首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   34688篇
  免费   3718篇
  国内免费   2460篇
电工技术   2758篇
技术理论   5篇
综合类   4122篇
化学工业   860篇
金属工艺   571篇
机械仪表   1267篇
建筑科学   5981篇
矿业工程   839篇
能源动力   484篇
轻工业   940篇
水利工程   668篇
石油天然气   354篇
武器工业   253篇
无线电   5750篇
一般工业技术   1461篇
冶金工业   533篇
原子能技术   81篇
自动化技术   13939篇
  2024年   152篇
  2023年   358篇
  2022年   714篇
  2021年   924篇
  2020年   1036篇
  2019年   760篇
  2018年   708篇
  2017年   949篇
  2016年   1072篇
  2015年   1171篇
  2014年   2859篇
  2013年   2234篇
  2012年   3080篇
  2011年   3389篇
  2010年   2478篇
  2009年   2526篇
  2008年   2465篇
  2007年   2779篇
  2006年   2312篇
  2005年   1980篇
  2004年   1550篇
  2003年   1378篇
  2002年   977篇
  2001年   775篇
  2000年   583篇
  1999年   379篇
  1998年   289篇
  1997年   201篇
  1996年   163篇
  1995年   109篇
  1994年   108篇
  1993年   69篇
  1992年   56篇
  1991年   38篇
  1990年   36篇
  1989年   29篇
  1988年   35篇
  1987年   15篇
  1986年   11篇
  1985年   22篇
  1984年   20篇
  1983年   23篇
  1982年   14篇
  1981年   6篇
  1980年   16篇
  1979年   3篇
  1959年   2篇
  1958年   2篇
  1955年   2篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
991.
为提高异型柱框架结构的抗震性能,笔者利用DRAIN-2DX程序,对长肢、底层长肢异型柱框架以及普通异型柱框架分别进行了弹塑性时程地震反应计算,较系统地分析了肢长的变化对结构整体地震反应的影响,为合理确定长肢异型柱的设计参数提供了数值分析依据.得出增大薄弱层异型柱肢长能够显著提高异型柱框架结构的抗震性能的结论.底层长肢异型柱框架能有效地克服了普通异型柱框架底层的薄弱现象;各层层间位移分布更为均匀,有利于抗震;对控制各层位移比普通异型柱框架更为有效.  相似文献   
992.
汽车碰撞中数据采集与分析   总被引:1,自引:0,他引:1  
介绍了汽车碰撞试验中电测量系统的要求与构成,通过VB和Matlab混合编写的数据分析软件对试验数据进行分析。对汽车正面碰撞乘员的各个伤害指标进行计算,提供了一种汽车安全性能客观的评价方法,同时也为汽车安全气囊的开发与系统匹配提供了重要的试验依据。  相似文献   
993.
电力监控自动化系统中信息安全防护的设计与应用   总被引:2,自引:0,他引:2       下载免费PDF全文
电力监控自动化系统的发展使得电力网络信息资源高度共享,然而一体化、网络化的发展使信息安全问题也更为突出。依据电力监控自动化系统中各应用系统的特点和安全要求,提出了一种新的信息安全防护系统设计方案,从系统网络架构上对系统进行有效的安全分区,应用各种网络安全技术实现系统横向和纵向的信息安全。最后阐述了该方案在某地区电网自动化系统设计中的整体安全防护的实际应用。  相似文献   
994.
基于密钥的安全认证系统设计   总被引:3,自引:0,他引:3  
提出了电子商务交易的安全需求,阐述了基于密钥的安全认证技术,如数字签名、数字信封等,并利用认证技术设计了一种实施方案,解决商务交易的安全问题,实现商务信息的真实性和交易双方的不可抵赖性.  相似文献   
995.
分析了万向联轴器法兰叉架的法兰破坏的原因 ,对法兰不同轴向截面进行受力分析 ,提出法兰厚度的计算公式。用这个计算公式可以对承担任何公称扭矩的任何轴向截面的法兰叉架的法兰进行强度计算及厚度确定。  相似文献   
996.
