全文获取类型
收费全文 | 4753篇 |
免费 | 261篇 |
国内免费 | 12篇 |
专业分类
电工技术 | 32篇 |
综合类 | 5篇 |
化学工业 | 1009篇 |
金属工艺 | 96篇 |
机械仪表 | 99篇 |
建筑科学 | 237篇 |
矿业工程 | 8篇 |
能源动力 | 150篇 |
轻工业 | 456篇 |
水利工程 | 47篇 |
石油天然气 | 18篇 |
武器工业 | 2篇 |
无线电 | 414篇 |
一般工业技术 | 880篇 |
冶金工业 | 811篇 |
原子能技术 | 28篇 |
自动化技术 | 734篇 |
出版年
2024年 | 6篇 |
2023年 | 42篇 |
2022年 | 82篇 |
2021年 | 136篇 |
2020年 | 94篇 |
2019年 | 110篇 |
2018年 | 141篇 |
2017年 | 126篇 |
2016年 | 157篇 |
2015年 | 118篇 |
2014年 | 158篇 |
2013年 | 273篇 |
2012年 | 274篇 |
2011年 | 338篇 |
2010年 | 239篇 |
2009年 | 263篇 |
2008年 | 297篇 |
2007年 | 282篇 |
2006年 | 228篇 |
2005年 | 238篇 |
2004年 | 170篇 |
2003年 | 147篇 |
2002年 | 151篇 |
2001年 | 75篇 |
2000年 | 64篇 |
1999年 | 57篇 |
1998年 | 59篇 |
1997年 | 58篇 |
1996年 | 67篇 |
1995年 | 48篇 |
1994年 | 47篇 |
1993年 | 50篇 |
1992年 | 37篇 |
1991年 | 26篇 |
1990年 | 38篇 |
1989年 | 38篇 |
1988年 | 31篇 |
1987年 | 41篇 |
1986年 | 38篇 |
1985年 | 32篇 |
1984年 | 25篇 |
1983年 | 27篇 |
1982年 | 25篇 |
1981年 | 13篇 |
1980年 | 12篇 |
1979年 | 9篇 |
1978年 | 13篇 |
1976年 | 6篇 |
1975年 | 6篇 |
1974年 | 4篇 |
排序方式: 共有5026条查询结果,搜索用时 15 毫秒
1.
A novel MINLP-based representation of the original complex model for predicting gasoline emissions 总被引:1,自引:1,他引:0
The Environmental Protection Agency (EPA) introduced Reformulated Gasoline (RFG) requirements as a measure to reduce emissions from gasoline-powered vehicles in certain geographic areas. As part of this effort, the EPA developed empirical models for predicting emissions as a function of gasoline properties and established statutory baseline emissions from a representative set of gasolines. All reformulated gasoline requires certification via this model, known as the Complex Model, and all refiners and importers calculate emissions performance reductions from the statutory baseline gasoline. The current representation of the Complex Model is extremely difficult to implement within refinery operations models or to use in combination with models for designer gasoline. RFG and boutique fuels are key driving forces in the North American refining industry.The RFG models introduce increasingly complex constraints with the major limitation that they are implicitly defined through a series of complicated disjunctions assembled by the EPA in the form of spreadsheets. This implicit and cumbersome representation of the emissions predictive models renders rigorous optimization and sensitivity analysis very difficult to address directly. In this paper, we discuss how the federal government requirements for reformulated gasoline can be restated as a set of mixed-integer nonlinear programming (MINLP) constraints with the aid of disjunctive programming techniques. We illustrate the use of this model with two simple example fuel blending problems. 相似文献
2.
Kevin Yale Teichman 《Indoor air》1994,4(3):202-211
Deciding between the different policy approaches available for reducing human exposures to indoor pollutants is an exceptionally complex task. These options can range from waiting until more definitive information is available to enacting regulatory standards, with many variations in between. This paper presents some of the factors policy-makers must consider in establishing indoor air quality policies, and the role researchers should play in ensuring that indoor air policies are based on the best available scientific information. 相似文献
3.
Kevin E. Spaulding Geoffrey J. Woolfe Rajan L. Joshi 《Color research and application》2003,28(4):251-266
Image sources, such as digital camera captures and photographic negatives, typically have more information than can be reproduced on a photographic print or a video display. The information that is lost during the tone/color rendering process relates to both the extended dynamic range and color gamut of the original scene. In conventional photographic systems, most of this additional information is archived on the photographic negative and can be accessed by adjusting the way the negative is printed. However, most digital imaging systems have traditionally archived only a rendered video RGB image. As a result, it is not possible to make the same sorts of image manipulations that historically have been possible with conventional photographic systems. This suggests that there would be an advantage to storing images using an extended dynamic range/color gamut color encoding. However, because of file compatibility issues, digital imaging systems that store images using color encoding other than a standard video RGB representation (e.g., sRGB) would be significantly disadvantaged in the marketplace. In this article, we describe a solution that has been developed to maintain compatibility with existing file formats and software applications, while simultaneously retaining the extended dynamic range and color gamut information associated with the original scenes. With this approach, the input raw digital camera image or film scan is first transformed to the scene‐referred ERIMM RGB color encoding. Next, a rendered sRGB image is formed in the usual way and stored in a conventional image file (e.g., a standard JPEG file). A residual image representing the difference between the original extended dynamic range image and the final rendered image is formed and stored in the image file using proprietary metadata tags. This provides a mechanism for archiving the extended dynamic range/color gamut information, which is normally discarded during the rendering process, without sacrificing interoperability. Appropriately enabled applications can decode the residual image metadata and use it to reconstruct the ERIMM RGB image, whereas applications that are not aware of the metadata will ignore it and only have access to the sRGB image. The residual image is formed such that it will have negligible pixel values for those portions of the image that lie within the sRGB gamut, and will therefore be highly compressible. Tests on a population of 950 real customer images have demonstrated that the extended dynamic range scene information can be stored with an average file size overhead of about 8% compared to the sRGB images alone. © 2003 Wiley Periodicals, Inc. Col Res Appl, 28, 251–266, 2003; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/col.10160 相似文献
4.
