全文获取类型
收费全文 | 1939篇 |
免费 | 36篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 12篇 |
综合类 | 1篇 |
化学工业 | 243篇 |
金属工艺 | 22篇 |
机械仪表 | 43篇 |
建筑科学 | 90篇 |
矿业工程 | 6篇 |
能源动力 | 55篇 |
轻工业 | 193篇 |
水利工程 | 14篇 |
石油天然气 | 4篇 |
无线电 | 209篇 |
一般工业技术 | 265篇 |
冶金工业 | 625篇 |
原子能技术 | 26篇 |
自动化技术 | 173篇 |
出版年
2023年 | 15篇 |
2022年 | 19篇 |
2021年 | 26篇 |
2020年 | 25篇 |
2019年 | 28篇 |
2018年 | 21篇 |
2017年 | 22篇 |
2016年 | 34篇 |
2015年 | 16篇 |
2014年 | 35篇 |
2013年 | 74篇 |
2012年 | 53篇 |
2011年 | 78篇 |
2010年 | 54篇 |
2009年 | 36篇 |
2008年 | 55篇 |
2007年 | 69篇 |
2006年 | 62篇 |
2005年 | 51篇 |
2004年 | 42篇 |
2003年 | 47篇 |
2002年 | 48篇 |
2001年 | 46篇 |
2000年 | 36篇 |
1999年 | 47篇 |
1998年 | 155篇 |
1997年 | 119篇 |
1996年 | 72篇 |
1995年 | 42篇 |
1994年 | 43篇 |
1993年 | 30篇 |
1992年 | 22篇 |
1991年 | 20篇 |
1990年 | 20篇 |
1989年 | 17篇 |
1988年 | 20篇 |
1987年 | 15篇 |
1986年 | 22篇 |
1985年 | 24篇 |
1984年 | 27篇 |
1983年 | 13篇 |
1982年 | 19篇 |
1981年 | 18篇 |
1980年 | 25篇 |
1979年 | 15篇 |
1978年 | 13篇 |
1977年 | 33篇 |
1976年 | 42篇 |
1975年 | 14篇 |
1974年 | 18篇 |
排序方式: 共有1981条查询结果,搜索用时 15 毫秒
31.
32.
33.
Justin Trumpickas Amanda Smith Melissa M. Robillard Jake K.L. La Rose 《Journal of Great Lakes research》2012
Nearshore small fish species represent a large proportion of fish biodiversity in Lake Simcoe, a large inland lake in southern Ontario, Canada. Over the past 30 years, Lake Simcoe has experienced several changes to its aquatic habitat, benthic invertebrate communities and predatory fish populations. This study compared samples of the nearshore small fish community in three geographic areas of Lake Simcoe. Fish community data were grouped into two time periods: a contemporary period (2007–2009) and a historical period (1982–1995). The fish community was compared across time periods for each area to assess if observed ecological changes had an impact on the small fish community. Species richness significantly declined between time periods in two areas (Cook's Bay and the southeast shoreline), the number of individuals captured declined between time periods in one area of the lake (Kempenfelt Bay) and Simpson's diversity index declined between time periods in one area of the lake (southeast shoreline). There were no significant differences in the Shannon–Weiner evenness index between time periods in any of the study areas. Additional analyses of intra- and inter-annual variation in fish sampling results generally supported the findings that shifts in the fish community occurred between time periods. Overall, this study suggests that the nearshore small fish biodiversity of Lake Simcoe has shifted over time but these shifts are not clearly related to recent increases in water clarity, macrophyte growth and nearshore benthic invertebrate densities. 相似文献
34.
With podcasting gaining more mainstream adoption in higher education, it’s critical to examine its effectiveness in improving the student learning experience. To this end, this paper examines the effectiveness of podcasts integrated into the curriculum (PIC) versus podcasts as supplemental material (PSM). Considering recent empirical work on the effectiveness of podcasting, this study collected data from students enrolled in lower level and upper level language courses. Results revealed an inconclusive relationship among PIC students’ learning outcomes (as measured by their final grades). In contrast, however, our findings indicate a strong relationship between the use of PSM and students’ final grades, particularly in upper level courses. 相似文献
35.
