全文获取类型
收费全文 | 11667篇 |
免费 | 460篇 |
国内免费 | 474篇 |
专业分类
电工技术 | 319篇 |
综合类 | 1144篇 |
化学工业 | 306篇 |
金属工艺 | 117篇 |
机械仪表 | 782篇 |
建筑科学 | 1657篇 |
矿业工程 | 397篇 |
能源动力 | 325篇 |
轻工业 | 489篇 |
水利工程 | 289篇 |
石油天然气 | 382篇 |
武器工业 | 50篇 |
无线电 | 705篇 |
一般工业技术 | 839篇 |
冶金工业 | 546篇 |
原子能技术 | 174篇 |
自动化技术 | 4080篇 |
出版年
2024年 | 3篇 |
2023年 | 63篇 |
2022年 | 118篇 |
2021年 | 121篇 |
2020年 | 179篇 |
2019年 | 158篇 |
2018年 | 153篇 |
2017年 | 195篇 |
2016年 | 250篇 |
2015年 | 273篇 |
2014年 | 644篇 |
2013年 | 732篇 |
2012年 | 780篇 |
2011年 | 1104篇 |
2010年 | 770篇 |
2009年 | 658篇 |
2008年 | 690篇 |
2007年 | 800篇 |
2006年 | 800篇 |
2005年 | 689篇 |
2004年 | 604篇 |
2003年 | 585篇 |
2002年 | 477篇 |
2001年 | 367篇 |
2000年 | 306篇 |
1999年 | 269篇 |
1998年 | 208篇 |
1997年 | 130篇 |
1996年 | 98篇 |
1995年 | 80篇 |
1994年 | 55篇 |
1993年 | 39篇 |
1992年 | 27篇 |
1991年 | 21篇 |
1990年 | 12篇 |
1989年 | 21篇 |
1988年 | 17篇 |
1987年 | 15篇 |
1986年 | 8篇 |
1985年 | 22篇 |
1984年 | 18篇 |
1983年 | 13篇 |
1982年 | 7篇 |
1981年 | 10篇 |
1980年 | 2篇 |
1978年 | 2篇 |
1973年 | 1篇 |
1972年 | 1篇 |
1971年 | 1篇 |
1964年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
11.
Kyle A. Crawford
Osama K. Eyada PhD PE
《Computers & Industrial Engineering》1989,17(1-4):298-302The worldwide proliferation of fraudulent materials has brought about the need for a new approach to the control of purchased material quality. Nuclear power, defense, aerospace and many other industries are affected by the supply of poor quality clones that presume to be original replacement parts. Safety considerations abound as these highly defective materials are used in systems that are critical to the preservation of human lives. Commonly utilized quality assurance programs have not effectively stopped the influx of fraudulent materials. These programs fail to concentrate inspection efforts on materials and inspection attributes that would effectively prevent the acceptance of fraudulent materials. herein a solution is presented to this problem in the form of an expert system application. Information commonly available in industry is formulated into a knowledge based system wherein advisories are given to the user regarding key purchased material receipt inspection strategies. 相似文献
12.
Summary Two independent random samples of sizesN
1 andN
2 from multivariate normal populationsN
p
(θ1,∑1) andN
p
(θ2,∑2) are considered. Under the null hypothesisH
0: θ1=θ2, a single θ is generated from aN
p(μ, Σ) prior distribution, while underH
1: θ1≠θ2 two means are generated from the exchangeable priorN
p(μ,σ). In both cases Σ will be assumed to have a vague prior distribution. For a simple covariance structure, the Bayes factorB and minimum Bayes factor in favour of the null hypotheses is derived. The Bayes risk for each hypothesis is derived and a
strategy is discussed for using the Bayes factor and Bayes risks to test the hypothesis. 相似文献
13.
针对中小型企业销售管理的现状,利用J2EE架构技术设计了面向中小型企业的销售管理信息系统,该系统具有良好的跨平台性和可移植性,并且经过测试运行,达到了预期的效果。 相似文献
14.
张亚伟 《石油化工安全环保技术》2006,22(1):5-7
通过体系整合的必要性和可行性分析,介绍运用管理的系统方法,以质量管理体系为基础,策划、推进及实施整合型QHSE管理体系的做法,并对各阶段体系建立的方法与措施进行阐述。 相似文献
15.
