全文获取类型
收费全文 | 8421篇 |
免费 | 474篇 |
国内免费 | 32篇 |
专业分类
电工技术 | 106篇 |
综合类 | 35篇 |
化学工业 | 1887篇 |
金属工艺 | 124篇 |
机械仪表 | 193篇 |
建筑科学 | 407篇 |
矿业工程 | 13篇 |
能源动力 | 289篇 |
轻工业 | 689篇 |
水利工程 | 71篇 |
石油天然气 | 34篇 |
武器工业 | 2篇 |
无线电 | 938篇 |
一般工业技术 | 1462篇 |
冶金工业 | 1134篇 |
原子能技术 | 42篇 |
自动化技术 | 1501篇 |
出版年
2023年 | 79篇 |
2022年 | 140篇 |
2021年 | 225篇 |
2020年 | 161篇 |
2019年 | 170篇 |
2018年 | 244篇 |
2017年 | 207篇 |
2016年 | 266篇 |
2015年 | 207篇 |
2014年 | 287篇 |
2013年 | 528篇 |
2012年 | 449篇 |
2011年 | 537篇 |
2010年 | 409篇 |
2009年 | 476篇 |
2008年 | 463篇 |
2007年 | 447篇 |
2006年 | 341篇 |
2005年 | 312篇 |
2004年 | 270篇 |
2003年 | 253篇 |
2002年 | 206篇 |
2001年 | 141篇 |
2000年 | 157篇 |
1999年 | 168篇 |
1998年 | 175篇 |
1997年 | 169篇 |
1996年 | 126篇 |
1995年 | 131篇 |
1994年 | 117篇 |
1993年 | 85篇 |
1992年 | 75篇 |
1991年 | 50篇 |
1990年 | 60篇 |
1989年 | 73篇 |
1988年 | 68篇 |
1987年 | 51篇 |
1986年 | 57篇 |
1985年 | 71篇 |
1984年 | 54篇 |
1983年 | 59篇 |
1982年 | 43篇 |
1981年 | 47篇 |
1980年 | 34篇 |
1979年 | 29篇 |
1978年 | 22篇 |
1977年 | 28篇 |
1976年 | 33篇 |
1975年 | 30篇 |
1974年 | 25篇 |
排序方式: 共有8927条查询结果,搜索用时 15 毫秒
141.
Analogy based estimation (ABE) generates an effort estimate for a new software project through adaptation of similar past projects (a.k.a. analogies). Majority of ABE methods follow uniform weighting in adaptation procedure. In this research we investigated non-uniform weighting through kernel density estimation. After an extensive experimentation of 19 datasets, 3 evaluation criteria, 5 kernels, 5 bandwidth values and a total of 2090 ABE variants, we found that: (1) non-uniform weighting through kernel methods cannot outperform uniform weighting ABE and (2) kernel type and bandwidth parameters do not produce a definite effect on estimation performance. In summary simple ABE approaches are able to perform better than much more complex approaches. Hence,—provided that similar experimental settings are adopted—we discourage the use of kernel methods as a weighting strategy in ABE. 相似文献
142.
Tan S Chan WM Wai MS Hui LK Hui VW James AE Yeung LY Yew DT 《Microscopy research and technique》2011,74(12):1192-1198
Different doses of ketamine (10 mg/kg, 20 mg/kg, 30 mg/kg, 40 mg/kg, 50 mg/kg, and 60 mg/kg) were injected i.p. (I.P.), respectively, to male ICR mice to determine the optimal dosage for chronic administration. At and above 40 mg/kg I.P. injection, mice had almost no hindlimb movement during swimming test. Subsequently, 30 mg/kg was used as the dose for the study in the toxicity of long-term ketamine administration on urinary bladder and sperm motility. The treatment group were subdivided into two (n = 10 each group); one received daily ketamine treatment i.p. for 3 months and another group for 6 months. Corresponding number of mice in control groups (n = 5 each group) received saline injection instead of ketamine. Terminal dUTP nick and labeling (TUNEL) study and Sirius red staining were carried out on the sectioned slides of the urinary bladders to study the degree of apoptosis in both epithelium and muscular layers of the urinary bladder and the relative thickness of the muscular layers in this organ was also computed. Apoptosis in the bladder epithelium was observed initially in the 3-month ketamine treated mice and the number of apoptotic cells was significantly different (P < 0.05) between the 3-month and 6-month ketamine treated mice and the control. The relative thickness of muscular layers in the bladder wall also decreased significantly (P < 0.05) when the 6-month treated mice and the control were compared. Sirius red staining revealed increase of collagen in the urinary bladder of the treated mice, most evidently 6 months after ketamine treatment. In addition, the sperm motility was studied and there was a statistically significant difference between the control and ketamine treated groups in the percentages of sperms which were motile (P < 0.05). This suggested that the chronic administration of ketamine affected the genital system as well. 相似文献
143.
