全文获取类型
收费全文 | 5399篇 |
免费 | 365篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 66篇 |
综合类 | 7篇 |
化学工业 | 1641篇 |
金属工艺 | 60篇 |
机械仪表 | 105篇 |
建筑科学 | 216篇 |
矿业工程 | 11篇 |
能源动力 | 204篇 |
轻工业 | 699篇 |
水利工程 | 45篇 |
石油天然气 | 7篇 |
无线电 | 348篇 |
一般工业技术 | 1015篇 |
冶金工业 | 378篇 |
原子能技术 | 29篇 |
自动化技术 | 938篇 |
出版年
2024年 | 16篇 |
2023年 | 98篇 |
2022年 | 326篇 |
2021年 | 399篇 |
2020年 | 184篇 |
2019年 | 188篇 |
2018年 | 219篇 |
2017年 | 191篇 |
2016年 | 266篇 |
2015年 | 194篇 |
2014年 | 285篇 |
2013年 | 362篇 |
2012年 | 354篇 |
2011年 | 457篇 |
2010年 | 295篇 |
2009年 | 254篇 |
2008年 | 301篇 |
2007年 | 244篇 |
2006年 | 168篇 |
2005年 | 152篇 |
2004年 | 129篇 |
2003年 | 119篇 |
2002年 | 85篇 |
2001年 | 61篇 |
2000年 | 47篇 |
1999年 | 50篇 |
1998年 | 41篇 |
1997年 | 32篇 |
1996年 | 41篇 |
1995年 | 24篇 |
1994年 | 21篇 |
1993年 | 22篇 |
1992年 | 25篇 |
1991年 | 14篇 |
1990年 | 7篇 |
1989年 | 11篇 |
1988年 | 9篇 |
1987年 | 9篇 |
1986年 | 5篇 |
1985年 | 6篇 |
1984年 | 10篇 |
1983年 | 10篇 |
1982年 | 11篇 |
1981年 | 7篇 |
1980年 | 3篇 |
1979年 | 8篇 |
1977年 | 2篇 |
1969年 | 1篇 |
1967年 | 2篇 |
1948年 | 1篇 |
排序方式: 共有5769条查询结果,搜索用时 15 毫秒
51.
Giordano Maria C. Longhi Stefano Barelli Matteo Mazzanti Andrea Buatier de Mongeot Francesco Della Valle Giuseppe 《Nano Research》2018,11(7):3943-3956
Nano Research - The engineering of self-organized plasmonic metasurfaces is demonstrated using a maskless technique with defocused ion-beam sputtering and kinetically controlled deposition. The... 相似文献
52.
53.
We first show that ground term-rewriting systems can be completed in a polynomial number of rewriting steps, if the appropriate data structure for terms is used. We then apply this result to study the lengths of critical pair proofs in non-ground systems, and obtain bounds on the lengths of critical pair proofs in the non-ground case. We show how these bounds depend on the types of inference steps that are allowed in the proofs. 相似文献
54.
The introduction of Internet and Information and communication Technologies (ICT) in offices is a global phenomenon that transformed
white-collar worker job demands. Although there are several studies of e-skills and mental workload for central countries,
there is a lack of similar studies for the Latin American context. An online snowball sampled (n = 352) survey was developed and validated by the authors (internal consistency = 0.7). We characterized ICT worker profiles
from e-skills and these dimensions: attitudes toward, resources usage and technology dependency. Mental Strain was assessed with raw task load index (RTLX) and correlated with the proposed profiles by means of paired
T-tests and Mann–Whitney Tests. The sample was characterized by 7.2% of non visual display terminal users and 92.8% of visual
display terminal, ICT skilled users. Of the latter, 30.7% were ICT practitioners, 30.4% were ICT Users and 27.2% were E-Business
Users. Non VDT users’ mental strain was statistically meaningful smaller than VDT–ICT skilled users’ mental workload. No statistical
differences were found in RTLX results when comparing ICT skilled user profiles. Non VDT users can be identified from ICT
skilled Users by their lower ITC Dependency and minor use of ICT resources. There were no differences in those dimensions
among ICT skilled Profiles. Attitude toward these technologies was a distinct factor for ICT Users in relation to ICT Practitioners
and ITC Business Users. The application of this tool in peripheral and central countries would allow a complete ergonomical
characterization of white-collar workers within the Information Society. 相似文献
55.