Hydrocarbon exploration risk evaluation through uncertainty and sensitivity analyses techniques 总被引:1,自引:0,他引:1
Paolo Ruffo Livia Bazzana Alberto Consonni Anna Corradi Andrea Saltelli Stefano Tarantola 《Reliability Engineering & System Safety》2006,91(10-11):1155-1162
The evaluation of the exploration risk in the oil industry is a fundamental component of the decision process related to the exploratory phase. In this paper the two basic components of the exploratory risk: trap geometry and trapped hydrocarbon quantities (fluid), are compounded in a single coherent uncertainty and sensitivity approach. The results clarify that the model geometry influences each Petroleum System Modeling step and that the geometric uncertainty is correlated with the fluid uncertainty. The geometric uncertainty evaluation makes use of geostatistical techniques that produce a number of possible realizations of the trap geometry, all compatible with available data. The evaluation of the fluid uncertainty, through a Monte Carlo methodology, allows us to compute the possible quantities of oil and gas, generated in a basin and migrated from the hydrocarbon source location to each single trap. The final result is the probability distribution of oil and gas for each trap in the basin, together with other useful indicators like: the hydrocarbon filling probability map, the closure probability map, the drainage area probability map, the spilling paths probabilities, the trap-filling scenarios. 相似文献
16.
17.
结合福州市行政区域界线勘查工作已结束的实际和社会信息化发展的趋势,提出建立该市市、县级行政区域界线信息管理系统的重要性,对该系统的基本框架、实施方案、建立步骤及与“数字福建”接轨等问题进行了初步讨论,提出了建议。 相似文献
18.
The development of autonomous mobile machines to perform useful tasks in real work environments is currently being impeded
by concerns over effectiveness, commercial viability and, above all, safety. This paper introduces a case study of a robotic
excavator to explore a series of issues around system development, navigation in unstructured environments, autonomous decision
making and changing the behaviour of autonomous machines to suit the prevailing demands of users. The adoption of the Real-Time
Control Systems (RCS) architecture (Albus, 1991) is proposed as a universal framework for the development of intelligent systems. In addition it is explained how the use
of Partially Observable Markov Decision Processes (POMDP) (Kaelbling et al., 1998) can form the basis of decision making in the face of uncertainty and how the technique can be effectively incorporated into
the RCS architecture. Particular emphasis is placed on ensuring that the resulting behaviour is both task effective and adequately
safe, and it is recognised that these two objectives may be in opposition and that the desired relative balance between them
may change. The concept of an autonomous system having “values” is introduced through the use of utility theory. Limited simulation
results of experiments are reported which demonstrate that these techniques can create intelligent systems capable of modifying
their behaviour to exhibit either ‘safety conscious’ or ‘task achieving’ personalities. 相似文献
19.
Leonhard E. Bernold 《Canadian Metallurgical Quarterly》2003,129(6):645-652
The need for better protecting our vital infrastructure from being damaged or destroyed has received increased attention since the terrorist attacks on September 11, 2001. The tragedy of having thousands of innocent people die before the eyes of an entire nation awakened people to the reality of “managed” attacks of unthinkable magnitudes. However, tragedies of a smaller scale are a daily occurrence but accepted as “collateral damage” of work in an unsafe environment. This paper presents a cost-benefit analysis to address the question of how much money should be spent in protecting underground utilities from damage. During the study of an actual incident it was found that the total costs of such accidents are vastly underreported because only costs for emergency responses and repair are tallied up. This paper makes the case that a comprehensive approach for assessing the total economic impact of such incidents on the public, business, and government is the critical stepping stone to a mathematical optimization of expenditure for damage prevention. In addition, the reader will quickly realize that the use of the presented optimization model provides theoretical underpinning for the engineering profession in its effort to better protect our critical infrastructure from terrorist attacks. 相似文献
20.
Business, not technology leaders should manage the change of Information Technology (IT) from a self-contained business support unit of the sixties to a distributed strategic business function of the nineties. Top management should recognize that a good business plan can only be developed and executed through the partnership between the business unit managers and the managers of the financial, the personnel, and the IT resource units. The technical problems associated with the management of IT may again be the easier part of the total management challenge. 相似文献