全文获取类型
收费全文 | 22941篇 |
免费 | 2032篇 |
国内免费 | 906篇 |
专业分类
电工技术 | 2035篇 |
技术理论 | 7篇 |
综合类 | 2400篇 |
化学工业 | 1344篇 |
金属工艺 | 343篇 |
机械仪表 | 418篇 |
建筑科学 | 5130篇 |
矿业工程 | 2038篇 |
能源动力 | 690篇 |
轻工业 | 1844篇 |
水利工程 | 2096篇 |
石油天然气 | 1266篇 |
武器工业 | 92篇 |
无线电 | 643篇 |
一般工业技术 | 1343篇 |
冶金工业 | 1673篇 |
原子能技术 | 169篇 |
自动化技术 | 2348篇 |
出版年
2024年 | 123篇 |
2023年 | 309篇 |
2022年 | 728篇 |
2021年 | 874篇 |
2020年 | 931篇 |
2019年 | 626篇 |
2018年 | 626篇 |
2017年 | 634篇 |
2016年 | 829篇 |
2015年 | 779篇 |
2014年 | 1738篇 |
2013年 | 1560篇 |
2012年 | 1847篇 |
2011年 | 1835篇 |
2010年 | 1449篇 |
2009年 | 1572篇 |
2008年 | 1383篇 |
2007年 | 1520篇 |
2006年 | 1463篇 |
2005年 | 1033篇 |
2004年 | 877篇 |
2003年 | 763篇 |
2002年 | 600篇 |
2001年 | 421篇 |
2000年 | 305篇 |
1999年 | 256篇 |
1998年 | 161篇 |
1997年 | 135篇 |
1996年 | 106篇 |
1995年 | 71篇 |
1994年 | 50篇 |
1993年 | 46篇 |
1992年 | 33篇 |
1991年 | 29篇 |
1990年 | 28篇 |
1989年 | 26篇 |
1988年 | 16篇 |
1987年 | 10篇 |
1986年 | 13篇 |
1985年 | 11篇 |
1984年 | 9篇 |
1983年 | 8篇 |
1982年 | 8篇 |
1981年 | 4篇 |
1980年 | 3篇 |
1979年 | 5篇 |
1974年 | 5篇 |
1964年 | 3篇 |
1963年 | 3篇 |
1961年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 28 毫秒
31.
借鉴了误差反向修正理论和增量式的思想,结合层次分析法固有的优势,提出了具有自适应能力的权重设定层次分析法(adaptive weight setting method,AWS)新方法,使盾构法隧道施工风险识别模型能够利用较少的施工数据,完成进行权重调整,满足了实际隧道施工中风险评估的需求.该方法在上海地铁某区间隧道工程中进行了试用,取得了良好的效果,表明了该方法的有效性和实用性. 相似文献
32.
数据库系统中事务死锁的检测和预防,对提高系统并发性和整体性能具有重要意义。在研究了现有的分布式数据库系统死锁预防策略的基础上,利用创建动态探针(DP)技术,提出了一种改进的死锁预防策略。该DP方法在创建探针后将其发往可能产生死锁的节点,接收到探针后,根据节点信息与探针所包含信息的比较结果,可以判断是否有死锁发生,从而达到预防死锁的目的。分析表明,该方法提高了死锁预防的有效性和系统资源的利用率。 相似文献
33.
基于量子粒子群优化的在线航迹规划 总被引:1,自引:0,他引:1
现代战场中,环境信息是变化的,飞行器很难预先获得精确的全局环境信息,因此要求无人飞行器具有实时的航迹规划能力,采用量子粒子群优化算法,将约束条件和搜索算法相结合,有效解决了简单粒子群算法在高维空间中易陷入局部最优点的问题;同时,根据地形障碍、敌方防御雷达、防空火力等威胁以及禁飞区的分布情况,引入最小威胁面的概念,利用B-Spline插值逼近最小威胁面中的三维航迹在二维水平面内的投影,从而将三维曲线的规划问题简化为二维平面中控制点的寻优问题,简化了问题复杂度,提高了计算效率.仿真结果表明该方法可以满足在线航迹规划的要求. 相似文献
34.
