全文获取类型
收费全文 | 1358篇 |
免费 | 98篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 19篇 |
综合类 | 2篇 |
化学工业 | 217篇 |
金属工艺 | 30篇 |
机械仪表 | 97篇 |
建筑科学 | 48篇 |
矿业工程 | 3篇 |
能源动力 | 42篇 |
轻工业 | 129篇 |
水利工程 | 7篇 |
石油天然气 | 2篇 |
无线电 | 183篇 |
一般工业技术 | 237篇 |
冶金工业 | 208篇 |
原子能技术 | 7篇 |
自动化技术 | 226篇 |
出版年
2023年 | 20篇 |
2022年 | 34篇 |
2021年 | 56篇 |
2020年 | 29篇 |
2019年 | 40篇 |
2018年 | 49篇 |
2017年 | 48篇 |
2016年 | 73篇 |
2015年 | 48篇 |
2014年 | 57篇 |
2013年 | 106篇 |
2012年 | 67篇 |
2011年 | 80篇 |
2010年 | 51篇 |
2009年 | 76篇 |
2008年 | 50篇 |
2007年 | 43篇 |
2006年 | 54篇 |
2005年 | 57篇 |
2004年 | 42篇 |
2003年 | 29篇 |
2002年 | 28篇 |
2001年 | 21篇 |
2000年 | 14篇 |
1999年 | 21篇 |
1998年 | 76篇 |
1997年 | 47篇 |
1996年 | 37篇 |
1995年 | 13篇 |
1994年 | 9篇 |
1993年 | 25篇 |
1992年 | 8篇 |
1991年 | 4篇 |
1990年 | 2篇 |
1988年 | 3篇 |
1987年 | 4篇 |
1986年 | 4篇 |
1985年 | 4篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1979年 | 3篇 |
1977年 | 1篇 |
1976年 | 5篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1973年 | 1篇 |
1972年 | 2篇 |
1971年 | 1篇 |
1965年 | 1篇 |
1939年 | 1篇 |
排序方式: 共有1457条查询结果,搜索用时 15 毫秒
31.
Kyung Seob Lim Jun-Kyu Park Myung Ho Jeong Jae-Woon Nah Dae Sung Park Jong Min Kim Jung Ha Kim So Youn Lee Eun Jae Jang Suyoung Jang Hyun Kuk Kim Doo Sun Sim Keun-Ho Park Young Joon Hong Youngkeun Ahn Jung Chaee Kang 《Journal of materials science. Materials in medicine》2016,27(4):66
The aim of this study was to evaluate antiproliferative sirolimus- and antioxidative alpha-lipoic acid (ALA)-eluting stents using biodegradable polymer [poly-l-lactic acid (PLA)] in a porcine coronary overstretch restenosis model. Forty coronary arteries of 20 pigs were randomized into four groups in which the coronary arteries had a bare metal stent (BMS, n = 10), ALA-eluting stent with PLA (AES, n = 10), sirolimus-eluting stent with PLA (SES, n = 10), or sirolimus- and ALA-eluting stent with PLA (SAS, n = 10). A histopathological analysis was performed 28 days after the stenting. The ALA and sirolimus released slowly over 30 days. There were no significant differences between groups in the injury or inflammation score; however, there were significant differences in the percent area of stenosis (56.2 ± 11.78 % in BMS vs. 51.5 ± 12.20 % in AES vs. 34.7 ± 7.23 % in SES vs. 28.7 ± 7.30 % in SAS, P < 0.0001) and fibrin score [1.0 (range 1.0–1.0) in BMS vs. 1.0 (range 1.0–1.0) in AES vs. 2.0 (range 2.0–2.0) in SES vs. 2.0 (range 2.0–2.0) in SAS, P < 0.0001] between the four groups. The percent area of stenosis based on micro-computed tomography corresponded with the restenosis rates based on histopathological stenosis in different proportions in the four groups (54.8 ± 7.88 % in BMS vs. 50.4 ± 14.87 % in AES vs. 34.5 ± 7.22 % in SES vs. 28.9 ± 7.22 % in SAS, P < 0.05). SAS showed a better neointimal inhibitory effect than BMS, AES, and SES at 1 month after stenting in a porcine coronary restenosis model. Therefore, SAS with PLA can be a useful drug combination for coronary stent coating to suppress neointimal hyperplasia. 相似文献
32.
