全文获取类型
收费全文 | 3927篇 |
免费 | 184篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 66篇 |
综合类 | 6篇 |
化学工业 | 863篇 |
金属工艺 | 88篇 |
机械仪表 | 66篇 |
建筑科学 | 285篇 |
矿业工程 | 6篇 |
能源动力 | 124篇 |
轻工业 | 350篇 |
水利工程 | 22篇 |
石油天然气 | 20篇 |
无线电 | 310篇 |
一般工业技术 | 699篇 |
冶金工业 | 514篇 |
原子能技术 | 26篇 |
自动化技术 | 674篇 |
出版年
2023年 | 31篇 |
2022年 | 57篇 |
2021年 | 104篇 |
2020年 | 61篇 |
2019年 | 91篇 |
2018年 | 76篇 |
2017年 | 81篇 |
2016年 | 124篇 |
2015年 | 115篇 |
2014年 | 154篇 |
2013年 | 212篇 |
2012年 | 193篇 |
2011年 | 287篇 |
2010年 | 173篇 |
2009年 | 210篇 |
2008年 | 241篇 |
2007年 | 206篇 |
2006年 | 161篇 |
2005年 | 143篇 |
2004年 | 139篇 |
2003年 | 94篇 |
2002年 | 90篇 |
2001年 | 67篇 |
2000年 | 77篇 |
1999年 | 70篇 |
1998年 | 158篇 |
1997年 | 109篇 |
1996年 | 84篇 |
1995年 | 58篇 |
1994年 | 60篇 |
1993年 | 52篇 |
1992年 | 33篇 |
1991年 | 25篇 |
1990年 | 27篇 |
1989年 | 26篇 |
1988年 | 25篇 |
1987年 | 14篇 |
1986年 | 16篇 |
1985年 | 15篇 |
1984年 | 23篇 |
1983年 | 8篇 |
1982年 | 8篇 |
1981年 | 11篇 |
1980年 | 8篇 |
1977年 | 15篇 |
1976年 | 16篇 |
1975年 | 7篇 |
1974年 | 7篇 |
1969年 | 6篇 |
1968年 | 6篇 |
排序方式: 共有4119条查询结果,搜索用时 296 毫秒
71.
Simon Pedersen Petar Durdevic Kasper Stampe Sandra Lindberg Pedersen Zhenyu Yang 《国际自动化与计算杂志》2016,13(1):81-88
Severe slugging flow is always challenging in oil & gas production, especially for the current offshore based production. The slugging flow can cause a lot of problems, such as those relevant to production safety, fatigue as well as capability. As one typical phenomenon in multi-phase flow dynamics, the slug can be avoided or eliminated by proper facility design or control of operational conditions. Based on a testing facility which can emulate a pipeline-riser or a gas-lifted production well in a scaled-down manner, this paper experimentally studies the correlations of key operational parameters with severe slugging flows. These correlations are reflected through an obtained stable surface in the parameter space, which is a natural extension of the bifurcation plot. The maximal production opportunity without compromising the stability is also studied. Relevant studies have already showed that the capability, performance and efficiency of anti-slug control can be dramatically improved if these stable surfaces can be experimentally determined beforehand. The paper concludes that obtaining the stable surface on the new developed map can significantly improve the production rate in a control scheme. Even though the production rate can be further improved by moving the stable surface using advanced control strategies, the constant inputs can in some cases be preferable due to the easier implementation. 相似文献
72.
Jens Petter Johansen Petter Grytten Almklov Abdul Basit Mohammad 《Cognition, Technology & Work》2016,18(2):333-350
This paper explores how different forms of anticipatory work contribute to reliability in high-risk space operations. It is based on ethnographic field work, participant observation and interviews supplemented with video recordings from a control room responsible for operating a microgravity greenhouse at the International Space Station (ISS). Drawing on examples from different stages of a biological experiment on the ISS, we demonstrate how engineers, researchers and technicians work to anticipate and proactively mitigate possible problems. Space research is expensive and risky. The experiments are planned over the course of many years by a globally distributed network of organizations. Owing to the inaccessibility of the ISS, every trivial detail that could possibly cause a problem is subject to scrutiny. We discuss what we label anticipatory work: practices constituted of an entanglement of cognitive, social and technical elements involved in anticipating and proactively mitigating everything that might go wrong. We show how the nature of anticipatory work changes between planning and the operational phases of an experiment. In the planning phase, operators inscribe their anticipation into technology and procedures. In the operational phase, we show how troubleshooting involves the ability to look ahead in the evolving temporal trajectory of the ISS operations and to juggle pre-planned fixes along these trajectories. A key objective of this paper is to illustrate how anticipation is shared between humans and different forms of technology. Moreover, it illustrates the importance of including considerations of temporality in safety and reliability research. 相似文献
73.
