全文获取类型
收费全文 | 1970篇 |
免费 | 30篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 26篇 |
综合类 | 5篇 |
化学工业 | 460篇 |
金属工艺 | 31篇 |
机械仪表 | 38篇 |
建筑科学 | 101篇 |
矿业工程 | 21篇 |
能源动力 | 34篇 |
轻工业 | 158篇 |
水利工程 | 10篇 |
石油天然气 | 12篇 |
无线电 | 145篇 |
一般工业技术 | 260篇 |
冶金工业 | 339篇 |
原子能技术 | 13篇 |
自动化技术 | 348篇 |
出版年
2022年 | 13篇 |
2020年 | 12篇 |
2019年 | 15篇 |
2018年 | 18篇 |
2016年 | 18篇 |
2015年 | 20篇 |
2014年 | 26篇 |
2013年 | 100篇 |
2012年 | 47篇 |
2011年 | 83篇 |
2010年 | 59篇 |
2009年 | 77篇 |
2008年 | 82篇 |
2007年 | 73篇 |
2006年 | 71篇 |
2005年 | 63篇 |
2004年 | 62篇 |
2003年 | 63篇 |
2002年 | 62篇 |
2001年 | 50篇 |
2000年 | 34篇 |
1999年 | 43篇 |
1998年 | 37篇 |
1997年 | 41篇 |
1996年 | 47篇 |
1995年 | 31篇 |
1994年 | 47篇 |
1993年 | 24篇 |
1992年 | 30篇 |
1991年 | 27篇 |
1990年 | 25篇 |
1989年 | 27篇 |
1988年 | 23篇 |
1987年 | 32篇 |
1986年 | 20篇 |
1985年 | 24篇 |
1984年 | 43篇 |
1983年 | 29篇 |
1982年 | 29篇 |
1981年 | 30篇 |
1980年 | 20篇 |
1979年 | 31篇 |
1978年 | 20篇 |
1977年 | 30篇 |
1976年 | 20篇 |
1975年 | 25篇 |
1974年 | 15篇 |
1973年 | 18篇 |
1972年 | 11篇 |
1971年 | 12篇 |
排序方式: 共有2001条查询结果,搜索用时 15 毫秒
51.
52.
Fred Cohen 《Network Security》2000,2000(9):16-17
Networks dominate today’s computing environment and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
53.
Fred Cohen 《Network Security》2000,2000(11):16-18
Networks dominate today's computing landscape and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
54.
The human visual system has the remarkable ability to largely recognize objects invariant of their position, rotation, and scale. A good interpretation of neurobiological findings involves a computational model that simulates signal processing of the visual cortex. In part, this is likely achieved step by step from early to late areas of visual perception. While several algorithms have been proposed for learning feature detectors, only few studies at hand cover the issue of biologically plausible learning of such invariance. In this study, a set of Hebbian learning rules based on calcium dynamics and homeostatic regulations of single neurons is proposed. Their performance is verified within a simple model of the primary visual cortex to learn so-called complex cells, based on a sequence of static images. As a result, the learned complex-cell responses are largely invariant to phase and position. 相似文献
55.
An adjustable-voltage adjustable-frequency polyphase reversible-phase sequence sine wave signal generator is described. This signal generator develops the reference waveforms, in this case sine waves, that are required in the control circuits of certain types of static dc to ac inverters and ac to ac cycloconverters. Digital and linear integrated circuits together with passive components are used to generrate the output signals. The output frequency is adjustable from 0 to 500 hertz; the output voltage is adjustable from 0 to 20 volts peak-to-peak. The phase sequence is reversible on command. The theory of operation together with steady-state and transient performance data are presented. 相似文献
56.
To date, few studies have sought to investigate the effects of child maltreatment and processes influencing maladaptation and resilience in Latino children. In the current investigation, multiple aspects of functioning, personal resources, and relationship features were examined in school-age maltreated and nonmaltreated Latino children. Maltreated Latino children were found to have fewer areas of resilient functioning. Ego-resiliency and ego-control, as personal resources, and the ability to form a positive relationship with an adult figure outside of the immediate family predicted resilience. However, certain aspects of interpersonal functioning were differentially related to resilience for maltreated and nonmaltreated Latino children. These findings have implications for understanding how resilience can be promoted in maltreated and nonmaltreated Latino children. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
57.
Fred Cohen 《Network Security》2003,2003(6):18-20
Networks dominate today's computing landscape and commercial technical protection is lagging behind attack technology. As a result, protection programme success depends more on prudent management decisions than on the selection of technical safeguards. Managing Network Security takes a management view of protection and seeks to reconcile the need for security with the limitations of technology. 相似文献
58.
Welkowitz Joan; Welkowitz Lawrence A.; Struening Elmer; Hellman Fred; Guardino Mary 《Canadian Metallurgical Quarterly》2004,41(1):69
Questionnaire data from 2,033 participants in the National Anxiety Disorders Screening Day sample were used to assess the presence of panic and comorbid anxiety problems. These participants were selected from more than 15,000 attendees on the basis of never having received treatment for a psychiatric disorder and meeting screening criteria for panic disorder. With each comorbid anxiety problem (generalized anxiety disorder, posttraumatic stress disorder, social phobia, and obsessive-compulsive disorder), participants had a corresponding increase in interference in daily living as well as readiness to seek treatment. The addition of generalized anxiety or depression with panic symptoms resulted in marked increases in interference scores. Clinical treatment implications for panic disorder are discussed in terms of the effects of comorbid anxiety problems. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
59.
Douglas A Stow Allen Hope David Verbyla Fred Huemmrich Charles Racine Kenneth Tape Kenji Yoshikawa Brian Noyle David Douglas Gensuo Jia Donald Walker Aaron Petersen Ranga Myneni 《Remote sensing of environment》2004,89(3):281-308
The objective of this paper is to review research conducted over the past decade on the application of multi-temporal remote sensing for monitoring changes of Arctic tundra lands. Emphasis is placed on results from the National Science Foundation Land-Air-Ice Interactions (LAII) program and on optical remote sensing techniques. Case studies demonstrate that ground-level sensors on stationary or moving track platforms and wide-swath imaging sensors on polar orbiting satellites are particularly useful for capturing optical remote sensing data at sufficient frequency to study tundra vegetation dynamics and changes for the cloud prone Arctic. Less frequent imaging with high spatial resolution instruments on aircraft and lower orbiting satellites enable more detailed analyses of land cover change and calibration/validation of coarser resolution observations.The strongest signals of ecosystem change detected thus far appear to correspond to expansion of tundra shrubs and changes in the amount and extent of thaw lakes and ponds. Changes in shrub cover and extent have been documented by modern repeat imaging that matches archived historical aerial photography. NOAA Advanced Very High Resolution Radiometer (AVHRR) time series provide a 20-year record for determining changes in greenness that relates to photosynthetic activity, net primary production, and growing season length. The strong contrast between land materials and surface waters enables changes in lake and pond extent to be readily measured and monitored. 相似文献
60.
This paper addresses the use of high order dissimilarity models in data mining problems. We explore dissimilarities between triplets of nearest neighbors, called dissimilarity increments (DIs). We derive a statistical model of DIs for d-dimensional data (d-DID) assuming that the objects follow a multivariate Gaussian distribution. Empirical evidence shows that the d-DID is well approximated by the particular case d=2. We propose the application of this model in clustering, with a partitional algorithm that uses a merge strategy on Gaussian components. Experimental results, in synthetic and real datasets, show that clustering algorithms using DID usually outperform well known clustering algorithms. 相似文献