全文获取类型
收费全文 | 4066篇 |
免费 | 218篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 42篇 |
综合类 | 5篇 |
化学工业 | 1161篇 |
金属工艺 | 66篇 |
机械仪表 | 110篇 |
建筑科学 | 193篇 |
矿业工程 | 8篇 |
能源动力 | 148篇 |
轻工业 | 501篇 |
水利工程 | 24篇 |
石油天然气 | 13篇 |
无线电 | 267篇 |
一般工业技术 | 689篇 |
冶金工业 | 124篇 |
原子能技术 | 45篇 |
自动化技术 | 892篇 |
出版年
2024年 | 8篇 |
2023年 | 38篇 |
2022年 | 182篇 |
2021年 | 213篇 |
2020年 | 98篇 |
2019年 | 113篇 |
2018年 | 150篇 |
2017年 | 136篇 |
2016年 | 189篇 |
2015年 | 110篇 |
2014年 | 167篇 |
2013年 | 298篇 |
2012年 | 273篇 |
2011年 | 326篇 |
2010年 | 216篇 |
2009年 | 241篇 |
2008年 | 226篇 |
2007年 | 181篇 |
2006年 | 189篇 |
2005年 | 149篇 |
2004年 | 106篇 |
2003年 | 95篇 |
2002年 | 76篇 |
2001年 | 58篇 |
2000年 | 56篇 |
1999年 | 53篇 |
1998年 | 40篇 |
1997年 | 32篇 |
1996年 | 34篇 |
1995年 | 39篇 |
1994年 | 19篇 |
1993年 | 22篇 |
1992年 | 9篇 |
1991年 | 15篇 |
1990年 | 10篇 |
1989年 | 11篇 |
1988年 | 7篇 |
1987年 | 7篇 |
1986年 | 8篇 |
1985年 | 9篇 |
1984年 | 10篇 |
1983年 | 6篇 |
1982年 | 16篇 |
1981年 | 11篇 |
1980年 | 5篇 |
1979年 | 8篇 |
1978年 | 7篇 |
1977年 | 4篇 |
1976年 | 3篇 |
1973年 | 3篇 |
排序方式: 共有4288条查询结果,搜索用时 15 毫秒
941.
942.
BACKGROUND: As the operating births (caesarean section) increase, many surgical equipes have been compelled to revise operating techniques in order to reduce fetus extraction times and the whole expense of operation without renouncing, at the same time to beauty advantages. With Stark technique, that we have modified, we have obtained all these aims, improving at the same time patients' postoperative course as well succeeding to extract the fetus in about five minutes. In the '70 Cohen explained the utility of a transiliac incision allowing the access to abdominal cavity with rectus muscles unsticking in an area in which these muscles should present a less adhesiveness. METHODS: Since 1988 Stark has used Cohen's technique changing however uterus closing times, peritoneal membranes and abdominal walls. Our technique is different since we performed the incision according to Pfannestiel. RESULTS: The times are considerably reduced to 4.8 minutes for fetus extraction and in postoperative time the complications are drastically reduced too (infection, pain, hematoma, adhesions). CONCLUSIONS: Therefore we can surely say that this kind of technique can be used with success in all gynaecological surgery, in extrauterine pregnancies and adnexial tumefactions (not malignant). Personal opinion is that spinal anesthesia is the best analgesic technique. 相似文献
943.
The increasingly widespread use of fiber-reinforced polymers as an alternative to conventional materials makes it necessary to formulate theoretical models which adequately evaluate the influence of the anisotropy of such composites on the structural behavior. While the cross section shapes adopted for compressed members are generally the same as in steel structures, the anisotropy which characterizes these polymers may reduce the critical loading threshold due to local buckling phenomena. A procedure to study the buckling of glass fiber reinforced polymer pultruded members by means of an homogenization approach is proposed here. A two-stage buckling model permits the determination of both global and local critical loads as explicit functions of the member geometry and its material behavior. These functions may be used for optimization of the shape of the above-mentioned members. Besides the model shows its reliability as it fits the results of experimental testson members with different slenderness ratios. 相似文献
944.
A large number of today’s botnets leverage the HTTP protocol to communicate with their botmasters or perpetrate malicious activities. In this paper, we present a new scalable system for network-level behavioral clustering of HTTP-based malware that aims to efficiently group newly collected malware samples into malware family clusters. The end goal is to obtain malware clusters that can aid the automatic generation of high quality network signatures, which can in turn be used to detect botnet command-and-control (C&C) and other malware-generated communications at the network perimeter.We achieve scalability in our clustering system by simplifying the multi-step clustering process proposed in [31], and by leveraging incremental clustering algorithms that run efficiently on very large datasets. At the same time, we show that scalability is achieved while retaining a good trade-off between detection rate and false positives for the signatures derived from the obtained malware clusters. We implemented a proof-of-concept version of our new scalable malware clustering system and performed experiments with about 65,000 distinct malware samples. Results from our evaluation confirm the effectiveness of the proposed system and show that, compared to [31], our approach can reduce processing times from several hours to a few minutes, and scales well to large datasets containing tens of thousands of distinct malware samples. 相似文献
945.
Antonio González-Torres Francisco J. García-Peñalvo Roberto Therón 《Computers in human behavior》2013
Software evolution is made up of changes carried out during software maintenance. Such accumulation of changes produces substantial modifications in software projects and therefore vast amounts of relevant facts that are useful for the understanding and comprehension of the software project for making additional changes. In this scenario, evolutionary visual software analytics is aimed to support software maintenance, with the active participation of users, through the understanding and comprehension of software evolution by means of visual analytics and human computer interaction. It is a complex process that takes into account the mining of evolutionary data, the subsequent analysis of the mining process results for producing evolution facts, the use of visualizations supported by interaction techniques and the active participation of users. Hence, this paper explains the evolutionary visual software analytics process, describes a framework proposal and validates such proposal through the definition and implementation of an architecture. 相似文献
946.
947.
The Weighted Gene Regulatory Network (WGRN) problem consists in pruning a regulatory network obtained from DNA microarray gene expression data, in order to identify a reduced set of candidate elements which can explain the expression of all other genes. Since the problem appears to be particularly hard for general-purpose solvers, we develop a Greedy Randomized Adaptive Search Procedure (GRASP) and refine it with three alternative Path Relinking procedures. For comparison purposes, we also develop a Tabu Search algorithm with a self-adapting tabu tenure. The experimental results show that GRASP performs better than Tabu Search and that Path Relinking significantly contributes to its effectiveness. 相似文献
948.
Roberto Lucchi Mario Bravetti Roberto Gorrieri 《Electronic Notes in Theoretical Computer Science》2003,85(3):54-70
SecSpaces is a Linda-like coordination model whose aim is to provide a support for secure coordination in Open System applications. Substantially it provides a methodology to restrict the access to the objects stored in the shared dataspace. In this paper we introduce a formal language for representing systems interacting via SecSpaces primitives and its operational semantics. Moreover in this context we consider a notion of observational equivalence, namely testing equivalence. In order to evaluate the adequacy of the model for limiting the access to the shared dataspace, we present some examples of interaction protocols that can be used to obtain some security properties (e.g., authentication or privacy of a datum). 相似文献
949.
This article addresses the problem of maneuvering multiple agents that must visit a number of target sets, while enforcing connectivity constraints and avoiding obstacle as well as interagent collisions. The tool to cope with the problem is a formulation of model predictive control including binary decision variables. In this regard, two mixed‐integer linear programming formulations are presented, considering a trade‐off between optimality and scalability between them. Simulation results are also shown to illustrate the main features of the proposed approaches. 相似文献
950.