全文获取类型
收费全文 | 877篇 |
免费 | 33篇 |
专业分类
电工技术 | 7篇 |
综合类 | 7篇 |
化学工业 | 176篇 |
金属工艺 | 79篇 |
机械仪表 | 14篇 |
建筑科学 | 56篇 |
矿业工程 | 1篇 |
能源动力 | 32篇 |
轻工业 | 76篇 |
水利工程 | 2篇 |
无线电 | 70篇 |
一般工业技术 | 164篇 |
冶金工业 | 102篇 |
原子能技术 | 5篇 |
自动化技术 | 119篇 |
出版年
2022年 | 4篇 |
2021年 | 10篇 |
2020年 | 14篇 |
2019年 | 5篇 |
2018年 | 16篇 |
2017年 | 13篇 |
2016年 | 17篇 |
2015年 | 22篇 |
2014年 | 23篇 |
2013年 | 50篇 |
2012年 | 50篇 |
2011年 | 64篇 |
2010年 | 46篇 |
2009年 | 54篇 |
2008年 | 58篇 |
2007年 | 40篇 |
2006年 | 42篇 |
2005年 | 34篇 |
2004年 | 34篇 |
2003年 | 22篇 |
2002年 | 19篇 |
2001年 | 15篇 |
2000年 | 24篇 |
1999年 | 17篇 |
1998年 | 21篇 |
1997年 | 16篇 |
1996年 | 16篇 |
1995年 | 14篇 |
1994年 | 10篇 |
1993年 | 12篇 |
1992年 | 7篇 |
1990年 | 5篇 |
1989年 | 10篇 |
1988年 | 6篇 |
1987年 | 6篇 |
1986年 | 5篇 |
1985年 | 9篇 |
1984年 | 5篇 |
1983年 | 7篇 |
1982年 | 6篇 |
1981年 | 7篇 |
1980年 | 8篇 |
1978年 | 5篇 |
1977年 | 10篇 |
1975年 | 3篇 |
1974年 | 4篇 |
1973年 | 3篇 |
1970年 | 2篇 |
1969年 | 2篇 |
1955年 | 4篇 |
排序方式: 共有910条查询结果,搜索用时 15 毫秒
61.
62.
Hendrik R. Sikkema Bauke F. Gaastra Tjeerd Pols Bert Poolman 《Chembiochem : a European journal of chemical biology》2019,20(20):2581-2592
We are aiming for a blue print for synthesizing (moderately complex) subcellular systems from molecular components and ultimately for constructing life. However, without comprehensive instructions and design principles, we rely on simple reaction routes to operate the essential functions of life. The first forms of synthetic life will not make every building block for polymers de novo according to complex pathways, rather they will be fed with amino acids, fatty acids and nucleotides. Controlled energy supply is crucial for any synthetic cell, no matter how complex. Herein, we describe the simplest pathways for the efficient generation of ATP and electrochemical ion gradients. We have estimated the demand for ATP by polymer synthesis and maintenance processes in small cell-like systems, and we describe circuits to control the need for ATP. We also present fluorescence-based sensors for pH, ionic strength, excluded volume, ATP/ADP, and viscosity, which allow the major physicochemical conditions inside cells to be monitored and tuned. 相似文献
63.
64.
Bert Baumgaertner 《Minds and Machines》2012,22(3):213-234
One feature of vague predicates is that, as far as appearances go, they lack sharp application boundaries. I argue that we would not be able to locate boundaries even if vague predicates had sharp boundaries. I do so by developing an idealized cognitive model of a categorization faculty which has mobile and dynamic sortals (??classes??, ??concepts?? or ??categories??) and formally prove that the degree of precision with which boundaries of such sortals can be located is inversely constrained by their flexibility. Given the literature, it is plausible that we are appropriately like the model. Hence, an inability to locate sharp boundaries is not necessarily because there are none; boundaries could be sharp and it is plausible that we would nevertheless be unable to locate them. 相似文献
65.
66.
Bert Slof Anouschka van Leeuwen Jeroen Janssen Paul A. Kirschner 《Journal of Computer Assisted Learning》2021,37(1):39-50
In computer-supported collaborative learning research, studies examining the combined effects of individual level, group level and within-group differences level measures on individual achievement are scarce. The current study addressed this by examining whether individual, group and within-group differences regarding engagement and prior knowledge predict individual achievement. Engagement was operationalised as group members' exhibited activities in the task space (i.e., discussing domain-content) and social space (i.e., regulating ideas, actions and socioemotional processes). Prior knowledge and achievement were operationalised as group members' performance on a domain-related pre-test and post-test, respectively. Data was collected for 95 triads of secondary education students collaborating on a complex business-economics problem. Subsequently, three different multilevel models were tested to examine the combined effect. First a model with the individual level measures (model 1) was tested and in subsequent models the group level measures (model 2) and within-group levels measures (model 3) were added. Findings indicate model 2 showed the best fit; group members' individual engagement in the social space activities as well as the groups' average prior knowledge positively predicts individual achievement. No effects were found for either group members' or groups' engagement in the task space and for the within-group differences. 相似文献
67.
68.
Bert Van Keulen 《国际强度与非线性控制杂志
》1994,4(4):521-552
》1994,4(4):521-552
In this paper we extend the finite-dimensional results for the H∞-control problem with measurement-feedback to a large class of infinite-dimensional systems, allowing for a certain type of unboundedness in the input and output operators (the Pritchard-Salamon class). The main result of the paper relates the solvability to the suboptimal H∞-control problem to the existence of stabilizing solutions to certain operator Riccati equations. Furthermore, a characterization of all suboptimal controllers is given. 相似文献
69.
Ofer Arieli Marc Denecker Bert Van Nuffelen Maurice Bruynooghe 《Annals of Mathematics and Artificial Intelligence》2006,46(1-2):4-37
We introduce a simple and practical method for repairing inconsistent databases. Given a possibly inconsistent database, the idea is to properly represent the underlying problem, i.e., to describe the possible ways of restoring its consistency. We do so by what we call signed formulae, and show how the ‘signed theory’ that is obtained can be used by a variety of off-the-shelf computational models in order
to compute the corresponding solutions, i.e., consistent repairs of the database.
*This paper is a revised and extended version of [9]. 相似文献
70.
Bert W. Leung Author Vitae Author Vitae Duncan S. Wong Author Vitae 《Pattern recognition》2009,42(5):929-940
Hou [Visual cryptography for color images, Pattern Recognition 36 (2003) 1619-1629] proposed a four-share visual cryptography scheme for color images. The scheme splits a dithered eight-color secret image into four shares: the black mask and other three shares. It was claimed that without knowing the black mask, no information about the secret image can be obtained even if all the other three shares are known. In this paper, we show that this may be true for a few specific two-color secret images only. In all other cases, however, security cannot be guaranteed. We show that an attacker can compromise a randomly chosen two-color secret image from any two of the other three shares with probability by completely recovering the shape and pattern of the secret image. The advantage will increase to if all the three shares are known. If the secret image has three or four colors, we show that the attacker can compromise it with probability and , respectively. Finally, we show that our technique can be extended to compromising secret images with more than four colors. 相似文献