首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8421篇
  免费   474篇
  国内免费   32篇
电工技术   106篇
综合类   35篇
化学工业   1887篇
金属工艺   124篇
机械仪表   193篇
建筑科学   407篇
矿业工程   13篇
能源动力   289篇
轻工业   689篇
水利工程   71篇
石油天然气   34篇
武器工业   2篇
无线电   938篇
一般工业技术   1462篇
冶金工业   1134篇
原子能技术   42篇
自动化技术   1501篇
  2023年   79篇
  2022年   140篇
  2021年   225篇
  2020年   161篇
  2019年   170篇
  2018年   244篇
  2017年   207篇
  2016年   266篇
  2015年   207篇
  2014年   287篇
  2013年   528篇
  2012年   449篇
  2011年   537篇
  2010年   409篇
  2009年   476篇
  2008年   463篇
  2007年   447篇
  2006年   341篇
  2005年   312篇
  2004年   270篇
  2003年   253篇
  2002年   206篇
  2001年   141篇
  2000年   157篇
  1999年   168篇
  1998年   175篇
  1997年   169篇
  1996年   126篇
  1995年   131篇
  1994年   117篇
  1993年   85篇
  1992年   75篇
  1991年   50篇
  1990年   60篇
  1989年   73篇
  1988年   68篇
  1987年   51篇
  1986年   57篇
  1985年   71篇
  1984年   54篇
  1983年   59篇
  1982年   43篇
  1981年   47篇
  1980年   34篇
  1979年   29篇
  1978年   22篇
  1977年   28篇
  1976年   33篇
  1975年   30篇
  1974年   25篇
排序方式: 共有8927条查询结果,搜索用时 15 毫秒
141.
Analogy based estimation (ABE) generates an effort estimate for a new software project through adaptation of similar past projects (a.k.a. analogies). Majority of ABE methods follow uniform weighting in adaptation procedure. In this research we investigated non-uniform weighting through kernel density estimation. After an extensive experimentation of 19 datasets, 3 evaluation criteria, 5 kernels, 5 bandwidth values and a total of 2090 ABE variants, we found that: (1) non-uniform weighting through kernel methods cannot outperform uniform weighting ABE and (2) kernel type and bandwidth parameters do not produce a definite effect on estimation performance. In summary simple ABE approaches are able to perform better than much more complex approaches. Hence,—provided that similar experimental settings are adopted—we discourage the use of kernel methods as a weighting strategy in ABE.  相似文献   
142.
Different doses of ketamine (10 mg/kg, 20 mg/kg, 30 mg/kg, 40 mg/kg, 50 mg/kg, and 60 mg/kg) were injected i.p. (I.P.), respectively, to male ICR mice to determine the optimal dosage for chronic administration. At and above 40 mg/kg I.P. injection, mice had almost no hindlimb movement during swimming test. Subsequently, 30 mg/kg was used as the dose for the study in the toxicity of long-term ketamine administration on urinary bladder and sperm motility. The treatment group were subdivided into two (n = 10 each group); one received daily ketamine treatment i.p. for 3 months and another group for 6 months. Corresponding number of mice in control groups (n = 5 each group) received saline injection instead of ketamine. Terminal dUTP nick and labeling (TUNEL) study and Sirius red staining were carried out on the sectioned slides of the urinary bladders to study the degree of apoptosis in both epithelium and muscular layers of the urinary bladder and the relative thickness of the muscular layers in this organ was also computed. Apoptosis in the bladder epithelium was observed initially in the 3-month ketamine treated mice and the number of apoptotic cells was significantly different (P < 0.05) between the 3-month and 6-month ketamine treated mice and the control. The relative thickness of muscular layers in the bladder wall also decreased significantly (P < 0.05) when the 6-month treated mice and the control were compared. Sirius red staining revealed increase of collagen in the urinary bladder of the treated mice, most evidently 6 months after ketamine treatment. In addition, the sperm motility was studied and there was a statistically significant difference between the control and ketamine treated groups in the percentages of sperms which were motile (P < 0.05). This suggested that the chronic administration of ketamine affected the genital system as well.  相似文献   
143.