Standard procedures for estimating factor scores for the Wechsler Adult Intelligence Scale—Revised (WAIS—R; D. Wechsler, 1981) involve equally weighted sums of the subtests that load most highly on the factor being estimated. We argue that factor scores derived in this manner lack discriminant validity; they are strongly biased toward g (the first unrotated factor) and away from the other 2 unrotated factors. If regression-like weights are applied to all of the WAIS—R subtests and the products are summed, the resulting differentially weighted factors give results that show similar convergent validity and much greater discriminant validity with respect to the original factors. (PsycINFO Database Record (c) 2011 APA, all rights reserved) 相似文献
5.
Sykes EC Han P Kandel SA Kelly KF McCarty GS Weiss PS 《Accounts of chemical research》2003,36(12):945-953
Adsorbate interactions and reactions on metal surfaces have been investigated using scanning tunneling microscopy. The manners in which adsorbates perturb the surface electronic structure in their vicinity are discussed. The effects these perturbations have on other molecules are shown to be important in overlayer growth. Interactions of molecules with surface steps are addressed, and each molecule's electron affinity is shown to dictate its adsorption sites at step edges. Standing waves emanating from steps are demonstrated to effect transient molecular adsorption up to 40 A away from the step edge. Halobenzene derivatives are used to demonstrate how the surface is important in aligning reactive intermediates. 相似文献
6.
Adam Bates Benjamin Mood Joe Pletcher Hannah Pruse Masoud Valafar Kevin Butler 《International Journal of Information Security》2014,13(2):171-189
Virtualization is the cornerstone of the developing third-party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the co-resident threat—unless perfect isolation is provided by the virtual hypervisor, there exists the possibility for unauthorized access to sensitive customer information through the exploitation of covert side channels. This paper presents co-resident watermarking, a traffic analysis attack that allows a malicious co-resident VM to inject a watermark signature into the network flow of a target instance. This watermark can be used to exfiltrate and broadcast co-residency data from the physical machine, compromising isolation without reliance on internal side channels. As a result, our approach is difficult to defend against without costly underutilization of the physical machine. We evaluate co-resident watermarkingunder a large variety of conditions, system loads and hardware configurations, from a local laboratory environment to production cloud environments (Futuregrid and the University of Oregon’s ACISS). We demonstrate the ability to initiate a covert channel of 4 bits per second, and we can confirm co-residency with a target VM instance in $<$ 10 s. We also show that passive load measurement of the target and subsequent behavior profiling is possible with this attack. We go on to consider the detectability of co-resident watermarking, extending our scheme to create a subtler watermarking attack by imitating legitimate cloud customer behavior. Our investigation demonstrates the need for the careful design of hardware to be used in the cloud. 相似文献
7.
8.
9.
Kevin Curran Michelle Murray David Stephen Norrby Martin Christian 《New Review of Information Networking》2013,18(1-2):47-59
Libraries, as we know them today, can be defined by the term Library 1.0. This defines the way resources are kept on shelves or at a computer behind a login. These resources can be taken from a shelf, checked out by the library staff, taken home for a certain length of time and absorbed, and then returned to the library for someone else to avail of. Library 1.0 is a one-directional service that takes people to the information they require. Library 2.0 – or L2 as it is now more commonly addressed as – aims to take the information to the people by bringing the library service to the Internet and getting the users more involved by encouraging feedback participation. This paper presents an overview of Library 2.0 and introduces web 2.0 concepts. 相似文献
10.
Wenjing Wang Shameek Bhattacharjee Mainak Chatterjee Kevin Kwiat 《Pervasive and Mobile Computing》2013,9(4):572-587
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportunistically access and use parts of the spectrum not being used by others. Though cooperation among nodes is desirable for efficient network operations and performance, there might be some malicious nodes whose objective could be to hinder communications and disrupt network operations. The absence of a central authority or any policy enforcement mechanism makes these kinds of open-access network more vulnerable and susceptible to attacks.In this paper, we analyze a common form of denial-of-service attack, i.e., collaborative jamming. We consider a network in which a group of jammers tries to jam the channels being used by legitimate users who in turn try to evade the jammed channels. First, we compute the distribution of the jamming signal that a node experiences by considering a random deployment of jammers. Then, we propose different jamming and defending schemes that are employed by the jammers and legitimate users, respectively. In particular, we model and analyze the channel availability when the legitimate users randomly choose available channels and the jammers jam different channels randomly. We propose a multi-tier proxy-based cooperative defense strategy to exploit the temporal and spatial diversity for the legitimate secondary users in an infrastructure-based centralized cognitive radio network. Illustrative results on spectrum availability rates show how to improve resiliency in cognitive radio networks in the presence of jammers. 相似文献