首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1411篇
  免费   61篇
  国内免费   73篇
电工技术   30篇
技术理论   1篇
综合类   391篇
化学工业   61篇
金属工艺   16篇
机械仪表   36篇
建筑科学   271篇
矿业工程   28篇
能源动力   14篇
轻工业   22篇
水利工程   24篇
石油天然气   18篇
武器工业   15篇
无线电   86篇
一般工业技术   54篇
冶金工业   54篇
自动化技术   424篇
  2024年   4篇
  2023年   4篇
  2022年   28篇
  2021年   16篇
  2020年   20篇
  2019年   19篇
  2018年   17篇
  2017年   22篇
  2016年   22篇
  2015年   33篇
  2014年   91篇
  2013年   70篇
  2012年   85篇
  2011年   110篇
  2010年   130篇
  2009年   103篇
  2008年   87篇
  2007年   125篇
  2006年   124篇
  2005年   84篇
  2004年   74篇
  2003年   64篇
  2002年   53篇
  2001年   39篇
  2000年   32篇
  1999年   9篇
  1998年   22篇
  1997年   13篇
  1996年   7篇
  1995年   4篇
  1994年   8篇
  1993年   1篇
  1992年   2篇
  1990年   1篇
  1989年   2篇
  1988年   1篇
  1987年   2篇
  1984年   3篇
  1983年   1篇
  1982年   4篇
  1981年   1篇
  1974年   1篇
  1973年   1篇
  1972年   1篇
  1970年   1篇
  1969年   1篇
  1964年   1篇
  1958年   1篇
  1954年   1篇
排序方式: 共有1545条查询结果,搜索用时 15 毫秒
111.
Whether the cloud computing environment is credible is the key factor in the promotion and effective use of cloud computing.For this reason,the expected value decision method in risk decision-making was improved.The usage scenarios was redefined,the cost and benefit of audit scheme was digitized,and a virtual machine trusted auditing strategy based on improved expectation decision method was proposed.Several levels of security protection for the user virtual machine was provided,and the optimal audit scheme was selected autonomously according to the security protection level chosen by the user for the virtual machine.The virtual machine introspection (VMI) technology was used to obtain the virtual machine information that needs to be audited.The designed encryption mechanism was used to protect the security of users selected security protection level,so as to ensure the security of user virtual machine selection audit strategy.Finally,the simulation results show that the scheme has good performance and validity.  相似文献   
112.
为研究和考证现行枪械定型试验国军标中规定的枪械射击方法的合理性,从最典型的战斗类型——进攻战与防御战出发,经实战分析与研究,结合部队、院校广泛调研情况,确定了既可满足试验要求也可指导实战的各种枪械射击方法。  相似文献   
113.
解决语义鸿沟必须建立图像低层特征到高层语义的映射,针对此问题,本文提出了一种基于词汇树层次语义模型的图像检索方法.首先提取图像包含颜色信息的SIFT特征来构造图像库的特征词汇树,生成描述图像视觉信息的视觉词汇.并在此基础上利用Bayesian决策理论实现视觉词汇到语义主题信息的映射,进而构造了一个层次语义模型,并在此模型基础上完成了基于内容的语义图像检索算法.通过检索过程中用户的相关反馈,不仅可以加入正反馈图像扩展图像查询库,同时能够修正高层语义映射.实验结果表明,基于该模型的图像检索算法性能稳定,并且随着反馈次数的增加,检索效果明显提升.  相似文献   
114.
Despite the fact that the benefits of student question generation are well documented, most students do not take part in question generation exercises during their formal schooling and are not accustomed to authoring questions. Under the premise that student question generation activities should be better supported in a timely, flexible and logistically feasible fashion, a customizable online learning environment that accentuates various scaffolding techniques has been designed and developed. The framework guiding the development of the system, and its associated designs, are described. To assess the various built-in scaffolds used to support students’ learning activities by means of question generation, a study was undertaken to that measured students’ perceived usefulness of each mechanism, as well as the effects of the perceived usefulness of the scaffolds on students’ attitudes toward question generation learning activities in general. The data collected indicated that, by utilizing computers and network technologies, the developed system provided a supportive learning environment for student’s question generation learning activities. Support features not yet included in other similar systems (including access to generic question stems with sample questions, access to model questions, two-way cyclic communication between authors of question and assessors, and the ability to conceal one’s real identity by anonymity or nickname, etc.), were confirmed to provide a high level of support. Recommendations for classroom implementations and future studies are offered.  相似文献   
115.
