全文获取类型
收费全文 | 5720篇 |
免费 | 466篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 33篇 |
综合类 | 3篇 |
化学工业 | 1152篇 |
金属工艺 | 59篇 |
机械仪表 | 90篇 |
建筑科学 | 173篇 |
矿业工程 | 9篇 |
能源动力 | 107篇 |
轻工业 | 1444篇 |
水利工程 | 77篇 |
石油天然气 | 33篇 |
无线电 | 239篇 |
一般工业技术 | 782篇 |
冶金工业 | 1232篇 |
原子能技术 | 13篇 |
自动化技术 | 744篇 |
出版年
2024年 | 10篇 |
2023年 | 59篇 |
2022年 | 95篇 |
2021年 | 179篇 |
2020年 | 128篇 |
2019年 | 153篇 |
2018年 | 233篇 |
2017年 | 226篇 |
2016年 | 216篇 |
2015年 | 186篇 |
2014年 | 244篇 |
2013年 | 452篇 |
2012年 | 396篇 |
2011年 | 375篇 |
2010年 | 284篇 |
2009年 | 239篇 |
2008年 | 270篇 |
2007年 | 262篇 |
2006年 | 181篇 |
2005年 | 134篇 |
2004年 | 116篇 |
2003年 | 110篇 |
2002年 | 86篇 |
2001年 | 82篇 |
2000年 | 50篇 |
1999年 | 65篇 |
1998年 | 499篇 |
1997年 | 271篇 |
1996年 | 178篇 |
1995年 | 89篇 |
1994年 | 75篇 |
1993年 | 75篇 |
1992年 | 19篇 |
1991年 | 14篇 |
1990年 | 10篇 |
1989年 | 11篇 |
1988年 | 12篇 |
1987年 | 18篇 |
1986年 | 10篇 |
1985年 | 12篇 |
1984年 | 7篇 |
1983年 | 7篇 |
1981年 | 9篇 |
1980年 | 8篇 |
1978年 | 5篇 |
1977年 | 7篇 |
1976年 | 17篇 |
1975年 | 1篇 |
1973年 | 2篇 |
1960年 | 1篇 |
排序方式: 共有6190条查询结果,搜索用时 62 毫秒
101.
Juan Martínez-Aguilar Jenny Chik Judith Nicholson Crystal Semaan Matthew J. McKay Mark P. Molloy 《Proteomics. Clinical applications》2013,7(1-2):42-54
This review documents the uses of quantitative MS applied to colorectal cancer (CRC) proteomics for biomarker discovery and molecular pathway profiling. Investigators are adopting various labeling and label-free MS approaches to quantitate differential protein levels in cells, tumors, and plasma/serum. We comprehensively review recent uses of this technology to examine mouse models of CRC, CRC cell lines, their secretomes and subcellular fractions, CRC tumors, CRC patient plasma/serum, and stool samples. For biomarker discovery these approaches are uncovering proteins with potential diagnostic and prognostic utility, while in vitro cell culture experiments are characterizing proteomic and phosphoproteomic responses to disrupted signaling pathways due to mutations or to inhibition of drugable enzymes. 相似文献
102.
Luis Martí Jesús García Antonio Berlanga José M. Molina 《Annals of Mathematics and Artificial Intelligence》2013,68(4):247-273
The introduction of learning to the search mechanisms of optimization algorithms has been nominated as one of the viable approaches when dealing with complex optimization problems, in particular with multi-objective ones. One of the forms of carrying out this hybridization process is by using multi-objective optimization estimation of distribution algorithms (MOEDAs). However, it has been pointed out that current MOEDAs have an intrinsic shortcoming in their model-building algorithms that hamper their performance. In this work, we put forward the argument that error-based learning, the class of learning most commonly used in MOEDAs is responsible for current MOEDA underachievement. We present adaptive resonance theory (ART) as a suitable learning paradigm alternative and present a novel algorithm called multi-objective ART-based EDA (MARTEDA) that uses a Gaussian ART neural network for model-building and a hypervolume-based selector as described for the HypE algorithm. In order to assert the improvement obtained by combining two cutting-edge approaches to optimization an extensive set of experiments are carried out. These experiments also test the scalability of MARTEDA as the number of objective functions increases. 相似文献
103.
Abraham Martín-Campillo Jon Crowcroft Eiko Yoneki Ramon Martí 《Journal of Network and Computer Applications》2013,36(2):870-880
Forwarding data in scenarios where devices have sporadic connectivity is a challenge. An example scenario is a disaster area, where forwarding information generated in the incident location, like victims' medical data, to a coordination point is critical for quick, accurate and coordinated intervention. New applications are being developed based on mobile devices and wireless opportunistic networks as a solution to destroyed or overused communication networks. But the performance of opportunistic routing methods applied to emergency scenarios is unknown today. In this paper, we compare and contrast the efficiency of the most significant opportunistic routing protocols through simulations in realistic disaster scenarios in order to show how the different characteristics of an emergency scenario impact in the behaviour of each one of them. 相似文献
104.
