全文获取类型
收费全文 | 34688篇 |
免费 | 3718篇 |
国内免费 | 2460篇 |
专业分类
电工技术 | 2758篇 |
技术理论 | 5篇 |
综合类 | 4122篇 |
化学工业 | 860篇 |
金属工艺 | 571篇 |
机械仪表 | 1267篇 |
建筑科学 | 5981篇 |
矿业工程 | 839篇 |
能源动力 | 484篇 |
轻工业 | 940篇 |
水利工程 | 668篇 |
石油天然气 | 354篇 |
武器工业 | 253篇 |
无线电 | 5750篇 |
一般工业技术 | 1461篇 |
冶金工业 | 533篇 |
原子能技术 | 81篇 |
自动化技术 | 13939篇 |
出版年
2024年 | 152篇 |
2023年 | 358篇 |
2022年 | 714篇 |
2021年 | 924篇 |
2020年 | 1036篇 |
2019年 | 760篇 |
2018年 | 708篇 |
2017年 | 949篇 |
2016年 | 1072篇 |
2015年 | 1171篇 |
2014年 | 2859篇 |
2013年 | 2234篇 |
2012年 | 3080篇 |
2011年 | 3389篇 |
2010年 | 2478篇 |
2009年 | 2526篇 |
2008年 | 2465篇 |
2007年 | 2779篇 |
2006年 | 2312篇 |
2005年 | 1980篇 |
2004年 | 1550篇 |
2003年 | 1378篇 |
2002年 | 977篇 |
2001年 | 775篇 |
2000年 | 583篇 |
1999年 | 379篇 |
1998年 | 289篇 |
1997年 | 201篇 |
1996年 | 163篇 |
1995年 | 109篇 |
1994年 | 108篇 |
1993年 | 69篇 |
1992年 | 56篇 |
1991年 | 38篇 |
1990年 | 36篇 |
1989年 | 29篇 |
1988年 | 35篇 |
1987年 | 15篇 |
1986年 | 11篇 |
1985年 | 22篇 |
1984年 | 20篇 |
1983年 | 23篇 |
1982年 | 14篇 |
1981年 | 6篇 |
1980年 | 16篇 |
1979年 | 3篇 |
1959年 | 2篇 |
1958年 | 2篇 |
1955年 | 2篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
991.
为提高异型柱框架结构的抗震性能,笔者利用DRAIN-2DX程序,对长肢、底层长肢异型柱框架以及普通异型柱框架分别进行了弹塑性时程地震反应计算,较系统地分析了肢长的变化对结构整体地震反应的影响,为合理确定长肢异型柱的设计参数提供了数值分析依据.得出增大薄弱层异型柱肢长能够显著提高异型柱框架结构的抗震性能的结论.底层长肢异型柱框架能有效地克服了普通异型柱框架底层的薄弱现象;各层层间位移分布更为均匀,有利于抗震;对控制各层位移比普通异型柱框架更为有效. 相似文献
992.
汽车碰撞中数据采集与分析 总被引:1,自引:0,他引:1
介绍了汽车碰撞试验中电测量系统的要求与构成,通过VB和Matlab混合编写的数据分析软件对试验数据进行分析。对汽车正面碰撞乘员的各个伤害指标进行计算,提供了一种汽车安全性能客观的评价方法,同时也为汽车安全气囊的开发与系统匹配提供了重要的试验依据。 相似文献
993.
电力监控自动化系统的发展使得电力网络信息资源高度共享,然而一体化、网络化的发展使信息安全问题也更为突出。依据电力监控自动化系统中各应用系统的特点和安全要求,提出了一种新的信息安全防护系统设计方案,从系统网络架构上对系统进行有效的安全分区,应用各种网络安全技术实现系统横向和纵向的信息安全。最后阐述了该方案在某地区电网自动化系统设计中的整体安全防护的实际应用。 相似文献
994.
基于密钥的安全认证系统设计 总被引:3,自引:0,他引:3
提出了电子商务交易的安全需求,阐述了基于密钥的安全认证技术,如数字签名、数字信封等,并利用认证技术设计了一种实施方案,解决商务交易的安全问题,实现商务信息的真实性和交易双方的不可抵赖性. 相似文献
995.