Mónica Giménez‐Marqués Elena Bellido Thomas Berthelot Teresa Simón‐Yarza Tania Hidalgo Rosana Simón‐Vázquez África González‐Fernández José Avila Maria Carmen Asensio Ruxandra Gref Patrick Couvreur Christian Serre Patricia Horcajada 《Small (Weinheim an der Bergstrasse, Germany)》2018,14(40)
Controlling the outer surface of nanometric metal–organic frameworks (nanoMOFs) and further understanding the in vivo effect of the coated material are crucial for the convenient biomedical applications of MOFs. However, in most studies, the surface modification protocol is often associated with significant toxicity and/or lack of selectivity. As an alternative, how the highly selective and general grafting GraftFast method leads, through a green and simple process, to the successful attachment of multifunctional biopolymers (polyethylene glycol (PEG) and hyaluronic acid) on the external surface of nanoMOFs is reported. In particular, effectively PEGylated iron trimesate MIL‐100(Fe) nanoparticles (NPs) exhibit suitable grafting stability and superior chemical and colloidal stability in different biofluids, while conserving full porosity and allowing the adsorption of bioactive molecules (cosmetic and antitumor agents). Furthermore, the nature of the MOF–PEG interaction is deeply investigated using high‐resolution soft X‐ray spectroscopy. Finally, a cell penetration study using the radio‐labeled antitumor agent gemcitabine monophosphate (3H‐GMP)‐loaded MIL‐100(Fe)@PEG NPs shows reduced macrophage phagocytosis, confirming a significant in vitro PEG furtiveness. 相似文献
33.
Small package delivery companies offer services where packages are guaranteed to be delivered within a given time-frame. With variability in travel time, the configuration on the hub-and-spoke delivery network is vital in ensuring a high probability of meeting the service-level guarantee. We present the stochastic p-hub center problem with chance constraints, which we use to model the service-level guarantees. We discuss analytical results, propose solution heuristics, and present the results from computational experiments. 相似文献
34.
String inclusion and non-inclusion problems have been vigorously studied in such diverse fields as molecular biology, data compression, and computer security. Among the well-known string inclusion or non-inclusion notions, we are interested in the longest common nonsuperstring. Given a set of strings, the longest common nonsuperstring problem is finding the longest string that is not a superstring of any string in the given set. It is known that the longest common nonsuperstring problem is solvable in polynomial time.In this paper, we propose an efficient algorithm for the longest common nonsuperstring problem. The running time of our algorithm is linear with respect to the sum of the lengths of the strings in the given set, using generalized suffix trees. 相似文献
35.
Fault based testing aims at detecting hypothesized faults based on specifications or program source. There are some fault
based techniques for testing Boolean expressions which are commonly used to model conditions in specifications as well as
logical decisions in program source. The MUMCUT strategy has been proposed to generate test cases from Boolean expressions.
Moreover, it detects eight common types of hypothesized faults provided that the original expression is in irredundant disjunctive
normal form, IDNF. Software practitioners are more likely to write the conditions and logical decisions in general form rather
than IDNF. Hence, it is interesting to investigate the fault detecting capability of the MUMCUT strategy with respect to general
form Boolean expressions. In this article, we perform empirical studies to investigate the fault detection capability of the
MUMCUT strategy with respect to general form Boolean expressions as well as mutated expressions. A mutated expression can
be obtained from the original given Boolean expression by making a syntactic change based on a particular type of fault.