Carboxymethylcellulose (CMC) and beta-cyclodextrin (beta-CD)-based polymers functionalized with two types of quaternary ammonium compounds (QACs), the alkaquat DMB-451 (N-alkyl (50% C14, 40% C12, 10% C10) dimethylbenzylammonium chloride) (DMD-451) named polymer DMB-451, and FMB 1210-8 (a blend of 32 w% N-alkyl (50% C14, 40% C12, 10% C10) dimethylbenzylammonium chloride and 48 w% of didecyldimethylammonium chloride) named polymer FMB 1210-8, were synthethized and characterized by Fourier transform infrared spectroscopy. The antimicrobial activities of these polymers against Eschericia coli were also evaluated at 25 degrees C in wastewater. The results have indicated that the polymer FMB 1210-8 possesses a high-affinity binding with bacterial cells that induces a rapid disinfection process. Moreover, in the same experimental conditions of disinfection (mixture of 1.0 g of polymer and 100 mL of wastewater), the polymer FMB 1210-8 has a higher antimicrobial efficiency (99.90%) than polymer DMB-451 (92.8%). This phenomenon might be associated to a stronger interaction with bacterial cells due to stronger binding affinity for E. coli cells and greater killing efficiency of the C10 alkyl chains QAC of polymer FMB 1210-8 to disrupt the bacterial cell membrane as compared to N-alkyl (50% C14, 40% C12, 10% C10) dimethylbenzylammonium chloride. Together, these results suggest that the polymer FMB 1210-8 could constitute a good disinfectant against Escherichia coli, which could be advantageously used in wastewater treatments due to the low toxicity of beta-CD and CMC, and moderated toxicity of FMB 1210-8 to human and environment.  相似文献   
144.
This paper presents a contingent valuation study concerning landscape impacts generated by the construction of one dam (Baker 1) of the HIDROAYSEN hydropower project located in the Chilean Patagonia. A survey was used to collect information about citizens’ opinions towards the hydropower project in four major cities in Chile. Specifically, a One-and-One-Half-Bound (OOHB) willingness to pay eliciting format was applied to capture citizens’ WTP. The economic loss, associated to the landscape impacts for people living in urban areas of the country, is found to be approximately US$ 205 million, which is nearly 28% of the total investment. Our results also show that the cities’ distance from the dam affects citizens’ willingness to pay.  相似文献   
145.
In this paper, an efficient arbitrated quantum signature scheme is proposed by combining quantum cryptographic techniques and some ideas in classical cryptography. In the presented scheme, the signatory and the receiver can share a long-term secret key with the arbitrator by utilizing the key together with a random number. While in previous quantum signature schemes, the key shared between the signatory and the arbitrator or between the receiver and the arbitrator could be used only once, and thus each time when a signatory needs to sign, the signatory and the receiver have to obtain a new key shared with the arbitrator through a quantum key distribution protocol. Detailed theoretical analysis shows that the proposed scheme is efficient and provably secure.  相似文献   
146.
Feature diagrams have become commonplace in software product line engineering as a means to document variability early in the life cycle. Over the years, their application has also been extended to assist stakeholders in the configuration of software products. However, existing feature-based configuration techniques offer little support for tailoring configuration views to the profiles of the various stakeholders. In this paper, we propose a lightweight, yet formal and flexible, mechanism to leverage multidimensional separation of concerns in feature-based configuration. We propose a technique to specify concerns in feature diagrams and to generate automatically concern-specific configuration views. Three alternative visualisations are proposed. Our contributions are motivated and illustrated through excerpts from a real web-based meeting management application which was also used for a preliminary evaluation. We also report on the progress made in the development of a tool supporting multi-view feature-based configuration.  相似文献   
147.
