全文获取类型
收费全文 | 26421篇 |
免费 | 3082篇 |
国内免费 | 2171篇 |
专业分类
电工技术 | 2249篇 |
技术理论 | 11篇 |
综合类 | 2921篇 |
化学工业 | 531篇 |
金属工艺 | 50篇 |
机械仪表 | 348篇 |
建筑科学 | 3449篇 |
矿业工程 | 1050篇 |
能源动力 | 542篇 |
轻工业 | 539篇 |
水利工程 | 2148篇 |
石油天然气 | 165篇 |
武器工业 | 101篇 |
无线电 | 4391篇 |
一般工业技术 | 664篇 |
冶金工业 | 419篇 |
原子能技术 | 50篇 |
自动化技术 | 12046篇 |
出版年
2024年 | 114篇 |
2023年 | 369篇 |
2022年 | 706篇 |
2021年 | 914篇 |
2020年 | 898篇 |
2019年 | 623篇 |
2018年 | 554篇 |
2017年 | 730篇 |
2016年 | 797篇 |
2015年 | 912篇 |
2014年 | 2453篇 |
2013年 | 1811篇 |
2012年 | 2354篇 |
2011年 | 2661篇 |
2010年 | 1937篇 |
2009年 | 1998篇 |
2008年 | 1965篇 |
2007年 | 2173篇 |
2006年 | 1848篇 |
2005年 | 1507篇 |
2004年 | 1175篇 |
2003年 | 1042篇 |
2002年 | 645篇 |
2001年 | 479篇 |
2000年 | 316篇 |
1999年 | 182篇 |
1998年 | 107篇 |
1997年 | 72篇 |
1996年 | 54篇 |
1995年 | 37篇 |
1994年 | 29篇 |
1993年 | 24篇 |
1992年 | 22篇 |
1991年 | 15篇 |
1990年 | 13篇 |
1989年 | 19篇 |
1988年 | 7篇 |
1987年 | 4篇 |
1986年 | 8篇 |
1985年 | 23篇 |
1984年 | 21篇 |
1983年 | 16篇 |
1982年 | 13篇 |
1981年 | 5篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1965年 | 3篇 |
1957年 | 1篇 |
1956年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
余浩 《山东大学学报(工学版)》2003,33(3):337-340
分析了我国中医药数据分析作业方式的不足,试图通过建立网络数据分析中心,为中医药部门提供了一条实现网络化,标准化,信息化的思路. 相似文献
102.
103.
Rowan Paul J.; Cofta-Woerpel Ludmila; Mazas Carlos A.; Vidrine Jennifer Irvin; Reitzel Lorraine R.; Cinciripini Paul M.; Wetter David W. 《Canadian Metallurgical Quarterly》2007,15(4):382
Ecological momentary assessment (EMA) consists of assessing phenomena in real time in the natural environment. EMA allows for more fine-grained analyses of addictive behavior and minimizes threats to internal validity, such as recall biases and errors. However, because of the intensive monitoring involved in EMA, measurement reactivity is a concern. To test whether EMA with palmtop personal computers induces reactivity, the authors compared smoking-related outcomes between smokers using EMA and those not using EMA during a quit attempt. The use of no-EMA control groups has been rare in reactivity investigations to date. The EMA protocol included event-contingent assessments (smoking episodes, urge episodes) and random assessments. Outcomes included biologically confirmed abstinence and self-report measures of withdrawal, self-efficacy, motivation, affect, and temptations. Participants were smokers motivated to quit (N = 96). They were randomized to 1 of 3 groups: EMA for the week preceding a planned quit date, EMA for the week following the quit date, and no EMA. Abstinence rates did not differ between the groups at Day 7 or at Day 28 postcessation. For the 20 subscales assessed at each of 3 assessment times, there were significant differences between participants with and without EMA experience for 3 subscales at the 1st of 3 assessment times, and significant differences for 3 different subscales at the 3rd assessment time. These differences suggest some reactivity to EMA, although the inconsistent pattern across time indicates that further research is needed to definitively conclude that EMA induces reactivity. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
104.
简要介绍了煤巷锚杆支护技术在童亭煤矿的应用推广情况 ,重点介绍了童亭煤矿在安全可靠性控制方面强化管理、优化设计、提高工艺水平和质量保证体系建设的一些经验和做法 ,并对今后发展煤巷锚杆支护技术提出了看法。 相似文献
105.
106.
邱向群 《计算机应用与软件》1994,11(3):61-64,F003
本文介绍了六种子目录加密法,这些方法在作者的工作中经过检验证明是行之有效和简单易行的。文中对这些加密法进行了比较并给出了一些实施细节。 相似文献
107.
108.
河北省迁安市滦河生态防洪工程是河北省重点工程建设项目,在建设中采用土工格室生态护岸工程技术,不仅大大提高了工程建设的速度和质量,而且延长了堤坝使用寿命,减少了维护成本,收到了环保、生态等方面的综合效益。 相似文献
109.
Chih-Hung Wang Author Vitae Chih-Heng Yin Author Vitae Author Vitae 《Computers & Electrical Engineering》2006,32(5):364-375
The most efficient approach to a fair exchange is to use an off-line trusted third party (TTP for short) who gets involved only when a dispute between two parties occurs. However, exchanged secrets that are not protected properly may be exposed to the TTP when one of these two parties asks the TTP to mediate the dispute. The first work to protect exchanged secrets from TTP’s misuse was proposed by Franklin and Reiter in 1997. They provided an on-line semi-trusted third party instead of an off-line third party for a fair exchange. Their schemes forced the TTP to take part in the protocol for all the cases, and thus, deemed to be impractical.The present paper, introduces several models, including single and multiple TTPs, to focus the attention not only on security properties, but also on reliability functions. In the single TTP mode, our new scheme can protect the exchanged data through an efficient exchange protocol, whereas in the multiple TTP mode, we proposed an approach to balance the security level with the reliability of the system. 相似文献
110.
《Information Systems Management》2007,24(4):305-310
Most organizations have measures to protect their network infrastructure from intruders. With the growth AND AVAILABILITY of wireless, some intruders now are aiming their attacks there. The potential for damage from these types of attacks is significant due to their nature. However, there is another type of wireless attack on organizational resources that also poses a significant vulnerability. That is electromagnetic radiation, also called radio frequency emissions (RFE), from unprotected systems and networks. 相似文献