全文获取类型
收费全文 | 12634篇 |
免费 | 1708篇 |
国内免费 | 1358篇 |
专业分类
电工技术 | 759篇 |
技术理论 | 5篇 |
综合类 | 1799篇 |
化学工业 | 179篇 |
金属工艺 | 241篇 |
机械仪表 | 907篇 |
建筑科学 | 759篇 |
矿业工程 | 170篇 |
能源动力 | 106篇 |
轻工业 | 155篇 |
水利工程 | 195篇 |
石油天然气 | 113篇 |
武器工业 | 81篇 |
无线电 | 1392篇 |
一般工业技术 | 962篇 |
冶金工业 | 624篇 |
原子能技术 | 30篇 |
自动化技术 | 7223篇 |
出版年
2024年 | 103篇 |
2023年 | 257篇 |
2022年 | 490篇 |
2021年 | 481篇 |
2020年 | 445篇 |
2019年 | 326篇 |
2018年 | 296篇 |
2017年 | 295篇 |
2016年 | 432篇 |
2015年 | 440篇 |
2014年 | 679篇 |
2013年 | 785篇 |
2012年 | 775篇 |
2011年 | 911篇 |
2010年 | 771篇 |
2009年 | 788篇 |
2008年 | 847篇 |
2007年 | 969篇 |
2006年 | 870篇 |
2005年 | 728篇 |
2004年 | 686篇 |
2003年 | 594篇 |
2002年 | 488篇 |
2001年 | 421篇 |
2000年 | 352篇 |
1999年 | 307篇 |
1998年 | 183篇 |
1997年 | 126篇 |
1996年 | 126篇 |
1995年 | 132篇 |
1994年 | 109篇 |
1993年 | 93篇 |
1992年 | 68篇 |
1991年 | 62篇 |
1990年 | 44篇 |
1989年 | 57篇 |
1988年 | 40篇 |
1987年 | 16篇 |
1986年 | 18篇 |
1985年 | 17篇 |
1981年 | 5篇 |
1979年 | 7篇 |
1976年 | 7篇 |
1966年 | 3篇 |
1965年 | 3篇 |
1963年 | 4篇 |
1962年 | 3篇 |
1960年 | 3篇 |
1959年 | 3篇 |
1958年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
An application of expert hierarchical control is described in this paper. The control is implemented in a two-level configuration, where the lower layer performs direct regulation control and the upper layer performs supervisory functions. In the regulation layer, a rule-based controller performs the regulation task, where the controller is constructed upon causal relations between subsystems. The control action is inferred from the measurement of both controlled and noncontrolled variables. In the supervisory layer, the main function is a fault diagnosis system which diagnoses faults on-line. The diagnosis is based upon reasoning from the structure of the system and the functions of its components, and efficient diagnosis is achieved by dividing the system into several subsystems. The overall technique has been successfully implemented on a pilot scale mixing process under on-line computer control. 相似文献
72.
73.
Ten areas of health knowledge were investigated in 2 studies, 1 of college students (N=169) and 1 of adults from the community (ages 19-70; N=176). Measures assessed knowledge of aging, orthopedic/ dermatological concerns, common illnesses, childhood/early life, serious illnesses, mental health, nutrition, reproduction, safety, and treatment of illness/disease. Significant gender differences favoring women were found for most areas of health knowledge, especially reproduction and early life. Results showed that cognitive ability accounted for the most variance in health knowledge with nonability (personality and interest traits) and demographic variables accounting for smaller but significant amounts of variance across most knowledge domains. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
74.
The aim of this study was to bring to the surface the strategic use of imitative processes in the context of a 2-route model: (a) direct imitation, used in reproducing new, meaningless actions, and (b) imitation based on stored semantic knowledge of familiar meaningful actions. Three experiments were carried out with healthy participants who reproduced meaningful and meaningless actions within an established time limit. The study investigated 3 factors that could potentially affect the selection of processes used for imitation: (a) the composition of the experimental list (blocked or mixed presentation), (b) the presence-absence of instructions (Experiments 1 and 2), and (c) the relative proportions of the stimuli (Experiment 3). Overall, the results suggest that each of these factors influences the selection of imitative strategies in healthy individuals with temporarily reduced capacities, as happens in the case of brain-damaged patients. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
75.
王校艳 《河南机电高等专科学校学报》2004,12(2):11-12
知识经济对领导方法提出了新的要求,也使传统的领导方法面临严峻挑战,知识经济时代所需要的领导方法具有开拓创新性。 相似文献
76.
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer
(OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a
new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel
technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the
design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general
portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is
the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting
mobile agents not only is possible, but also can be implemented efficiently.
This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval
Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399
and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper
was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003.
Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position
at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical
Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases,
and wireless networks. On the theoretical side, he is interested in cryptography and game theory.
Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile
computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS)
at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received
his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998
and 2001). 相似文献
77.
People have knowledge about relationships (i.e., relational schemas) that is based on their experiences. Because most people have experience with complementary behavior (interaction partners behaving similarly in terms of affiliation but oppositely in terms of control), they expect complementary behavior in their relationships. Like other beliefs about relationships, expectations of complementarity affect self-construal. The authors provide evidence for complementary self-construal; people assimilate to relevant relationship partners on the affiliation dimension and contrast on the control dimension. Consistent with the proposed role of relationship knowledge in these effects, complementary self-construal was moderated by the familiarity of the target, whether people focused on their relationship with or the appearance of the target, and whether the context was relevant for the interpersonal dimension. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
78.
知识经济的发展,使知识和创新,成为人类活动的强大动力,人类的实践活动迈入了崭新阶段。人类的潜在智慧和才能,正源源不断地释放出来,转化为对象性存在,充分展示了人类活动的主体性效应,与此同时我们也必须正视人类活动的反主体性的效应。正确处理主体自觉能动性和客体自然性之间矛盾,是强化人类活动的主体性效应,防止反主体性效应的前提条件。 相似文献
79.
80.
面向对象机器翻译知识库IMT—KB的设计与实现 总被引:1,自引:0,他引:1
机器翻译知识库是机译系统的重要组成部分,针对传统机译知识库的不足之处,本文提出一种面向对象的机译知识体系结构,同时给出这种具有层次性和模块性机译知识库的存储组织和管理机制。 相似文献