Franco Cicirelli Angelo Furfaro Andrea Giordano Libero Nigro 《Simulation Modelling Practice and Theory》2011,19(1):283-300
RePast is a popular agent toolkit with proven capabilities to fulfil the modelling challenges of large multi-agent systems (MASs). The toolkit, though, is normally used on a standalone workstation and therefore its practical use can be constrained (in space and time) by the limited available computing resources. This paper proposes an original approach – HLA_ACTOR_REPAST – aimed to distributing RePast models for high-performance simulation of complex scalable models. Novel in HLA_ACTOR_REPAST is an exploitation of a lean actor infrastructure implemented in Java. Actors bring to RePast agents such features as migration, location-transparent naming, efficient communications, and a control-centric framework. Actors can be orchestrated by an in-the-large custom control structure which is in charge of ensuring the necessary message causality constraints. Distribution and time management concerns depend on the IEEE standard HLA middleware. The paper first discusses details of the software engineering process underlying the development of HLA_ACTOR_REPAST. The mapping techniques, assisted by Java text annotations and aspect-oriented programming, try to minimize “code intrusions” in the original model and favour model transparency. The paper then furnishes some experimental data which witness the good performance results achieved by applying HLA_ACTOR_REPAST to a distributed version of a classic MAS benchmark model. 相似文献
56.
Combinatorial testing is as an effective testing technique to reveal failures in a given system, based on input combinations
coverage and combinatorial optimization. Combinatorial testing of strength
t (t ≥ 2) requires that each t-wise tuple of values of the different system input parameters is covered by at least one test case. Combinatorial test suite generation
algorithms aim at producing a test suite covering all the required tuples in a small (possibly minimal) number of test cases,
in order to reduce the cost of testing. The most used combinatorial technique is the pairwise testing (t = 2) which requires coverage of all pairs of input values. Constrained combinatorial testing takes also into account constraints
over the system parameters, for instance forbidden tuples of inputs, modeling invalid or not realizable input values combinations. In this paper a new approach to combinatorial
testing, tightly integrated with formal logic, is presented. In this approach, test predicates are used to formalize combinatorial
testing as a logical problem, and an external formal logic tool is applied to solve it. Constraints over the input domain
are expressed as logical predicates too, and effectively handled by the same tool. Moreover, inclusion or exclusion of select
tuples is supported, allowing the user to customize the test suite layout. The proposed approach is supported by a prototype
tool implementation and results of experimental assessment are also presented. 相似文献
57.
58.
Electronic documents used in the framework of the goods delivery industry—i.e. electronic bills of lading (e-BOLs)—are the enablers of any payment, and therefore exposed to frauds. As of today, e-BOLs are handled by special private companies, which provide paperless trading services through their trade chains. This paper contributes a zero-knowledge open solution to the problem of designing secure electronic bills of lading, in the framework of a shipper-carrier-buyer transmission model. The suggested solution is a cryptographic protocol based on digital signatures and blind merchandise counts—that is, counts that do not reveal any information about actually counted quantities. The model is designed to mitigate a number of security threats and assumes the existence of both a trusted third party and a bank in charge of payment procedures. The paper discusses the drawbacks of the existing proprietary solutions and shows how the suggested open protocol addresses them. 相似文献
59.
60.
In this paper we propose a heuristic approach for the problem of packing equal rectangles within a convex region. The approach is based on an Iterated Local Search scheme, in which the key step is the perturbation move. Different perturbation moves, both combinatorial and continuous ones, are proposed and compared through extensive computational experiments on a set of test instances. The overall results are quite encouraging. 相似文献