Bonenfant D Bourgeois FR Mimeault M Monette F Niquette P Hausler R 《Water science and technology》2011,63(12):2827-2832
Carboxymethylcellulose (CMC) and beta-cyclodextrin (beta-CD)-based polymers functionalized with two types of quaternary ammonium compounds (QACs), the alkaquat DMB-451 (N-alkyl (50% C14, 40% C12, 10% C10) dimethylbenzylammonium chloride) (DMD-451) named polymer DMB-451, and FMB 1210-8 (a blend of 32 w% N-alkyl (50% C14, 40% C12, 10% C10) dimethylbenzylammonium chloride and 48 w% of didecyldimethylammonium chloride) named polymer FMB 1210-8, were synthethized and characterized by Fourier transform infrared spectroscopy. The antimicrobial activities of these polymers against Eschericia coli were also evaluated at 25 degrees C in wastewater. The results have indicated that the polymer FMB 1210-8 possesses a high-affinity binding with bacterial cells that induces a rapid disinfection process. Moreover, in the same experimental conditions of disinfection (mixture of 1.0 g of polymer and 100 mL of wastewater), the polymer FMB 1210-8 has a higher antimicrobial efficiency (99.90%) than polymer DMB-451 (92.8%). This phenomenon might be associated to a stronger interaction with bacterial cells due to stronger binding affinity for E. coli cells and greater killing efficiency of the C10 alkyl chains QAC of polymer FMB 1210-8 to disrupt the bacterial cell membrane as compared to N-alkyl (50% C14, 40% C12, 10% C10) dimethylbenzylammonium chloride. Together, these results suggest that the polymer FMB 1210-8 could constitute a good disinfectant against Escherichia coli, which could be advantageously used in wastewater treatments due to the low toxicity of beta-CD and CMC, and moderated toxicity of FMB 1210-8 to human and environment. 相似文献
144.
Roberto D. Ponce Felipe Vásquez Alejandra Stehr Patrick Debels Carlos Orihuela 《Water Resources Management》2011,25(10):2449-2466
This paper presents a contingent valuation study concerning landscape impacts generated by the construction of one dam (Baker
1) of the HIDROAYSEN hydropower project located in the Chilean Patagonia. A survey was used to collect information about citizens’
opinions towards the hydropower project in four major cities in Chile. Specifically, a One-and-One-Half-Bound (OOHB) willingness
to pay eliciting format was applied to capture citizens’ WTP. The economic loss, associated to the landscape impacts for people
living in urban areas of the country, is found to be approximately US$ 205 million, which is nearly 28% of the total investment.
Our results also show that the cities’ distance from the dam affects citizens’ willingness to pay. 相似文献
145.
Qin Li Chengqing Li Dongyang Long Wai Hong Chan Changji Wang 《Quantum Information Processing》2013,12(7):2427-2439
In this paper, an efficient arbitrated quantum signature scheme is proposed by combining quantum cryptographic techniques and some ideas in classical cryptography. In the presented scheme, the signatory and the receiver can share a long-term secret key with the arbitrator by utilizing the key together with a random number. While in previous quantum signature schemes, the key shared between the signatory and the arbitrator or between the receiver and the arbitrator could be used only once, and thus each time when a signatory needs to sign, the signatory and the receiver have to obtain a new key shared with the arbitrator through a quantum key distribution protocol. Detailed theoretical analysis shows that the proposed scheme is efficient and provably secure. 相似文献
146.
Arnaud Hubaux Patrick Heymans Pierre-Yves Schobbens Dirk Deridder Ebrahim Khalil Abbasi 《Software and Systems Modeling》2013,12(3):641-663
Feature diagrams have become commonplace in software product line engineering as a means to document variability early in the life cycle. Over the years, their application has also been extended to assist stakeholders in the configuration of software products. However, existing feature-based configuration techniques offer little support for tailoring configuration views to the profiles of the various stakeholders. In this paper, we propose a lightweight, yet formal and flexible, mechanism to leverage multidimensional separation of concerns in feature-based configuration. We propose a technique to specify concerns in feature diagrams and to generate automatically concern-specific configuration views. Three alternative visualisations are proposed. Our contributions are motivated and illustrated through excerpts from a real web-based meeting management application which was also used for a preliminary evaluation. We also report on the progress made in the development of a tool supporting multi-view feature-based configuration. 相似文献
147.
