全文获取类型
收费全文 | 2467篇 |
免费 | 33篇 |
专业分类
电工技术 | 20篇 |
综合类 | 6篇 |
化学工业 | 386篇 |
金属工艺 | 88篇 |
机械仪表 | 36篇 |
建筑科学 | 81篇 |
矿业工程 | 30篇 |
能源动力 | 36篇 |
轻工业 | 784篇 |
水利工程 | 8篇 |
石油天然气 | 6篇 |
无线电 | 92篇 |
一般工业技术 | 236篇 |
冶金工业 | 435篇 |
原子能技术 | 20篇 |
自动化技术 | 236篇 |
出版年
2021年 | 26篇 |
2016年 | 27篇 |
2015年 | 24篇 |
2014年 | 28篇 |
2013年 | 95篇 |
2012年 | 37篇 |
2011年 | 82篇 |
2010年 | 60篇 |
2009年 | 57篇 |
2008年 | 61篇 |
2007年 | 57篇 |
2006年 | 51篇 |
2005年 | 55篇 |
2004年 | 43篇 |
2003年 | 45篇 |
2002年 | 50篇 |
2001年 | 28篇 |
2000年 | 28篇 |
1999年 | 41篇 |
1998年 | 126篇 |
1997年 | 83篇 |
1996年 | 51篇 |
1995年 | 45篇 |
1994年 | 35篇 |
1993年 | 33篇 |
1992年 | 22篇 |
1991年 | 23篇 |
1990年 | 22篇 |
1989年 | 29篇 |
1988年 | 26篇 |
1987年 | 28篇 |
1986年 | 23篇 |
1985年 | 48篇 |
1984年 | 30篇 |
1983年 | 22篇 |
1977年 | 36篇 |
1976年 | 26篇 |
1974年 | 20篇 |
1921年 | 21篇 |
1920年 | 30篇 |
1919年 | 22篇 |
1918年 | 27篇 |
1917年 | 84篇 |
1916年 | 45篇 |
1915年 | 43篇 |
1914年 | 39篇 |
1913年 | 68篇 |
1912年 | 115篇 |
1911年 | 31篇 |
1910年 | 31篇 |
排序方式: 共有2500条查询结果,搜索用时 15 毫秒
41.
Evolutionary algorithms are randomized search heuristics, which are applied to problems whose structure is not well understood, as well as to problems in combinatorial optimization. They have successfully been applied to different kinds of arc routing problems. To start the analysis of evolutionary algorithms with respect to the expected optimization time on these problems, we consider the Eulerian cycle problem. We show that a variant of the well-known (1+1) EA working on the important encoding of permutations is able to find an Eulerian tour of an Eulerian graph in expected polynomial time. Altering the operator used for mutation in the considered algorithm, the expected optimization time changes from polynomial to exponential. 相似文献
42.
In this paper we have a closer look at one of the rules of the tableau calculus presented by Fitting [4], called the -rule. We prove that a modification of this rule, called the +-rule, which uses fewer free variables, is also sound and complete. We examine the relationship between the +-rule and variations of the -rule presented by Smullyan [9]. This leads to a second proof of the soundness of the +-rule. An example shows the relevance of this modification for building tableau-based theorem provers. 相似文献
43.
Oxidative Stress Imaging: Visualizing Oxidative Cellular Stress Induced by Nanoparticles in the Subcytotoxic Range Using Fluorescence Lifetime Imaging (Small 23/2018) 下载免费PDF全文
44.
C Loske A Neumann AM Cunningham K Nichol R Schinzel P Riederer G Münch 《Canadian Metallurgical Quarterly》1998,105(8-9):1005-1015
Non-enzymatic glycation of proteins with reducing sugars and subsequent transition metal catalysed oxidations leads to the formation of protein bound "advanced glycation endproducts" (AGEs). They accumulate on long-lived proteins and are for example structural components of the beta-amyloid plaques in Alzheimer's disease. Since the oxidation of glycated proteins as well as the interaction of AGEs with cell surface receptors produces superoxide radicals, it was tested in BHK 21 hamster fibroblast cells and SH-SY5Y human neuroblastoma cells if AGEs can exert cytotoxic effects on cells. Cell viability was assessed with three independent tests: MTT-assay (activity of the mitochondrial respiratory chain), lactate dehydrogenase assay (release of cytoplasmatic enzymes, membrane integrity) and Neutral Red assay (active uptake of a hydrophilic dye). Two model AGEs, chicken egg albumin-AGE and BSA-AGE, both caused significant cell death in a dose-dependent manner. The cytotoxic effects of AGEs could be attenuated by alpha-ketoglutarate and pyruvate, by antioxidants such as thioctic acid and N-acetylcysteine, and by aminoguanidine, an inhibitor of nitric oxide synthase. This suggests that reactive oxygen species as well as reactive nitrogen species contribute to AGE mediated cytotoxicity. Since AGEs accumulate on beta-amyloid plaques in AD over time, they may additionally contribute to oxidative stress, cell damage, functional loss and even neuronal cell death in the Alzheimer's disease brain. 相似文献
45.