Introduction to the special section on contemporary issues in human sexuality: research and practice
MD Ackerman 《Canadian Metallurgical Quarterly》1995,63(6):859-861
Critical issues in human sexuality have changed markedly during the past decade and so have the contributions of psychology to the evaluation and treatment of sexual behavior problems. Some of the greatest challenges facing psychologists today include the increasing emphasis on medical interventions for the male sexual disorders and the relative decline of traditional behavioral sex therapies, the recalcitrance of sexual desire disorders, the prevention of "unsafe" sexual behavior, and the limited understanding of female sexuality. This overview introduces a series of 5 articles that examine these selected critical issues in human sexuality. Guidelines for clinical practice and directions for future research are highlighted. 相似文献
35.
本文论述了实现“清洁生产”是从根本上消除工业污染,促进环保与经济协调发展的有效途径;指出过去因忽略了生产全过程的控制和工艺进步等关键性环节,造成“先污染,后治理”的事倍功半的后果;提高了实现“清洁生产”的途径和实现“清洁生产”的必要性和紧迫性。 相似文献
36.
《The Journal of Strategic Information Systems》2022,31(4):101743
Research has extensively investigated the rationale of firm diversity from the economic perspective, but little is known about how such a strategy may affect information security. The present study is the first to examine how firm diversity is relevant to firms’ likelihood to experience data breaches (i.e., data breach risk). Drawing from the strands of literature on information security, diversification, and resource-based view, we propose hypotheses on the relationship between firm diversity and data breach risk, as well as the boundary conditions of this relationship. On the basis of a twelve-year sample of publicly-listed firms, our analysis provides evidence to support the negative association between firm diversity and data breach risk. Our analysis also delineates conditions under which the effects of firm diversity can intervene to reduce the data breach risk invoked, such as under related diversity and when managers are managerially capable. For academics, our research accentuates an intriguing but unexamined benefit of firm diversity because it relates to information security. For practicing professionals, this research highlights the significant impact of firms’ operational structure on information security. 相似文献
37.
Yao-Tien Chen Author Vitae 《Pattern recognition》2010,43(11):3699-3711
This paper proposes an alternative criterion derived from the Bayesian risk classification error for image segmentation. The proposed model introduces a region-based force determined through the difference of the posterior image densities for the different classes, a term based on the prior probability derived from Kullback-Leibler information number, and a regularity term adopted to avoid the generation of excessively irregular and small segmented regions. Compared with other level set methods, the proposed approach relies on the optimum decision of pixel classification and the estimates of prior probabilities; thus the approach has more reliability in theory and practice. Experiments show that the proposed approach is able to extract the complicated shapes of targets and robust for various types of medical images. Moreover, the algorithm can be easily extendable for multiphase segmentation. 相似文献
38.
在防灾项目中,给决策者提供精确的地质地理背景信息,使其随时查询各个地理信息要素是格外必要的,所以项目中的空间数据查询系统发挥着至关重要的作用;该项目中利用AECENGINE9.2的强大嵌入功能和良好的可操作性,基于visual studio 2005.NET使其功能在防灾项目中发挥出来,在地震地质和基础地理两大类中可详尽的查询出地壳等厚线、深断裂构造、遥感地质构造解译图等信息。 相似文献
39.
Gyrd Brændeland Author Vitae Atle Refsdal Author Vitae Author Vitae 《Journal of Systems and Software》2010,83(10):1995-2013
The risk analysis of critical infrastructures such as the electric power supply or telecommunications is complicated by the fact that such infrastructures are mutually dependent. We propose a modular approach to the modelling and analysis of risk scenarios with dependencies. Our approach may be used to deduce the risk level of an overall system from previous risk analyses of its constituent systems. A custom made assumption-guarantee style is put forward as a means to describe risk scenarios with external dependencies. We also define a set of deduction rules facilitating various kinds of reasoning, including the analysis of mutual dependencies between risk scenarios expressed in the assumption-guarantee style. 相似文献
40.
Online game is the most popular entertainment application in the virtual world and online gamers demonstrate high attachment to playing online games. Previous studies have linked to the numerous negative outcomes in playing online games. The factors contribute to the negative consequences on using online game have been relatively neglected. The purpose of this study is to explore the impact of perceived risk, intangibility, gender and age (adolescent/adult) difference on online game playing consequences and intentions. Past usage frequency is also made to look into the influence additional purchase intention. A total of 1418 useful questionnaires (including 1018 from public interview and 400 from online questionnaire feedback) were collected for final data analysis. The results demonstrated the important roles that time risk, psychological risk, financial risk, physical intangibility, mental intangibility and generality play on the negative consequences associated with online game playing. The results also indicated that male and adolescent individuals spent much more time on online game and intented to act the entertainment more than females and adults did. Finally, past online game playing frequency was showed to be a positive predictor of future online game playing intention. 相似文献