全文获取类型
收费全文 | 4006篇 |
免费 | 280篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 49篇 |
综合类 | 4篇 |
化学工业 | 1168篇 |
金属工艺 | 41篇 |
机械仪表 | 88篇 |
建筑科学 | 108篇 |
矿业工程 | 5篇 |
能源动力 | 147篇 |
轻工业 | 576篇 |
水利工程 | 24篇 |
石油天然气 | 24篇 |
无线电 | 318篇 |
一般工业技术 | 652篇 |
冶金工业 | 266篇 |
原子能技术 | 30篇 |
自动化技术 | 794篇 |
出版年
2024年 | 7篇 |
2023年 | 54篇 |
2022年 | 128篇 |
2021年 | 174篇 |
2020年 | 99篇 |
2019年 | 130篇 |
2018年 | 145篇 |
2017年 | 125篇 |
2016年 | 164篇 |
2015年 | 137篇 |
2014年 | 238篇 |
2013年 | 345篇 |
2012年 | 283篇 |
2011年 | 318篇 |
2010年 | 201篇 |
2009年 | 215篇 |
2008年 | 166篇 |
2007年 | 162篇 |
2006年 | 141篇 |
2005年 | 110篇 |
2004年 | 101篇 |
2003年 | 74篇 |
2002年 | 85篇 |
2001年 | 49篇 |
2000年 | 44篇 |
1999年 | 54篇 |
1998年 | 69篇 |
1997年 | 54篇 |
1996年 | 41篇 |
1995年 | 42篇 |
1994年 | 41篇 |
1993年 | 32篇 |
1992年 | 15篇 |
1991年 | 21篇 |
1990年 | 22篇 |
1989年 | 34篇 |
1988年 | 16篇 |
1987年 | 19篇 |
1986年 | 20篇 |
1985年 | 18篇 |
1984年 | 23篇 |
1983年 | 9篇 |
1982年 | 14篇 |
1981年 | 8篇 |
1980年 | 9篇 |
1977年 | 5篇 |
1976年 | 7篇 |
1975年 | 5篇 |
1973年 | 3篇 |
1969年 | 4篇 |
排序方式: 共有4294条查询结果,搜索用时 15 毫秒
91.
The evaluation of the emergent behaviour in complex systems requires an analytical framework which allows the observation of different phenomena that take place at different levels. In order to observe the dynamics of complex systems, it is necessary to perform simulations so that both local and the emergent behaviour can be observed. To this end, the way in which complex system simulators are built must be examined so that it will be feasible to model large scale scenarios. In this paper, the use of Model Driven Engineering methodology is proposed to deal with this issue. Among other benefits, it is shown that this methodology allows the representation and simulation of a complex system providing support for the analysis. This analysis is supported by a metamodel which describes the system components that are under study. The application of this methodology to the development of large scale simulators is explored through a case study. This case study analyses a complex socio-technical system: a power grid. 相似文献
92.
Ricard Fogues Jose M. Such Agustin Espinosa Ana Garcia-Fornes 《International journal of human-computer interaction》2013,29(5):350-370
Social networking services (SNSs) such as Facebook and Twitter have experienced explosive growth during the few past years. Millions of users have created their profiles on these services because they experience great benefits in terms of friendship. SNSs can help people to maintain their friendships, organize their social lives, start new friendships, and meet others who share their hobbies and interests. However, all these benefits can be eclipsed by the privacy hazards that affect people in SNSs. People expose intimate information about their lives on SNSs, and this information affects the way others think about them. It is crucial that users be able to control how their information is distributed through the SNSs and decide who can access it. This article presents a list of privacy threats that can affect SNS users and what requirements privacy mechanisms should fulfill to prevent this threats. Then the article reviews current approaches and analyzes to what extent they cover the requirements. 相似文献
93.
