇 |
1992年 | 33篇 |
1991年 | 28篇 |
1990年 | 31篇 |
1989年 | 42篇 |
1988年 | 32篇 |
1987年 | 34篇 |
1986年 | 33篇 |
1985年 | 30篇 |
1984年 | 18篇 |
1983年 | 33篇 |
1982年 | 19篇 |
1981年 | 21篇 |
1980年 | 38篇 |
1979年 | 18篇 |
1978年 | 14篇 |
1977年 | 47篇 |
1976年 | 78篇 |
1975年 | 11篇 |
1974年 | 6篇 |
1973年 | 16篇 |
1969年 | 6篇 |
排序方式: 共有2071条查询结果,搜索用时 15 毫秒
61.
62.
Duane C. Chapman Jeremiah J. Davis Jill A. Jenkins Patrick M. Kocovsky Jeffrey G. Miner John Farver P. Ryan Jackson 《Journal of Great Lakes research》2013
We use aging techniques, ploidy analysis, and otolith microchemistry to assess whether four grass carp Ctenopharyngodon idella captured from the Sandusky River, Ohio were the result of natural reproduction within the Lake Erie Basin. All four fish were of age 1 +. Multiple lines of evidence indicate that these fish were not aquaculture-reared and that they were most likely the result of successful reproduction in the Sandusky River. First, at least two of the fish were diploid; diploid grass carp cannot legally be released in the Great Lakes Basin. Second, strontium:calcium (Sr:Ca) ratios were elevated in all four grass carp from the Sandusky River, with elevated Sr:Ca ratios throughout the otolith transect, compared to grass carp from Missouri and Arkansas ponds. This reflects the high Sr:Ca ratio of the Sandusky River, and indicates that these fish lived in a high-strontium environment throughout their entire lives. Third, Sandusky River fish were higher in Sr:Ca ratio variability than fish from ponds, reflecting the high but spatially and temporally variable strontium concentrations of southwestern Lake Erie tributaries, and not the stable environment of pond aquaculture. Fourth, Sr:Ca ratios in the grass carp from the Sandusky River were lower in their 2011 growth increment (a high water year) than the 2012 growth increment (a low water year), reflecting the observed inverse relationship between discharge and strontium concentration in these rivers. We conclude that these four grass carp captured from the Sandusky River are most likely the result of natural reproduction within the Lake Erie Basin. 相似文献
63.
P. Wang I. M. Hutchings S. J. Duncan L. Jenkins E. Woo 《Journal of Materials Science》2006,41(15):4847-4859
This paper presents research work on the characteristics and micro mechanism of strain whitening of a thermoplastic olefin material. Systematic tensile tests have been carried out to investigate the relation between strain whitening extent and external factors, including the deformation employed and the environmental temperature. A new optical method has been developed for the measurement of strain on polymer tensile samples. Applying this method relation between whitening level (grey level change) and strain has been studied. A new concept of ‘strain whitening sensitivity’ has been proposed and defined as the strain whitening induced by unit deformation or strain. Non-monotonic relation between whitening level and strain has been found. Strained and fractured samples were observed with A JEOL 5800 LV SEM for the micro mechanism investigation. The change of microstructure on the sample surface has been extensively observed and the combined effects of small ridges and micro-voids on the scattering efficiency of the strained surface were regarded as reasons for the non-monotonic relation between whitening level and strain. 相似文献
64.
The optimisation of parameters is investigated for the compositional analysis of nanometre-sized particles embedded in a matrix by energy-filtered transmission electron microscopy. The specific example of Cu-rich particles in a Fe matrix is used both to model and to explore the experimental limits of detection and characterisation. Modelling of alternative procedures for background extrapolation as a function of the number of pre-edge windows confirmed that greater accuracy in a fixed analysis time is achieved by using more than two pre-edge windows. Further modelling investigated the effects of noise, drift and instrumental blurring of images on the accuracy of particle size and composition measurements. Correction factors were generated for ranges of these artefact amplitudes. The corrections were then applied to experimental data and shown to be both realistic and effective. Determination of particle radius below 1 nm was demonstrated. 相似文献
65.
López Steven Regeser; Nelson Hipke Kathleen; Polo Antonio J.; Jenkins Janis H.; Karno Marvin; Vaughn Christine; Snyder Karen S. 《Canadian Metallurgical Quarterly》2004,113(3):428
The authors examined the role of family factors and the course of schizophrenia by carrying out additional assessments and analyses in 2 previously published studies of Mexican American and Anglo American patients and families. The authors found partial support for an attributional model of relapse for families who are low in emotional overinvolvement. Attributions of control, criticism, and warmth together marginally predicted relapse. The data also indicated that for Mexican Americans, family warmth is a significant protective factor, whereas for Anglo Americans, family criticism is a significant risk factor. These findings suggest that the sociocultural context shapes the pathways by which family processes are related to the course of illness. Moreover, the warmth findings suggest that families may contribute to preventing relapse. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
66.
