全文获取类型
收费全文 | 13610篇 |
免费 | 1623篇 |
国内免费 | 682篇 |
专业分类
电工技术 | 1598篇 |
技术理论 | 5篇 |
综合类 | 1731篇 |
化学工业 | 683篇 |
金属工艺 | 83篇 |
机械仪表 | 238篇 |
建筑科学 | 2786篇 |
矿业工程 | 614篇 |
能源动力 | 442篇 |
轻工业 | 1403篇 |
水利工程 | 1243篇 |
石油天然气 | 551篇 |
武器工业 | 79篇 |
无线电 | 462篇 |
一般工业技术 | 1001篇 |
冶金工业 | 1039篇 |
原子能技术 | 139篇 |
自动化技术 | 1818篇 |
出版年
2024年 | 76篇 |
2023年 | 230篇 |
2022年 | 489篇 |
2021年 | 622篇 |
2020年 | 641篇 |
2019年 | 487篇 |
2018年 | 523篇 |
2017年 | 486篇 |
2016年 | 666篇 |
2015年 | 583篇 |
2014年 | 1086篇 |
2013年 | 1151篇 |
2012年 | 1138篇 |
2011年 | 1080篇 |
2010年 | 835篇 |
2009年 | 862篇 |
2008年 | 816篇 |
2007年 | 872篇 |
2006年 | 844篇 |
2005年 | 565篇 |
2004年 | 468篇 |
2003年 | 368篇 |
2002年 | 255篇 |
2001年 | 185篇 |
2000年 | 134篇 |
1999年 | 94篇 |
1998年 | 70篇 |
1997年 | 46篇 |
1996年 | 37篇 |
1995年 | 24篇 |
1994年 | 23篇 |
1993年 | 15篇 |
1992年 | 19篇 |
1991年 | 13篇 |
1990年 | 18篇 |
1989年 | 17篇 |
1988年 | 10篇 |
1987年 | 5篇 |
1986年 | 5篇 |
1985年 | 7篇 |
1984年 | 8篇 |
1983年 | 7篇 |
1982年 | 7篇 |
1981年 | 4篇 |
1979年 | 5篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1964年 | 3篇 |
1963年 | 3篇 |
1961年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 109 毫秒
91.
我国幅员辽阔,地质环境条件多样且复杂,导致了地质灾害发育强烈,种类繁多、危害较大。地质灾害与工程建设活动密切相关,既相互作用,相互依存,又相互影响[1]。电力工程项目遍布全国,特别是输电线路大多为人烟稀少的山区分布,线路长,跨越的地质地貌区域复杂,存在的地质灾害多种多样,或多或少面临着各种地质灾害的严重威胁[2]。通过电力工程地质灾害危险性评估工作的现状及评估工作流程的介绍,进一步分析电力工程地质灾害的危险性评估工作中存在的问题并提出了相应的看法。 相似文献
92.
在湿陷性黄土地区开展雨水集中下渗的海绵城市建设面临着湿陷变形的风险,以黄土湿陷性较为严重的西咸新区空港新城临空产业区为例,采用数值模拟的方法模拟了研究区湿陷性黄土在不同设计降雨情况下的雨水集中入渗后的湿陷情况。应用GAST模型计算雨洪过程,并将降雨量下渗过程作为边界条件输入Midas GTS/NX软件来模拟黄土基础变形情况。通过分析5个典型黄土区因降雨下渗导致的湿陷量,发现其等级为Ⅱ级及以上,其中最严重情况下的雨水下渗深度为5.02~6.51 m,总湿陷量和自重湿陷量分别为468.18~1015.56 mm和88.99~239.03 mm,湿陷等级为Ⅲ级。可见局部集中下渗会导致较高的湿陷风险,故建议在湿陷性黄土地区海绵城市建设中应进行量化评估并合理规避湿陷风险。 相似文献
93.
Through an ergonomic approach, this study aimed to evaluate whether workers involved in forest harvesting activities in rural properties are subject to the development of work-related diseases, as well as their consequences. A cross-sectional study with 267 forest workers in rural properties in the Brazilian Central region was used. The following evaluations were performed for each of the activities (felling, delimbing, tracing, manual extraction and manual loading): physical workload evaluation; biomechanical evaluation; risk of repetitive strain injuries/work-related musculoskeletal disorders; environmental noise and vibration factors, where relevant, and thermal overload through the Wetbulb Globe Temperature index. The results showed that in general the physical workload was very high, exceeding the cardiovascular load limits and adding to the need for work reorganization. All activities exposed workers to serious and imminent risks of developing injuries to the spine and lower limbs. Likewise, in general the risk of the appearance of RSI/WMSDs was very high for all activities evaluated. Such results are due to the combination of organizational work factors and factors of the work environment such as exposure to bad weather, uneven terrain, lifting and handling loads above tolerable limits, excessive noise and thermal overload. All of this allows to conclude that ergonomic risks and workers’ health hazards in forest harvesting in rural properties are latent and very worrying, and that these workers are exposed to a form of labor exploitation that invariably leads to physical and emotional exhaustion and therefore to their decreased labor capacity and useful working life. 相似文献
94.
