全文获取类型
收费全文 | 4108篇 |
免费 | 166篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 53篇 |
综合类 | 6篇 |
化学工业 | 944篇 |
金属工艺 | 108篇 |
机械仪表 | 113篇 |
建筑科学 | 96篇 |
矿业工程 | 1篇 |
能源动力 | 142篇 |
轻工业 | 167篇 |
水利工程 | 26篇 |
石油天然气 | 3篇 |
武器工业 | 2篇 |
无线电 | 929篇 |
一般工业技术 | 659篇 |
冶金工业 | 390篇 |
原子能技术 | 22篇 |
自动化技术 | 621篇 |
出版年
2023年 | 19篇 |
2022年 | 67篇 |
2021年 | 91篇 |
2020年 | 59篇 |
2019年 | 52篇 |
2018年 | 84篇 |
2017年 | 68篇 |
2016年 | 87篇 |
2015年 | 83篇 |
2014年 | 125篇 |
2013年 | 305篇 |
2012年 | 220篇 |
2011年 | 236篇 |
2010年 | 220篇 |
2009年 | 229篇 |
2008年 | 236篇 |
2007年 | 202篇 |
2006年 | 175篇 |
2005年 | 153篇 |
2004年 | 141篇 |
2003年 | 125篇 |
2002年 | 113篇 |
2001年 | 102篇 |
2000年 | 92篇 |
1999年 | 84篇 |
1998年 | 175篇 |
1997年 | 120篇 |
1996年 | 82篇 |
1995年 | 67篇 |
1994年 | 58篇 |
1993年 | 43篇 |
1992年 | 38篇 |
1991年 | 30篇 |
1990年 | 25篇 |
1989年 | 31篇 |
1988年 | 22篇 |
1987年 | 18篇 |
1986年 | 8篇 |
1985年 | 22篇 |
1984年 | 19篇 |
1983年 | 15篇 |
1982年 | 10篇 |
1981年 | 14篇 |
1980年 | 14篇 |
1979年 | 12篇 |
1977年 | 16篇 |
1976年 | 15篇 |
1975年 | 13篇 |
1973年 | 10篇 |
1967年 | 7篇 |
排序方式: 共有4282条查询结果,搜索用时 0 毫秒
91.
This paper proposes two maintenance schemes for reused products. In order to reduce the purchasing cost or conform to the concept of environmental protection, reuse is considered as one of the most efficient strategies. However, the initial quality of reused product is often inferior to the new one and then product failures will occur frequently during usage period. Therefore, two periodical preventive maintenance (PM) policies in this paper are developed to decrease the high failure rate of the second-hand products. When a second-hand product with Weibull life time distribution of known age is intended to be used for a pre-specified period of time, the optimal number of PM actions and the corresponding maintenance degree are derived such that the expected total maintenance cost is minimized. The impact of providing preventive maintenance is illustrated through numerical examples. 相似文献
92.
This paper presents an evolutionary algorithm, called the multi-objective symbiotic evolutionary algorithm (MOSEA), to solve a multi-objective FMS process planning (MFPP) problem with various flexibilities. The MFPP problem simultaneously considers four types of flexibilities related to machine, tool, sequence, and process and takes into account three objectives: balancing the machine workload, minimizing part movements, and minimizing tool changes. The MOSEA is modeled as a two-leveled structure to find a set of well-distributed solutions close to the true Pareto optimal solutions. To promote the search capability of such solutions, two main processes imitating symbiotic evolution and endosymbiotic evolution are introduced, together with an elitist strategy and a fitness sharing scheme. Evolutionary components suitable for the MFPP problem are provided. With a variety of test-bed problems, the performance of the proposed MOSEA is compared with those of existing multi-objective evolutionary algorithms. The experimental results show that the MOSEA is promising in solution convergence and diversity. 相似文献
93.
Junwei Zhang Bu-Sung Lee Xueyan Tang Chai-Kiat Yeo 《The Journal of supercomputing》2011,56(3):245-269
Data Grid has evolved to be the solution for data-intensive applications, such as High Energy Physics (HEP), astrophysics,
and computational genomics. These applications usually have large input of data to be analyzed and these input data are widely
replicated across Data Grid to improve the performance. The job scheduling performance on traditional computing jobs can be
studied using queuing theory. However, with the addition of data transfer, the job scheduling performance is too complex to
be modeled. In this research, we study the impact of data transfer on the performance of job scheduling in the Data Grid environment.
We have proposed a parallel downloading system that supports replicating data fragments and parallel downloading of replicated
data fragments, to improve the job scheduling performance. The performance of the parallel downloading system is compared
with non-parallel downloading system, using three scheduling heuristics: Shortest Turnaround Time (STT), Least Relative Load
(LRL) and Data Present (DP). Our simulation results show that the proposed parallel download approach greatly improves the
Data Grid performance for all three scheduling algorithms, in terms of the geometric mean of job turnaround time. The advantage
of parallel downloading system is most evident when the Data Grid has relatively low network bandwidth and relatively high
computing power. 相似文献
94.
In this paper, we have first reviewed the state-of-the-art technologies related to DOCSIS 3.0 high-speed data transmission
system and also looked at current trends in the next generation Gbps transmission technology, which is one of key technology
for ubiquitous high performance multimedia service environments. Also, we implemented the RS encoder which was designed using
VHDL and verified its operation in order to confirm our design through the ModelSim simulation analysis tool. 相似文献
95.
