全文获取类型
收费全文 | 79065篇 |
免费 | 9325篇 |
国内免费 | 4311篇 |
专业分类
电工技术 | 8038篇 |
技术理论 | 13篇 |
综合类 | 9616篇 |
化学工业 | 3946篇 |
金属工艺 | 1637篇 |
机械仪表 | 3582篇 |
建筑科学 | 4263篇 |
矿业工程 | 1968篇 |
能源动力 | 1770篇 |
轻工业 | 1445篇 |
水利工程 | 3273篇 |
石油天然气 | 1668篇 |
武器工业 | 1279篇 |
无线电 | 14431篇 |
一般工业技术 | 5278篇 |
冶金工业 | 2560篇 |
原子能技术 | 761篇 |
自动化技术 | 27173篇 |
出版年
2025年 | 651篇 |
2024年 | 1836篇 |
2023年 | 1662篇 |
2022年 | 2074篇 |
2021年 | 2443篇 |
2020年 | 2766篇 |
2019年 | 2350篇 |
2018年 | 2018篇 |
2017年 | 2538篇 |
2016年 | 2805篇 |
2015年 | 3061篇 |
2014年 | 4941篇 |
2013年 | 4887篇 |
2012年 | 5502篇 |
2011年 | 5624篇 |
2010年 | 4331篇 |
2009年 | 4474篇 |
2008年 | 4776篇 |
2007年 | 5225篇 |
2006年 | 4825篇 |
2005年 | 4214篇 |
2004年 | 3609篇 |
2003年 | 3180篇 |
2002年 | 2523篇 |
2001年 | 2051篇 |
2000年 | 1635篇 |
1999年 | 1258篇 |
1998年 | 887篇 |
1997年 | 792篇 |
1996年 | 675篇 |
1995年 | 560篇 |
1994年 | 530篇 |
1993年 | 409篇 |
1992年 | 309篇 |
1991年 | 208篇 |
1990年 | 182篇 |
1989年 | 140篇 |
1988年 | 117篇 |
1987年 | 71篇 |
1986年 | 63篇 |
1985年 | 58篇 |
1984年 | 80篇 |
1983年 | 56篇 |
1982年 | 41篇 |
1981年 | 28篇 |
1980年 | 31篇 |
1979年 | 34篇 |
1977年 | 15篇 |
1964年 | 15篇 |
1959年 | 18篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
21.
索荣华 《数字社区&智能家居》2013,(11):7013-7016
长期以来,宁夏司法警官职业学院各种信息通过Office软件来存储,处理,在信息的更新,共享,查询,版本控制上等方面存在很多问题,管理这些信息比较繁琐,并且信息很难共享,因此学院急需一套信息管理系统来管理这些信息。该文对宁夏司法警官职业学院学生信息管理系统的项目立项、用户需求征询、设计开发、测试实施做了一个比较全面的概述。 相似文献
22.
随着企业生产规模的扩大,其所掌控的资产也越来越多。信息作为企业重要的资产,其安全性正得到越来越多的企业的关注,很多企业为了保证自身信息的安全与保密性,也制订了自身的信息安全策略。然而,很多企业的信息安全策略常常形同虚设,没有发挥其应有的作用,甚至存在着严重的漏洞,为企业的健康发展埋下了不小的隐患。笔者结合自身多年的工作经验,就企业信息安全策略实施过程中存在的问题进行分析,并针对性的提出几点对策,希望对相关人士能有所帮助。 相似文献
23.
《国际互联网参考资料服务季刊》2013,18(1-2):189-208
SUMMARY University students-whether adult, distance learner, or traditional age-need access to university services and quick accurate answers to their questions beyond traditional “business” hours. Students' busy schedules and changing life patterns dictate that university services meet their needs. At DePaul University in Chicago, student focus groups repeatedly pointed to the need for one central place to get an answer or solve a problem. DePaul Central was created as an information and referral service to satisfy that student need, at the same capitalizing on the value of the librarian skill set. 相似文献
24.
《国际互联网参考资料服务季刊》2013,18(2):75-96
Multi-user Data base (MUD) technology, and its object-oriented descendant (MOO), is one of the most exciting tools to surface on the Internet, and offers libraries and librarians a unique opportunity to participate in creating user-friendly standardized interfaces to many of our most frequently used resources. These resources include those we access through the Internet already, using gopher, telnet, WWW, and FTP, and also those proprietary databases that we currently access through leased lines such as OCLC First Search, Prism, DIALOG, and many others. MOO technology is already being used successfully to create user-extensible collaborative professional environments for educators, astronomers, and computer network systems administrators. With the growing relevance of the Internet for libraries and other information professionals, it behooves the library community to engage those emerging technologies which will aloow us to interface most effectively with the Internet and its many resources, with the proprietary databases which we depend on, and with one another. 相似文献
25.