Current software and systems engineering tools provide only basic trace features, and as a result users are often compelled to construct non-trivial traceability queries using generic query languages such as SQL. In this paper, we present an alternative approach which defines traceability strategies for a project using UML class diagrams and then constructs trace queries as constraints upon subsets of the model. The visual trace modeling language (VTML) allows users to model a broad range of trace queries while hiding underlying technical details and data structures. The viability and expressiveness of VTML for use in a real project are demonstrated through modeling a broadly representative set of queries for a web-based health-care system. It is then evaluated through an experiment with human users to assess the readability and writability of VTML queries in comparison to generic SQL queries. We found that users read and constructed traceability queries considerably faster using VTML than using SQL. Furthermore, visually constructed traceability queries were substantially more correct compared to the same queries constructed with SQL.  相似文献   
148.
A comparison of broad versus deep auditory menu structures   总被引:1,自引:0,他引:1  
OBJECTIVE: The primary purpose of this experiment was to gain a greater understanding of the utilization of working memory when interacting with a speech-enabled interactive voice response (IVR) system. BACKGROUND: A widely promoted guideline advises limiting IVR menus to five or fewer items because of constraints of the human memory system, commonly citing Miller's (1956) paper. The authors argue that Miller's paper does not, in fact, support this guideline. Furthermore, applying modern theories of working memory leads to the opposite conclusion--that reducing menu length by creating a deeper structure is actually more demanding of users' working memories and leads to poorer performance and satisfaction. METHOD: Participants took a working memory capacity test and then attempted to complete a series of e-mail tasks using one of two IVR designs (functionally equivalent, but one with a broad menu structure and the other with a deep structure). RESULTS: Users of the broad-structure IVR performed better and were more satisfied than users of the deep-structure IVR. Furthermore, this effect was more pronounced for those with low working memory capacity. CONCLUSION: Results indicate that creating a deeper structure is more demanding of working memory resource than the alternative of longer, shallower menus. APPLICATION: This experiment has important practical implications for all systems with auditory menus (particularly IVRs) because it provides empirical evidence refuting a widely promoted design practice.  相似文献   
149.
Lately, the once powerful one-factor authentication which is based solely on either password, token or biometric approach, appears to be insufficient in addressing the challenges of identity frauds. For example, the sole biometric approach suffers from the privacy invasion and non-revocable issues. Passwords and tokens are easily forgotten and lost. To address these issues, the notion of cancellable biometrics was introduced to denote biometric templates that can be cancelled and replaced with the inclusion of another independent authentication factor. BioHash is a form of cancellable biometrics which mixes a set of user-specific random vectors with biometric features. In verification setting, BioHash is able to deliver extremely low error rates as compared to the sole biometric approach when a genuine token is used. However, this raises the possibility of two identity theft scenarios: (i) stolen-biometrics, in which an impostor possesses intercepted biometric data of sufficient high quality to be considered genuine and (ii) stolen-token, in which an impostor has access to the genuine token and used by the impostor to claim as the genuine user. We found that the recognition rate for the latter case is poorer. In this paper, the quantised random projection ensemble based on the Johnson–Lindenstrauss Lemma is used to establish the mathematical foundation of BioHash. Based on this model, we elucidate the characteristics of BioHash in pattern recognition as well as security view points and propose new methods to rectify the stolen-token problem.  相似文献   
150.
The overproduce-and-choose strategy, which is divided into the overproduction and selection phases, has traditionally focused on finding the most accurate subset of classifiers at the selection phase, and using it to predict the class of all the samples in the test data set. It is therefore, a static classifier ensemble selection strategy. In this paper, we propose a dynamic overproduce-and-choose strategy which combines optimization and dynamic selection in a two-level selection phase to allow the selection of the most confident subset of classifiers to label each test sample individually. The optimization level is intended to generate a population of highly accurate candidate classifier ensembles, while the dynamic selection level applies measures of confidence to reveal the candidate ensemble with the highest degree of confidence in the current decision. Experimental results conducted to compare the proposed method to a static overproduce-and-choose strategy and a classical dynamic classifier selection approach demonstrate that our method outperforms both these selection-based methods, and is also more efficient in terms of performance than combining the decisions of all classifiers in the initial pool.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号