全文获取类型
收费全文 | 3395篇 |
免费 | 86篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 30篇 |
化学工业 | 382篇 |
金属工艺 | 57篇 |
机械仪表 | 41篇 |
建筑科学 | 137篇 |
矿业工程 | 40篇 |
能源动力 | 83篇 |
轻工业 | 261篇 |
水利工程 | 30篇 |
石油天然气 | 37篇 |
武器工业 | 4篇 |
无线电 | 455篇 |
一般工业技术 | 439篇 |
冶金工业 | 859篇 |
原子能技术 | 30篇 |
自动化技术 | 598篇 |
出版年
2022年 | 14篇 |
2021年 | 37篇 |
2020年 | 25篇 |
2019年 | 37篇 |
2018年 | 47篇 |
2017年 | 50篇 |
2016年 | 65篇 |
2015年 | 51篇 |
2014年 | 77篇 |
2013年 | 179篇 |
2012年 | 99篇 |
2011年 | 173篇 |
2010年 | 122篇 |
2009年 | 109篇 |
2008年 | 150篇 |
2007年 | 138篇 |
2006年 | 133篇 |
2005年 | 110篇 |
2004年 | 94篇 |
2003年 | 99篇 |
2002年 | 75篇 |
2001年 | 60篇 |
2000年 | 52篇 |
1999年 | 77篇 |
1998年 | 191篇 |
1997年 | 136篇 |
1996年 | 154篇 |
1995年 | 78篇 |
1994年 | 76篇 |
1993年 | 78篇 |
1992年 | 49篇 |
1991年 | 28篇 |
1990年 | 49篇 |
1989年 | 43篇 |
1988年 | 37篇 |
1987年 | 34篇 |
1986年 | 28篇 |
1985年 | 38篇 |
1984年 | 41篇 |
1983年 | 29篇 |
1982年 | 22篇 |
1981年 | 22篇 |
1980年 | 26篇 |
1979年 | 21篇 |
1978年 | 24篇 |
1977年 | 30篇 |
1976年 | 49篇 |
1975年 | 17篇 |
1973年 | 22篇 |
1971年 | 14篇 |
排序方式: 共有3483条查询结果,搜索用时 31 毫秒
71.
Bingbing Nie Taewung Kim Yan Wang Varun Bollapragada Tom Daniel Jeff R. Crandall 《Multibody System Dynamics》2016,38(3):297-316
Dimensional scaling approaches are widely used to develop multi-body human models in injury biomechanics research. Given the limited experimental data for any particular anthropometry, a validated model can be scaled to different sizes to reflect the biological variance of population and used to characterize the human response. This paper compares two scaling approaches at the whole-body level: one is the conventional mass-based scaling approach which assumes geometric similarity; the other is the structure-based approach which assumes additional structural similarity by using idealized mechanical models to account for the specific anatomy and expected loading conditions. Given the use of exterior body dimensions and a uniform Young’s modulus, the two approaches showed close values of the scaling factors for most body regions, with 1.5 % difference on force scaling factors and 13.5 % difference on moment scaling factors, on average. One exception was on the thoracic modeling, with 19.3 % difference on the scaling factor of the deflection. Two 6-year-old child models were generated from a baseline adult model as application example and were evaluated using recent biomechanical data from cadaveric pediatric experiments. The scaled models predicted similar impact responses of the thorax and lower extremity, which were within the experimental corridors; and suggested further consideration of age-specific structural change of the pelvis. Towards improved scaling methods to develop biofidelic human models, this comparative analysis suggests further investigation on interior anatomical geometry and detailed biological material properties associated with the demographic range of the population. 相似文献
72.
Jeff Flynn 《Information Security Journal: A Global Perspective》2013,22(4):22-28
Abstract There is a level of sensitivity to almost all data, but what is most important — keeping sensitive data sensitive or guaranteeing the integrity of the data? When it comes to sensitivity or integrity, access control models have provided several options. Yet, wouldn't a combination of access control models provide a more desirable result than just settling for one? Is it possible to have a slice of data sensitivity with a dollop of data integrity? In finding the answer to this question it must be understood exactly what an access control model is and, in terms of sensitivity and integrity, which models provide the best security. 相似文献
73.
