首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5149篇
  免费   189篇
  国内免费   3篇
电工技术   59篇
综合类   10篇
化学工业   1028篇
金属工艺   95篇
机械仪表   85篇
建筑科学   229篇
矿业工程   17篇
能源动力   111篇
轻工业   590篇
水利工程   41篇
石油天然气   12篇
无线电   431篇
一般工业技术   852篇
冶金工业   1043篇
原子能技术   51篇
自动化技术   687篇
  2023年   49篇
  2022年   75篇
  2021年   139篇
  2020年   74篇
  2019年   88篇
  2018年   76篇
  2017年   90篇
  2016年   133篇
  2015年   107篇
  2014年   171篇
  2013年   204篇
  2012年   210篇
  2011年   276篇
  2010年   195篇
  2009年   190篇
  2008年   222篇
  2007年   207篇
  2006年   171篇
  2005年   171篇
  2004年   134篇
  2003年   116篇
  2002年   112篇
  2001年   76篇
  2000年   96篇
  1999年   106篇
  1998年   249篇
  1997年   172篇
  1996年   157篇
  1995年   118篇
  1994年   100篇
  1993年   92篇
  1992年   52篇
  1991年   43篇
  1990年   41篇
  1989年   38篇
  1988年   30篇
  1987年   32篇
  1986年   37篇
  1985年   51篇
  1984年   36篇
  1983年   30篇
  1982年   27篇
  1981年   28篇
  1980年   25篇
  1978年   33篇
  1977年   46篇
  1976年   52篇
  1975年   27篇
  1972年   31篇
  1970年   25篇
排序方式: 共有5341条查询结果,搜索用时 31 毫秒
1.
2.
Non-standard fault models often require the application of two-pattern testing. A fully-automated approach for generating a multiple scan chain-based architecture is presented so that two-pattern test sets generated for the combinational core can be applied to the sequential circuit. Test time and area overhead constraints are considered.  相似文献   
3.
Security for ad hoc network environments has received a lot of attention as of today. Previous work has mainly been focussing on secure routing, fairness issues, and malicious node detection. However, the issue of introducing and conserving trust relationships has received considerably less attention. In this article, we present a scalable method for the use of public key certificates and their revocation in mobile ad hoc networks (MANETs). With the LKN-ad hoc security framework (LKN-ASF) a certificate management protocol has been introduced, bringing PKI technology to MANETs. In addition a performance analysis of two different revocation approaches for MANETs will be presented.  相似文献   
4.
We examined whether either psychotic features (e.g., delusions and hallucinations) or EEG abnormalities are associated with more rapid progression of Alzheimer's disease (AD). AD patients with psychosis have exhibited more EEG abnormalities than those without psychosis, and both abnormal EEG and psychosis have been noted to be predictors of functional and cognitive decline in AD. Ninety-five probable AD patients participating in a longitudinal study of dementia had an EEG and a semistructured psychiatric interview at baseline. Using EEG spectral analysis, we classified records as normal/abnormal based on the parasagittal mean frequency. Patients with abnormal EEGs were more functionally (e.g., Blessed Rating Scale for activities of daily living) and cognitively (e.g., Mini-Mental State) impaired than patients with normal EEG. AD patients with psychosis were only more functionally impaired than patients without psychosis. A two-factor analysis showed no interaction between abnormal EEG and psychosis. In addition, using a Cox proportional hazard model adjusted for age and education, the presence of an abnormal EEG or psychotic symptom at study entry was associated with higher risk of reaching severe cognitive and functional impairment during follow-up. Neither abnormal EEG nor the presence of psychosis predicted death. These results indicate that both abnormal EEG and psychosis are independent predictors of disease progression but not of physical survival.  相似文献   
5.
Abstract— In this paper, methods and instruments for measurement and evaluation of reflection characteristics are reviewed as needed for research and development of electronic displays and for material and surface modeling with ray‐tracing and rendering software packages. Contrast under ambient illumination and recognizability under daylight illumination are prime development targets in the electronic‐display field, while computation and synthesis of realistic scenes and objects are pushing the need for physical data in computer graphics applications. Three categories of instruments are available for detailed reflection analysis. They are based on (1) gonioscopic (mechanical) and conoscopic (optical) directional scanning, (2) imaging approaches, and (3) on arrangements with variable source or receiver aperture. The capabilities, advantages, and limitations of these methods are introduced and discussed in order to facilitate appropriate selection of methods and instruments. For illustration purposes we present typical results obtained from commercial electronic display screens. A basis for continued widespread implementation and standardization of reflection metrology as required for objective rating and comparison of electronic‐display screen performance under ambient illumination is provided.  相似文献   
6.