Roberto Truzoli Veronica Pirola Stella Conte 《Journal of Computer Assisted Learning》2021,37(4):940-952
The lockdown due to COVID-19 in Italy resulted in the sudden closure of schools, with a shift from traditional teaching to the online one. Through an online questionnaire, this survey explores teachers' experience of online teaching, the level of risk factors (e.g., stress) and protective factors (e.g., locus of control) and their impact on satisfaction levels during the social distancing. One hundred seven high school teachers from Lombardy, an Italian region very affected by the COVID-19 outbreak, participated. Results show that depression and stress are the main predictors of satisfaction levels for online teaching. In addition, coping, locus of control and self-efficacy emerge as important protective factors. Finally, although there is great satisfaction with the online teaching experience, critical elements emerged. This study is relevant because it describes the critical elements of the online teaching experience, and identifies some protective factors and the main risk factors in teachers operating in an area strongly marked by social restrictions imposed by the pandemic. High school teachers emerge as a sub-group of the general population with specific psychological reactions. Considering the results, it is possible to suggest providing high-quality educational support and crisis-psychological oriented services to teachers, and help to maintain the psychological well-being. 相似文献
95.
Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework is developed by means of a methodology based on a heuristic theory that incorporates knowledge generated by existing works as well as the experience of their implementation. The paper presents the design details of the framework, which consists of three stages: identification of data security requirements, management of data security risks and evaluation of data security performance in CCS. 相似文献
96.
Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph in the conversion process, a related algorithm is proposed to generate the B_NAG model. Finally, to analyze the reachability of paths in B_NAG, the measuring indexs such as node attack complexity and node state transition are defined, and an iterative algorithm for obtaining the probability of reaching the target node is presented. On this basis, the posterior probability of related nodes can be calculated. A simulation environment is set up to evaluate the effectiveness of the B_NAG model. The experimental results indicate that the B_NAG model is realistic and effective in evaluating vulnerabilities of computer networks and can accurately highlight the degree of vulnerability in a chaotic relationship. 相似文献
97.
Samar Shetaban Mir Mehdi Seyyed Esfahani Abbas Saghaei Abbas Ahmadi 《Computational Intelligence》2021,37(1):435-460
Today, air pollution, smoking, use of fatty acids and ready‐made foods, and so on, have exacerbated heart disease. Therefore, controlling the risk of such diseases can prevent or reduce their incidence. The present study aimed at developing an integrated methodology including Markov decision processes (MDP) and genetic algorithm (GA) to control the risk of cardiovascular disease in patients with hypertension and type 1 diabetes. First, the efficiency of GA is evaluated against Grey Wolf optimization (GWO) algorithm, and then, the superiority of GA is revealed. Next, the MDP is employed to estimate the risk of cardiovascular disease. For this purpose, model inputs are first determined using a validated micro‐simulation model for screening cardiovascular disease developed at Tehran University of Medical Sciences, Iran by GA. The model input factors are then defined accordingly and using these inputs, three risk estimation models are identified. The results of these models support WHO guidelines that provide medicine with a high discount to patients with high expected LYs. To develop the MDP methodology, policies should be adopted that work well despite the difference between the risk model and the actual risk. Finally, a sensitivity analysis is conducted to study the behavior of the total medication cost against the changes of parameters. 相似文献
98.
99.
随着信息化进程的快速发展,保障信息系统的安全性和降低信息系统潜在的风险,一直是国内外学者关注的焦点,而风险评估正是解决该问题的有效方法之一,但是在风险评估过程中存在评估指标难以量化、风险值难以界定等困难,因此文章提出了一种基于灰色关联分析的信息安全风险评估方法,该方法首先建立了信息系统的风险评估指标体系,其次将评估的信息系统与最优信息系统进行关联度分析,最后得出信息系统风险的准确度量。该方法可以使信息系统的评估过程简单化,标准化。 相似文献
100.