全文获取类型
收费全文 | 3856篇 |
免费 | 227篇 |
国内免费 | 19篇 |
专业分类
电工技术 | 59篇 |
综合类 | 15篇 |
化学工业 | 580篇 |
金属工艺 | 39篇 |
机械仪表 | 98篇 |
建筑科学 | 204篇 |
矿业工程 | 6篇 |
能源动力 | 117篇 |
轻工业 | 239篇 |
水利工程 | 18篇 |
石油天然气 | 14篇 |
武器工业 | 1篇 |
无线电 | 706篇 |
一般工业技术 | 762篇 |
冶金工业 | 490篇 |
原子能技术 | 19篇 |
自动化技术 | 735篇 |
出版年
2023年 | 31篇 |
2022年 | 53篇 |
2021年 | 77篇 |
2020年 | 70篇 |
2019年 | 73篇 |
2018年 | 110篇 |
2017年 | 74篇 |
2016年 | 132篇 |
2015年 | 95篇 |
2014年 | 114篇 |
2013年 | 236篇 |
2012年 | 149篇 |
2011年 | 185篇 |
2010年 | 156篇 |
2009年 | 204篇 |
2008年 | 224篇 |
2007年 | 176篇 |
2006年 | 164篇 |
2005年 | 137篇 |
2004年 | 138篇 |
2003年 | 153篇 |
2002年 | 99篇 |
2001年 | 108篇 |
2000年 | 107篇 |
1999年 | 94篇 |
1998年 | 176篇 |
1997年 | 122篇 |
1996年 | 91篇 |
1995年 | 75篇 |
1994年 | 59篇 |
1993年 | 38篇 |
1992年 | 33篇 |
1991年 | 31篇 |
1990年 | 33篇 |
1989年 | 25篇 |
1988年 | 32篇 |
1987年 | 26篇 |
1986年 | 24篇 |
1985年 | 21篇 |
1984年 | 19篇 |
1983年 | 11篇 |
1982年 | 13篇 |
1981年 | 19篇 |
1980年 | 9篇 |
1979年 | 8篇 |
1978年 | 11篇 |
1977年 | 12篇 |
1976年 | 15篇 |
1975年 | 8篇 |
1974年 | 4篇 |
排序方式: 共有4102条查询结果,搜索用时 15 毫秒
81.
On-time shipment delivery is critical for just-in-time production and quick response logistics. Due to uncertainties in travel and service times, on-time arrival probability of vehicles at customer locations can not be ensured. Therefore, on-time shipment delivery is a challenging job for carriers in congested road networks. In this paper, such on-time shipment delivery problems are formulated as a stochastic vehicle routing problem with soft time windows under travel and service time uncertainties. A new stochastic programming model is proposed to minimize carrier’s total cost, while guaranteeing a minimum on-time arrival probability at each customer location. The aim of this model is to find a good trade-off between carrier’s total cost and customer service level. To solve the proposed model, an iterated tabu search heuristic algorithm was developed, incorporating a route reduction mechanism. A discrete approximation method is proposed for generating arrival time distributions of vehicles in the presence of time windows. Several numerical examples were conducted to demonstrate the applicability of the proposed model and solution algorithm. 相似文献
82.
Qin Li Chengqing Li Dongyang Long Wai Hong Chan Changji Wang 《Quantum Information Processing》2013,12(7):2427-2439
In this paper, an efficient arbitrated quantum signature scheme is proposed by combining quantum cryptographic techniques and some ideas in classical cryptography. In the presented scheme, the signatory and the receiver can share a long-term secret key with the arbitrator by utilizing the key together with a random number. While in previous quantum signature schemes, the key shared between the signatory and the arbitrator or between the receiver and the arbitrator could be used only once, and thus each time when a signatory needs to sign, the signatory and the receiver have to obtain a new key shared with the arbitrator through a quantum key distribution protocol. Detailed theoretical analysis shows that the proposed scheme is efficient and provably secure. 相似文献
83.
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges of identity frauds. For example, the sole biometric approach suffers from the privacy invasion and non-revocable issues. Passwords and tokens are easily forgotten and lost. To address these issues, the notion of cancellable biometrics was introduced to denote biometric templates that can be cancelled and replaced with the inclusion of another independent authentication factor. BioHash is a form of cancellable biometrics which mixes a set of user-specific random vectors with biometric features. In verification setting, BioHash is able to deliver extremely low error rates as compared to the sole biometric approach when a genuine token is used. However, this raises the possibility of two identity theft scenarios: (i) stolen-biometrics, in which an impostor possesses intercepted biometric data of sufficient high quality to be considered genuine and (ii) stolen-token, in which an impostor has access to the genuine token and used by the impostor to claim as the genuine user. We found that the recognition rate for the latter case is poorer. In this paper, the quantised random projection ensemble based on the Johnson–Lindenstrauss Lemma is used to establish the mathematical foundation of BioHash. Based on this model, we elucidate the characteristics of BioHash in pattern recognition as well as security view points and propose new methods to rectify the stolen-token problem. 相似文献
84.