Chaoqing Yu Alan M. MacEachren Donna J. Peuquet Brent Yarnal 《Environmental Modelling & Software》2009,24(12):1501-1512
Recent natural disasters indicate that modern technologies for environmental monitoring, modeling, and forecasting are not well integrated with cross-level social responses in many hazard-management systems. This research addresses this problem through a Java-based multi-agent prototype system, GeoAgent-based Knowledge System (GeoAgentKS). This system allows: (1) computer representation of institutional regulations and behavioral rules used by multiple social institutions and individuals in cross-level human–environment interactions, (2) integration of this representation with scientific modeling of dynamic hazard development, and (3) application of automated reasoning that suggests to users the appropriate actions for supporting cooperative social responses. This paper demonstrates the software architecture of GeoAgentKS and presents such an integrated approach by modeling the drought management processes in Central Pennsylvania, USA. The results show that it is possible to use GeoAgentKS to represent multilevel human–environment interactions and to use those interactions as input to decision making in hazard management. 相似文献
26.
In this paper, we consider randomly failing equipment leased several times during their life cycle with a given warranty period. A mathematical model is developed to determine the optimal efficiency levels of preventive maintenance (PM) to be performed on the equipment between successive lease periods, maximising the expected total profit of the lessor over the equipment life cycle. The model considers the expected leasing revenue as well as the equipment acquisition cost and the average PM and repair costs. PM actions allow reducing the age of the equipment to a certain extent with a corresponding cost depending on the PM level adopted. The efficiency of the PM is determinant of the expected revenue during the next lease period. Given a set of K possible PM levels and the number of lease periods n over the equipment life cycle, Kn?1 PM strategies are possible. A genetic algorithm is proposed in order to obtain nearly optimal policies in situations where the number of possibilities Kn?1 is very high. Obtained numerical results are discussed. Small- and big-size instances of the problem are considered in the case of a service company in the oil and gas industry specialised in leasing specific equipment such as separators, to oil companies for production activities with a limited duration of several months like well testing or short production tests. 相似文献
27.
Tony Tan 《Journal of Computer and System Sciences》2010,76(8):778-791
In this paper we study a subclass of pebble automata (PA) for data languages for which the emptiness problem is decidable. Namely, we show that the emptiness problem for weak 2-pebble automata is decidable, while the same problem for weak 3-pebble automata is undecidable. We also introduce the so-called top view weak PA. Roughly speaking, top view weak PA are weak PA where the equality test is performed only between the data values seen by the two most recently placed pebbles. The emptiness problem for this model is still decidable. It is also robust: alternating, non-deterministic and deterministic top view weak PA have the same recognition power; and are strong enough to accept all data languages expressible in Linear Temporal Logic with the future-time operators, augmented with one register freeze quantifier. 相似文献
28.
宋光 《数字社区&智能家居》2011,(6)
在社会日益发展的今天,传统的图书馆服务模式已经无法适用新形势的发展要求,数字化、网络化等计算机信息技术的出现并应用,促使图书馆从传统功能模式向开放式、网络式的信息服务模式转变,由单一功能向多功能转变,从根本上推动了图书馆事业的发展。 相似文献
29.
Sharon Christensen William J. Caelli William D. Duncan 《Information & Communications Technology Law》2010,19(1):61-85
Critical, or national, information infrastructure protection, referred to as either CIIP or NIIP, has been highlighted as a critical factor in overall national security by the United States, the United Kingdom, India and the European Community. As nations move inexorably towards so-called ‘digital economies’, critical infrastructure depends on information systems to process, transfer, store and exchange information through the Internet. Electronic attacks such as denial of service attacks on critical information infrastructures challenge the law and raise concerns. A myriad of issues potentially plague the protection of critical information infrastructures owing to the lack of legal regulation aimed at ensuring the protection of critical information infrastructures. This paper will highlight the legal concerns that relate to the denial of service attacks on critical information infrastructures and provide an introductory overview of the law as it relates to CIIP in Australia. 相似文献
30.
The problem of transporting patients or elderly people has been widely studied in literature and is usually modeled as a dial-a-ride problem (DARP). In this paper we analyze the corresponding problem arising in the daily operation of the Austrian Red Cross. This nongovernmental organization is the largest organization performing patient transportation in Austria. The aim is to design vehicle routes to serve partially dynamic transportation requests using a fixed vehicle fleet. Each request requires transportation from a patient's home location to a hospital (outbound request) or back home from the hospital (inbound request). Some of these requests are known in advance. Some requests are dynamic in the sense that they appear during the day without any prior information. Finally, some inbound requests are stochastic. More precisely, with a certain probability each outbound request causes a corresponding inbound request on the same day. Some stochastic information about these return transports is available from historical data. The purpose of this study is to investigate, whether using this information in designing the routes has a significant positive effect on the solution quality. The problem is modeled as a dynamic stochastic dial-a-ride problem with expected return transports. We propose four different modifications of metaheuristic solution approaches for this problem. In detail, we test dynamic versions of variable neighborhood search (VNS) and stochastic VNS (S-VNS) as well as modified versions of the multiple plan approach (MPA) and the multiple scenario approach (MSA). Tests are performed using 12 sets of test instances based on a real road network. Various demand scenarios are generated based on the available real data. Results show that using the stochastic information on return transports leads to average improvements of around 15%. Moreover, improvements of up to 41% can be achieved for some test instances. 相似文献