首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5010篇
  免费   177篇
  国内免费   9篇
电工技术   49篇
综合类   1篇
化学工业   914篇
金属工艺   95篇
机械仪表   86篇
建筑科学   296篇
矿业工程   18篇
能源动力   131篇
轻工业   458篇
水利工程   43篇
石油天然气   38篇
武器工业   1篇
无线电   274篇
一般工业技术   856篇
冶金工业   992篇
原子能技术   19篇
自动化技术   925篇
  2023年   29篇
  2022年   27篇
  2021年   80篇
  2020年   73篇
  2019年   63篇
  2018年   92篇
  2017年   72篇
  2016年   123篇
  2015年   88篇
  2014年   161篇
  2013年   348篇
  2012年   246篇
  2011年   323篇
  2010年   224篇
  2009年   191篇
  2008年   255篇
  2007年   231篇
  2006年   189篇
  2005年   191篇
  2004年   138篇
  2003年   129篇
  2002年   132篇
  2001年   79篇
  2000年   70篇
  1999年   79篇
  1998年   99篇
  1997年   109篇
  1996年   73篇
  1995年   73篇
  1994年   54篇
  1993年   68篇
  1992年   76篇
  1991年   44篇
  1990年   49篇
  1989年   53篇
  1988年   49篇
  1987年   48篇
  1986年   56篇
  1985年   70篇
  1984年   57篇
  1983年   68篇
  1982年   48篇
  1981年   37篇
  1980年   45篇
  1979年   61篇
  1978年   46篇
  1977年   46篇
  1976年   37篇
  1975年   37篇
  1973年   25篇
排序方式: 共有5196条查询结果,搜索用时 15 毫秒
151.
It was clearly bad news for Cisco itself when a portion of its IOS software surfaced for a few days in May on a Russian website. But it was difficult to obtain a consensus within the security industry over the potential threat posed by the breach to the Internet as a whole or to the countless private IP networks. Given that IOS drives most of the world's routers that direct traffic both through the Internet and private networks, theft of some of its source code clearly gives hackers the potential to exploit vulnerabilities that would be hard to identify otherwise. Naturally the Open Source community pounced on the issue, as they did earlier in the year when some Microsoft Windows source code was stolen, with the argument that any system relying on secrecy for security is fundamentally flawed and by definition insecure. Kerckhoff's law that “a system should be designed to be secure if everything is known about it except the key information” was trotted out as an argument that closed source software such as IOS and Windows would soon be extinct, ushering in the golden age of open source.  相似文献   
152.
153.
Obtaining quantitative information about molecular assemblies with high spatial and temporal resolution is a challenging task in fluorescence microscopy. Single‐molecule techniques build on the ability to count molecules one by one. Here, a method is presented that extends recent approaches to analyze the statistics of coincidently emitted photons to enable reliable counting of molecules in the range of 1–20. This method does not require photochemistry such as blinking or bleaching. DNA origami structures are labeled with up to 36 dye molecules as a new evaluation tool to characterize this counting by a photon statistics approach. Labeled DNA origami has a well‐defined labeling stoichiometry and ensures equal brightness for all dyes incorporated. Bias and precision of the estimating algorithm are determined, along with the minimal acquisition time required for robust estimation. Complexes containing up to 18 molecules can be investigated non‐invasively within 150 ms. The method might become a quantifying add‐on for confocal microscopes and could be especially powerful in combination with STED/RESOLFT‐type microscopy.  相似文献   
154.
Computers are transforming the workplace as users discover Innovative ways to put their power to work. To effectively manage their employees, managers must understand —and exploit — all facets of the user Interface.  相似文献   
155.
This paper uses two large databases, one of given names and one of family names, to categorise the names of researchers from Italy, Sweden, the UK and the USA whose papers in astronomy and oncology were published in 2006–2007 and in 2011–2012 by sex (gender) and ethnicity or national origin. For all the countries, there were relatively many more females publishing papers in oncology than in astronomy, but their share of contributions was lower than the percentage of researchers. Sweden and the UK had much higher percentages of both other European and Rest of the World researchers than Italy did. US researchers with non-European names were categorised in six main country groups. The ones with the greatest presence were Chinese (mainly Mandarin) and South Asians (mainly Indians). The method could be adapted to investigate the progress of women in research in many other countries, and the role played by non-national researchers in their scientific output.  相似文献   
156.
157.
158.
Some of the systems used in natural language generation (NLG), a branch of applied computational linguistics, have the capacity to create or assemble somewhat original messages adapted to new contexts. In this paper, taking Bernard Williams’ account of assertion by machines as a starting point, I argue that NLG systems meet the criteria for being speech actants to a substantial degree. They are capable of authoring original messages, and can even simulate illocutionary force and speaker meaning. Background intelligence embedded in their datasets enhances these speech capacities. Although there is an open question about who is ultimately responsible for their speech, if anybody, we can settle this question by using the notion of proxy speech, in which responsibility for artificial speech acts is assigned legally or conventionally to an entity separate from the speech actant.  相似文献   
159.
Foodborne illness caused by Salmonella spp. is a worldwide problem. In the United States Salmonella Enteritidis is the second most commonly isolated serotype from human illness, and is known to be strongly associated with shell eggs and egg containing products. Eggs can become contaminated internally either by penetration through the shell or directly during formation in the reproductive tract. This review begins with a brief account of the physiology of egg production and the various physical and chemical barriers the egg possesses to prevent bacterial contamination. Factors involved in vertical and horizontal transmission of S. Enteritidis are examined, as well as the role of forced molt in colonization of the hen. Pre- and post-harvest mitigation strategies are also discussed.  相似文献   
160.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号