首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   31836篇
  免费   3306篇
  国内免费   1650篇
电工技术   2026篇
技术理论   1篇
综合类   1801篇
化学工业   3232篇
金属工艺   1741篇
机械仪表   1394篇
建筑科学   1959篇
矿业工程   537篇
能源动力   694篇
轻工业   1907篇
水利工程   569篇
石油天然气   1066篇
武器工业   267篇
无线电   3209篇
一般工业技术   3080篇
冶金工业   840篇
原子能技术   397篇
自动化技术   12072篇
  2025年   10篇
  2024年   525篇
  2023年   625篇
  2022年   989篇
  2021年   1181篇
  2020年   961篇
  2019年   791篇
  2018年   814篇
  2017年   849篇
  2016年   824篇
  2015年   1023篇
  2014年   1401篇
  2013年   1595篇
  2012年   2301篇
  2011年   4643篇
  2010年   2543篇
  2009年   2278篇
  2008年   1901篇
  2007年   1732篇
  2006年   1597篇
  2005年   1452篇
  2004年   1160篇
  2003年   1231篇
  2002年   1062篇
  2001年   717篇
  2000年   436篇
  1999年   444篇
  1998年   367篇
  1997年   254篇
  1996年   206篇
  1995年   163篇
  1994年   124篇
  1993年   129篇
  1992年   116篇
  1991年   63篇
  1990年   56篇
  1989年   43篇
  1988年   32篇
  1987年   29篇
  1986年   25篇
  1985年   17篇
  1984年   33篇
  1983年   21篇
  1982年   10篇
  1981年   7篇
  1980年   4篇
  1979年   1篇
  1965年   1篇
  1959年   4篇
  1951年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
彭曦  叶斌 《中国水利》2010,(3):46-47
湖北省鄂州市农村饮水安全工程建设模式是:充分利用现有供水工程水源稳定可靠、供水能力尚有较大潜力的优势,通过改造现有水厂各项配套设施,主要采取管网延伸解决农村饮水安全问题,逐步实现农村用水城市化、城乡供水一体化。这一建设模式具有良好的社会、经济、生态效益,目前已在湖北省相关县市试行推广。  相似文献   
992.
This paper presents a novel concept for power quality hardware and software architecture. Software tools related to detection, classification and characterization of power quality events can be integrated into a Distribution Control Center in which the interconnection between different subsystems is being carried out through the Internet allowing flexibility to the system. This system is implemented using wavelet analysis applied in all proposed algorithms. Different power quality events are taken as examples to illustrate the capabilities of the proposed method. The obtained results reveal that the proposed architecture is feasible to be implemented as an integral part of a control center system.The proposed system has the property of fast and accurate detection and classification of any power quality disturbance event and introduces a new PQ index determination that allows characterizing any type of disturbance including the non-periodic signals.  相似文献   
993.
994.
This paper presents a novel data hiding scheme for VQ compression images. This scheme first uses SMVQ prediction to classify encoding blocks into different types, then uses different codebooks and encoding strategies to perform encoding and data hiding simultaneously. In using SMVQ prediction, no extra data is required to identify the combination of encoding strategies and codebook, which helps improve compression performance. Furthermore, the proposed scheme adaptively combines VQ and SMVQ encoding characteristics to provide higher image quality of stego-images while size of the hidden payload remains the same. Experimental results show that the proposed scheme indeed outperforms other previously proposed schemes in image quality of the stego-images and compression performance.  相似文献   
995.
A pattern language for designing e-business architecture   总被引:1,自引:0,他引:1  
The pattern language for e-business provides a holistic support for developing software architectures for the e-business domain. The pattern language contains four related pattern categories: Business Patterns, Integration Patterns, Application Patterns, and Runtime Patterns. These pattern categories organise an e-business architecture into three layers—business interaction, application infrastructure and middleware infrastructure—and provide reusable design solutions to these layers in a top-down decomposition fashion. Business and Integration Patterns partition the business interaction layer into a set of subsystems; Application Patterns provide a high-level application infrastructure for these subsystems and separate business abstractions from their software solutions; Runtime Patterns then define a middleware infrastructure for the subsystems and shield design solutions from their implementations. The paper describes, demonstrates and evaluates this pattern language.  相似文献   
996.