分析了万向联轴器法兰叉架的法兰破坏的原因 ,对法兰不同轴向截面进行受力分析 ,提出法兰厚度的计算公式。用这个计算公式可以对承担任何公称扭矩的任何轴向截面的法兰叉架的法兰进行强度计算及厚度确定。 相似文献
996.
The internal/external frame of reference (I/E) model explains a seemingly paradoxical pattern of relations between math and verbal self-concepts and corresponding measures of achievement, extends social comparison theory, and has important educational implications. In a cross-cultural study of nationally representative samples of 15-year-olds from 26 countries (total N = 55,577), I/E predictions were supported in that (a) math and verbal achievements were highly correlated, but math and verbal self-concepts were nearly uncorrelated; (b) math achievement had positive effects on math self-concept, but negative effects on verbal self-concept; and (c) verbal achievement had positive effects on verbal self-concept, but negative effects on math self-concept. Supporting the cross-cultural generalizability of predictions, multigroup structural equation models demonstrated good support for the generalizabilify of results across 26 countries participating in the Programme for International Student Assessment project sponsored by the Organisation for Economic Co-operation and Development. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
997.
Single-mother, cohabiting 2-parent, and married 2-parent families with infants were compared on maternal and infant behavior, Home Observation for Measurement of the Environment (HOME) scores, and infant's security of attachment. Married mothers and their infants demonstrated more positive behavior and received higher HOME scores when the infant was 6 and 15 months old than did their cohabiting and single counterparts. Married families were also better off than single and cohabiting families on several demographic, parent personality, financial, and social context measures. Single and cohabiting families were similar across most measures. Selection variables (maternal age, ethnic group, and education) explained much, but not all, of the family structure differences in the mother-infant relationship and the HOME. Maternal psychological adjustment, attitudes about child rearing, income, and social support explained little of the family structure variation, suggesting that characteristics that preceded marriage and conception were important determinants of family structure differences. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
998.
In order to study the effect of alloy component on magnetic properties of NdFeB magnets, the experiment schemes are carried out by the uniform design theory, and the relationship between the component and the magnetic properties is established by artificial neural network(ANN) predicting model.The element contents of alloys are optimized by the ANN model.Meanwhile, the influences of mono-factor or multi-factor interaction on alloy magnetic properties are respectively discussed according to the curves ploted by ANN model.Simulation result shows that the predicted and measured results are in good agreement.The relative error is every low, the error is not more than 1.68% for remanence Br, 1.56% for maximal energy product (BH)m, and 7.73% for coercivity Hcj.Hcj can be obviously improved and Br can be reduced by increasing Nd or Zr content.Co and B have advantageous effects on increasing Br and disadvantageous effects on increasing Hcj.Influence of alloying elements on Hcj and Br are inverse, and the interaction among the alloying elements play an important role in the magnetic properties of NdFeB magnets.The ANN prediction model presents a new approach to investigate the nonlinear relationship between the component and the magnetic properties of NdFeB alloys. 相似文献
999.
It is envisaged that the application of the multilevel security (MLS) scheme will enhance flexibility and effectiveness of authorization policies in shared enterprise databases and will replace cumbersome authorization enforcement practices through complicated view definitions on a per user basis. However, the critical problem with the current model is that the belief at a higher security level is cluttered with irrelevant or inconsistent data as no mechanism for attenuation is supported. Critics also argue that it is imperative for MLS database users to theorize about the belief of others, perhaps at different security levels, an apparatus that is currently missing and the absence of which is seriously felt.The impetus for our current research is the need to provide an adequate framework for belief reasoning in MLS databases. In this paper, we show that these concepts can be captured in a F-logic style declarative query language, called MultiLog, for MLS deductive databases for which a proof theoretic, model theoretic and fixpoint semantics exist. This development is significant from a database perspective as it now enables us to compute the semantics of MultiLog databases in a bottom-up fashion. We also define a bottom-up procedure to compute unique models of stratified MultiLog databases. Finally, we establish the equivalence of MultiLog's three logical characterizations—model theory, fixpoint theory and proof theory. 相似文献
1000.
A method is presented for checking secure information flow in Java bytecode, assuming a multilevel security policy that assigns security levels to the objects. The method exploits the type‐level abstract interpretation of standard bytecode verification to detect illegal information flows. We define an algorithm transforming the original code into another code in such a way that a typing error detected by the Verifier on the transformed code corresponds to a possible illicit information flow in the original code. We present a prototype tool that implements the method and we show an example of application. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献