全文获取类型
收费全文 | 19911篇 |
免费 | 2339篇 |
国内免费 | 1908篇 |
专业分类
电工技术 | 1312篇 |
综合类 | 2632篇 |
化学工业 | 1254篇 |
金属工艺 | 1036篇 |
机械仪表 | 972篇 |
建筑科学 | 837篇 |
矿业工程 | 450篇 |
能源动力 | 485篇 |
轻工业 | 377篇 |
水利工程 | 438篇 |
石油天然气 | 459篇 |
武器工业 | 254篇 |
无线电 | 2141篇 |
一般工业技术 | 1733篇 |
冶金工业 | 1178篇 |
原子能技术 | 99篇 |
自动化技术 | 8501篇 |
出版年
2024年 | 64篇 |
2023年 | 239篇 |
2022年 | 402篇 |
2021年 | 523篇 |
2020年 | 630篇 |
2019年 | 614篇 |
2018年 | 541篇 |
2017年 | 681篇 |
2016年 | 699篇 |
2015年 | 783篇 |
2014年 | 1142篇 |
2013年 | 1392篇 |
2012年 | 1270篇 |
2011年 | 1404篇 |
2010年 | 1153篇 |
2009年 | 1243篇 |
2008年 | 1234篇 |
2007年 | 1460篇 |
2006年 | 1234篇 |
2005年 | 1107篇 |
2004年 | 934篇 |
2003年 | 806篇 |
2002年 | 736篇 |
2001年 | 593篇 |
2000年 | 480篇 |
1999年 | 449篇 |
1998年 | 355篇 |
1997年 | 320篇 |
1996年 | 266篇 |
1995年 | 232篇 |
1994年 | 233篇 |
1993年 | 160篇 |
1992年 | 138篇 |
1991年 | 91篇 |
1990年 | 109篇 |
1989年 | 85篇 |
1988年 | 63篇 |
1987年 | 42篇 |
1986年 | 23篇 |
1985年 | 21篇 |
1984年 | 33篇 |
1983年 | 27篇 |
1982年 | 25篇 |
1981年 | 16篇 |
1980年 | 16篇 |
1979年 | 16篇 |
1978年 | 9篇 |
1977年 | 7篇 |
1966年 | 7篇 |
1955年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
51.
预期回报对决策具有决定性的影响。基于行为经济模型,认为创业决策依赖于预期回报和欲望水平之间的相互作用,并通过计量分析验证了预期回报对创业决策的影响。 相似文献
52.
R.A. Forrest 《Fusion Engineering and Design》2006,81(18):2143-2156
Existing neutron cross section libraries such as EAF-2003 contain a large number of reactions. Of these only a small proportion are significant in the production of the nuclides that dominate activation quantities such as activity or γ-dose rate at various decay times. These reactions were identified in a recent extensive set of calculations on all the elements and reported in the ‘Activation Handbook’. These 1340 reactions are considered here and the set of reactions with no differential or integral data are listed and prioritised. A set of 339 reactions with very limited possibility of measurement are given; these require further study by theoretical calculations. A set of 100 reactions with either discrepant or no data, that might be measurable are listed and are recommended to be the subject of future experimental work. 相似文献
53.
The paper presents a case study of the development of an expert decision support system which uses simple heuristic methods for fast determination of routes for simultaneous signals in a transmission network of limited capacity. It illustrates how heuristic solutions can be embodied in a model-based DSS and how the standard decision support literature, although intuitively appealing, provides little practical assistance in system construction or classification 相似文献
54.
现场地质预测与决策技术 总被引:1,自引:1,他引:0
油气的生成、运移、分布、成藏、保存具有规律性,技术人员可以依据其规律性对地下地质情况进行推理、预测和决策。钻井过程的现场地质预测技术方法主要是外推法、因果法和直观法三大类。外推法是常用的预测方法,包含了岩性、沉积旋回、标志层、标准层、重矿物等岩石地层学对比方法和生物地层学方法及地球物理方法。现场地质预测与决策是通过确定预测目标、收集相关资料、进行对比分析、形成地质预测结果、拟定地质决策方案、方案优选、方案实施等环节来完成。该技术是现场地质监督的核心技术,在实践中取得显著成效。 相似文献
55.
