全文获取类型
收费全文 | 5478篇 |
免费 | 862篇 |
国内免费 | 734篇 |
专业分类
电工技术 | 189篇 |
综合类 | 518篇 |
化学工业 | 214篇 |
金属工艺 | 31篇 |
机械仪表 | 69篇 |
建筑科学 | 558篇 |
矿业工程 | 57篇 |
能源动力 | 63篇 |
轻工业 | 1375篇 |
水利工程 | 62篇 |
石油天然气 | 211篇 |
武器工业 | 13篇 |
无线电 | 648篇 |
一般工业技术 | 448篇 |
冶金工业 | 148篇 |
原子能技术 | 20篇 |
自动化技术 | 2450篇 |
出版年
2024年 | 74篇 |
2023年 | 200篇 |
2022年 | 311篇 |
2021年 | 385篇 |
2020年 | 366篇 |
2019年 | 299篇 |
2018年 | 271篇 |
2017年 | 276篇 |
2016年 | 283篇 |
2015年 | 319篇 |
2014年 | 369篇 |
2013年 | 372篇 |
2012年 | 433篇 |
2011年 | 441篇 |
2010年 | 290篇 |
2009年 | 303篇 |
2008年 | 288篇 |
2007年 | 295篇 |
2006年 | 249篇 |
2005年 | 226篇 |
2004年 | 192篇 |
2003年 | 160篇 |
2002年 | 129篇 |
2001年 | 90篇 |
2000年 | 75篇 |
1999年 | 54篇 |
1998年 | 50篇 |
1997年 | 42篇 |
1996年 | 38篇 |
1995年 | 31篇 |
1994年 | 19篇 |
1993年 | 16篇 |
1992年 | 18篇 |
1991年 | 13篇 |
1990年 | 14篇 |
1989年 | 12篇 |
1988年 | 8篇 |
1987年 | 8篇 |
1986年 | 2篇 |
1985年 | 10篇 |
1984年 | 4篇 |
1983年 | 10篇 |
1982年 | 7篇 |
1981年 | 3篇 |
1980年 | 5篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1966年 | 2篇 |
1965年 | 2篇 |
1956年 | 1篇 |
排序方式: 共有7074条查询结果,搜索用时 562 毫秒
31.
Abstract. A pth‐order random coefficient integer‐valued autoregressive [RCINAR(p)] model is proposed for count data. Stationarity and ergodicity properties are established. Maximum likelihood, conditional least squares, modified quasi‐likelihood and generalized method of moments are used to estimate the model parameters. Asymptotic properties of the estimators are derived. Simulation results on the comparison of the estimators are reported. The models are applied to two real data sets. 相似文献
32.
33.
Yu. F. Smirnov 《Measurement Techniques》2007,50(3):293-297
Metrological characteristics of active hydrogen frequency standards are investigated on the basis of internal and external
comparisons. The stability of random changes and drift of hydrogen frequency standards and also the potential capabilities
of time scale preservation with effective consideration of systematic changes in their frequency are demonstrated.
__________
Translated from Izmeritel’naya Tekhnika, No. 3. pp. 42–45, March, 2007. 相似文献
34.
[Correction Notice: An erratum for this article was reported in Vol 29(6) of Journal of Experimental Psychology: Learning, Memory, and Cognition (see record 2007-16865-001). On page 684, Table 4, all correlations should have been identified as having a pp then q") as indicating a high conditional probability P(q|p). Participants estimated the probability that a given conditional is true (Experiments 1A, 1B, and 3) or judged whether a conditional was true or false (Experiments 2 and 4) given information about the frequencies of the relevant truth table cases. Judgments were strongly influenced by the ratio of pq to p?q cases, supporting the conditional probability account. In Experiments 1A, 1B, and 3, judgments were also affected by the frequency of pq cases, consistent with a version of mental model theory. Experiments 3 and 4 extended the results to thematic conditionals and showed that the pragmatic utility associated with believing a statement also affected the degree of belief in conditionals but not in logically equivalent quantified statements. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
35.
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer
(OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a
new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel
technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the
design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general
portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is
the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting
mobile agents not only is possible, but also can be implemented efficiently.
This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval
Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399
and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper
was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003.
Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position
at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical
Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases,
and wireless networks. On the theoretical side, he is interested in cryptography and game theory.
Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile
computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS)
at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received
his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998
and 2001). 相似文献
36.
37.
38.
Chun-I Fan 《Information Sciences》2006,176(3):263-284
In an untraceable electronic cash protocol based on blind signatures, an identified customer can withdraw a blinded electronic cash from the bank and the unblinding operation is adopted by the customer to transform the blinded electronic cash into a valid one. Before performing the operation, the blinded electronic cash is protected well since attackers cannot convert it into a valid electronic cash without the blinding factor corresponding to the operation. However, after unblinding, the electronic cash will suffer from the theft attacks since it is not protected by any security mechanism. This paper introduces a new unblinding operation called ownership-attached unblinding which attaches the identities of a designated payee and a specified transaction to the blinded electronic cash and then produces an ownership-attached electronic cash other than a bare one such that the cash can withstand the theft attacks during the entire transaction because it is valid for the designated payee and the specified transaction only. Furthermore, the proposed scheme does not largely increase the computation cost required for each customer so that it also is a customer efficient protection solution for untraceable electronic cash and especially suitable for mobile clients and smart-card users. 相似文献
39.
Maria G Corradini Mark D Normand Micha Peleg 《Journal of the science of food and agriculture》2006,86(5):785-792
Currently, the sterility of heat‐processed food and pharmaceuticals is assessed in terms of an F0 value, based on the equivalence of the heat treatment to an isothermal process at a reference temperature. This F0 value, however, has a meaning if, and only if, the inactivation kinetics of the targeted spores (or cells) follow a first‐order relationship and the temperature dependence of the D value, the reciprocal of the rate constant, is log‐linear. There is growing evidence that these conditions are not satisfied by many spores, including those of Clostridium botulinum and vegetative cells. Consequently, a replacement for the F0 value is proposed in the form of a momentary equivalent time at the reference temperature based on the actual survival pattern of the spores, which need not be log‐linear. This equivalent time can be calculated together with the theoretical survival ratio in real time, thus enabling an operator to monitor the lethality of ongoing industrial heat processes. The concept is demonstrated with published survival data of C. botulinum, for which the Weibullian and log‐logistic models served as primary and secondary models, respectively. The safety factor according to the proposed method is in the number of added minutes of processing, beyond the theoretical time needed to reduce the survival ratio of the targeted spores or cells to a level that would produce practical (or commercial) sterility. Copyright © 2006 Society of Chemical Industry 相似文献
40.
用FOSECS研究了中性红的光谱电化学特性,测定了它的热力学函数、条件平衡常数和参加电极反应的H^+数,其结果与文献值一致。 相似文献