首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   720760篇
  免费   19162篇
  国内免费   7809篇
电工技术   18793篇
技术理论   9篇
综合类   9183篇
化学工业   110178篇
金属工艺   29772篇
机械仪表   25937篇
建筑科学   24909篇
矿业工程   5923篇
能源动力   18483篇
轻工业   64142篇
水利工程   8088篇
石油天然气   14635篇
武器工业   1070篇
无线电   87257篇
一般工业技术   130625篇
冶金工业   114995篇
原子能技术   13806篇
自动化技术   69926篇
  2022年   6782篇
  2021年   10013篇
  2020年   7355篇
  2019年   7567篇
  2018年   10810篇
  2017年   11362篇
  2016年   11271篇
  2015年   10316篇
  2014年   15139篇
  2013年   34651篇
  2012年   23178篇
  2011年   29602篇
  2010年   23795篇
  2009年   25818篇
  2008年   26602篇
  2007年   26412篇
  2006年   23678篇
  2005年   21576篇
  2004年   19595篇
  2003年   19265篇
  2002年   18649篇
  2001年   18494篇
  2000年   16979篇
  1999年   17292篇
  1998年   35089篇
  1997年   25685篇
  1996年   20527篇
  1995年   16003篇
  1994年   14283篇
  1993年   13544篇
  1992年   10519篇
  1991年   9975篇
  1990年   9505篇
  1989年   9154篇
  1988年   8721篇
  1987年   7496篇
  1986年   7289篇
  1985年   8615篇
  1984年   8104篇
  1983年   7227篇
  1982年   6658篇
  1981年   6778篇
  1980年   6329篇
  1979年   6387篇
  1978年   6153篇
  1977年   7107篇
  1976年   9379篇
  1975年   5229篇
  1974年   5080篇
  1973年   4986篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
951.
This paper describes the elastic response of a block sample of compressible Chicago glacial clay under a variety of stresses and its relationship with the deformation characteristics at relatively large strains. The elastic shear stiffness was obtained from bender element tests during consolidation and shearing in drained triaxial stress probe tests. An empirical correlation was established based on the elastic shear stiffness in a preyield condition. By comparing the empirical correlation with the measured elastic shear stiffness in the stress region during probing, the changes of elastic shear stiffness were investigated. The departure of elastic shear stiffness from values computed by the empirical relation based on K0 loading directly relates to the yielding characteristics of the clay. The large-scale change of soil structure at yielding alters the well-established relationship between the elastic shear stiffness and stresses in the preyield condition. The mechanical yielding response of clays can be detected based on the systematic analysis of the elastic shear wave velocities.  相似文献   
952.
The current methods of connecting the flanges of precast double tee members, and their respective short comings in specific situations, are described. A new carbon fiber-reinforced polymer (CFRP) flange-to-flange connection is proposed to eliminate the problems associated with repair requirements for the current connections. Design expressions for the currently used mechanical anchorage and the proposed CFRP connection are presented. A comparative calculation for the two systems is given.  相似文献   
953.
This paper describes a module that was introduced into a civil engineering degree program with the help of professional engineers. The aim was to develop a bridge between the world of learning and professional practice by putting students in the role of consulting engineers working with industry to produce a feasible solution to a real inquiry from a client. The module is placed in context by comparing the goals of accredited civil engineering programs in the United Kingdom and America, by describing how it is linked to the degree program and by explaining the matrix developed to identify the skills the students needed to demonstrate their ability to practice as professional engineers. Details of the module are given with examples of student work and feedback.  相似文献   
954.
In this work, simple modifications on the cost index of particular local-model fuzzy clustering algorithms are proposed in order to improve the readability of the resulting models. The final goal is simultaneously providing local linear models (reasonably close to the plant’s Jacobian) and clustering in the input space so that desirable characteristics (regarding final model accuracy, and convexity and smoothness of the cluster membership functions) are improved with respect to other proposals in literature. Some examples illustrate the proposed approach.  相似文献   
955.
In this article, we describe a knowledge-based controlled platform using program supervision techniques. This platform eases the creation and the configuration of video surveillance systems. Several issues need to be addressed to provide a correct system configuration: (1) to choose, among a library of programs, those which are best satisfying a given user request, (2) to assign a correct value for each program parameter, (3) to evaluate performances and to guarantee a performance rate which is satisfactory regarding end-user requirements. This platform is composed of three main components: the library of programs, the knowledge base and the control component. The knowledge is either given by experts or learnt by the system. The control is generic in the sense that it is independent of any application. To validate this platform, we have built and evaluated six video surveillance systems which are featured with three properties: adaptability, reliability and real-time processing.  相似文献   
956.
Networkable Windows-based operating system devices present information security challenges to both vendors and users of such devices. This article highlights some of those threats and offers measures to improve the link between a firm's business strategy, its operational activities, and its information security strategy.  相似文献   
957.
The entire IT security industry is an accident: an artifact of how the computer industry developed. Computers are hard to use, and you need an IT department staffed with experts to make it work. IT security is critical, but there's no earthly reason why users need to know what an intrusion detection system with stateful protocol analysis is, or why it's helpful in spotting SQL injection attacks. As IT fades into the background and becomes just another utility, users will simply expect it to work. The details of how it works won't matter.  相似文献   
958.
959.
Pervasive computing is as much about the user as it is about the technology. So, the Fifth International Conference on Pervasive Computing emphasized desirability rather than just feasibility. Featured themes included user benefits, human-computer interaction, group and social interactions, context awareness, finding and positioning people and objects, and personal privacy.  相似文献   
960.
Unicode is rapidly becoming the preferred means for representing symbols used in creating multimedia content, especially for information that's presented in multiple languages. This article discusses a unicode vulnerability that makes such content susceptible to being used for creation of covert channel communications. We also developed a solution architecture, the unified secure message augmentation (USMA) service. The USMA service incorporates rules (in an XML vocabulary) that we can apply to unicode transmissions that will detect an attempt to transmit a potential exploit, alert network managers to the presence of the unicode anomaly, and take action to mitigate the exploit.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号