The internal/external frame of reference (I/E) model explains a seemingly paradoxical pattern of relations between math and verbal self-concepts and corresponding measures of achievement, extends social comparison theory, and has important educational implications. In a cross-cultural study of nationally representative samples of 15-year-olds from 26 countries (total N = 55,577), I/E predictions were supported in that (a) math and verbal achievements were highly correlated, but math and verbal self-concepts were nearly uncorrelated; (b) math achievement had positive effects on math self-concept, but negative effects on verbal self-concept; and (c) verbal achievement had positive effects on verbal self-concept, but negative effects on math self-concept. Supporting the cross-cultural generalizability of predictions, multigroup structural equation models demonstrated good support for the generalizabilify of results across 26 countries participating in the Programme for International Student Assessment project sponsored by the Organisation for Economic Co-operation and Development. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
997.
Single-mother, cohabiting 2-parent, and married 2-parent families with infants were compared on maternal and infant behavior, Home Observation for Measurement of the Environment (HOME) scores, and infant's security of attachment. Married mothers and their infants demonstrated more positive behavior and received higher HOME scores when the infant was 6 and 15 months old than did their cohabiting and single counterparts. Married families were also better off than single and cohabiting families on several demographic, parent personality, financial, and social context measures. Single and cohabiting families were similar across most measures. Selection variables (maternal age, ethnic group, and education) explained much, but not all, of the family structure differences in the mother-infant relationship and the HOME. Maternal psychological adjustment, attitudes about child rearing, income, and social support explained little of the family structure variation, suggesting that characteristics that preceded marriage and conception were important determinants of family structure differences. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
998.
In order to study the effect of alloy component on magnetic properties of NdFeB magnets, the experiment schemes are carried out by the uniform design theory, and the relationship between the component and the magnetic properties is established by artificial neural network(ANN) predicting model.The element contents of alloys are optimized by the ANN model.Meanwhile, the influences of mono-factor or multi-factor interaction on alloy magnetic properties are respectively discussed according to the curves ploted by ANN model.Simulation result shows that the predicted and measured results are in good agreement.The relative error is every low, the error is not more than 1.68% for remanence Br, 1.56% for maximal energy product (BH)m, and 7.73% for coercivity Hcj.Hcj can be obviously improved and Br can be reduced by increasing Nd or Zr content.Co and B have advantageous effects on increasing Br and disadvantageous effects on increasing Hcj.Influence of alloying elements on Hcj and Br are inverse, and the interaction among the alloying elements play an important role in the magnetic properties of NdFeB magnets.The ANN prediction model presents a new approach to investigate the nonlinear relationship between the component and the magnetic properties of NdFeB alloys.  相似文献   
999.
It is envisaged that the application of the multilevel security (MLS) scheme will enhance flexibility and effectiveness of authorization policies in shared enterprise databases and will replace cumbersome authorization enforcement practices through complicated view definitions on a per user basis. However, the critical problem with the current model is that the belief at a higher security level is cluttered with irrelevant or inconsistent data as no mechanism for attenuation is supported. Critics also argue that it is imperative for MLS database users to theorize about the belief of others, perhaps at different security levels, an apparatus that is currently missing and the absence of which is seriously felt.The impetus for our current research is the need to provide an adequate framework for belief reasoning in MLS databases. In this paper, we show that these concepts can be captured in a F-logic style declarative query language, called MultiLog, for MLS deductive databases for which a proof theoretic, model theoretic and fixpoint semantics exist. This development is significant from a database perspective as it now enables us to compute the semantics of MultiLog databases in a bottom-up fashion. We also define a bottom-up procedure to compute unique models of stratified MultiLog databases. Finally, we establish the equivalence of MultiLog's three logical characterizations—model theory, fixpoint theory and proof theory.  相似文献   
1000.
A method is presented for checking secure information flow in Java bytecode, assuming a multilevel security policy that assigns security levels to the objects. The method exploits the type‐level abstract interpretation of standard bytecode verification to detect illegal information flows. We define an algorithm transforming the original code into another code in such a way that a typing error detected by the Verifier on the transformed code corresponds to a possible illicit information flow in the original code. We present a prototype tool that implements the method and we show an example of application. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号