“Simply, people can no longer remember passwords good enough to reliably defend against dictionary attacks, and are much more secure if they choose a password too complicated to remember and then write it down. We’re all good at securing small pieces of paper. I recommend that people write their passwords down on a small piece of paper, and keep it with their other valuable small pieces of paper: in their wallet.” 相似文献
74.
75.
Olaf Mersmann Bernd Bischl Heike Trautmann Markus Wagner Jakob Bossek Frank Neumann 《Annals of Mathematics and Artificial Intelligence》2013,69(2):151-182
Meta-heuristics are frequently used to tackle NP-hard combinatorial optimization problems. With this paper we contribute to the understanding of the success of 2-opt based local search algorithms for solving the traveling salesperson problem (TSP). Although 2-opt is widely used in practice, it is hard to understand its success from a theoretical perspective. We take a statistical approach and examine the features of TSP instances that make the problem either hard or easy to solve. As a measure of problem difficulty for 2-opt we use the approximation ratio that it achieves on a given instance. Our investigations point out important features that make TSP instances hard or easy to be approximated by 2-opt. 相似文献
76.
We analyze the class of surfaces which are equipped with rational support functions. Any rational support function can be decomposed into a symmetric (even) and an antisymmetric (odd) part. We analyze certain geometric properties of surfaces with odd and even rational support functions. In particular it is shown that odd rational support functions correspond to those rational surfaces which can be equipped with a linear field of normal vectors, which were discussed by Sampoli et al. (Sampoli, M.L., Peternell, M., Jüttler, B., 2006. Rational surfaces with linear normals and their convolutions with rational surfaces. Comput. Aided Geom. Design 23, 179–192). As shown recently, this class of surfaces includes non-developable quadratic triangular Bézier surface patches (Lávička, M., Bastl, B., 2007. Rational hypersurfaces with rational convolutions. Comput. Aided Geom. Design 24, 410–426; Peternell, M., Odehnal, B., 2008. Convolution surfaces of quadratic triangular Bézier surfaces. Comput. Aided Geom. Design 25, 116–129). 相似文献
77.
Andreas Petlund Paul Beskow Jon Pedersen Espen Søgård Paaby Carsten Griwodz Pål Halvorsen 《Multimedia Tools and Applications》2009,45(1-3):33-60
A large number of network services rely on IP and reliable transport protocols. For applications that provide abundant data for transmission, loss is usually handled satisfactorily, even if the application is latency-sensitive (Wang et al. 2004). For data streams where small packets are sent intermittently, however, applications can occasionally experience extreme latencies (Griwodz and Halvorsen 2006). As it is not uncommon that such thin-stream applications are time-dependent, any unnecessarily induced delay can have severe consequences for the service provided. Massively Multiplayer Online Games (MMOGs) are a defining example of thin streams. Many MMOGs (like World of Warcraft and Age of Conan) use TCP for the benefits of reliability, in-order delivery and NAT/firewall traversal. It has been shown that TCP has several shortcomings with respect to the latency requirements of thin streams because of the way it handles retransmissions (Griwodz and Halvorsen 2006). As such, an alternative to TCP may be SCTP (Stewart et al. 2000), which was originally developed to meet the requirements of signaling transport. In this paper, we evaluate the Linux-kernel SCTP implementation in the context of thin streams. To address the identified latency challenges, we propose sender-side only enhancements that reduce the application-layer latency in a manner that is compatible with unmodified receivers. These enhancements can be switched on by applications and are used only when the system identifies the stream as thin. To evaluate the latency performance, we have performed several tests over various real networks and over an emulated network, varying parameters like RTT, packet loss and amount of competing cross traffic. When comparing our modifications with SCTP on Linux and FreeBSD and TCP New Reno, our results show great latency improvements and indicate the need for a separate handling of thin and thick streams. 相似文献
78.
