全文获取类型
收费全文 | 13583篇 |
免费 | 1608篇 |
国内免费 | 684篇 |
专业分类
电工技术 | 1559篇 |
技术理论 | 5篇 |
综合类 | 1724篇 |
化学工业 | 715篇 |
金属工艺 | 83篇 |
机械仪表 | 234篇 |
建筑科学 | 2789篇 |
矿业工程 | 613篇 |
能源动力 | 432篇 |
轻工业 | 1407篇 |
水利工程 | 1246篇 |
石油天然气 | 551篇 |
武器工业 | 79篇 |
无线电 | 446篇 |
一般工业技术 | 1000篇 |
冶金工业 | 1039篇 |
原子能技术 | 139篇 |
自动化技术 | 1814篇 |
出版年
2024年 | 92篇 |
2023年 | 225篇 |
2022年 | 515篇 |
2021年 | 620篇 |
2020年 | 637篇 |
2019年 | 484篇 |
2018年 | 522篇 |
2017年 | 478篇 |
2016年 | 661篇 |
2015年 | 576篇 |
2014年 | 1074篇 |
2013年 | 1144篇 |
2012年 | 1130篇 |
2011年 | 1073篇 |
2010年 | 830篇 |
2009年 | 858篇 |
2008年 | 815篇 |
2007年 | 871篇 |
2006年 | 844篇 |
2005年 | 564篇 |
2004年 | 468篇 |
2003年 | 368篇 |
2002年 | 255篇 |
2001年 | 185篇 |
2000年 | 134篇 |
1999年 | 94篇 |
1998年 | 70篇 |
1997年 | 45篇 |
1996年 | 37篇 |
1995年 | 24篇 |
1994年 | 23篇 |
1993年 | 15篇 |
1992年 | 19篇 |
1991年 | 13篇 |
1990年 | 18篇 |
1989年 | 17篇 |
1988年 | 10篇 |
1987年 | 5篇 |
1986年 | 5篇 |
1985年 | 7篇 |
1984年 | 8篇 |
1983年 | 7篇 |
1982年 | 7篇 |
1981年 | 4篇 |
1979年 | 5篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1964年 | 3篇 |
1963年 | 3篇 |
1961年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
51.
Trust for Ubiquitous,Transparent Collaboration 总被引:1,自引:0,他引:1
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information. 相似文献
52.
53.
Thompson Karin E.; Malow Robert M.; Corrigan Sheila A.; Sorensen James L. 《Canadian Metallurgical Quarterly》1992,6(2):67
Drug users are particularly at risk for contracting the human immunodeficiency virus and serve as a major mechanism for spreading the virus to other sectors of the population. As a result drug abuse treatment and potential behavioral change strategies are primary public health issues. The purpose of this article is to review the contributions included in this special edition, which represent an effort to describe the most current thinking in the field with a blend of theoretical, review, and empirical articles. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
54.
Shaw Daniel S.; Gilliom Miles; Ingoldsby Erin M.; Nagin Daniel S. 《Canadian Metallurgical Quarterly》2003,39(2):189
The present study applied a semiparametric mixture model to a sample of 284 low-income boys to model developmental trajectories of overt conduct problems from ages 2 to 8. As in research on older children, 4 developmental trajectories were identified: a persistent problem trajectory, a high-level desister trajectory, a moderate-level desister trajectory, and a persistent low trajectory. Follow-up analyses indicated that initially high and low groups were differentiated in early childhood by high child fearlessness and elevated maternal depressive symptomatology. Persistent problem and high desister trajectories were differentiated by high child fearlessness and maternal rejecting parenting. The implications of the results for early intervention research are discussed, with an emphasis on the identification of at-risk parent-child dyads. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
55.
The authors hypothesize that depressed states evolved to minimize risk in social interactions in which individuals perceive that the ratio of their social value to others, and their social burden on others, is at a critically low level. When this ratio reaches a point where social value and social burden are approaching equivalence, the individual is in danger of exclusion from social contexts that, over the course of evolution, have been critical to fitness. Many features of depressed states can be understood in relation to mechanisms that reduce social risk in such circumstances, including (a) hyper-sensitivity to signals of social threat from others, (b) sending signals to others that reduce social risks, and (c) inhibiting risk-seeking (e.g., confident, acquisitive) behaviors. These features are discussed in terms of psychosocial and neurobiological research on depressive phenomena. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
56.
针对目前大多数科研单位在内部会计控制中存在的问题,根据财政部颁布的《内部会计控制规范一基本规范》,探讨了科研单位在转制过程中应如何建立和完善内部会计控制制度,以达到防范经营风险,保护资产安全、完整,确保经营管理目标和政策有效实施. 相似文献
57.
In this paper we introduce an empirical Bayes procedure for estimating an unknown parameter, say θ. This procedure gives the empirical Bayes estimator for θ and its associated minimum posterior risk in closed forms without estimating the unknown prior density function of θ. In such procedure the posterior probability density function of θ is not required. A sufficient statistic for θ with conditional probability density function in the one parameter exponential family is required. Instead of estimating the unknown prior density function, the marginal density function of the sufficient statistic must be estimated. As special cases the empirical Bayes estimators and their respective minimum posterior risks of the failure rate for the exponential distribution, the unknown scale parameters of Weibull and gamma distributions are obtained in simple forms as special cases. Numerical results and a simulation study are introduced to (i) investigate how the number of available past experiments and the sample size of each influence the accuracy of the empirical Bayes estimator, (ii) make a comparison between the presented procedure and the Bayes procedure when the prior probability density function of the parameter θ is gamma. 相似文献
58.
近几年,我国外汇储备逐年增加,而美元汇率偏弱,使我国承担很大的外汇风险。为了规避外汇风险,应增加黄金储备。文中提出了我国增加黄金储备总量的理由以及增加黄金储备的途径。这些建议具有可操作性,可以提供给有关部门参考。 相似文献
59.
DiPietro Janet A.; Caulfield Laura; Costigan Kathleen A.; Merialdi Mario; Nguyen Ruby H. N.; Zavaleta Nelly; Gurewitsch Edith D. 《Canadian Metallurgical Quarterly》2004,40(3):445
Longitudinal neurobehavioral development was examined in 237 fetuses of low-risk pregnancies from 2 distinct populations-Baltimore, Maryland, and Lima. Peru-at 20. 24. 28. 32, 36. and 38 weeks gestation. Data were based on digitized Doppler-based fetal heart rate (FHR) and fetal movement (FM). In both groups. FHR declined while variability, episodic accelerations, and FM-FHR coupling increased, with discontinuities evident between 28 and 32 weeks gestation. Fetuses in Lima had higher FHR and lower variability, accelerations, and FM-FHR coupling. Declines in trajectories were typically observed 1 month sooner in Lima, which magnified these disparities. Motor activity differences were less consistent. No sex differences in fetal neurobehaviors were detected. It is concluded that population factors can influence the developmental niche of the fetus. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
60.
高坝风险分析的事件树法 总被引:2,自引:0,他引:2
新世纪一批高坝将要在我国开工建设,这对我国的水电能源及国民经济的发展有着不可估量的作用,而高坝建设中,安全性是需要首先保证的。目前对高坝的风险分析方法有主观概率法、客观概率法等。从系统工程的角度出发,采用事件树方法对高坝的风险进行了探索研究,并给出了算例以说明该方法的有效性和实用性。 相似文献