全文获取类型
收费全文 | 18501篇 |
免费 | 2419篇 |
国内免费 | 2260篇 |
专业分类
电工技术 | 1030篇 |
技术理论 | 4篇 |
综合类 | 1575篇 |
化学工业 | 280篇 |
金属工艺 | 166篇 |
机械仪表 | 564篇 |
建筑科学 | 452篇 |
矿业工程 | 211篇 |
能源动力 | 160篇 |
轻工业 | 129篇 |
水利工程 | 160篇 |
石油天然气 | 191篇 |
武器工业 | 171篇 |
无线电 | 3101篇 |
一般工业技术 | 914篇 |
冶金工业 | 583篇 |
原子能技术 | 62篇 |
自动化技术 | 13427篇 |
出版年
2024年 | 194篇 |
2023年 | 626篇 |
2022年 | 817篇 |
2021年 | 995篇 |
2020年 | 1033篇 |
2019年 | 654篇 |
2018年 | 610篇 |
2017年 | 734篇 |
2016年 | 803篇 |
2015年 | 912篇 |
2014年 | 1494篇 |
2013年 | 1335篇 |
2012年 | 1444篇 |
2011年 | 1396篇 |
2010年 | 953篇 |
2009年 | 961篇 |
2008年 | 1085篇 |
2007年 | 1205篇 |
2006年 | 926篇 |
2005年 | 865篇 |
2004年 | 713篇 |
2003年 | 618篇 |
2002年 | 468篇 |
2001年 | 429篇 |
2000年 | 304篇 |
1999年 | 267篇 |
1998年 | 198篇 |
1997年 | 155篇 |
1996年 | 142篇 |
1995年 | 120篇 |
1994年 | 133篇 |
1993年 | 80篇 |
1992年 | 79篇 |
1991年 | 58篇 |
1990年 | 53篇 |
1989年 | 47篇 |
1988年 | 38篇 |
1987年 | 21篇 |
1986年 | 22篇 |
1985年 | 19篇 |
1984年 | 9篇 |
1983年 | 12篇 |
1980年 | 9篇 |
1979年 | 10篇 |
1966年 | 12篇 |
1965年 | 9篇 |
1964年 | 11篇 |
1963年 | 7篇 |
1957年 | 8篇 |
1955年 | 10篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
41.
42.
凌礼富 《武汉化工学院学报》1991,(4)
本文通过对SIMATIC S5—115U可编程控制器性能的简介,简述国外PC技术的现状和发展,并提出对PC国产化的看法. 相似文献
43.
44.
Multiple forms of a symbol-digit substitution task were used to provide a componential analysis of age differences in coding task performance. The results demonstrated age differences in feature encoding, memory, and visual search. A 2nd experiment was conducted with young adults to investigate a sensory deficit as a locus of age differences. The spatial contrast sensitivity deficit of older adults was simulated on forms by applying a digital filter. Persons in the age-simulated contrast condition performed worse than those in the normal contrast condition. The stimulus degradation effect was linked to visual search speed. The study illustrates the utility of componential analysis and offers direct support for the hypothesis that sensory deficits affect performance on tasks used to assess intelligence (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
45.
Differentiation of the construct of emotional intelligence was investigated in young and middle-aged adults, on the basis of hypotheses generated from differential emotions theory, discrete emotions functionalist theory, and empirical literature on age-related changes in affective complexity and differentiation of abilities. Both age groups were characterized by the same set of comparably related dimensions. However, midlife adults reported significantly greater use of optimism as a mood-regulation strategy than was reported by young adults. This study considers implications of possible structural continuity in emotional intelligence in conjunction with mean increases in the use of optimism as a strategy for managing affect. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
46.
This article reviews the theory of successful intelligence and attempts to construct-validate the theory of successful intelligence. It describes 4 distinct converging operations that have been used in these attempts. Two sets involve internal validation of the structure of the theory and 2 sets external validation of the theory with outside criteria. The internal validation operations involve information-processing (componential) analyses and both exploratory and confirmatory factor analyses. The external validation operations involve correlational analysis and analyses of instructional interventions based on the theory. The results are generally supportive of the theory and suggest that conventional conceptions of intelligence may be too narrow. The theory is of use in consulting because it broadens the scope of skills one looks for in seeking "intelligent" people for hiring, retention, and promotion and in assessing a person's ability to do his or her current job. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
47.
XIAN He-qun FENG Deng-guo 《通讯和计算机》2007,4(3):44-51
Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various security issues. This paper proposes a method called Private Key Consignment to solve the problem of how to protect the data carried by mobile agents. It exploits new functionalities and mechanism provided by the trusted computing technology, and adopts both public key and symmetric key cryptographic means for data and key protection. The most notable feature of this method is that it protects the private key of the agent by consigning it to a tamper proof hardware, thus, enabling convenient and secure use of the private key. It provides a new scheme of mobile agents' data protection. 相似文献
48.
Kuo-Ming Chao Muhammad Younas Nick Godwin Pen-Choug Sun 《International Journal of Wireless Information Networks》2006,13(2):141-150
The popularity of grid services has widened their application to numerous domains and increased the utilization of computational resources. In order to create more incentives for the resources owners to lease their resources and prevent users from wasting the resources, the introduction of a market-oriented grid is inevitable. However, the issues for the negotiation between service provider and consumer over the supply and demand of resources can be complex, with highly interdependent issues. In this research, a simulated automated negotiation mechanism including a co-evolutionary mechanism and a modified game theory approach is proposed, to assist them in reaching an agreement over the conflicting issues. In the proposed architecture, the co-evolution process is able to reduce the multiple dimensional search space into a two-dimension search space and identify the appropriate negotiation strategies for the negotiating agents to form a payoff matrix which can be used for the game theory related stage of their interaction. The multiple stage negotiation process is introduced to improve the negotiation result. In this paper, an application which requires a large amount of computational resources to process the data generated from mobile devises is used to demonstrate that the proposed system is able to resolve the conflicts and obtain a valid solution. 相似文献
49.
论企业竞争情报信息系统的构建与重要性 总被引:1,自引:0,他引:1
简要地述叙了现代企业构建竞争情报信息系统的必要性,介绍了竞争情报信息的构建与应用以及该系统在企业中所起的重要作用。 相似文献
50.
The Grid shows itself as a globally distributed computing environment, in which hardware and software resources are virtualized to transparently provide applications with vast capabilities. Just like the electrical power grid, the Grid aims at offering a powerful yet easy‐to‐use computing infrastructure to which applications can be easily ‘plugged’ and efficiently executed. Unfortunately, it is still very difficult to Grid‐enable applications, since current tools force users to take into account many details when adapting applications to run on the Grid. In this paper, we survey some of the recent efforts in providing tools for easy gridification of applications and propose several taxonomies to identify approaches followed in the materialization of such tools. We conclude this paper by describing common features among the proposed approaches, and by pointing out open issues and future directions in the research and development of gridification methods. Copyright © 2007 John Wiley & Sons, Ltd. 相似文献