T. Y. Chen obtained his BSc and MPhil from the University of Hong Kong, MSc and DIC from the Imperial College of Science and Technology, PhD from the University of Melbourne. He is currently a Professor of Software Engineering at the Swinburne University of Technology. Prior to joining Swinburne, he has taught at the University of Hong Kong and the University of Melbourne. His research interests include software testing, debugging, maintenance, and validation of requirements. M. F. Lau received the Ph.D. degree in Software Engineering from the University of Melbourne, Australia. He is currently a Senior Lecturer in the Faculty of Information and Communication Technologies, Swinburne University of Technology, Australia. His research publications have appeared in various scholarly journals, including ACM Transactions on Software Engineering and Methodology, The Journal of Systems and Software, The Computer Journal, Software Testing, Verification and Reliability, Information and Software Technology, Information Sciences, and Information Processing Letters. His research interests include software testing, software quality, software specification and computers in education. K. Y. Sim received his Bachelor of Engineering in Electrical, Electronics and Systems from the National University of Malaysia in 1999 and the Master of Computer Science from the University of Malaya, Malaysia in 2001. Currently, he is a Senior Lecturer in the School of Engineering, Swinburne University of Technology, Sarawak Campus, Malaysia. His current research interests include software testing and information security. C. A. Sun received the PhD degree in Computer Software and Theory in 2002 from Beijing University of Aeronautics and Astronautics, China; the bachelor degree in Computer and Its application in 1997 from University of Science and Technology Beijing, China. He is currently an Assistant Professor in the School of Computer and Information Technology, Beijing Jiaotong University, China. His research areas are software testing, software architecture and service-oriented computing. He has published about 40 referred papers in the above areas. He is an IEEE member. 相似文献
M. F. LauEmail: |
T. Y. Chen obtained his BSc and MPhil from the University of Hong Kong, MSc and DIC from the Imperial College of Science and Technology, PhD from the University of Melbourne. He is currently a Professor of Software Engineering at the Swinburne University of Technology. Prior to joining Swinburne, he has taught at the University of Hong Kong and the University of Melbourne. His research interests include software testing, debugging, maintenance, and validation of requirements. M. F. Lau received the Ph.D. degree in Software Engineering from the University of Melbourne, Australia. He is currently a Senior Lecturer in the Faculty of Information and Communication Technologies, Swinburne University of Technology, Australia. His research publications have appeared in various scholarly journals, including ACM Transactions on Software Engineering and Methodology, The Journal of Systems and Software, The Computer Journal, Software Testing, Verification and Reliability, Information and Software Technology, Information Sciences, and Information Processing Letters. His research interests include software testing, software quality, software specification and computers in education. K. Y. Sim received his Bachelor of Engineering in Electrical, Electronics and Systems from the National University of Malaysia in 1999 and the Master of Computer Science from the University of Malaya, Malaysia in 2001. Currently, he is a Senior Lecturer in the School of Engineering, Swinburne University of Technology, Sarawak Campus, Malaysia. His current research interests include software testing and information security. C. A. Sun received the PhD degree in Computer Software and Theory in 2002 from Beijing University of Aeronautics and Astronautics, China; the bachelor degree in Computer and Its application in 1997 from University of Science and Technology Beijing, China. He is currently an Assistant Professor in the School of Computer and Information Technology, Beijing Jiaotong University, China. His research areas are software testing, software architecture and service-oriented computing. He has published about 40 referred papers in the above areas. He is an IEEE member. 相似文献
36.
Marcelo Godoy Simões Tiago Davi Curi Busarello Abdullah Saad Bubshait Farnaz Harirchi José Antenor Pomilio Frede Blaabjerg 《International journal of control》2016,89(4):850-870
This paper presents interactive smart battery-based storage (BBS) for wind generator (WG) and photovoltaic (PV) systems. The BBS is composed of an asymmetric cascaded H-bridge multilevel inverter (ACMI) with staircase modulation. The structure is parallel to the WG and PV systems, allowing the ACMI to have a reduction in power losses compared to the usual solution for storage connected at the DC-link of the converter for WG or PV systems. Moreover, the BBS is embedded with a decision algorithm running real-time energy costs, plus a battery state-of-charge manager and power quality capabilities, making the described system in this paper very interactive, smart and multifunctional. The paper describes how BBS interacts with the WG and PV and how its performance is improved. Experimental results are presented showing the efficacy of this BBS for renewable energy applications. 相似文献
37.