Using the analytic network process (ANP) in a SWOT analysis - A case study for a textile firm 总被引:5,自引:0,他引:5
?hsan Yüksel 《Information Sciences》2007,177(16):3364-3382
Strengths, Weaknesses, Opportunities and Threats (SWOT) analysis does not provide an analytical means to determine the importance of the identified factors or the ability to assess decision alternatives according to these factors. Although the analysis successfully pinpoints the factors, individual factors are usually described briefly and very generally. For this reason, SWOT analysis possesses deficiencies in the measurement and evaluation steps. Although the analytic hierarchy process (AHP) technique removes these deficiencies, it does not allow for measurement of the possible dependencies among the factors. The AHP method assumes that the factors presented in the hierarchical structure are independent; however, this assumption may be inappropriate in light of certain internal and external environmental effects. Therefore, it is necessary to employ a form of SWOT analysis that measures and takes into account the possible dependency among the factors. This paper demonstrates a process for quantitative SWOT analysis that can be performed even when there is dependence among strategic factors. The proposed algorithm uses the analytic network process (ANP), which allows measurement of the dependency among the strategic factors, as well as AHP, which is based on the independence between the factors. Dependency among the SWOT factors is observed to effect the strategic and sub-factor weights, as well as to change the strategy priorities. 相似文献
56.
简介了关系模型、键、完整性规则、E-R模型、函数依赖、模式分解和关系模式的范式等数据库技术基础和规范化设计理论,从键和完整性规则的实现、数据冗余的特殊情况和字典设计等方面论述了在实际设计工作中如何灵活运用关系数据库设计理论。 相似文献
57.
An actor-critic type reinforcement learning algorithm is proposed and analyzed for constrained controlled Markov decision processes. The analysis uses multiscale stochastic approximation theory and the envelope theorem' of mathematical economics. 相似文献
58.
The infrastructure renewal program at MIT consists of a large number of projects with an estimated budget that could approach $1 billion. Infrastructure renewal at the Massachusetts Institute of Technology (MIT) is the process of evaluating and investing in the maintenance of facility systems and basic structure to preserve existing campus buildings. The selection and prioritization of projects must be addressed with a systematic method for the optimal allocation of funds and other resources. This paper presents a case study of a prioritization method utilizing multi-attribute utility theory. This method was developed at MIT's Department of Nuclear Engineering and was deployed by the Department of Facilities after appropriate modifications were implemented to address the idiosyncrasies of infrastructure renewal projects and the competing criteria and constraints that influence the judgment of the decision-makers. Such criteria include minimization of risk, optimization of economic impact, and coordination with academic policies, programs, and operations of the Institute. A brief overview of the method is presented, as well as the results of its application to the prioritization of infrastructure renewal projects. Results of workshops held at MIT with the participation of stakeholders demonstrate the feasibility of the prioritization method and the usefulness of this approach. 相似文献
59.
60.
Buffer overflow vulnerabilities are one of the most commonly and widely exploited security vulnerabilities in programs. Most existing solutions for avoiding buffer overflows are either inadequate, inefficient or incompatible with existing code. In this paper, we present a novel approach for transparent and efficient runtime protection against buffer overflows. The approach is implemented by two tools: Type Information Extractor and Depositor (TIED) and LibsafePlus. TIED is first used on a binary executable or shared library file to extract type information from the debugging information inserted in the file by the compiler and reinsert it in the file as a data structure available at runtime. LibsafePlus is a shared library that is preloaded when the program is run. LibsafePlus intercepts unsafe C library calls such as strcpy and uses the type information made available by TIED at runtime to determine whether it would be ‘safe’ to carry out the operation. With our simple design we are able to protect most applications with a performance overhead of less than 10%. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献