全文获取类型
收费全文 | 617篇 |
免费 | 60篇 |
国内免费 | 24篇 |
专业分类
电工技术 | 12篇 |
综合类 | 6篇 |
化学工业 | 113篇 |
金属工艺 | 48篇 |
机械仪表 | 32篇 |
建筑科学 | 12篇 |
矿业工程 | 15篇 |
能源动力 | 17篇 |
轻工业 | 30篇 |
水利工程 | 6篇 |
石油天然气 | 6篇 |
无线电 | 65篇 |
一般工业技术 | 109篇 |
冶金工业 | 109篇 |
自动化技术 | 121篇 |
出版年
2023年 | 8篇 |
2022年 | 15篇 |
2021年 | 20篇 |
2020年 | 6篇 |
2019年 | 14篇 |
2018年 | 9篇 |
2017年 | 18篇 |
2016年 | 18篇 |
2015年 | 14篇 |
2014年 | 36篇 |
2013年 | 40篇 |
2012年 | 40篇 |
2011年 | 35篇 |
2010年 | 32篇 |
2009年 | 29篇 |
2008年 | 36篇 |
2007年 | 24篇 |
2006年 | 41篇 |
2005年 | 38篇 |
2004年 | 27篇 |
2003年 | 16篇 |
2002年 | 13篇 |
2001年 | 13篇 |
2000年 | 19篇 |
1999年 | 17篇 |
1998年 | 19篇 |
1997年 | 12篇 |
1996年 | 12篇 |
1995年 | 11篇 |
1994年 | 7篇 |
1993年 | 12篇 |
1992年 | 6篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 7篇 |
1988年 | 6篇 |
1987年 | 3篇 |
1985年 | 5篇 |
1984年 | 5篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1979年 | 2篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1972年 | 1篇 |
1971年 | 1篇 |
1969年 | 1篇 |
1963年 | 1篇 |
排序方式: 共有701条查询结果,搜索用时 877 毫秒
571.
关联维数是一个混沌时间序列分析中很重要的参数,在分析了噪声对关联维数求取的影响后,提出了一种应用小波分解求取含噪混沌时间序列关联维数的方法,数值试验证实了我们这种方法的正确性与可行性. 相似文献
572.
Loon Ching Tang Su Ee Than Beng Wah Ang 《Quality and Reliability Engineering International》1997,13(6):337-346
The process capability index Cpk has been widely used as a process performance measure. In practice this index is estimated using sample data. Hence it is of great interest to obtain confidence limits for the actual index given a sample estimate. In this paper we depict graphically the relationship between process potential index (Cp), process shift index (k) and percentage non-conforming (p). Based on the monotone properties of the relationship, we derive two-sided confidence limits for k and Cpk under two different scenarios. These two limits are combined using the Bonferroni inequality to generate a third type of confidence limit. The performance of these limits of Cpk in terms of their coverage probability and average width is evaluated by simulation. The most suitable type of confidence limit for each specific range of k is then determined. The usage of these confidence limits is illustrated via examples. Finally a performance comparison is done between the proposed confidence limits and three non-parametric bootstrap confidence limits. The results show that the proposed method consistently gives the smallest width and yet provides the intended coverage probability. © 1997 John Wiley & Sons, Ltd. 相似文献
573.
574.
Fault coupling is the phenomenon whereby a test set is able to detect faults when they occur in isolation, but fails to do so when they occur in combination. It is widely regarded as a nuisance in fault‐based approaches to software testing, which focus on the detection of single faults and normally neglect multiple faults. This paper presents a theoretical study of fault coupling, based on a simple model of fault‐based testing. This provides for the presence of two faults that interact with each other and thus includes the possibility of fault coupling between them. The model is analysed mathematically, the conclusion reached being that fault coupling only occurs infrequently. This result provides support for current approaches to fault‐based testing, but it is not quite enough to conclude that they are thereby validated. In effect, the paper generalizes the results of a previous paper that dealt with the restricted case where the functions underlying programs are bijective as well as finite. The restriction that functions be bijective is lifted here, but they are still required to be finite. Though the same theoretical framework is used in both cases, and more or less the same results are obtained, the techniques employed to arrive at the results in the general case are quite different. Copyright © 2000 John Wiley & Sons, Ltd. 相似文献
575.
Secret and public key image watermarking schemes for imageauthentication and ownership verification 总被引:33,自引:0,他引:33
We describe a watermarking scheme for ownership verification and authentication. Depending on the desire of the user, the watermark can be either visible or invisible. The scheme can detect any modification made to the image and indicate the specific locations that have been modified. If the correct key is specified in the watermark extraction procedure, then an output image is returned showing a proper watermark, indicating the image is authentic and has not been changed since the insertion of the watermark. Any modification would be reflected in a corresponding error in the watermark. If the key is incorrect, or if the image was not watermarked, or if the watermarked image is cropped, the watermark extraction algorithm will return an image that resembles random noise. Since it requires a user key during both the insertion and the extraction procedures, it is not possible for an unauthorized user to insert a new watermark or alter the existing watermark so that the resulting image will pass the test. We present secret key and public key versions of the technique. 相似文献
576.
577.
578.
Combined Detection of Cancer Cells and a Tumor Biomarker using an Immunomagnetic Sensor for the Improvement of Prostate‐Cancer Diagnosis
下载免费PDF全文
![点击此处可从《Advanced materials (Deerfield Beach, Fla.)》网站下载免费的PDF全文](/ch/ext_images/free.gif)
579.
580.
Wah Khim Ang 《工程优选》2013,45(7):705-715
Over the past decade, one of the key research areas for water distribution networks has been the quantification of network reliability. An interesting approach in this research topic is the use of informational entropy as a surrogate measure for the reliability of water distribution network. Research on water distribution network entropy has progressed to the stage where practical applications are possible, but the actual meaning of the network entropy has never been fully elucidated. Recently, an alternative approach to calculate network entropy was proposed, which was termed the path entropy method (PEM). This alternative method was shown to be useful for the case of single-source water distribution networks. The purpose of this article is to explore the use of the PEM on multiple-source networks. A two-source and two-demand water distribution network is analysed to gain insight into the differences between single-source and multiple-source networks in terms of maximum-entropy flow distribution. This leads to the formal proof of the principle governing maximum-entropy flow ratios in multiple-source water distribution networks. 相似文献