Frank-Michael Schleif Mathias Lindemann Mario Diaz Peter Maaß Jens Decker Thomas Elssner Michael Kuhn Herbert Thiele 《Computing and Visualization in Science》2009,12(4):189-199
Automatic classification of high-resolution mass spectrometry data has increasing potential to support physicians in diagnosis of diseases like cancer. The proteomic data exhibit variations among different disease states. A precise and reliable classification of mass spectra is essential for a successful diagnosis and treatment. The underlying process to obtain such reliable classification results is a crucial point. In this paper such a method is explained and a corresponding semi automatic parameterization procedure is derived. Thereby a simple straightforward classification procedure to assign mass spectra to a particular disease state is derived. The method is based on an initial preprocessing stage of the whole set of spectra followed by the bi-orthogonal discrete wavelet transform (DWT) for feature extraction. The approximation coefficients calculated from the scaling function exhibit a high peak pattern matching property and feature a denoising of the spectrum. The discriminating coefficients, selected by the Kolmogorov–Smirnov test are finally used as features for training and testing a support vector machine with both a linear and a radial basis kernel. For comparison the peak areas obtained with the it ClinProt-System 1 [33] were analyzed using the same support vector machines. The introduced approach was evaluated on clinical MALDI-MS data sets with two classes each originating from cancer studies. The cross validated error rates using the wavelet coefficients where better than those obtained from the peak areas2. 相似文献
79.
Ivan Martinovic Paul Pichota Matthias Wilhelm Frank A. Zdarsky Jens B. Schmitt 《Pervasive and Mobile Computing》2009,5(5):510-525
To improve the tarnished reputation of WLAN security, the new IEEE 802.11i standard provides means for mutual user authentication and assures confidentiality of user data. However, the IEEE 802.11 link-layer is still highly vulnerable to a plethora of simple, yet effective attacks which further jeopardize the already fragile security of wireless communications.Some of these vulnerabilities are related to limited hardware capabilities of access points and their abuse may result in serious degradation of control over the wireless connection, which, especially in the case of broadcast communication, allows for client hijacking attacks. Although these issues are known and their impact is expected to be less prevalent on modern equipment, this work demonstrates the opposite. In our experimental analysis, we tested frequently used access points, and by forcing them to operate on their performance limits, we identified significant operational anomalies and demonstrated their impact on security by implementing a novel version of the Man-In-The-Middle attack, to which we refer as the Muzzle attack.Secondly, this work describes DiscoSec, a solution for “patching” WLANs against a variety of such link-layer attacks. DiscoSec provides DoS-resilient key exchange, an efficient frame authentication, and a performance-oriented implementation. By means of extensive real-world measurements DiscoSec is evaluated, showing that even on very resource-limited devices the network throughput is decreased by only 22% compared to the throughput without any authentication, and by 6% on more performance-capable hardware. To demonstrate its effectiveness, DiscoSec is available as an open-source IEEE 802.11 device driver utilizing well-established cryptographic primitives provided by the Linux Crypto API and OpenSSL library. 相似文献
80.
Bolette Sandford Pedersen Sanni Nimb Jørg Asmussen Nicolai Hartvig Sørensen Lars Trap-Jensen Henrik Lorentzen 《Language Resources and Evaluation》2009,43(3):269-299
This paper is a contribution to the discussion on compiling computational lexical resources from conventional dictionaries.
It describes the theoretical as well as practical problems that are encountered when reusing a conventional dictionary for
compiling a lexical-semantic resource in terms of a wordnet. More specifically, it describes the methodological issues of
compiling a wordnet for Danish, DanNet, from a monolingual basis, and not—as is often seen—by applying the translational expansion method with Princeton WordNet as the English source.
Thus, we apply as our basis a large, corpus-based printed dictionary of modern Danish. Using this approach, we discuss the
issues of readjusting inconsistent and/or underspecified hyponymy hierarchies taken from the conventional dictionary, sense
distinctions as opposed to the synonym sets of wordnets, generating semantic wordnet relations on the basis of sense definitions,
and finally, supplementing missing or implicit information. 相似文献