Software engineering article types: An analysis of the literature   总被引:1,自引:0,他引:1  
The software engineering (SE) community has recently recognized that the field lacks well-established research paradigms and clear guidance on how to write good research reports. With no comprehensive guide to the different article types in the field, article writing and reviewing heavily depends on the expertise and the understanding of the individual SE actors.In this work, we classify and describe the article types published in SE with an emphasis on what is required for publication in journals and conference proceedings. Theoretically, we consider article types as genres, because we assume that each type of article has a specific function and a particular communicative purpose within the community, which the members of the community can recognize. We draw on written sources available, i.e. the instructions to authors/reviewers of major SE journals, the calls for papers of major SE conferences, and previous research published on the topic.Despite the fragmentation and limitations of the sources studied, we are able to propose a classification of different SE article types. Such classification helps in guiding the reader through the SE literature, and in making the researcher reflect on directions for improvements.  相似文献   
997.
Starting from mid 1980s, there has been a debate about what data model is most appropriate for temporal databases. A fundamental choice one has to make is whether to use intervals of time or temporal elements to timestamp objects and events with the periods of validity. The advantage of using interval timestamps is that Start and End columns can be added to relations for treating them within the framework of classical databases, leading to quick implementation. Temporal elements are finite unions of intervals. The advantage of temporal elements is that timestamps become implicitly associated with values, tuples, and relations. Furthermore, since temporal elements, by design, are closed under set theoretical operations such as union, intersection and complementation, they lead to query languages that are natural. Here, we investigate the ease of use as well as system performance for the two approaches to help settle the debate.  相似文献   
998.
DDO-64 is a 64-bit Feistel-like block cipher based on data-dependent operations (DDOs). It is composed of 8 rounds and uses a 128-bit key. There are two versions of DDO-64, named DDO-64V1 and DDO-64V2, according to the key schedule. They were designed under an attempt for improving the security and performance of DDP-based ciphers. In this paper, however, we show that like most of the existing DDP-based ciphers, DDO-64V1 and DDO-64V2 are also vulnerable to related-key attacks. The attack on DDO-64V1 requires 235.5 related-key chosen plaintexts and 263.5 encryptions while the attack on DDO-64V2 only needs 8 related-key chosen plaintexts and 231 encryptions; our attacks are both mainly due to their simple key schedules and structural weaknesses. These works are the first known cryptanalytic results on DDO-64V1 and DDO-64V2 so far.  相似文献   
999.
The mechanisms of project management of software development   总被引:1,自引:0,他引:1  
The changing environments of software development such as component-based, distributed and outsourced software development require matching changes by project managers to monitor, control and coordinate their projects. While the objectives of project management may be well established, the mechanisms with which those objectives are achieved are less well known. An empirical study was undertaken to investigate which mechanisms were used by practising project managers to monitor, control and coordinate software development projects.First, the types of mechanisms are discussed so that the mechanisms can be classified usefully. Then, the design of the empirical study is described. The data were collected through structured interview, which provided both quantitative and qualitative data. The data are analysed for each mechanism separately and the findings presented. The study found that project managers use multiple mechanisms to achieve project management objectives and use the same mechanism to serve multiple objectives. Further research is suggested to investigate project management from the opposite orientation, that is, which objectives are served by specific project management mechanisms.  相似文献   
1000.
E-learning technologies have developed greatly in recent years, with considerable success. However, there is increasing evidence that web-based learning is not reaching the social sectors which are more reluctant to contact with the new technologies, thus leading to inequalities in the access to education and knowledge in the Information Society. By hiding the intricacies of computers behind the familiarity of household equipment, Interactive Digital TV (IDTV) is considered to play a key role in addressing this problem, and the term t-learning has been recently coined to mean TV-based interactive learning.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号