全文获取类型
收费全文 | 24538篇 |
免费 | 3013篇 |
国内免费 | 1644篇 |
专业分类
电工技术 | 2035篇 |
技术理论 | 6篇 |
综合类 | 3100篇 |
化学工业 | 891篇 |
金属工艺 | 397篇 |
机械仪表 | 535篇 |
建筑科学 | 3785篇 |
矿业工程 | 1006篇 |
能源动力 | 918篇 |
轻工业 | 1569篇 |
水利工程 | 4995篇 |
石油天然气 | 847篇 |
武器工业 | 133篇 |
无线电 | 1287篇 |
一般工业技术 | 1541篇 |
冶金工业 | 1223篇 |
原子能技术 | 189篇 |
自动化技术 | 4738篇 |
出版年
2024年 | 168篇 |
2023年 | 439篇 |
2022年 | 895篇 |
2021年 | 1018篇 |
2020年 | 1033篇 |
2019年 | 893篇 |
2018年 | 892篇 |
2017年 | 913篇 |
2016年 | 1078篇 |
2015年 | 1076篇 |
2014年 | 1783篇 |
2013年 | 1793篇 |
2012年 | 1934篇 |
2011年 | 1907篇 |
2010年 | 1475篇 |
2009年 | 1531篇 |
2008年 | 1475篇 |
2007年 | 1583篇 |
2006年 | 1470篇 |
2005年 | 1105篇 |
2004年 | 977篇 |
2003年 | 759篇 |
2002年 | 614篇 |
2001年 | 499篇 |
2000年 | 408篇 |
1999年 | 320篇 |
1998年 | 233篇 |
1997年 | 193篇 |
1996年 | 133篇 |
1995年 | 122篇 |
1994年 | 98篇 |
1993年 | 78篇 |
1992年 | 54篇 |
1991年 | 40篇 |
1990年 | 46篇 |
1989年 | 38篇 |
1988年 | 28篇 |
1987年 | 15篇 |
1986年 | 12篇 |
1985年 | 9篇 |
1984年 | 9篇 |
1983年 | 9篇 |
1982年 | 8篇 |
1981年 | 4篇 |
1979年 | 5篇 |
1974年 | 2篇 |
1964年 | 3篇 |
1963年 | 3篇 |
1961年 | 3篇 |
1959年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 16 毫秒
81.
Fisher最优分割法在星星哨水库汛期分期划分中的应用 总被引:1,自引:0,他引:1
Fisher最优分割法是对有序样本进行最优化分段的一种数学方法。本文利用该方法对星星哨水库汛期进行相应的划分,结果表明该方法是可行的。因此,可利用该结果对分期实施不同的汛限水位,使水库的防洪和兴利效益达到最大。 相似文献
82.
Children's perceived attachments with parents, and family cohesion and adaptability were examined as predictors, mediators, and moderators in the parental problem drinking-child outcomes link. A total of 216 6- to 12-year-olds (110 boys, 106 girls) participated. Data were obtained from children and their mothers, fathers, and teachers. A higher level of family cohesion and adaptability functioned as (a) a robust protective factor against adjustment and cognitive difficulties otherwise associated with problem drinking and (b) a mediator of adjustment problems. Children's perceptions of attachments to mothers and fathers were consistent predictors of behavioral, social, and cognitive problems and further moderated relations between problem drinking and child functioning. The results support that child-parent and family functioning variables act as either pathways and/or vulnerability and protective factors for children exposed to a high-risk environment. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
83.
84.
Xiaofeng Liao Xueming Li Jun Pen Guanrong Chen 《International Journal of Communication Systems》2004,17(5):437-445
In this paper, a simple image secure communication scheme based on the chaotic Chebyshev map and chaos synchronization is proposed. The scheme relies on the excellent correlation property of chaotic sequences, which is very desirable for secure image communication. The results obtained by computer simulation indicate that the transmitted source image can be correctly and reliably recovered using the proposed scheme, even through a noisy channel. Notably, the scheme possesses relatively high security and can be easily implemented. Moreover, the quality of the recovered image is satisfactory, quantified by such common criteria as the bit‐error rate performance. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
85.
