首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3856篇
  免费   227篇
  国内免费   19篇
电工技术   59篇
综合类   15篇
化学工业   580篇
金属工艺   39篇
机械仪表   98篇
建筑科学   204篇
矿业工程   6篇
能源动力   117篇
轻工业   239篇
水利工程   18篇
石油天然气   14篇
武器工业   1篇
无线电   706篇
一般工业技术   762篇
冶金工业   490篇
原子能技术   19篇
自动化技术   735篇
  2023年   31篇
  2022年   53篇
  2021年   77篇
  2020年   70篇
  2019年   73篇
  2018年   110篇
  2017年   74篇
  2016年   132篇
  2015年   95篇
  2014年   114篇
  2013年   236篇
  2012年   149篇
  2011年   185篇
  2010年   156篇
  2009年   204篇
  2008年   224篇
  2007年   176篇
  2006年   164篇
  2005年   137篇
  2004年   138篇
  2003年   153篇
  2002年   99篇
  2001年   108篇
  2000年   107篇
  1999年   94篇
  1998年   176篇
  1997年   122篇
  1996年   91篇
  1995年   75篇
  1994年   59篇
  1993年   38篇
  1992年   33篇
  1991年   31篇
  1990年   33篇
  1989年   25篇
  1988年   32篇
  1987年   26篇
  1986年   24篇
  1985年   21篇
  1984年   19篇
  1983年   11篇
  1982年   13篇
  1981年   19篇
  1980年   9篇
  1979年   8篇
  1978年   11篇
  1977年   12篇
  1976年   15篇
  1975年   8篇
  1974年   4篇
排序方式: 共有4102条查询结果,搜索用时 15 毫秒
81.
On-time shipment delivery is critical for just-in-time production and quick response logistics. Due to uncertainties in travel and service times, on-time arrival probability of vehicles at customer locations can not be ensured. Therefore, on-time shipment delivery is a challenging job for carriers in congested road networks. In this paper, such on-time shipment delivery problems are formulated as a stochastic vehicle routing problem with soft time windows under travel and service time uncertainties. A new stochastic programming model is proposed to minimize carrier’s total cost, while guaranteeing a minimum on-time arrival probability at each customer location. The aim of this model is to find a good trade-off between carrier’s total cost and customer service level. To solve the proposed model, an iterated tabu search heuristic algorithm was developed, incorporating a route reduction mechanism. A discrete approximation method is proposed for generating arrival time distributions of vehicles in the presence of time windows. Several numerical examples were conducted to demonstrate the applicability of the proposed model and solution algorithm.  相似文献   
82.
In this paper, an efficient arbitrated quantum signature scheme is proposed by combining quantum cryptographic techniques and some ideas in classical cryptography. In the presented scheme, the signatory and the receiver can share a long-term secret key with the arbitrator by utilizing the key together with a random number. While in previous quantum signature schemes, the key shared between the signatory and the arbitrator or between the receiver and the arbitrator could be used only once, and thus each time when a signatory needs to sign, the signatory and the receiver have to obtain a new key shared with the arbitrator through a quantum key distribution protocol. Detailed theoretical analysis shows that the proposed scheme is efficient and provably secure.  相似文献   
83.
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges of identity frauds. For example, the sole biometric approach suffers from the privacy invasion and non-revocable issues. Passwords and tokens are easily forgotten and lost. To address these issues, the notion of cancellable biometrics was introduced to denote biometric templates that can be cancelled and replaced with the inclusion of another independent authentication factor. BioHash is a form of cancellable biometrics which mixes a set of user-specific random vectors with biometric features. In verification setting, BioHash is able to deliver extremely low error rates as compared to the sole biometric approach when a genuine token is used. However, this raises the possibility of two identity theft scenarios: (i) stolen-biometrics, in which an impostor possesses intercepted biometric data of sufficient high quality to be considered genuine and (ii) stolen-token, in which an impostor has access to the genuine token and used by the impostor to claim as the genuine user. We found that the recognition rate for the latter case is poorer. In this paper, the quantised random projection ensemble based on the Johnson–Lindenstrauss Lemma is used to establish the mathematical foundation of BioHash. Based on this model, we elucidate the characteristics of BioHash in pattern recognition as well as security view points and propose new methods to rectify the stolen-token problem.  相似文献   
84.
The Environmental Effects Monitoring (EEM) Statistical Assessment Tool (SAT) Decision Support System (DSS) has been developed to provide a user-friendly data analysis, display and decision support tool for Canada's federal environmental effects monitoring program for the pulp and paper and mining industries. The target users include industries, consultants, regional EEM coordinators, National EEM Office and scientists involved in EEM-related research. The tool allows the assessment of the effects of effluent from industrial or other sources on fish and benthic populations. Effect endpoints, which are used as indicators of potentially important effluent effects, are measured at effluent-exposed sites and are compared statistically to measures at reference sites, in order to determine if changes have occurred and the magnitude of the changes. The main driver of the EEM-SAT DSS is its rule-based expert system. The results are used in assessing the adequacy of existing regulations for protecting aquatic environments.  相似文献   
85.