Carlos Gañán Jose L. Muñoz Oscar Esparza Jorge Mata-Díaz Juan Hernández-Serrano Juanjo Alins 《Journal of Network and Computer Applications》2013,36(5):1337-1351
Vehicular Ad Hoc Networks (VANETs) require mechanisms to authenticate messages, identify valid vehicles, and remove misbehaving vehicles. A public key infrastructure (PKI) can be used to provide these functionalities using digital certificates. However, if a vehicle is no longer trusted, its certificates have to be revoked and this status information has to be made available to other vehicles as soon as possible. In this paper, we propose a collaborative certificate status checking mechanism called COACH to efficiently distribute certificate revocation information in VANETs. In COACH, we embed a hash tree in each standard Certificate Revocation List (CRL). This dual structure is called extended-CRL. A node possessing an extended-CRL can respond to certificate status requests without having to send the complete CRL. Instead, the node can send a short response (less than 1 kB) that fits in a single UDP message. Obviously, the substructures included in the short responses are authenticated. This means that any node possessing an extended-CRL can produce short responses that can be authenticated (including Road Side Units or intermediate vehicles). We also propose an extension to the COACH mechanism called EvCOACH that is more efficient than COACH in scenarios with relatively low revocation rates per CRL validity period. To build EvCOACH, we embed an additional hash chain in the extended-CRL. Finally, by conducting a detailed performance evaluation, COACH and EvCOACH are proved to be reliable, efficient, and scalable. 相似文献
94.
Anderson da Silva Soares Telma Woerle de Lima Daniel Vitor de LuPcena Rogerio Lopes Salvini GustavoTeodoro Laureano Clarimar Jose Coelho 《计算机技术与应用:英文》2013,(9):466-475
The multiple determination tasks of chemical properties are a classical problem in analytical chemistry. The major problem is concerned in to find the best subset of variables that better represents the compounds. These variables are obtained by a spectrophotometer device. This device measures hundreds of correlated variables related with physicocbemical properties and that can be used to estimate the component of interest. The problem is the selection of a subset of informative and uncorrelated variables that help the minimization of prediction error. Classical algorithms select a subset of variables for each compound considered. In this work we propose the use of the SPEA-II (strength Pareto evolutionary algorithm II). We would like to show that the variable selection algorithm can selected just one subset used for multiple determinations using multiple linear regressions. For the case study is used wheat data obtained by NIR (near-infrared spectroscopy) spectrometry where the objective is the determination of a variable subgroup with information about E protein content (%), test weight (Kg/HI), WKT (wheat kernel texture) (%) and farinograph water absorption (%). The results of traditional techniques of multivariate calibration as the SPA (successive projections algorithm), PLS (partial least square) and mono-objective genetic algorithm are presents for comparisons. For NIR spectral analysis of protein concentration on wheat, the number of variables selected from 775 spectral variables was reduced for just 10 in the SPEA-II algorithm. The prediction error decreased from 0.2 in the classical methods to 0.09 in proposed approach, a reduction of 37%. The model using variables selected by SPEA-II had better prediction performance than classical algorithms and full-spectrum partial least-squares. 相似文献
95.
This paper studies connectivity aspects that arise in image operators that process connected components. The focus is on morphological
image analysis (i.e., on increasing image operators) and, in particular, on a robustness property satisfied by certain morphological
filters that is denominated the strong property. The behavior of alternated compositions of openings and closings is investigated
under certain assumptions, particularly connectedness and a connected component preserving condition. It is shown that these
conditions cannot in general guarantee the strong property of certain connected alternated filters because of issues related
to the locality of the filters. As treated in the paper, there have been a series of misunderstandings in the literature concerning
this topic, and it is important to clarify them. The root cause of those problems is discussed, and a solution is indicated.
The class of connected openings and closings used to build connected alternated filters should therefore be defined to avoid
such situations, since the strong property of alternated filters should be a distinctive characteristic of this class.
相似文献
Victor MaojoEmail: |
96.
The Amazon rainforest is one of the world's greatest natural wonders and holds great importance and significance for the world's environmental balance. Around 60% of the Amazon rainforest is located in the Brazilian territory. The two biggest states of the Amazon region are Amazonas (the upper Amazon) and Pará (the lower Amazon), which together account for around 73% of the Brazilian Legal Amazon, and are the only states that are serviced by international airports in Brazil's north region. The purpose of this paper is to model and forecast sustainable international tourism demand for the states of Amazonas, Pará, and the aggregate of the two states. By sustainable tourism is meant a distinctive type of tourism that has relatively low environmental and cultural impacts. Economic progress brought about by illegal wood extraction and commercial agriculture has destroyed large areas of the Amazon rainforest. The sustainable tourism industry has the potential to contribute to the economic development of the Amazon region without destroying the rainforest. The paper presents unit root tests for monthly and annual data, estimates alternative time series models and conditional volatility models of the shocks to international tourist arrivals, and provides forecasts for 2006 and 2007. 相似文献
97.
