全文获取类型
收费全文 | 54779篇 |
免费 | 5033篇 |
国内免费 | 2528篇 |
专业分类
电工技术 | 3495篇 |
技术理论 | 4篇 |
综合类 | 6325篇 |
化学工业 | 4407篇 |
金属工艺 | 1152篇 |
机械仪表 | 2490篇 |
建筑科学 | 6229篇 |
矿业工程 | 2266篇 |
能源动力 | 1386篇 |
轻工业 | 5841篇 |
水利工程 | 2313篇 |
石油天然气 | 4466篇 |
武器工业 | 918篇 |
无线电 | 3166篇 |
一般工业技术 | 5136篇 |
冶金工业 | 2043篇 |
原子能技术 | 409篇 |
自动化技术 | 10294篇 |
出版年
2024年 | 287篇 |
2023年 | 776篇 |
2022年 | 1363篇 |
2021年 | 1667篇 |
2020年 | 1818篇 |
2019年 | 1559篇 |
2018年 | 1512篇 |
2017年 | 1690篇 |
2016年 | 2055篇 |
2015年 | 2123篇 |
2014年 | 3627篇 |
2013年 | 3336篇 |
2012年 | 4165篇 |
2011年 | 4473篇 |
2010年 | 3283篇 |
2009年 | 3378篇 |
2008年 | 2966篇 |
2007年 | 3575篇 |
2006年 | 3085篇 |
2005年 | 2686篇 |
2004年 | 2216篇 |
2003年 | 1885篇 |
2002年 | 1447篇 |
2001年 | 1212篇 |
2000年 | 956篇 |
1999年 | 857篇 |
1998年 | 668篇 |
1997年 | 606篇 |
1996年 | 475篇 |
1995年 | 433篇 |
1994年 | 320篇 |
1993年 | 263篇 |
1992年 | 181篇 |
1991年 | 157篇 |
1990年 | 126篇 |
1989年 | 151篇 |
1988年 | 109篇 |
1987年 | 74篇 |
1986年 | 70篇 |
1985年 | 79篇 |
1984年 | 99篇 |
1983年 | 116篇 |
1982年 | 105篇 |
1981年 | 42篇 |
1980年 | 34篇 |
1979年 | 31篇 |
1978年 | 28篇 |
1977年 | 25篇 |
1959年 | 12篇 |
1955年 | 13篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
72.
以微型计算机原理及应用课程网络教学改革为例,详细介绍一种基于网络资源利用的主题协作学习的模式,并提出网络环境下学生学习态度、网络教学环境、教师指导和自我评价表质量等建议。 相似文献
73.
董艳 《数码设计:surface》2010,(11):214-215
工业设计是科学和艺术的综合体,创新思维在工业设计中具有十分重要的作用。它不仅决定了产品的外观,甚至还影响着产品的制造和使用过程。我国著名教育家陶行知先生认为,"处处是创造之地""天天是创造之时""人人是创造之人"。中国是制造大国,却不是设计大国。中国设计的原创性产品很少,中国的创新能力也亟待加强。但是随着科技的进步,中国的设计能力也在突飞猛进地发展。可以相信,未来的中国一定会成为一个设计大国。 相似文献
74.
A simple mathematical model of laser drilling is proposed. Assuming axi-symmetry of the process around the axis of the laser beam, a one-dimensional formulation is obtained after cross-sectional averaging. The novelty of the approach relies on the fact that even after dimension reduction, the shape of the hole can still be described. The model is derived, implemented and validated for drilling using lasers with intensities in the GW/cm2 range and microsecond pulses. 相似文献
75.
76.
Yang et al. [J.P. Yang, S.H. Cheng, Q. Wu, Recursive equations for compound distribution with the severity distribution of the mixed type, Science in China Series A 48 (2005) 594-609] investigated a recursive procedure for a kind of compound distributions with the number of claims belonging to (a,b)-family and the severity distribution of the mixed type. In this paper, we extend their results by assuming that the claim number belongs to a larger class. As applications, the excess-of-loss reinsurance treaty is discussed and concrete examples are considered in some detail. 相似文献
77.
