首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4066篇
  免费   218篇
  国内免费   4篇
电工技术   42篇
综合类   5篇
化学工业   1161篇
金属工艺   66篇
机械仪表   110篇
建筑科学   193篇
矿业工程   8篇
能源动力   148篇
轻工业   501篇
水利工程   24篇
石油天然气   13篇
无线电   267篇
一般工业技术   689篇
冶金工业   124篇
原子能技术   45篇
自动化技术   892篇
  2024年   8篇
  2023年   38篇
  2022年   182篇
  2021年   213篇
  2020年   98篇
  2019年   113篇
  2018年   150篇
  2017年   136篇
  2016年   189篇
  2015年   110篇
  2014年   167篇
  2013年   298篇
  2012年   273篇
  2011年   326篇
  2010年   216篇
  2009年   241篇
  2008年   226篇
  2007年   181篇
  2006年   189篇
  2005年   149篇
  2004年   106篇
  2003年   95篇
  2002年   76篇
  2001年   58篇
  2000年   56篇
  1999年   53篇
  1998年   40篇
  1997年   32篇
  1996年   34篇
  1995年   39篇
  1994年   19篇
  1993年   22篇
  1992年   9篇
  1991年   15篇
  1990年   10篇
  1989年   11篇
  1988年   7篇
  1987年   7篇
  1986年   8篇
  1985年   9篇
  1984年   10篇
  1983年   6篇
  1982年   16篇
  1981年   11篇
  1980年   5篇
  1979年   8篇
  1978年   7篇
  1977年   4篇
  1976年   3篇
  1973年   3篇
排序方式: 共有4288条查询结果,搜索用时 15 毫秒
941.
942.
BACKGROUND: As the operating births (caesarean section) increase, many surgical equipes have been compelled to revise operating techniques in order to reduce fetus extraction times and the whole expense of operation without renouncing, at the same time to beauty advantages. With Stark technique, that we have modified, we have obtained all these aims, improving at the same time patients' postoperative course as well succeeding to extract the fetus in about five minutes. In the '70 Cohen explained the utility of a transiliac incision allowing the access to abdominal cavity with rectus muscles unsticking in an area in which these muscles should present a less adhesiveness. METHODS: Since 1988 Stark has used Cohen's technique changing however uterus closing times, peritoneal membranes and abdominal walls. Our technique is different since we performed the incision according to Pfannestiel. RESULTS: The times are considerably reduced to 4.8 minutes for fetus extraction and in postoperative time the complications are drastically reduced too (infection, pain, hematoma, adhesions). CONCLUSIONS: Therefore we can surely say that this kind of technique can be used with success in all gynaecological surgery, in extrauterine pregnancies and adnexial tumefactions (not malignant). Personal opinion is that spinal anesthesia is the best analgesic technique.  相似文献   
943.
The increasingly widespread use of fiber-reinforced polymers as an alternative to conventional materials makes it necessary to formulate theoretical models which adequately evaluate the influence of the anisotropy of such composites on the structural behavior. While the cross section shapes adopted for compressed members are generally the same as in steel structures, the anisotropy which characterizes these polymers may reduce the critical loading threshold due to local buckling phenomena. A procedure to study the buckling of glass fiber reinforced polymer pultruded members by means of an homogenization approach is proposed here. A two-stage buckling model permits the determination of both global and local critical loads as explicit functions of the member geometry and its material behavior. These functions may be used for optimization of the shape of the above-mentioned members. Besides the model shows its reliability as it fits the results of experimental testson members with different slenderness ratios.  相似文献   
944.
A large number of today’s botnets leverage the HTTP protocol to communicate with their botmasters or perpetrate malicious activities. In this paper, we present a new scalable system for network-level behavioral clustering of HTTP-based malware that aims to efficiently group newly collected malware samples into malware family clusters. The end goal is to obtain malware clusters that can aid the automatic generation of high quality network signatures, which can in turn be used to detect botnet command-and-control (C&C) and other malware-generated communications at the network perimeter.We achieve scalability in our clustering system by simplifying the multi-step clustering process proposed in [31], and by leveraging incremental clustering algorithms that run efficiently on very large datasets. At the same time, we show that scalability is achieved while retaining a good trade-off between detection rate and false positives for the signatures derived from the obtained malware clusters. We implemented a proof-of-concept version of our new scalable malware clustering system and performed experiments with about 65,000 distinct malware samples. Results from our evaluation confirm the effectiveness of the proposed system and show that, compared to [31], our approach can reduce processing times from several hours to a few minutes, and scales well to large datasets containing tens of thousands of distinct malware samples.  相似文献   
945.
Software evolution is made up of changes carried out during software maintenance. Such accumulation of changes produces substantial modifications in software projects and therefore vast amounts of relevant facts that are useful for the understanding and comprehension of the software project for making additional changes. In this scenario, evolutionary visual software analytics is aimed to support software maintenance, with the active participation of users, through the understanding and comprehension of software evolution by means of visual analytics and human computer interaction. It is a complex process that takes into account the mining of evolutionary data, the subsequent analysis of the mining process results for producing evolution facts, the use of visualizations supported by interaction techniques and the active participation of users. Hence, this paper explains the evolutionary visual software analytics process, describes a framework proposal and validates such proposal through the definition and implementation of an architecture.  相似文献   
946.
947.
The Weighted Gene Regulatory Network (WGRN) problem consists in pruning a regulatory network obtained from DNA microarray gene expression data, in order to identify a reduced set of candidate elements which can explain the expression of all other genes. Since the problem appears to be particularly hard for general-purpose solvers, we develop a Greedy Randomized Adaptive Search Procedure (GRASP) and refine it with three alternative Path Relinking procedures. For comparison purposes, we also develop a Tabu Search algorithm with a self-adapting tabu tenure. The experimental results show that GRASP performs better than Tabu Search and that Path Relinking significantly contributes to its effectiveness.  相似文献   
948.
SecSpaces is a Linda-like coordination model whose aim is to provide a support for secure coordination in Open System applications. Substantially it provides a methodology to restrict the access to the objects stored in the shared dataspace. In this paper we introduce a formal language for representing systems interacting via SecSpaces primitives and its operational semantics. Moreover in this context we consider a notion of observational equivalence, namely testing equivalence. In order to evaluate the adequacy of the model for limiting the access to the shared dataspace, we present some examples of interaction protocols that can be used to obtain some security properties (e.g., authentication or privacy of a datum).  相似文献   
949.
This article addresses the problem of maneuvering multiple agents that must visit a number of target sets, while enforcing connectivity constraints and avoiding obstacle as well as interagent collisions. The tool to cope with the problem is a formulation of model predictive control including binary decision variables. In this regard, two mixed‐integer linear programming formulations are presented, considering a trade‐off between optimality and scalability between them. Simulation results are also shown to illustrate the main features of the proposed approaches.  相似文献   
950.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号