Paul Gray 《Information Systems Management》2013,30(4):356-359
Abstract The research in this paper considers the complex and dynamic arrangements for potential and actual knowledge sharing in interorganizational networks. The essence of this stance is that “knowledge” relates to affirmative managerial action beyond the necessary collection of information facilitated through technology. The issue is to determine the nature and extent of the degree of organizational agreement that may be achieved as competitors either cooperate or continue to compete in the face of challenging and pervasive market conditions. The theory relating to network formulation is reviewed, findings from empirical analyses from the experiences from automobile distributors in a large USA city, and one scientific collaborators network are presented. A framework is proposed identifying the factors necessary to initially construct the network and then to further sustain it over time. A number of lessons learned are developed, which are believed to be of value to researchers and practitioners engaged in these processes. 相似文献
74.
Peyman Afshani Pankaj K. Agarwal Lars Arge Kasper Green Larsen Jeff M. Phillips 《Theory of Computing Systems》2013,52(3):342-366
Given a set of points with uncertain locations, we consider the problem of computing the probability of each point lying on the skyline, that is, the probability that it is not dominated by any other input point. If each point’s uncertainty is described as a probability distribution over a discrete set of locations, we improve the best known exact solution. We also suggest why we believe our solution might be optimal. Next, we describe simple, near-linear time approximation algorithms for computing the probability of each point lying on the skyline. In addition, some of our methods can be adapted to construct data structures that can efficiently determine the probability of a query point lying on the skyline. 相似文献
75.
Susan S. Gray Barbara J. Loud Carole P. Sokolowski 《Canadian Journal of Science, Mathematics, & Technology Education》2013,13(2):59-72
Abstract The ability to use and interpret algebraic variables as generalized numbers and changing quantities is fundamental to the learning of calculus. This study considers the use of variables in these advanced ways as a component of algebraic thinking. College introductory calculus students' (n = 174) written responses to algebra problems requiring the use and interpretation of variables as changing quantities were examined for evidence of algebraic and arithmetic thinking. A framework was developed to describe and categorize examples of algebraic, transitional, and arithmetic thinking reflected in these students' uses of variables. The extent to which students' responses showed evidence of algebraic or arithmetic thinking was quantified and related to their course grades. Only one third of the responses of these entering calculus students were identified as representative of algebraic thinking. This study extends previous research by showing that evidence of algebraic thinking in students' work was positively related to successful performance in calculus. 相似文献
76.
77.
The engineering of distributed adaptive software is a complex task which requires a rigorous approach. Software architectural
(structural) concepts and principles are highly beneficial in specifying, designing, analysing, constructing and evolving
distributed software. A rigorous architectural approach dictates formalisms and techniques that are compositional, components
that are context independent and systems that can be constructed and evolved incrementally. This paper overviews some of the
underlying reasons for adopting an architectural approach, including a brief “rational history” of our research work, and
indicates how an architectural model can potentially facilitate the provision of self-managed adaptive software system.
Much of the research has been supported by the Engineering and Physical Sciences Research Council and is currently partly
supported by EPSRC Platform grant AEDUS 2 and a DTC grant. 相似文献
78.
Cheating is rampant in current gameplay on the Internet. However, it isn't as well understood as we might expect. The authors summarize the various known methods of cheating and define a taxonomy of online game cheating with respect to the underlying vulnerability, consequence, and cheating principal. This taxonomy provides a systematic introduction to the characteristics of cheats in online games and how they can arise. Although cheating in online games is largely due to various security failures, the four traditional aspects of security—confidentiality, integrity, availability, and authenticity—are insufficient to explain it. Instead, fairness becomes a vital additional aspect, and its enforcement provides a convincing perspective for understanding security techniques' role in developing and operating online games. 相似文献
79.
80.