首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11667篇
  免费   460篇
  国内免费   474篇
电工技术   319篇
综合类   1144篇
化学工业   306篇
金属工艺   117篇
机械仪表   782篇
建筑科学   1657篇
矿业工程   397篇
能源动力   325篇
轻工业   489篇
水利工程   289篇
石油天然气   382篇
武器工业   50篇
无线电   705篇
一般工业技术   839篇
冶金工业   546篇
原子能技术   174篇
自动化技术   4080篇
  2024年   3篇
  2023年   63篇
  2022年   118篇
  2021年   121篇
  2020年   179篇
  2019年   158篇
  2018年   153篇
  2017年   195篇
  2016年   250篇
  2015年   273篇
  2014年   644篇
  2013年   732篇
  2012年   780篇
  2011年   1104篇
  2010年   770篇
  2009年   658篇
  2008年   690篇
  2007年   800篇
  2006年   800篇
  2005年   689篇
  2004年   604篇
  2003年   585篇
  2002年   477篇
  2001年   367篇
  2000年   306篇
  1999年   269篇
  1998年   208篇
  1997年   130篇
  1996年   98篇
  1995年   80篇
  1994年   55篇
  1993年   39篇
  1992年   27篇
  1991年   21篇
  1990年   12篇
  1989年   21篇
  1988年   17篇
  1987年   15篇
  1986年   8篇
  1985年   22篇
  1984年   18篇
  1983年   13篇
  1982年   7篇
  1981年   10篇
  1980年   2篇
  1978年   2篇
  1973年   1篇
  1972年   1篇
  1971年   1篇
  1964年   1篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
11.
The worldwide proliferation of fraudulent materials has brought about the need for a new approach to the control of purchased material quality. Nuclear power, defense, aerospace and many other industries are affected by the supply of poor quality clones that presume to be original replacement parts. Safety considerations abound as these highly defective materials are used in systems that are critical to the preservation of human lives. Commonly utilized quality assurance programs have not effectively stopped the influx of fraudulent materials. These programs fail to concentrate inspection efforts on materials and inspection attributes that would effectively prevent the acceptance of fraudulent materials. herein a solution is presented to this problem in the form of an expert system application. Information commonly available in industry is formulated into a knowledge based system wherein advisories are given to the user regarding key purchased material receipt inspection strategies.  相似文献   
12.
D. G. Nel  P. C. N. Groenewald 《TEST》1993,2(1-2):111-124
Summary Two independent random samples of sizesN 1 andN 2 from multivariate normal populationsN p 1,∑1) andN p 2,∑2) are considered. Under the null hypothesisH 0: θ12, a single θ is generated from aN p(μ, Σ) prior distribution, while underH 1: θ1≠θ2 two means are generated from the exchangeable priorN p(μ,σ). In both cases Σ will be assumed to have a vague prior distribution. For a simple covariance structure, the Bayes factorB and minimum Bayes factor in favour of the null hypotheses is derived. The Bayes risk for each hypothesis is derived and a strategy is discussed for using the Bayes factor and Bayes risks to test the hypothesis.  相似文献   
13.
针对中小型企业销售管理的现状,利用J2EE架构技术设计了面向中小型企业的销售管理信息系统,该系统具有良好的跨平台性和可移植性,并且经过测试运行,达到了预期的效果。  相似文献   
14.
通过体系整合的必要性和可行性分析,介绍运用管理的系统方法,以质量管理体系为基础,策划、推进及实施整合型QHSE管理体系的做法,并对各阶段体系建立的方法与措施进行阐述。  相似文献   
15.
The evaluation of the exploration risk in the oil industry is a fundamental component of the decision process related to the exploratory phase. In this paper the two basic components of the exploratory risk: trap geometry and trapped hydrocarbon quantities (fluid), are compounded in a single coherent uncertainty and sensitivity approach. The results clarify that the model geometry influences each Petroleum System Modeling step and that the geometric uncertainty is correlated with the fluid uncertainty. The geometric uncertainty evaluation makes use of geostatistical techniques that produce a number of possible realizations of the trap geometry, all compatible with available data. The evaluation of the fluid uncertainty, through a Monte Carlo methodology, allows us to compute the possible quantities of oil and gas, generated in a basin and migrated from the hydrocarbon source location to each single trap. The final result is the probability distribution of oil and gas for each trap in the basin, together with other useful indicators like: the hydrocarbon filling probability map, the closure probability map, the drainage area probability map, the spilling paths probabilities, the trap-filling scenarios.  相似文献   
16.
范永兴 《柳钢科技》2006,(F11):36-38
简要介绍焦化厂6m焦炉投产一年多以来的生产现状,整改措施和焦炉热工管理。  相似文献   
17.
赵崇广 《地矿测绘》2003,19(3):28-30
结合福州市行政区域界线勘查工作已结束的实际和社会信息化发展的趋势,提出建立该市市、县级行政区域界线信息管理系统的重要性,对该系统的基本框架、实施方案、建立步骤及与“数字福建”接轨等问题进行了初步讨论,提出了建议。  相似文献   
18.
The development of autonomous mobile machines to perform useful tasks in real work environments is currently being impeded by concerns over effectiveness, commercial viability and, above all, safety. This paper introduces a case study of a robotic excavator to explore a series of issues around system development, navigation in unstructured environments, autonomous decision making and changing the behaviour of autonomous machines to suit the prevailing demands of users. The adoption of the Real-Time Control Systems (RCS) architecture (Albus, 1991) is proposed as a universal framework for the development of intelligent systems. In addition it is explained how the use of Partially Observable Markov Decision Processes (POMDP) (Kaelbling et al., 1998) can form the basis of decision making in the face of uncertainty and how the technique can be effectively incorporated into the RCS architecture. Particular emphasis is placed on ensuring that the resulting behaviour is both task effective and adequately safe, and it is recognised that these two objectives may be in opposition and that the desired relative balance between them may change. The concept of an autonomous system having “values” is introduced through the use of utility theory. Limited simulation results of experiments are reported which demonstrate that these techniques can create intelligent systems capable of modifying their behaviour to exhibit either ‘safety conscious’ or ‘task achieving’ personalities.  相似文献   
19.
The need for better protecting our vital infrastructure from being damaged or destroyed has received increased attention since the terrorist attacks on September 11, 2001. The tragedy of having thousands of innocent people die before the eyes of an entire nation awakened people to the reality of “managed” attacks of unthinkable magnitudes. However, tragedies of a smaller scale are a daily occurrence but accepted as “collateral damage” of work in an unsafe environment. This paper presents a cost-benefit analysis to address the question of how much money should be spent in protecting underground utilities from damage. During the study of an actual incident it was found that the total costs of such accidents are vastly underreported because only costs for emergency responses and repair are tallied up. This paper makes the case that a comprehensive approach for assessing the total economic impact of such incidents on the public, business, and government is the critical stepping stone to a mathematical optimization of expenditure for damage prevention. In addition, the reader will quickly realize that the use of the presented optimization model provides theoretical underpinning for the engineering profession in its effort to better protect our critical infrastructure from terrorist attacks.  相似文献   
20.
Business, not technology leaders should manage the change of Information Technology (IT) from a self-contained business support unit of the sixties to a distributed strategic business function of the nineties. Top management should recognize that a good business plan can only be developed and executed through the partnership between the business unit managers and the managers of the financial, the personnel, and the IT resource units. The technical problems associated with the management of IT may again be the easier part of the total management challenge.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号