This report proposes a solution to the open shop scheduling problem with the objective of minimizing total job tardiness in the system. Some practical processing restrictions, such as independent setup and dependent removal times, are taken into account as well. The addressed problem is first described as a 0–1 integer programming model, and is then solved optimally. Subsequently, some hybrid genetic-based heuristics are proposed to solve the problem in an acceptable computation time. To demonstrate the adaptability of these heuristics, some performance comparisons are made with solutions provided by running either a mathematical programming model or certain classic meta-heuristics such as genetic algorithm, simulated annealing, and tabu search in various manufacturing scenarios. The experimental results show that the hybrid genetic-based heuristics perform well, especially the DGA. However, these heuristics require some more additional computations but are still acceptable. 相似文献
96.
Muhammad Sajjad Khan Muhammad Sung Wook Baik Seungmin Rho Zahoor Jan Sang-Soo Yeo Irfan Mehmood 《Multimedia Tools and Applications》2017,76(3):3519-3536
In this paper, the problem of outsourcing the selective encryption of a medical image to cloud by resource-constrained devices such as smart phone is addressed, without revealing the cover image to cloud using steganography. In the proposed framework, the region of interest of the medical image is first detected using a visual saliency model. The detected important data is then embedded in a host image, producing a stego image which is outsourced to cloud for encryption. The cloud which has powerful resources, encrypts the image and sent back the encrypted marked image to the client. The client can then extract the selectively encrypted region of interest and can combine it with the region of non-interest to form a selectively encrypted image, which can be sent to medical specialists and healthcare centers. Experimental results and analysis validate the effectiveness of the proposed framework in terms of security, image quality, and computational complexity and verify its applicability in remote patient monitoring centers. 相似文献
97.
Traditional microfluidic paper-based analytical devices (μPADs) consist of a flat straight channel printed on a paper substrate. Such devices provide a promising low-cost solution for a variety of biomedical assays. However, they have a relatively high sample consumption due to their use of external reservoirs. Moreover, in μPADs based on the ion concentration polarization (ICP) effect, controlling the cross-sectional area of the Nafion membrane relative to that of the hydrophilic channel is difficult. Accordingly, the present study utilizes an origami technique to create a μPAD with a three-dimensional (3D) structure. The μPAD features short channels and embedded reservoirs, and therefore reduces both the driving voltage requirement and the sample consumption. Moreover, the preconcentration effect is enhanced through the use of an additional hydrophilic area adjacent to the Nafion membrane. The existence of electroosmotic flow (EOF) within the proposed device is confirmed using a current-monitoring method. In addition, the occurrence of ICP is evaluated by measuring the current–voltage response of the device at external voltages ranging from 0 to 50 V. The experimental results obtained for a fluorescein sample with an initial concentration of 10?5 M show that a 100-fold enhancement factor can be achieved given the use of a non-uniform-geometry design for the assay channel and an additional hydrophilic region with an area equal to approximately 10% of the channel cross-sectional area. Finally, a 100-fold factor can also be achieved for a fluorescein isothiocyanate sample with an initial concentration of 10?6 M given an external driving voltage of 40 V. 相似文献
98.
99.
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value 总被引:4,自引:0,他引:4
Radio Frequency IDentification (RFID ) system is a contactless automatic identification system using small, low-cost RFID tags. It enables recognition of the tag information via radio frequency communication, by attaching an RFID tag to an animate or inanimate object. Since an RFID system has the advantage of simultaneously recognizing massive amounts of information, it is expected to replace the bar-code system. The most important problem with an RFID system is that an adversary can access the tag information, which gives rise to privacy and forgery problems. This paper presents a hash-based mutual authentication protocol as a solution. The proposed protocol is designed to send a random number generated by a tag to a back-end server without disclosure. Moreover it substitutes a random number with a secret value, which is employed in a response message. The properties of the proposed protocol enable constant creation of distinct response messages without interferences from intended or meaningless requests generated by an adversary, while the secret value is not directly transmitted. Our proposed protocol make is difficult for an attacker to launch successful brute-force attacks against our approach. 相似文献
100.
Chung-Wei Yeh Chih-Ping Chu 《Knowledge and Data Engineering, IEEE Transactions on》2008,20(7):965-975
Various graphic techniques have been developed to analyze structural errors in rule-based systems that utilize inference (propositional) logic rules. Four typical errors in rule-based systems are: redundancy (numerous rule sets resulting in the same conclusion); circularity (a rule leading back to itself); incompleteness (deadends or a rule set conclusion leading to unreachable goals); and inconsistency (rules conflicting with each other). This study presents a new DNA-based computing algorithm mainly based upon Adleman's DNA operations. It can be used to detect such errors. There are three phases to this molecular solution: rule-to-DNA transformation design, solution space generation, and rule verification. We first encode individual rules using relatively short DNA strands, and then generate all possible rule paths by the directed joining of such short strands to form longer strands. We then conduct the verification algorithm to detect errors. The potential of applying this proposed DNA computation algorithm to rule verification is promising given the operational time complexity of O(n*q), in which n denotes the number of fact clauses in the rule base and q is the number of rules with longest inference chain. 相似文献