Adrian Fernandez Emilio Insfran Silvia Abrahão 《Information and Software Technology》2011,53(8):789-817
Context
In recent years, many usability evaluation methods (UEMs) have been employed to evaluate Web applications. However, many of these applications still do not meet most customers’ usability expectations and many companies have folded as a result of not considering Web usability issues. No studies currently exist with regard to either the use of usability evaluation methods for the Web or the benefits they bring.Objective
The objective of this paper is to summarize the current knowledge that is available as regards the usability evaluation methods (UEMs) that have been employed to evaluate Web applications over the last 14 years.Method
A systematic mapping study was performed to assess the UEMs that have been used by researchers to evaluate Web applications and their relation to the Web development process. Systematic mapping studies are useful for categorizing and summarizing the existing information concerning a research question in an unbiased manner.Results
The results show that around 39% of the papers reviewed reported the use of evaluation methods that had been specifically crafted for the Web. The results also show that the type of method most widely used was that of User Testing. The results identify several research gaps, such as the fact that around 90% of the studies applied evaluations during the implementation phase of the Web application development, which is the most costly phase in which to perform changes. A list of the UEMs that were found is also provided in order to guide novice usability practitioners.Conclusions
From an initial set of 2703 papers, a total of 206 research papers were selected for the mapping study. The results obtained allowed us to reach conclusions concerning the state-of-the-art of UEMs for evaluating Web applications. This allowed us to identify several research gaps, which subsequently provided us with a framework in which new research activities can be more appropriately positioned, and from which useful information for novice usability practitioners can be extracted. 相似文献78.
Prakash Ramanan 《Journal of Computer and System Sciences》2009,75(8):465-485
We consider the XPath evaluation problem: Evaluate an XPath query Q on a streaming XML document D; i.e., determine the set Q(D) of document elements selected by Q. We mainly consider Conjunctive XPath queries that involve only the child and descendant axes. Previously known in-memory algorithms for this problem use O(|D|) space and O(|Q||D|) time. Several previously known algorithms for the streaming version use Ω(dn) space and Ω(dn|D|) time in the worst case; d denotes the depth of D, and n denotes the number of location steps in Q. Their exponential space requirement could well exceed the O(|D|) space used by the in-memory algorithms. We present an efficient algorithm that uses O(d|Q|+nc) space and O((|Q|+dn)|D|) time in the worst case; c denotes the maximum number of elements of D that can be candidates for output, at any one instant. For some worst case Q and D, the memory space used by our algorithm matches our lower bound proved in a different paper; so, our algorithm uses optimal memory space in the worst case. 相似文献
79.
Per Bjesse 《Formal Methods in System Design》2009,35(1):56-72
In this paper we present a word-level model checking method that attempts to speed up safety property checking of industrial
netlists. Our aim is to construct an algorithm that allows us to check both bounded and unbounded properties using standard
bit-level model checking methods as back-end decision procedures, while incurring minimum runtime penalties for designs that
are unsuited to our analysis. We do this by combining modifications of several previously known techniques into a static abstraction
algorithm which is guaranteed to produce bit-level netlists that are as small or smaller than the original bitblasted designs.
We evaluate our algorithm on several challenging hardware components. 相似文献
80.
Histogram equalization is an effective technique to boost image quality and contrast enhancement. However, in some cases the increase in image contrast by traditional histogram equalization exceeds the desired amount Which damages the image properties and wanes its natural look. Histogram division and performing a separate equalization for each sub-histogram is one of the presented solutions. The dividing method and determining the number of sub-histograms are the main problems directly affecting the output image quality. In this study, a method is introduced for automatic determination of the number of sub-histograms and density based histogram division leading to appropriate output with no need for parameter setting. Each main peak is in a separate section. Image contrast is increased with no loss of image specifications through determining the number of sub-histograms based on the number of main peaks. The introduced histogram equalization approach consists of three stages. The first stage, using histogram analysis, produces an automated estimate of number of clusters for image brightness levels. The second, clusters the image brightness levels, and using the provided transfer function, the final stage includes contrast enhancement for each individual cluster separately. The results of the proposed approach demonstrate not only clearer details along with a boost in contrast, but also noticeably more natural appearance in the images. 相似文献