Xiang Zhao Joseph L Rose Huidong Gao 《IEEE transactions on ultrasonics, ferroelectrics, and frequency control》2006,53(2):360-369
Laser-induced ultrasonic bulk wave tomography is used for density variation determination of powder metal compacts. A laser beam is used to excite ultrasonic energy, and the signals passing through the specimen are received by an air-coupled transducer. The density variations of powder metal compacts can be determined directly by the cross-sectional tomographic images of slowness obtained by using a filtered, backprojection algorithm based on measured time of flights. Interpolations with respect to sample and projection angles are used to generate the input data required for displaying a well-balanced, reconstructed image to reduce the aliasing distortions caused by insufficient input data. Results of presintered cylindrical ferrous powdered samples show that this novel approach makes the reconstruction process more cost effective than the very tedious, time-consuming, and inaccurate metallographic methods, thus making it a potentially powerful tool for studying manufacturing processes through significant parameters to obtain a more uniform density distribution. 相似文献
36.
Goldsmith Rachel E.; Barlow M. Rose; Freyd Jennifer J. 《Canadian Metallurgical Quarterly》2004,41(4):448
Levels of awareness for trauma and their consequences for research, treatment, and prevention within professional psychology and society are considered. When people must endure chronically traumatic environments, it may be adaptive to isolate from awareness information that would produce cognitive dissonance and threaten necessary relationships. Unawareness may also facilitate functioning in environments that invalidate the prevalence and impact of trauma. In addition, characteristics of the posttraumatic environment can promote or impede individuals' awareness of trauma and their psychological functioning. Though often initially adaptive, unawareness for trauma is linked to intergenerational transmission of trauma and its effects and may preclude public and professional attention to trauma treatment and prevention. Understanding the processes through which individuals become unaware or aware of traumatic experience is therefore essential to conducting effective psychotherapy with trauma survivors. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
37.
Rose Nathan S.; Rendell Peter G.; McDaniel Mark A.; Aberle Ingo; Kliegel Matthias 《Canadian Metallurgical Quarterly》2010,25(3):595
Young (ages 18–22 years) and older (ages 61–87 years) adults (N = 106) played the Virtual Week board game, which involves simulating common prospective memory (PM) tasks of everyday life (e.g., taking medication), and performed working memory (WM) and vigilance tasks. The Virtual Week game includes regular (repeated) and irregular (nonrepeated) PM tasks with cues that are either more or less focal to other ongoing activities. Age differences in PM were reduced for repeated tasks, and performance improved over the course of the week, suggesting retrieval was more spontaneous or habitual. Correlations with WM within each age group were reduced for PM tasks that had more regular or focal cues. WM (but not vigilance) ability was a strong predictor of irregular PM tasks with less focal cues. Taken together, these results support the hypothesis that habitual and focally cued PM tasks are less demanding of attentional resources (specifically, WM), whereas tasks that are more demanding of controlled attentional processes produce larger age differences, which may be attributable to individual differences in WM. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
38.
Eva Rose 《Journal of Automated Reasoning》2003,31(3-4):303-334
In this paper, we provide a theoretical foundation for and improvements to the existing bytecode verification technology, a critical component of the Java security model, for mobile code used with the Java “micro edition” (J2ME), which is intended for embedded computing devices. In Java, remotely loaded “bytecode” class files are required to be bytecode verified before execution, that is, to undergo a static type analysis that protects the platform's Java run-time system from so-called type confusion attacks such as pointer manipulation. The data flow analysis that performs the verification, however, is beyond the capacity of most embedded devices because of the memory requirements that the typical algorithm will need. We propose to take a proof-carrying code approach to data flow analysis in defining an alternative technique called “lightweight analysis” that uses the notion of a “certificate” to reanalyze a previously analyzed data flow problem, even on poorly resourced platforms. We formally prove that the technique provides the same guarantees as standard bytecode safety verification analysis, in particular that it is “tamper proof” in the sense that the guarantees provided by the analysis cannot be broken by crafting a “false” certificate or by altering the analyzed code. We show how the Java bytecode verifier fits into this framework for an important subset of the Java Virtual Machine; we also show how the resulting “lightweight bytecode verification” technique generalizes and simulates the J2ME verifier (to be expected as Sun's J2ME “K-Virtual machine” verifier was directly based on an early version of this work), as well as Leroy's “on-card bytecode verifier,” which is specifically targeted for Java Cards. 相似文献
39.
The magic of computer graphics as seen in many current movies and computer games comes at a cost. Creating the geometric forms with which to generate synthetic characters and animating the characters to bring them to life require either highly skilled artists and/or sophisticated capture devices. Both are expensive and, in the case of highly skilled artists, rare. 相似文献
40.