A major problem in empirical software engineering is to determine or ensure comparability across multiple sources of empirical data. This paper summarizes experiences in developing and applying a software engineering technology testbed. The testbed was designed to ensure comparability of empirical data used to evaluate alternative software engineering technologies, and to accelerate the technology maturation and transition into project use. The requirements for such software engineering technology testbeds include not only the specifications and code, but also the package of instrumentation, scenario drivers, seeded defects, experimentation guidelines, and comparative effort and defect data needed to facilitate technology evaluation experiments. The requirements and architecture to build a particular software engineering technology testbed to help NASA evaluate its investments in software dependability research and technology have been developed and applied to evaluate a wide range of technologies. The technologies evaluated came from the fields of architecture, testing, state-model checking, and operational envelopes. This paper will present for the first time the requirements and architecture of the software engineering technology testbed. The results of the technology evaluations will be analyzed from a point of view of how researchers benefitted from using the SETT. The researchers just reported how their technology performed in their original findings. The testbed evaluation showed (1) that certain technologies were complementary and cost-effective to apply; (2) that the testbed was cost-effective to use by researchers within a well-specified domain of applicability; (3) that collaboration in testbed use by researchers and the practitioners resulted comparable empirical data and in actions to accelerate technology maturity and transition into project use, as shown in the AcmeStudio evaluation; and (4) that the software engineering technology testbed’s requirements and architecture were suitable for evaluating technologies and accelerating their maturation and transition into project use.
Barry BoehmEmail:
  相似文献   
86.
87.
We developed a novel bivalent antibody fragment, the linear(L-) F(ab')2, comprising tandem repeats of a heavy chain fragmentVH–CH1–VH–CH1 cosecreted with a light chain.Functional humanized L-F(ab')2 directed against p185HER2 wassecreted from Escherichia coli at high titer (100 mg/l) andpurified to homogeneity. The L-F(ab')2 binds two equivalentsof antigen with an apparent affinity (Kd = 0.46 nM) that iswithin 3-fold of the corresponding thioether-linked F(ab')2fragment The N-terminal site binds antigen with an affinity(Kd = 1.2 nM) that is 4-fold greater than that for the C-terminalsite, as shown by the comparison of L-F(ab')2 variants containinga single functional binding site. L-F(ab')2 has greater antiproliferativeactivity than the thioether-linked F(ab')2 against the p185HER2-overexpressingtumor cell line BT474. Linear and thioether-linked F(ab')2 havevery similar pharmacokinetic properties in normal mice, andtheir serum permanence times are respectively 7- and 8-foldlonger than the corresponding Fab fragment L-F(ab')2 offersa facile route to bivalent antibody fragments that are potentiallysuitable for clinical applications, and that may have improvedbiological activity compared with thioether-linked F(ab')2 fragments.  相似文献   
88.
Lam KY  Afromowitz MA 《Applied optics》1995,34(25):5635-5638
We discuss the behavior of the refractive index of a typical epoxy-aromatic diamine system. Near 850 nm the index of refraction is found to be largely controlled by the density of the epoxy. Models are derived to describe its dependence on temperature and extent of cure. Within the range of temperatures studied, the refractive index decreases linearly with increasing temperature. In addition, as the epoxy is cured, the refractive index increases linearly with conversion to the gel point. From then on, shrinkage in the volume of the epoxy is restricted by local viscosity. Therefore the linear relationship between the refractive index and the extent of cure does not hold beyond the gel point.  相似文献   
89.
Lam KY  Afromowitz MA 《Applied optics》1995,34(25):5639-5644
The performance of a fiber-optic epoxy composite cure sensor, as previously proposed, depends on the optical properties and the reaction kinetics of the epoxy. The reaction kinetics of a typical epoxy system are presented. It is a third-order autocatalytic reaction with a peak observed in each isothermal reaction-rate curve. A model is derived to describe the performance characteristics of the epoxy cure sensor. If a composite coupon is cured at an isothermal temperature, the sensor signal can be used to predict the time when the gel point occurs and to monitor the cure process. The sensor is also shown to perform well in nonstoichiometric epoxy matrices. In addition the sensor can detect the end of the cure without calibration.  相似文献   
90.
Virtual Reality - Cognitive impairment is not uncommon in patients with end-stage renal disease and can make it more difficult for these patients to carry out peritoneal dialysis (PD) on their own....  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号