Rhee T Lewis JP Neumann U Nayak KS 《IEEE transactions on visualization and computer graphics》2011,17(3):368-379
This paper describes a complete system to create anatomically accurate example-based volume deformation and animation of articulated body regions, starting from multiple in vivo volume scans of a specific individual. In order to solve the correspondence problem across volume scans, a template volume is registered to each sample. The wide range of pose variations is first approximated by volume blend deformation (VBD), providing proper initialization of the articulated subject in different poses. A novel registration method is presented to efficiently reduce the computation cost while avoiding strong local minima inherent in complex articulated body volume registration. The algorithm highly constrains the degrees of freedom and search space involved in the nonlinear optimization, using hierarchical volume structures and locally constrained deformation based on the biharmonic clamped spline. Our registration step establishes a correspondence across scans, allowing a data-driven deformation approach in the volume domain. The results provide an occlusion-free person-specific 3D human body model, asymptotically accurate inner tissue deformations, and realistic volume animation of articulated movements driven by standard joint control estimated from the actual skeleton. Our approach also addresses the practical issues arising in using scans from living subjects. The robustness of our algorithms is tested by their applications on the hand, probably the most complex articulated region in the body, and the knee, a frequent subject area for medical imaging due to injuries. 相似文献
46.
This special issue collects current advances in the ongoing attempt to obtain synergies from the combination of Tests and
Proofs. 相似文献
47.
A quantity known as the Kemeny constant, which is used to measure the expected number of links that a surfer on the World Wide Web, located on a random web page, needs to follow before reaching his/her desired location, coincides with the more well known notion of the expected time to mixing, i.e., to reaching stationarity of an ergodic Markov chain. In this paper we present a new formula for the Kemeny constant and we develop several perturbation results for the constant, including conditions under which it is a convex function. Finally, for chains whose transition matrix has a certain directed graph structure we show that the Kemeny constant is dependent only on the common length of the cycles and the total number of vertices and not on the specific transition probabilities of the chain. 相似文献
48.
Nikolay Borissov Dirk Neumann Christof Weinhardt 《Autonomous Agents and Multi-Agent Systems》2010,21(2):115-142
Autonomous agents are widely applied to automate interactions in robotics, e.g. for selling and purchasing goods on eBay,
and in financial markets, e.g. in the form of quote machines and algorithmic traders. Current research investigates efficient
economic mechanisms that fully automate the provisioning and usage processes of Grid-based services. On the one hand, consumers
want to allocate resources on demand for their various applications, e.g. data sharing, stream processing, email, business
applications and simulations. On the other hand, providers of Grid services want to govern business policies to meet their
utilization and profit goals. The above-mentioned processes are not manually manageable, however, because decisions need to
be taken within milliseconds. Therefore, such processes have to be automated to minimize human interactions. Hence, market
mechanisms and strategic behavior play important roles when it comes to achieving automated and efficient allocation of Grid
services. The paper begins by presenting a framework for automated bidding, providing a methodology for the design and implementation
of configurable bidding strategies. Second, it presents a novel bidding strategy based on a reinforcement learning technique.
This strategy is designed to automate the bid generation processes of consumers and providers in various market mechanisms.
Third, the behavior and convergence of the strategy is evaluated in a centralized Continuous Double Auction and a decentralized
on-line machine scheduling mechanism against selected benchmark bidding strategies. Fourth, we define a bidding language for
communicating consumer and provider preferences to the market as well as report back the match of the market-based allocation
process. 相似文献
49.
User interfaces are becoming more intuitive following the requirements of the individual learner and reinforcing the drive towards more personalised learning and greater learner autonomy. There are clearly a new set of challenges emerging for teaching practitioners that will have implications upon not just what is learned but importantly upon lesson planning. This paper explores these changes to teaching through a consideration of an exploratory learning model which allows practitioners to rethink how they teach in 3D and immersive spaces where learning sequences and experiences are choreographed to support peer interactions and exchanges. The ELM extends from Kolb’s experiential learning model to adapt the use of 3D applications, and provides examples from research and development projects to exemplify how the model works in practice. Teaching in these contexts provides less emphasis upon curriculum and more emphasis upon sequencing learning experiences, meta-reflection, peer assessment and group work. 相似文献
50.
Thomas Neumann Matthias Bender Sebastian Michel Ralf Schenkel Peter Triantafillou Gerhard Weikum 《Distributed and Parallel Databases》2009,26(1):3-27
Top-k query processing is a fundamental building block for efficient ranking in a large number of applications. Efficiency is a
central issue, especially for distributed settings, when the data is spread across different nodes in a network. This paper
introduces novel optimization methods for top-k aggregation queries in such distributed environments. The optimizations can be applied to all algorithms that fall into the
frameworks of the prior TPUT and KLEE methods. The optimizations address three degrees of freedom: 1) hierarchically grouping
input lists into top-k operator trees and optimizing the tree structure, 2) computing data-adaptive scan depths for different input sources, and
3) data-adaptive sampling of a small subset of input sources in scenarios with hundreds or thousands of query-relevant network
nodes. All optimizations are based on a statistical cost model that utilizes local synopses, e.g., in the form of histograms,
efficiently computed convolutions, and estimators based on order statistics. The paper presents comprehensive experiments,
with three different real-life datasets and using the ns-2 network simulator for a packet-level simulation of a large Internet-style
network. 相似文献