全文获取类型
收费全文 | 26370篇 |
免费 | 1583篇 |
国内免费 | 561篇 |
专业分类
电工技术 | 808篇 |
综合类 | 707篇 |
化学工业 | 4824篇 |
金属工艺 | 924篇 |
机械仪表 | 1048篇 |
建筑科学 | 1770篇 |
矿业工程 | 383篇 |
能源动力 | 762篇 |
轻工业 | 1791篇 |
水利工程 | 339篇 |
石油天然气 | 910篇 |
武器工业 | 73篇 |
无线电 | 2719篇 |
一般工业技术 | 4103篇 |
冶金工业 | 3240篇 |
原子能技术 | 147篇 |
自动化技术 | 3966篇 |
出版年
2024年 | 48篇 |
2023年 | 299篇 |
2022年 | 498篇 |
2021年 | 750篇 |
2020年 | 510篇 |
2019年 | 495篇 |
2018年 | 606篇 |
2017年 | 602篇 |
2016年 | 691篇 |
2015年 | 743篇 |
2014年 | 1063篇 |
2013年 | 1644篇 |
2012年 | 1451篇 |
2011年 | 1840篇 |
2010年 | 1469篇 |
2009年 | 1358篇 |
2008年 | 1521篇 |
2007年 | 1442篇 |
2006年 | 1363篇 |
2005年 | 1253篇 |
2004年 | 931篇 |
2003年 | 759篇 |
2002年 | 770篇 |
2001年 | 563篇 |
2000年 | 551篇 |
1999年 | 632篇 |
1998年 | 601篇 |
1997年 | 489篇 |
1996年 | 441篇 |
1995年 | 415篇 |
1994年 | 364篇 |
1993年 | 312篇 |
1992年 | 261篇 |
1991年 | 146篇 |
1990年 | 196篇 |
1989年 | 159篇 |
1988年 | 140篇 |
1987年 | 125篇 |
1986年 | 107篇 |
1985年 | 144篇 |
1984年 | 142篇 |
1983年 | 89篇 |
1982年 | 83篇 |
1981年 | 72篇 |
1980年 | 53篇 |
1979年 | 58篇 |
1978年 | 43篇 |
1977年 | 31篇 |
1976年 | 40篇 |
1974年 | 27篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
Xiaofeng Liao Xueming Li Jun Pen Guanrong Chen 《International Journal of Communication Systems》2004,17(5):437-445
In this paper, a simple image secure communication scheme based on the chaotic Chebyshev map and chaos synchronization is proposed. The scheme relies on the excellent correlation property of chaotic sequences, which is very desirable for secure image communication. The results obtained by computer simulation indicate that the transmitted source image can be correctly and reliably recovered using the proposed scheme, even through a noisy channel. Notably, the scheme possesses relatively high security and can be easily implemented. Moreover, the quality of the recovered image is satisfactory, quantified by such common criteria as the bit‐error rate performance. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
102.
103.
Choosing a standard speed for visual inspection is difficult using standard work measurement techniques. This paper uses a different approach, taking a model of human functioning in inspection and deriving an optimum speed of working so as to balance the cost of time against the cost of errors. Random search is used as the model and both self-paced and externally-paced conditions are derived for multiple fault types. Optimization using a Golden Section search is used to provide optimum inspection speed. 相似文献
104.
The primary visual sources of depth and size information are binocular cues and motion parallax. Here, the authors determine the efficacy of these cues to control prehension by presenting them in isolation from other visual cues. When only binocular cues were available, reaches showed normal scaling of the transport and grasp components with object distance and size. However, when only motion parallax was available, only the transpont component scaled reliably. No additional increase in scaling was found when both cues were available simultaneously. Therefore, although equivalent information is available from binocular and motion parallax information, the latter may be of relatively limited use for the control of the grasp. Binocular disparity appears selectively important for the control of the grasp. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
105.
106.
107.
Erp Implementation Failure: A Case Study 总被引:5,自引:0,他引:5
While it is true that successful implementation of an enterprise resource planning (ERP) system is a task of Herculean proportions, it is not impossible. If your organization is to reap the benefits of ERP, it must first develop a plan for success. But “prepare to see your organization reengineered, your staff disrupted, and your productivity drop before the payoff is realized.” Implementing ERP must be viewed and undertaken as a new business endeavor and a team mission, not just a software installation. Companies must involve all employees, and unconditionally and completely sell them on the concept of ERP for it to be a success. A successful implementation means involving, supervising, recognizing, and retaining those who have worked or will work closely with the system. Without a team attitude and total backing by everyone involved, an ERP implementation will end in less than an ideal situation. This was the situation for a soft drink bottler that tried to cut corners and did not recognize the importance of the people so heavily involved and depended on. 相似文献
108.
Myers Mark G.; MacPherson Laura; McCarthy Denis M.; Brown Sandra A. 《Canadian Metallurgical Quarterly》2003,15(2):163
The goal of the present studies was to construct and validate a short form of the 50-item Smoking Consequences Questionnaire (SCQ; T. H. Brandon & T. B. Baker, 1991), a measure of smoking outcome expectancies. In Study 1, a 21-item short form (S-SCQ) was derived from a sample of 107 young adults previously treated for substance abuse. In Study 2, the measure was cross-validated on 125 adolescents in treatment for substance abuse. Confirmatory factor analyses revealed good model fit and factorial invariance for the 4 S-SCQ subscales across both samples. Validation analyses on each sample found that subscale scores generally correlated significantly with smoking-related variables. The present studies provide initial evidence for the utility of the S-SCQ when used with young adults and adolescents. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
109.
A wireless LAN service integration architecture based on current wireless LAN hot spots is proposed so that migration to a new service becomes easier and cost effective. The proposed architecture offers wireless LAN seamless roaming in wireless LAN/cellular mobile networks. In addition, a link-layer-assisted mobile IP handoff mechanism is introduced to improve the network/domain switching quality in terms of handoff delay and packet loss. An application layer end-to-end authentication and key negotiation scheme is proposed to overcome the open-air connection problem existing in wireless LAN deployment. The scheme provides a general solution for Internet applications running on a mobile station under various authentication scenarios and keeps the communications private to other wireless LAN users and foreign network. A functional demonstration of the scheme is given. The research results can contribute to rapid deployment of wireless LANs. 相似文献
110.