105.
Félix Gómez Mármol Christoph Sorge Ronald Petrlic Osman Ugus Dirk Westhoff Gregorio Martínez Pérez 《International Journal of Information Security》2013,12(2):67-82
The recent deployment of smart grids promises to bring numerous advantages in terms of energy consumption reduction in both homes and businesses. A more transparent and instantaneous measurement of electricity consumption through smart meters utilization leads to an enhancement in the ability of monitoring, controlling and predicting energy usage. Nevertheless, it also has associated drawbacks related to the privacy of customers, since such management might reveal their personal habits, which electrical appliances they are using at each moment, whether they are at home or not, etc. In this work, we present a privacy-enhanced architecture for smart metering aimed at tackling this threat by means of encrypting individual measurements while allowing the electricity supplier to access the aggregation of the corresponding decrypted values. 相似文献
106.
Functional networks are used to solve some nonlinear regression problems. One particular problem is how to find the optimal transformations of the response and/or the explanatory variables and obtain the best possible functional relation between the response and predictor variables. After a brief introduction to functional networks, two specific transformation models based on functional networks are proposed. Unlike in neural networks, where the selection of the network topology is arbitrary, the selection of the initial topology of a functional network is problem driven. This important feature of functional networks is illustrated for each of the two proposed models. An equivalent, but simpler network may be obtained from the initial topology using functional equations. The resultant model is then checked for uniqueness of representation. When the functions specified by the transformations are unknown in form, families of linear independent functions are used as approximations. Two different parametric criteria are used for learning these functions: the constrained least squares and the maximum canonical correlation. Model selection criteria are used to avoid the problem of overfitting. Finally, performance of the proposed method are assessed and compared to other methods using a simulation study as well as several real-life data. 相似文献
107.
Dimas?Martínez?MoreraEmail author Paulo?Cezar?Carvalho Luiz?Velho 《The Visual computer》2008,24(12):1025-1037
This paper discusses the problem of modeling on triangulated surfaces with geodesic curves. In the first part of the paper
we define a new class of curves, called geodesic Bézier curves, that are suitable for modeling on manifold triangulations. As a natural generalization of Bézier curves, the new curves
are as smooth as possible. In the second part we discuss the construction of C
0 and C
1 piecewise Bézier splines. We also describe how to perform editing operations, such as trimming, using these curves. Special
care is taken to achieve interactive rates for modeling tasks. The third part is devoted to the definition and study of convex
sets on triangulated surfaces. We derive the convex hull property of geodesic Bézier curves.
相似文献
Luiz VelhoEmail: |
108.
Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased. Nevertheless, some
of these systems present privacy problems that may discourage potential users. Hence, high confidence and effient privacy
protocols are urgently needed. Previous studies in the literature proposed schemes that are proven to be secure, but they
have scalability problems. A feasible and scalable protocol to guarantee privacy is presented in this paper. The proposed
protocol uses elliptic curve cryptography combined with a zero knowledge-based authentication scheme. An analysis to prove
the system secure, and even forward secure is also provided.
This work is supported by the Generalitat de Catalunya under Grant No. FIC 2007FIC 00880, and the projects of the Spanish
MCyT MTM2007-66842-C02-02 and TIN2006-15662-C02-02. 相似文献
109.
Juan José Martín‐Romero Montserrat Gil‐Martínez Mario García‐Sanz 《国际强度与非线性控制杂志
》2009,19(17):1959-1971
》2009,19(17):1959-1971
This paper describes an analytical formulation to compute quantitative feedback theory (QFT) bounds in one‐degree‐of‐freedom feedback control problems. The new approach is based on envelope curves and shows that a QFT control specification can be expressed as a family of circumferences. Then, the controller bound is defined by the envelope curve of this family and can be obtained as an analytical function. This offers the possibility of studying the QFT bounds in an analytical way with several useful properties. Gridding methods are avoided, resulting in a lower computational effort procedure. The new formulation improves the accuracy of previous methods and allows the designer to calculate multivalued bounds. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
110.
GLSV: Graphics library stereo vision for OpenGL 总被引:1,自引:0,他引:1
This work proposes the development of an auxiliary library for use with OpenGL, to facilitate the creation of graphic applications
incorporating stereoscopic representation. This library, christened graphics library stereo vision (GLSV), is designed to
remove all calculations involving knowledge of stereo vision theory from the task performed by the programmer without the
latter having to change the way he/she has been working with the OpenGL library. The GLSV is distributed under the terms of
the GNU Library General Public License agreement. 相似文献