Current software and systems engineering tools provide only basic trace features, and as a result users are often compelled to construct non-trivial traceability queries using generic query languages such as SQL. In this paper, we present an alternative approach which defines traceability strategies for a project using UML class diagrams and then constructs trace queries as constraints upon subsets of the model. The visual trace modeling language (VTML) allows users to model a broad range of trace queries while hiding underlying technical details and data structures. The viability and expressiveness of VTML for use in a real project are demonstrated through modeling a broadly representative set of queries for a web-based health-care system. It is then evaluated through an experiment with human users to assess the readability and writability of VTML queries in comparison to generic SQL queries. We found that users read and constructed traceability queries considerably faster using VTML than using SQL. Furthermore, visually constructed traceability queries were substantially more correct compared to the same queries constructed with SQL. 相似文献
148.
A comparison of broad versus deep auditory menu structures 总被引:1,自引:0,他引:1
OBJECTIVE: The primary purpose of this experiment was to gain a greater understanding of the utilization of working memory when interacting with a speech-enabled interactive voice response (IVR) system. BACKGROUND: A widely promoted guideline advises limiting IVR menus to five or fewer items because of constraints of the human memory system, commonly citing Miller's (1956) paper. The authors argue that Miller's paper does not, in fact, support this guideline. Furthermore, applying modern theories of working memory leads to the opposite conclusion--that reducing menu length by creating a deeper structure is actually more demanding of users' working memories and leads to poorer performance and satisfaction. METHOD: Participants took a working memory capacity test and then attempted to complete a series of e-mail tasks using one of two IVR designs (functionally equivalent, but one with a broad menu structure and the other with a deep structure). RESULTS: Users of the broad-structure IVR performed better and were more satisfied than users of the deep-structure IVR. Furthermore, this effect was more pronounced for those with low working memory capacity. CONCLUSION: Results indicate that creating a deeper structure is more demanding of working memory resource than the alternative of longer, shallower menus. APPLICATION: This experiment has important practical implications for all systems with auditory menus (particularly IVRs) because it provides empirical evidence refuting a widely promoted design practice. 相似文献
149.
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges of identity frauds. For example, the sole biometric approach suffers from the privacy invasion and non-revocable issues. Passwords and tokens are easily forgotten and lost. To address these issues, the notion of cancellable biometrics was introduced to denote biometric templates that can be cancelled and replaced with the inclusion of another independent authentication factor. BioHash is a form of cancellable biometrics which mixes a set of user-specific random vectors with biometric features. In verification setting, BioHash is able to deliver extremely low error rates as compared to the sole biometric approach when a genuine token is used. However, this raises the possibility of two identity theft scenarios: (i) stolen-biometrics, in which an impostor possesses intercepted biometric data of sufficient high quality to be considered genuine and (ii) stolen-token, in which an impostor has access to the genuine token and used by the impostor to claim as the genuine user. We found that the recognition rate for the latter case is poorer. In this paper, the quantised random projection ensemble based on the Johnson–Lindenstrauss Lemma is used to establish the mathematical foundation of BioHash. Based on this model, we elucidate the characteristics of BioHash in pattern recognition as well as security view points and propose new methods to rectify the stolen-token problem. 相似文献
150.
The overproduce-and-choose strategy, which is divided into the overproduction and selection phases, has traditionally focused on finding the most accurate subset of classifiers at the selection phase, and using it to predict the class of all the samples in the test data set. It is therefore, a static classifier ensemble selection strategy. In this paper, we propose a dynamic overproduce-and-choose strategy which combines optimization and dynamic selection in a two-level selection phase to allow the selection of the most confident subset of classifiers to label each test sample individually. The optimization level is intended to generate a population of highly accurate candidate classifier ensembles, while the dynamic selection level applies measures of confidence to reveal the candidate ensemble with the highest degree of confidence in the current decision. Experimental results conducted to compare the proposed method to a static overproduce-and-choose strategy and a classical dynamic classifier selection approach demonstrate that our method outperforms both these selection-based methods, and is also more efficient in terms of performance than combining the decisions of all classifiers in the initial pool. 相似文献