Trust for Ubiquitous,Transparent Collaboration 总被引:1,自引:0,他引:1
In this paper, trust-based recommendations control the exchange of personal information between handheld computers. Combined with explicit risk analysis, this enables unobtrusive information exchange, while limiting access to confidential information. The same model can be applied to a wide range of mobile computing tasks, such as managing personal address books and electronic diaries, to automatically provide an appropriate level of security. Recommendations add structure to the information, by associating categories with data and with each other, with degrees of trust belief and disbelief. Since categories also in turn confer privileges and restrict actions, they are analogous to rôles in a Rôle-Based Access Control system, while principals represent their trust policies in recommendations. Participants first compute their trust in information, by combining their own trust assumptions with others' policies. Recommendations are thus linked together to compute a considered, local trust assessment. Actions are then moderated by a risk assessment, which weighs up costs and benefits, including the cost of the user's time, before deciding whether to allow or forbid the information exchange, or ask for help. By unifying trust assessments and access control, participants can take calculated risks to automatically yet safely share their personal information. 相似文献
86.
87.
Coupling GIS with Hydrologic and Hydraulic Flood Modelling 总被引:6,自引:1,他引:5
Nunes Correia Francisco Castro Rego Filipe Da Grača Saraiva Maria Ramos Isabel 《Water Resources Management》1998,12(3):229-249
Geographic Information Systems (GIS) have been recognised as a powerful means to integrate and analyse data from various sources in the context of comprehensive floodplain management. As part of this comprehensive approach to floodplain management, it is very important to be able to predict the consequences of different scenarios in terms of flooded areas and associated risk. Hydrologic and hydraulic modelling plays a crucial role and there is much to gain in incorporating these modelling capabilities in GIS. This is still a rather complex task and research is being done on the full integration of these models. Interfacing between these models and GIS may be a very efficient way of overcoming the difficulties and getting very good results in terms of engineering practice. This paper presents results based on the use of Intergraph GIS coupled with Idrisi GIS. Using these two systems substantially increased the flexibility of using GIS as a tool for flood studies. A lumped (XSRAIN) and a distributed (OMEGA) hydrologic models were used to simulate flood hydrographs. The well known HEC-2 Hydraulic model was used to compute flooded areas. These models were applied in the Livramento catchment with very good results. The computation of flooded areas for different flood scenarios, and its representation in GIS, can be used in the assessment of affected property and associated damages. This is a very useful GIS-based approach to floodplain management. 相似文献
88.
鄱阳湖流域水土流失加剧了洪涝灾害。治理水土流失能增强山丘地涵养水源的能力,削洪减沙,减少库容损失,降低河床,具有明显的防洪效益。进行流域防洪规划时,应将防治水土流失与防洪治涝结合起来,因地制宣,综合治理。 相似文献
89.
根据黄河中游多沙粗区暴雨洪水及产流产沙特点,提出了为控制水沙危害,黄河中游治理应分两步走的战略。第一步解决近期水沙控制和耕地问题,主要措施是建设淤地坝和骨干坝。研究表明,在现状坝地,梯田条件下,为满足粮食生产需要,每平方公里需新增坝地3.18ha,且能港口控制水沙的要求。第二步是进行坡面治理,改善生态环境,以达到根治水沙的目的。 相似文献
90.
Thompson Karin E.; Malow Robert M.; Corrigan Sheila A.; Sorensen James L. 《Canadian Metallurgical Quarterly》1992,6(2):67
Drug users are particularly at risk for contracting the human immunodeficiency virus and serve as a major mechanism for spreading the virus to other sectors of the population. As a result drug abuse treatment and potential behavioral change strategies are primary public health issues. The purpose of this article is to review the contributions included in this special edition, which represent an effort to describe the most current thinking in the field with a blend of theoretical, review, and empirical articles. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献