38.
The application of object oriented concepts (OO) to the requirements phase of information systems (IS) and software development
has been adopted by many proponents of IS and software development methodologies. Although many claims have been made about
the effectiveness of OO techniques for improving requirements analysis, very few experimental studies have been done to substantiate
these claims. This paper addresses this gap in the literature by conducting an experimental study that attempts to validate
the effectiveness of object-oriented analysis (OOA) by comparing it to structured analysis (SA) for producing requirements.
We argue that the quality of the requirements specification can be measured and that measurement can be used to compare the
effectiveness of OOA and SA. We present an overview of the basic models and principles associated with OOA and SA, a discussion
of quality in requirements definition, and a detailed discussion of the research methodology used. A review of relevant research
is also presented and directions for further research are suggested. Our findings suggest that the OOA methodology does not
necessarily produce better requirements statements. 相似文献
39.
The Fisher Linear Discriminant (FLD) is commonly used in pattern recognition. It finds a linear subspace that maximally separates class patterns according to the Fisher Criterion. Several methods of computing the FLD have been proposed in the literature, most of which require the calculation of the so-called scatter matrices. In this paper, we bring a fresh perspective to FLD via the Fukunaga-Koontz Transform (FKT). We do this by decomposing the whole data space into four subspaces with different discriminability, as measured by eigenvalue ratios. By connecting the eigenvalue ratio with the generalized eigenvalue, we show where the Fisher Criterion is maximally satisfied. We prove the relationship between FLD and FKT analytically, and propose a unified framework to understanding some existing work. Furthermore, we extend our our theory to Multiple Discriminant Analysis (MDA). This is done by transforming the data into intra- and extra-class spaces, followed by maximizing the Bhattacharyya distance. Based on our FKT analysis, we identify the discriminant subspaces of MDA/FKT, and propose an efficient algorithm, which works even when the scatter matrices are singular, or too large to be formed. Our method is general and may be applied to different pattern recognition problems. We validate our method by experimenting on synthetic and real data. 相似文献
40.
Kwang Mong Sim 《Artificial Intelligence Review》2001,15(3):219-240
The past few decades have seen a resurgence ofreasoning techniques in artificial intelligenceinvolving both classical and non-classical logics. Inhis paper, ``Multi-valued Logics: A Uniform Approach toReasoning in Artificial Intelligence', Ginsberg hasshown that through the use of bilattices,several reasoning techniques can be unified under asingle framework. A bilattice is a structure that canbe viewed as a class of truth values that canaccommodate incomplete and inconsistent informationand in certain cases default information. Inbilattice theory, knowledge is ordered along twodimensions: truth/falsity and certainty/uncertainty. By defining the corresponding bilattices as truthspaces, Ginsberg has shown that the same theoremprover can be used to simulate reasoning in firstorder logic, default logic, prioritized default logicand assumption truth maintenance system. Although thisis a significant contribution, Ginsberg's paper waslengthy and involved. This paper summarizes some ofthe essential concepts and foundations of bilatticetheory. Furthermore, it discusses the connections ofbilattice theory and several other existingmulti-valued logics such as the various three-valuedlogics and Belnap's four-valued logic. It is notedthat the set of four truth values in Belnap's logicform a lattice structure that is isomorphic to thesimplest bilattice. Subsequently, Fitting proposed aconflation operation that can be used to selectsub-sets of truth values from this and otherbilattices. This method of selecting sub-sets oftruth values provides a means for identifyingsub-logic in a bilattice. 相似文献