大学章程制定权实质是大学自治权的核心,在法治原则下,其来源于法律的授予。法律授予制定权的对象为制定主体,制定主体中真正起作用的是行使审议和表决通过权的决策主体,行使其他权利的则为影响主体。域内外各地区有关大学章程制定主体的实践表明,制定主体一般为大学各方利益主体的联合大会。  相似文献   
116.
产学一体化是高职院校人才培养的重要途径,商贸类不同专业可从多种模式中选择适合自己的进行实践,并对教育教学方式进行系统改革、创新。  相似文献   
117.
财务在线稽核是国网公司开展风险在线监控的一项重要内容,也是国网公司近几年重点财务工作之一。文章通过对目前基层单位在线稽核管理能力现状进行分析,指出目前在线稽核管理工作中存在的问题,并对这些问题提出合理化建议,以期对各单位在线稽核管理能力的提升有所助益。  相似文献   
118.
罗馨  姚佳玲 《陶瓷》2013,(19):45-46
纹形装饰是古瓷装饰艺术的一朵奇葩,是艺术陶瓷的文化与价值的体现。兔形纹饰是以兔为装饰对象,撷取其蹲、跳、闪、奔、躲、仰、顾等生动形象,表现了其机灵、敏捷、勤奋、睿智、温和、仁善和勇敢的优良品性,汇集其神话传说、民间故事等优秀题材,深刻体现兔形纹饰的丰富文化内涵。经历几千年的淘炼与继承,兔形纹饰形成了独具特色的艺术风格和简、繁、符、形、神、文融为一体的完备体系。观、赏、玩、研,俱让人体味一种特殊的美感。  相似文献   
119.
Reducing energy consumption is becoming an increasingly high government priority. Teenagers are an important category of future energy consumers, but little is known of their conceptions about energy and, particularly, how formal learning about energy translates into understanding of personal energy consumption. We have worked with teenagers to investigate the design of learning technologies that support understanding about energy consumption in a way that is relevant to teenagers' personal contexts, including their motivations, concerns and conceptions, their personal energy consumption, and the sources of information about energy already available to them. In this paper we report on our findings and participatory design methodology. The findings contribute to our understanding of the support learning technologies must provide to scaffold teenagers' learning about personal energy consumption, in terms of how teenagers conceptualise energy consumption, what skills they have in searching for information, and what they consider motivating and relevant. Our methodology, more generally, contributes to our understanding of the initial phases of developing learning technologies that are grounded in an understanding of learners' personal contexts.  相似文献   
120.
This paper describes the flexibility of Personal Response Systems (PRSs), (also known as ‘clickers’ or electronic voting systems (EVS)), as part of strategies to support students’ learning in science. Whilst variants of this technology began to appear 12 years ago, there is now a steadily increasing adoption of these systems within higher education, including science programmes, and this use has grown significantly in the last six years. They have previously been shown to offer a measurable learning benefit. Typically, someone at an institution buys these systems for learning support and they never make it out of their cases. Far less work has been done with these systems at school level. In this practitioner based paper, the broad range of practical uses for these systems is described in a variety of formal and informal learning situations – from testing the understanding of science concepts (from primary aged school children up to physics undergraduates), to undertaking evaluation of events as well as public participation in data collection for research on attitudes to careers. In addition, the data collected on such handsets can be mapped to demographic factors such as gender and age yielding further layers of analysis. Overall this is a highly flexible and transferable approach to the use of interactive technology for engaging learners of all ages as well as carrying out research.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号