首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2286篇
  免费   297篇
  国内免费   137篇
电工技术   183篇
综合类   196篇
化学工业   161篇
金属工艺   27篇
机械仪表   73篇
建筑科学   293篇
矿业工程   42篇
能源动力   122篇
轻工业   297篇
水利工程   176篇
石油天然气   31篇
武器工业   9篇
无线电   141篇
一般工业技术   99篇
冶金工业   29篇
原子能技术   9篇
自动化技术   832篇
  2025年   60篇
  2024年   125篇
  2023年   157篇
  2022年   231篇
  2021年   228篇
  2020年   225篇
  2019年   158篇
  2018年   105篇
  2017年   95篇
  2016年   84篇
  2015年   65篇
  2014年   110篇
  2013年   102篇
  2012年   79篇
  2011年   115篇
  2010年   73篇
  2009年   78篇
  2008年   68篇
  2007年   71篇
  2006年   82篇
  2005年   67篇
  2004年   56篇
  2003年   45篇
  2002年   46篇
  2001年   31篇
  2000年   23篇
  1999年   21篇
  1998年   14篇
  1997年   13篇
  1996年   15篇
  1995年   10篇
  1994年   6篇
  1993年   6篇
  1992年   12篇
  1991年   13篇
  1990年   5篇
  1989年   4篇
  1988年   3篇
  1987年   3篇
  1986年   8篇
  1985年   4篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1959年   1篇
排序方式: 共有2720条查询结果,搜索用时 15 毫秒
61.
对鹤煤集团岭北露天矿排矸区,复垦营造的樟子松人工林,采用定位观察法,在标准地内对林木各项因子生长量的调查,将获得的数据经过整理分析,结果显示:林木的保存率、平均胸径、平均高度、蓄积等因子的生长量与当地宜林荒山荒地所营造的同龄樟子松林的生长量对照无差异,具有明显的经济、生态及社会效益。  相似文献   
62.
赤天化纸业竹浆纸一体化的探索   总被引:1,自引:1,他引:0  
介绍了赤天化纸业在西部大开发的背景下,对竹浆纸一体化的认识和一些具体运作方法,以及在运作中所遇到的困难和需要探索的问题.  相似文献   
63.
在国家实施林权制度改革的大形势,对原料林基地建设的影响、较适宜的造林模式、新的造林模式所需要的条件进行阐述,并以合作造林中订单林业的具体实施方案为例详析.  相似文献   
64.
65.
The antioxidant -tocopherol (vitamin E), applied in a basal trunk band to the green ash tree,Fraxinus pennsylvanica var.subintergerrinia, elicited an alteration of foliar feeding byMalacosoma disstria larvae (Lepidoptera: Lasiocampidae). The bioassayed effects were dependent on the dosage of elicitor, the time after elicitation, and the position in the tree. Leaves for chemical analysis were collected from trees receiving two dosages and at two intervals after elicitation. Compounds in the ethyl acetate extractables from the ash tree leaves were separated by TLC and HPLC. TLC separations showed differences in the nonhydrolyzed extractables attributable to elicitor dosage and time after elicitation. TLC-resolved differences were also evident among acid-hydrolyzed samples. HPLC-resolved profiles revealed eight peaks in the nonhydrolyzed extractables that were quantitatively negatively correlated with larval feeding preference between elicited versus control foliage on at least one of the two sampling dates. Results from this study and other investigations reported in the literature indicate that the antioxidant-tocopherol (vitamin E) can function as an environmental-stress elicitor of alterable defensive chemistry in green ash and other plants.  相似文献   
66.
In arid regions, large-scale water diversion from rivers leads to significant changes in river flow regimes, which may have large impacts on ecological water uses of river-dependent ecosystems, such as river, lake, wetland, and riparian ecosystems. To assess the integrated impact of water diversion on ecological water uses, we proposed a hierarchy evaluation model composed of four layers representing the evaluation goal, sub-areas of the influenced region, evaluation criteria, and water diversion schemes, respectively. The evaluation criteria for different types of ecological water uses were proposed, and the analytical hierarchy process was used for the integrated assessment. For a river ecosystem, the percentage of mean annual flow was used to define the grade of environmental flow. For a lake ecosystem, water recharge to the lake to compensate the lake water losses was used to assess the ecological water use of a lake. The flooding level of the wetland and the groundwater level in the riparian plain were used to assess the wetland and riparian ecological water uses, respectively. The proposed model was applied to a basin in northern Xinjiang in northwest China, where both water diversion and inter-basin water transfer projects were planned to be carried out. Based on assessment results for the whole study area and two sub-areas, an appropriate scheme was recommended from four planning schemes. With the recommended scheme, ecological water uses of the influenced ecosystems can be maintained at an acceptable level. Meanwhile, economical water requirements can be met to a great extent.  相似文献   
67.
森林植被截留降雨实验与模拟   总被引:1,自引:0,他引:1  
张淑琢  范世香 《水利科技与经济》2009,15(10):857-859,866
根据半干旱地区樟子松林冠截留降雨的实测资料,对林冠截留与大气降雨之间的关系进行了分析。在几个假设的基础上,建立林冠截留及林内雨量的半理论半经验公式,并介绍了参数确定方法。经检验,公式的计算值与实测值取得较好的一致性,基本上反映出林冠截留降雨的一般规律,揭示了林冠对降雨截留作用的数量关系和客观实质。  相似文献   
68.
The effect of fertilization with urea and ammonium nitrate on nitrogen mineralization was studied in a series of laboratory incubation experiments. The samples (humus layer) were collected from field experiments with different applications of fertilizers during a period of 11–14 years. The nitrogen fertilization influenced some chemical properties of the humus layer such as pH, N-Kjeldahl content and the content of inorganic nitrogen, especially in the samples from North Sweden. Nitrate nitrogen was formed in humus samples classified as non-nitrifying in several cases, usually after urea fertilization.  相似文献   
69.
对雨洪及雨洪资源利用的概念进行了界定,明确了雨洪资源开发利用的对象。在明确雨洪资源概念的基础上,概括了近20年来国内外在雨洪资源利用方面的研究和进展,并对国外在此利用技术和管理方面所取得的经验进行了总结。接下来用较多的篇幅对雨洪资源利用工程和非工程的措施进行了的介绍,在对每种利用方式加以剖析之后,分别引用了相应利用方式中比较典型的实例。最后对这些利用方式在未来的发展趋势做了初步的展望。  相似文献   
70.
    
Summary Software‐Defined Networking (SDN) is an emerging network paradigm that has gained significant traction from many researchers to address the requirement of current data centers. Although central control is the major advantage of SDN, it is also a single point of failure if it is made unreachable by a Distributed Denial of Service (DDoS) attack. Despite the large number of traditional detection solutions that exist currently, DDoS attacks continue to grow in frequency, volume, and severity. This paper brings an analysis of the problem and suggests the implementation of four machine learning algorithms (SVM, MLP, Decision Tree, and Random Forest) with the purpose of classifying DDoS attacks in an SDN simulated environment (Mininet 2.2.2). With this goal, the DDoS attacks were simulated using the Scapy tool with a list of valid IPs, acquiring, as a result, the best accuracy with the Random Forest algorithm and the best processing time with the Decision Tree algorithm. Moreover, it is shown the most important features to classify DDoS attacks and some drawbacks in the implementation of a classifier to detect the three kinds of DDoS attacks discussed in this paper (controller attack, flow‐table attack, and bandwidth attack).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号