William G. Booty Isaac Wong David Lam Oskar Resler 《Environmental Modelling & Software》2009,24(8):889-900
The Environmental Effects Monitoring (EEM) Statistical Assessment Tool (SAT) Decision Support System (DSS) has been developed to provide a user-friendly data analysis, display and decision support tool for Canada's federal environmental effects monitoring program for the pulp and paper and mining industries. The target users include industries, consultants, regional EEM coordinators, National EEM Office and scientists involved in EEM-related research. The tool allows the assessment of the effects of effluent from industrial or other sources on fish and benthic populations. Effect endpoints, which are used as indicators of potentially important effluent effects, are measured at effluent-exposed sites and are compared statistically to measures at reference sites, in order to determine if changes have occurred and the magnitude of the changes. The main driver of the EEM-SAT DSS is its rule-based expert system. The results are used in assessing the adequacy of existing regulations for protecting aquatic environments. 相似文献
85.
A major problem in empirical software engineering is to determine or ensure comparability across multiple sources of empirical
data. This paper summarizes experiences in developing and applying a software engineering technology testbed. The testbed
was designed to ensure comparability of empirical data used to evaluate alternative software engineering technologies, and
to accelerate the technology maturation and transition into project use. The requirements for such software engineering technology
testbeds include not only the specifications and code, but also the package of instrumentation, scenario drivers, seeded defects,
experimentation guidelines, and comparative effort and defect data needed to facilitate technology evaluation experiments.
The requirements and architecture to build a particular software engineering technology testbed to help NASA evaluate its
investments in software dependability research and technology have been developed and applied to evaluate a wide range of
technologies. The technologies evaluated came from the fields of architecture, testing, state-model checking, and operational
envelopes. This paper will present for the first time the requirements and architecture of the software engineering technology
testbed. The results of the technology evaluations will be analyzed from a point of view of how researchers benefitted from
using the SETT. The researchers just reported how their technology performed in their original findings. The testbed evaluation
showed (1) that certain technologies were complementary and cost-effective to apply; (2) that the testbed was cost-effective
to use by researchers within a well-specified domain of applicability; (3) that collaboration in testbed use by researchers
and the practitioners resulted comparable empirical data and in actions to accelerate technology maturity and transition into
project use, as shown in the AcmeStudio evaluation; and (4) that the software engineering technology testbed’s requirements
and architecture were suitable for evaluating technologies and accelerating their maturation and transition into project use.
相似文献
Barry BoehmEmail: |
86.
87.
Engineering linear F(ab')2 fragments for efficient production in Escherichia coli and enhanced antiproliferative activity 总被引:1,自引:0,他引:1
Zapata Gerardo; Ridgway John B. B.; Mordenti Joyce; Osaka Gary; Wong Wai Lee T.; Bennett Gregory L.; Carter Paul 《Protein engineering, design & selection : PEDS》1995,8(10):1057-1062
We developed a novel bivalent antibody fragment, the linear(L-) F(ab')2, comprising tandem repeats of a heavy chain fragmentVHCH1VHCH1 cosecreted with a light chain.Functional humanized L-F(ab')2 directed against p185HER2 wassecreted from Escherichia coli at high titer (100 mg/l) andpurified to homogeneity. The L-F(ab')2 binds two equivalentsof antigen with an apparent affinity (Kd = 0.46 nM) that iswithin 3-fold of the corresponding thioether-linked F(ab')2fragment The N-terminal site binds antigen with an affinity(Kd = 1.2 nM) that is 4-fold greater than that for the C-terminalsite, as shown by the comparison of L-F(ab')2 variants containinga single functional binding site. L-F(ab')2 has greater antiproliferativeactivity than the thioether-linked F(ab')2 against the p185HER2-overexpressingtumor cell line BT474. Linear and thioether-linked F(ab')2 havevery similar pharmacokinetic properties in normal mice, andtheir serum permanence times are respectively 7- and 8-foldlonger than the corresponding Fab fragment L-F(ab')2 offersa facile route to bivalent antibody fragments that are potentiallysuitable for clinical applications, and that may have improvedbiological activity compared with thioether-linked F(ab')2 fragments. 相似文献
88.
We discuss the behavior of the refractive index of a typical epoxy-aromatic diamine system. Near 850 nm the index of refraction is found to be largely controlled by the density of the epoxy. Models are derived to describe its dependence on temperature and extent of cure. Within the range of temperatures studied, the refractive index decreases linearly with increasing temperature. In addition, as the epoxy is cured, the refractive index increases linearly with conversion to the gel point. From then on, shrinkage in the volume of the epoxy is restricted by local viscosity. Therefore the linear relationship between the refractive index and the extent of cure does not hold beyond the gel point. 相似文献
89.
The performance of a fiber-optic epoxy composite cure sensor, as previously proposed, depends on the optical properties and the reaction kinetics of the epoxy. The reaction kinetics of a typical epoxy system are presented. It is a third-order autocatalytic reaction with a peak observed in each isothermal reaction-rate curve. A model is derived to describe the performance characteristics of the epoxy cure sensor. If a composite coupon is cured at an isothermal temperature, the sensor signal can be used to predict the time when the gel point occurs and to monitor the cure process. The sensor is also shown to perform well in nonstoichiometric epoxy matrices. In addition the sensor can detect the end of the cure without calibration. 相似文献
90.
Lee Connie M. S. Fong Kenneth N. K. Mok Maggie M. Y. Lam M. K. Kung Y. Chan Paven P. W. Ma Maggie K. M. Lui S. L. Kwan Lorraine P. Y. Chu W. L. Hui P. C. Yau Christina S. F. Kwan Ivan W. L. Chan Kelsey Y. M. Chan T. M. 《Virtual Reality》2023,27(3):1571-1583
Virtual Reality - Cognitive impairment is not uncommon in patients with end-stage renal disease and can make it more difficult for these patients to carry out peritoneal dialysis (PD) on their own.... 相似文献