Gajate A.M. Guerra R.E.H. 《Automation Science and Engineering, IEEE Transactions on》2009,6(2):367-372
This paper presents the design and implementation of a neurofuzzy system for modeling and control of a high-performance drilling process in a networked application. The neurofuzzy system considered in this work is an adaptive-network-based fuzzy inference system (ANFIS), where fuzzy rules are obtained from input/output data. The design of the control system is based on the internal model control paradigm. The results obtained are significant both in simulation as well as the real-time application of networked control of the cutting force during high-performance drilling processes. 相似文献
98.
Boraldi F Annovi G Guerra D Paolinelli Devincenzi C Garcia-Fernandez MI Panico F De Santis G Tiozzo R Ronchetti I Quaglino D 《Proteomics. Clinical applications》2009,3(9):1084-1098
Pseudoxanthoma elasticum (PXE) is a genetic disorder associated to mutations in the ABCC6 gene; however, the pathogenetic mechanisms leading to elastic fibre calcifications and to clinical manifestations are still unknown. Dermal fibroblasts, directly involved in the production of the extracellular milieu, have been isolated from healthy subjects and from patients affected by PXE, cultured in vitro and characterized for their ability to produce reactive oxygen species, for structural and functional properties of their cell membranes, for changes in their protein profile. Data demonstrate that oxidative stress has profound and endurable consequences on PXE fibroblast phenotype being responsible for: reduced levels of global DNA methylation, increased amount of carbonylated proteins and of lipid peroxidation products, altered structural properties of cell membranes, modified protein expression. Data shed new light on the pathogenetic pathways in PXE, by identifying a network of proteins affecting elastic fibre calcification through inefficient vitamin K recycling, and highlight the role of differentially expressed proteins as targets for validating the efficacy of future therapeutic strategies aiming to delay and/or revert the pathologic phenotype of PXE fibroblasts. Moreover, data open new perspectives for investigating PXE-like phenotypes in the absence of ABCC6 mutations. 相似文献
99.
Gimenez-Aguilar Mar de Fuentes Jose Maria Gonzalez-Manzano Lorena 《International Journal of Information Security》2023,22(5):1445-1480
The permanent availability and relative obscurity of blockchains is the perfect ground for using them for malicious purposes. However, the use of blockchains by malwares has not been characterized yet. This paper analyses the current state of the art in this area. One of the lessons learned is that covert communications for malware have received little attention. To foster further defence-oriented research, a novel mechanism (dubbed Smart-Zephyrus) is built leveraging smart contracts written in Solidity. Our results show that it is possible to hide 4 Kb of secret in 41 s. While being expensive (around USD 1.82 per bit), the provided stealthiness might be worth the price for attackers.
相似文献100.
Baoyu Li Weifeng Li Jose Manuel Perez‐Aguilar Ruhong Zhou 《Small (Weinheim an der Bergstrasse, Germany)》2017,13(12)
The development of biocompatible nanomaterials for smart drug delivery and bioimaging has attracted great interest in recent years in biomedical fields. Here, the interaction between the recently reported nitrogenated graphene (C2N) and a prototypical protein (villin headpiece HP35) utilizing atomistic molecular dynamics simulations is studied. The simulations reveal that HP35 can form a stable binding with the C2N monolayer. Although the C2N–HP35 attractive interactions are constantly preserved, the binding strength between C2N and the protein is mild and does not cause significant distortion in the protein's structural integrity. This intrinsic biofriendly property of native C2N is distinct from several widely studied nanomaterials, such as graphene, carbon nanotubes, and MoS2, which can induce severe protein denaturation. Interestingly, once the protein is adsorbed onto C2N surface, its transverse migration is highly restricted at the binding sites. This restriction is orchestrated by C2N's periodic porous structure with negatively charged “holes,” where the basic residues—such as lysine—can form stable interactions, thus functioning as “anchor points” in confining the protein displacement. It is suggested that the mild, immobilized protein attraction and biofriendly aspects of C2N would make it a prospective candidate in bio‐ and medical‐related applications. 相似文献