Automotive under-the-hood electronics often have to withstand temperatures up to 175 °C in combination with harsh environment conditions. This paper gives an overview about the reliability potential of epoxy based encapsulants for automotive applications. Therefore the resistance of epoxy molding compound against typical automotive fluids at temperature of use is analyzed. Six epoxy molding compounds available on the market, showing high temperature automotive potential have been carefully selected to undergo a media resistance testing. For this purpose a dedicated mold tool has been designed and manufactured to prepare these encapsulants for material testing. Thermo-mechanical, mechanical and thermal properties had been determined in initial state directly after molding and after storage in aggressive fluids typical for automotive applications as e.g. gas oil, automatic transmission fluid (ATF), brake fluid or accumulator acid at the respective temperature of use.  相似文献   
7.
Eich (1985) recently presented a distributed memory model in which the pattern of results used to support the levels-of-processing view of Craik and Lockhart (1972) was modeled by different degrees of similarity between the encoding context and the to-be-recalled item. We report two experiments in which both phonemic and semantic similarity were varied between pairs of words and incidental acquisition (rhyme vs. category judgments) was varied across the same pairs of items. In both experiments the manipulation of the acquisition task produced a difference in cued-recall performance for positive and negative rhyme and category judgments. Recall was better following a category encoding decision than following a rhyme decision. This difference was independent of the effects of similarity, which demonstrated that Eich's (1985) assumptions regarding the effects of similarity are not sufficient to account for the differences resulting from the manner in which subjects encode information. An alternative method of modeling the levels-of-processing effect within the framework of distributed memory models is proposed. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
8.
This paper sets out to share BT's leadership and experience by determining the identity management opportunities and issues, then document the lessons learnt in previous deployments and recommend strategies for all types and sizes of organisation. Today's ICT environment has created a mixed approach to access management across sectors. Browser-based any time, anywhere, anyone access, coupled with the business need to access more systems and services across a changing infrastructure of distributed platforms and networked services, has changed the administrative landscape. Enterprises are being forced to add administrative support staff or invest in technology-driven process change. At the same time, users are undergoing significant change, creating new expectations in service quality. Moreover, regulatory bodies are demanding confirmation that processes granting access are controlled and documented. In this world of increasing demands, complexity and expectation, the service management tools, techniques and options available to improve user access management are as varied and numerous as the issues faced by management in their deployment. Identity management is widely heralded as an opportunity to improve the end user experience, reduce costs, improve security and deliver regulatory compliance — but is often misunderstood. Projects regularly fail to achieve the expected benefits. These failures are the result of expectations being inappropriately set, deployment of solutions turning out to be more complex or taking longer than expected, and/or products selected before required functionality has been determined. For the larger more mature organisations, or those organisations that are the amalgamation of mergers and acquisitions, the dilemma is where to start and what approach to take.  相似文献   
9.
According to the knowledge partitioning framework, people sometimes master complex tasks by creating multiple independent parcels of partial knowledge. Research has shown that knowledge parcels may contain mutually contradictory information, and that each parcel may be used without regard to knowledge that is demonstrably present in other parcels. This article reports 4 experiments that investigated knowledge partitioning in categorization. When component boundaries of a complex categorization were identified by a context cue, a significant proportion of participants learned partial and independent categorization strategies that were chosen on the basis of context. For those participants, a strategy used in one context was unaffected by knowledge demonstrably present in other contexts, suggesting that knowledge partitioning in categorization can be complete. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
10.
OBJECTIVE: The purpose of our study was to test the hypothesis that surfactant dosing through a proximal sideport adapter on an endotracheal tube leads to more dosing-associated hypoxemia compared with a method of dosing that uses a double-lumen endotracheal tube. STUDY DESIGN: Using adequate sample size to compare significant changes in O2 saturation (power > 0.8, alpha < 0.05) we enrolled 36 infants with respiratory distress syndrome in this randomized trial. A 10% change in O2 saturation was considered clinically significant. Nineteen infants received 38 doses of surfactant through the sideport adapter. Seventeen infants received 31 doses of surfactant through the nonventilation lumen of a double-lumen endotracheal tube. Two main outcome measures were assessed: time-averaged O2 saturation values 30 minutes after dosing and the largest absolute fall in O2 saturation for each patient. RESULTS AND CONCLUSIONS: Time-averaged O2 saturation measures were higher in the proximal sideport group (p = 0.02), but the magnitude of difference was probably not clinically significant. No significant difference was detected between groups when we compared largest absolute drop in O2 saturation. Secondary analyses found no effect of birth weight or dose number (second vs third dose) on either outcome measure.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号