首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   682031篇
  免费   8951篇
  国内免费   2182篇
电工技术   12382篇
综合类   558篇
化学工业   102744篇
金属工艺   25508篇
机械仪表   19554篇
建筑科学   18355篇
矿业工程   2802篇
能源动力   17992篇
轻工业   64402篇
水利工程   6285篇
石油天然气   8100篇
武器工业   22篇
无线电   82833篇
一般工业技术   127914篇
冶金工业   130333篇
原子能技术   12467篇
自动化技术   60913篇
  2021年   4858篇
  2019年   4507篇
  2018年   7308篇
  2017年   7487篇
  2016年   7981篇
  2015年   5909篇
  2014年   9811篇
  2013年   31223篇
  2012年   16771篇
  2011年   23772篇
  2010年   18689篇
  2009年   21374篇
  2008年   22213篇
  2007年   22574篇
  2006年   19798篇
  2005年   18442篇
  2004年   17871篇
  2003年   17419篇
  2002年   16720篇
  2001年   16773篇
  2000年   15812篇
  1999年   16674篇
  1998年   39866篇
  1997年   28737篇
  1996年   22519篇
  1995年   17203篇
  1994年   15332篇
  1993年   14882篇
  1992年   11099篇
  1991年   10652篇
  1990年   10154篇
  1989年   9982篇
  1988年   9534篇
  1987年   8254篇
  1986年   8087篇
  1985年   9671篇
  1984年   8990篇
  1983年   8113篇
  1982年   7467篇
  1981年   7578篇
  1980年   7079篇
  1979年   7021篇
  1978年   6752篇
  1977年   8006篇
  1976年   10813篇
  1975年   5794篇
  1974年   5589篇
  1973年   5535篇
  1972年   4535篇
  1971年   4123篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
981.
This paper describes the elastic response of a block sample of compressible Chicago glacial clay under a variety of stresses and its relationship with the deformation characteristics at relatively large strains. The elastic shear stiffness was obtained from bender element tests during consolidation and shearing in drained triaxial stress probe tests. An empirical correlation was established based on the elastic shear stiffness in a preyield condition. By comparing the empirical correlation with the measured elastic shear stiffness in the stress region during probing, the changes of elastic shear stiffness were investigated. The departure of elastic shear stiffness from values computed by the empirical relation based on K0 loading directly relates to the yielding characteristics of the clay. The large-scale change of soil structure at yielding alters the well-established relationship between the elastic shear stiffness and stresses in the preyield condition. The mechanical yielding response of clays can be detected based on the systematic analysis of the elastic shear wave velocities.  相似文献   
982.
The current methods of connecting the flanges of precast double tee members, and their respective short comings in specific situations, are described. A new carbon fiber-reinforced polymer (CFRP) flange-to-flange connection is proposed to eliminate the problems associated with repair requirements for the current connections. Design expressions for the currently used mechanical anchorage and the proposed CFRP connection are presented. A comparative calculation for the two systems is given.  相似文献   
983.
This paper describes a module that was introduced into a civil engineering degree program with the help of professional engineers. The aim was to develop a bridge between the world of learning and professional practice by putting students in the role of consulting engineers working with industry to produce a feasible solution to a real inquiry from a client. The module is placed in context by comparing the goals of accredited civil engineering programs in the United Kingdom and America, by describing how it is linked to the degree program and by explaining the matrix developed to identify the skills the students needed to demonstrate their ability to practice as professional engineers. Details of the module are given with examples of student work and feedback.  相似文献   
984.
985.
We show new upper bounds for problems in the W-hierarchy of fixed-parameter complexity. A crucial ingredient of our proofs is an extension to the W-RAM model, which permits more-powerful operations but remains equivalent to the original. We use the extended model to give new upper bounds for Subsetsum, Maximum Irredundant Set, and various problems concerning intersection of finite-state machines.  相似文献   
986.
In this work, simple modifications on the cost index of particular local-model fuzzy clustering algorithms are proposed in order to improve the readability of the resulting models. The final goal is simultaneously providing local linear models (reasonably close to the plant’s Jacobian) and clustering in the input space so that desirable characteristics (regarding final model accuracy, and convexity and smoothness of the cluster membership functions) are improved with respect to other proposals in literature. Some examples illustrate the proposed approach.  相似文献   
987.
In this article, we describe a knowledge-based controlled platform using program supervision techniques. This platform eases the creation and the configuration of video surveillance systems. Several issues need to be addressed to provide a correct system configuration: (1) to choose, among a library of programs, those which are best satisfying a given user request, (2) to assign a correct value for each program parameter, (3) to evaluate performances and to guarantee a performance rate which is satisfactory regarding end-user requirements. This platform is composed of three main components: the library of programs, the knowledge base and the control component. The knowledge is either given by experts or learnt by the system. The control is generic in the sense that it is independent of any application. To validate this platform, we have built and evaluated six video surveillance systems which are featured with three properties: adaptability, reliability and real-time processing.  相似文献   
988.
Networkable Windows-based operating system devices present information security challenges to both vendors and users of such devices. This article highlights some of those threats and offers measures to improve the link between a firm's business strategy, its operational activities, and its information security strategy.  相似文献   
989.
The entire IT security industry is an accident: an artifact of how the computer industry developed. Computers are hard to use, and you need an IT department staffed with experts to make it work. IT security is critical, but there's no earthly reason why users need to know what an intrusion detection system with stateful protocol analysis is, or why it's helpful in spotting SQL injection attacks. As IT fades into the background and becomes just another utility, users will simply expect it to work. The details of how it works won't matter.  相似文献   
990.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号