Y. Z. Huang S. Lozano-Perez R. M. Langford J. M. Titchmarsh & M. L. Jenkins 《Journal of microscopy》2002,207(2):129-136
The preparation of transmission electron microscope (TEM) thin foil specimens from metal alloys containing cracks is usually thwarted by the difficulty in preventing preferential erosion of material along the flanks and at the tips of cracks. Recent developments in focused ion beam (FIB) micromachining methods have the potential to overcome this inherent problem. In this article we describe the development of new procedures, one using FIB alone and the other using a combination of FIB with more conventional ion milling to generate TEM specimens that largely retain the microstructural information at stress corrosion cracks in austentic alloys. Examples of corrosion product phase identification and interfacial segregation are included to verify that detailed information is not destroyed by ion bombardment during specimen preparation. 相似文献
67.
Bonnie Brinton Anderson Anthony Vance C Brock Kirwan David Eargle Jeffrey L Jenkins 《欧洲信息系统杂志》2016,25(4):364-390
Users are vital to the information security of organizations. In spite of technical safeguards, users make many critical security decisions. An example is users’ responses to security messages – discrete communication designed to persuade users to either impair or improve their security status. Research shows that although users are highly susceptible to malicious messages (e.g., phishing attacks), they are highly resistant to protective messages such as security warnings. Research is therefore needed to better understand how users perceive and respond to security messages. In this article, we argue for the potential of NeuroIS – cognitive neuroscience applied to Information Systems – to shed new light on users’ reception of security messages in the areas of (1) habituation, (2) stress, (3) fear, and (4) dual-task interference. We present an illustrative study that shows the value of using NeuroIS to investigate one of our research questions. This example uses eye tracking to gain unique insight into how habituation occurs when people repeatedly view security messages, allowing us to design more effective security messages. Our results indicate that the eye movement-based memory (EMM) effect is a cause of habituation to security messages – a phenomenon in which people unconsciously scrutinize stimuli that they have previously seen less than other stimuli. We show that after only a few exposures to a warning, this neural aspect of habituation sets in rapidly, and continues with further repetitions. We also created a polymorphic warning that continually updates its appearance and found that it is effective in substantially reducing the rate of habituation as measured by the EMM effect. Our research agenda and empirical example demonstrate the promise of using NeuroIS to gain novel insight into users’ responses to security messages that will encourage more secure user behaviors and facilitate more effective security message designs. 相似文献
68.
Christopher W. Brown Michael Jenkins 《International Journal of Information Security》2016,15(6):621-635
“Secure” Web browsing with HTTPS uses TLS/SSL and X.509 certificates to provide authenticated, confidential communication between Web clients and Web servers. The authentication component of the system has a variety of weaknesses, which have led to a variety of proposals for improving the current environment. In this paper, we survey, analyze, compare and contrast five prominent proposals. To do this, we attempt to systematically capture the properties one might require of such a system: authentication properties, forensics/privacy properties, usability properties and pragmatic properties. Enumerating these properties is an important part of understanding these proposals and the nature of the authentication problem for the secure Web. Finally, we offer a few conclusions and suggestions pertaining to these proposals and possible future directions of research. 相似文献
69.
The paradoxical behaviour of a new command and control concept called Network Enabled Capability (NEC) provides the motivation for this paper. In it, a traditional hierarchical command and control organisation was pitted against a network centric alternative on a common task, played thirty times, by two teams. Multiple regression was used to undertake a simple form of time series analysis. It revealed that whilst the NEC condition ended up being slightly slower than its hierarchical counterpart, it was able to balance and optimise all three of the performance variables measured (task time, enemies neutralised and attrition). From this it is argued that a useful conceptual response is not to consider NEC as an end product comprised of networked computers and standard operating procedures, nor to regard the human system interaction as inherently stable, but rather to view it as a set of initial conditions from which the most adaptable component of all can be harnessed: the human. 相似文献
70.
The Victoria Planning Provisions (VPPs) include siting and design regulations incorporated into local government planning schemes to mitigate risk in areas prone to bushfires. Introduced in 1997, these provisions were previously called the Wildfire Management Overlay (WMO). Now updated and renamed the Bushfire Management Overlay (BMO), the provision's ongoing development has been informed by fire behaviour and how houses ignite. The aim of the research reported here, conducted following the catastrophic February 2009 Victorian fires, was to review dwelling losses in terms of the WMO's effectiveness. Empirical evidence compares house losses of dwellings referred to the Country Fire Authority (CFA) via the WMO, with overall house losses. The results suggest that proportionately fewer houses referred to the CFA were lost, compared with those not assessed under the WMO. It should be noted that other factors influenced the results, such as the houses assessed under the WMO being generally newer. 相似文献