全文获取类型
收费全文 | 1582篇 |
免费 | 44篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 18篇 |
综合类 | 9篇 |
化学工业 | 192篇 |
金属工艺 | 117篇 |
机械仪表 | 33篇 |
建筑科学 | 66篇 |
矿业工程 | 9篇 |
能源动力 | 41篇 |
轻工业 | 159篇 |
水利工程 | 4篇 |
石油天然气 | 8篇 |
无线电 | 197篇 |
一般工业技术 | 215篇 |
冶金工业 | 266篇 |
原子能技术 | 13篇 |
自动化技术 | 282篇 |
出版年
2022年 | 10篇 |
2021年 | 18篇 |
2020年 | 12篇 |
2019年 | 17篇 |
2018年 | 23篇 |
2017年 | 29篇 |
2016年 | 26篇 |
2015年 | 21篇 |
2014年 | 36篇 |
2013年 | 83篇 |
2012年 | 55篇 |
2011年 | 80篇 |
2010年 | 69篇 |
2009年 | 83篇 |
2008年 | 95篇 |
2007年 | 85篇 |
2006年 | 83篇 |
2005年 | 80篇 |
2004年 | 56篇 |
2003年 | 70篇 |
2002年 | 61篇 |
2001年 | 32篇 |
2000年 | 25篇 |
1999年 | 32篇 |
1998年 | 52篇 |
1997年 | 43篇 |
1996年 | 44篇 |
1995年 | 48篇 |
1994年 | 25篇 |
1993年 | 27篇 |
1992年 | 16篇 |
1991年 | 13篇 |
1990年 | 15篇 |
1989年 | 18篇 |
1988年 | 13篇 |
1987年 | 10篇 |
1986年 | 14篇 |
1985年 | 9篇 |
1984年 | 9篇 |
1983年 | 11篇 |
1982年 | 11篇 |
1981年 | 6篇 |
1980年 | 7篇 |
1979年 | 4篇 |
1978年 | 7篇 |
1977年 | 7篇 |
1976年 | 14篇 |
1975年 | 5篇 |
1973年 | 4篇 |
1970年 | 4篇 |
排序方式: 共有1629条查询结果,搜索用时 15 毫秒
51.
Reza Sepahi Ron Steinfeld Josef Pieprzyk 《International Journal of Information Security》2014,13(4):315-333
The notion of certificateless public-key encryption (CL-PKE) was introduced by Al-Riyami and Paterson in 2003 that avoids the drawbacks of both traditional PKI-based public-key encryption (i.e., establishing public-key infrastructure) and identity-based encryption (i.e., key escrow). So CL-PKE like identity-based encryption is certificate-free, and unlike identity-based encryption is key escrow-free. In this paper, we introduce simple and efficient CCA-secure CL-PKE based on (hierarchical) identity-based encryption. Our construction has both theoretical and practical interests. First, our generic transformation gives a new way of constructing CCA-secure CL-PKE. Second, instantiating our transformation using lattice-based primitives results in a more efficient CCA-secure CL-PKE than its counterpart introduced by Dent in 2008. 相似文献
52.
We raise the question of approximating the compressibility of a string with respect to a fixed compression scheme, in sublinear time. We study this question in detail for two popular lossless compression schemes: run-length encoding (RLE) and a variant of Lempel-Ziv (LZ77), and present sublinear algorithms for approximating compressibility with respect to both schemes. We also give several lower bounds that show that our algorithms for both schemes cannot be improved significantly. Our investigation of LZ77 yields results whose interest goes beyond the initial questions we set out to study. In particular, we prove combinatorial structural lemmas that relate the compressibility of a string with respect to LZ77 to the number of distinct short substrings contained in it (its ?th subword complexity , for small ?). In addition, we show that approximating the compressibility with respect to LZ77 is related to approximating the support size of a distribution. 相似文献
53.
54.
55.
56.
57.
E. A. Chinnov F. V. Ron’shin V. V. Guzanov D. M. Markovich O. A. Kabov 《High Temperature》2014,52(5):681-687
Two-phase flow in a rectangular short horizontal channel 200 μm high was studied experimentally. The use of the fluorescent method made it possible to reveal flow of liquid in the channel and to determine its characteristics quantitatively. The existence of the regime of separate (stratified) flow is established. Based on analysis of previous investigations and newly obtained data, it is shown that a change in the height of the horizontal channel has a substantial effect on the boundaries between the regimes. The region of the churn regime increases with decreasing thickness of the channel. 相似文献
58.
Ron Sun 《人工智能实验与理论杂志》2018,30(1):13-37
This paper discusses, in the context of computational modelling and simulation of cognition, the relevance of deeper structures in the control of behaviour. Such deeper structures include motivational control of behaviour, which provides underlying causes for actions, and also metacognitive control, which provides higher-order processes for monitoring and regulation. It is argued that such deeper structures are important and thus cannot be ignored in computational cognitive architectures. A general framework based on the Clarion cognitive architecture is outlined that emphasises the interaction amongst action selection, motivation, and metacognition. The upshot is that it is necessary to incorporate all essential processes; short of that, the understanding of cognition can only be incomplete. 相似文献
59.
60.
Modern technology is affecting what is taught and how statistics is taught. Computer intensive methods like bootstrapping, generalized regression, coordinate exchange algorithms and computer experiment emulators are now part of the statistical toolkit. In parallel with these new methods and tools, a similar evolution appears in statistical education. Simulators offer opportunities for hands-on experience in the classroom, bridging the gap between theory and practice. In this article, we map a wide range of simulation based tools used in teaching statistical methods, putting them in the context of a quality ladder representing various maturity levels of organizations and course level sophistication. The mapping is designed to help educators assess and integrate options related to the incorporation of simulators as teaching aids in an educational and pedagogical roadmap. The mapping is applied to specific simulation products but provides a general framework that can be expanded and used in a generic way. 相似文献