全文获取类型
收费全文 | 5131篇 |
免费 | 158篇 |
国内免费 | 24篇 |
专业分类
电工技术 | 62篇 |
综合类 | 8篇 |
化学工业 | 1347篇 |
金属工艺 | 141篇 |
机械仪表 | 135篇 |
建筑科学 | 70篇 |
矿业工程 | 16篇 |
能源动力 | 256篇 |
轻工业 | 342篇 |
水利工程 | 38篇 |
石油天然气 | 10篇 |
无线电 | 671篇 |
一般工业技术 | 1151篇 |
冶金工业 | 392篇 |
原子能技术 | 45篇 |
自动化技术 | 629篇 |
出版年
2024年 | 14篇 |
2023年 | 68篇 |
2022年 | 157篇 |
2021年 | 237篇 |
2020年 | 151篇 |
2019年 | 154篇 |
2018年 | 198篇 |
2017年 | 151篇 |
2016年 | 145篇 |
2015年 | 115篇 |
2014年 | 189篇 |
2013年 | 497篇 |
2012年 | 211篇 |
2011年 | 259篇 |
2010年 | 219篇 |
2009年 | 221篇 |
2008年 | 205篇 |
2007年 | 165篇 |
2006年 | 171篇 |
2005年 | 130篇 |
2004年 | 86篇 |
2003年 | 98篇 |
2002年 | 76篇 |
2001年 | 80篇 |
2000年 | 84篇 |
1999年 | 72篇 |
1998年 | 128篇 |
1997年 | 71篇 |
1996年 | 68篇 |
1995年 | 64篇 |
1994年 | 80篇 |
1993年 | 72篇 |
1992年 | 71篇 |
1991年 | 69篇 |
1990年 | 59篇 |
1989年 | 49篇 |
1988年 | 38篇 |
1987年 | 39篇 |
1986年 | 35篇 |
1985年 | 30篇 |
1984年 | 38篇 |
1983年 | 31篇 |
1982年 | 36篇 |
1981年 | 18篇 |
1980年 | 26篇 |
1979年 | 27篇 |
1978年 | 17篇 |
1977年 | 20篇 |
1976年 | 28篇 |
1973年 | 8篇 |
排序方式: 共有5313条查询结果,搜索用时 15 毫秒
131.
Nishant Doshi Saru Kumari Dheerendra Mishra Xiong Li Kim-Kwang Raymond Choo Arun Kumar Sangaiah 《Multimedia Tools and Applications》2017,76(24):25893-25918
In this digital era, where Internet of Things (IoT) is increasing day by day, use of resource constrained devices is also increasing. Indeed, the features such as low cost, less maintenance, more adaptive to hostile environment, etc. make the wireless multimedia devices to be the best choice as the resource constrained devices. For the security, the end user device requires to establish the session key with the server before transferring the data. Mobile is one of the device having more and more usage as wireless multimedia device in recent years. In 2013, Li et al. proposed an efficient scheme for the wireless mobile communications and claimed it to be secure against various attacks. Recently, Shen et al. claimed that the scheme of Li et al. is still vulnerable to the privileged insider attack, the stolen verifier attack and finally proposed a scheme to withstand the mentioned and other attacks. However, in this paper we claim that the scheme of Shen et al. is still susceptible to the user anonymity, the session specific temporary information attack and the replay attack. In addition, Shen et al.’s scheme requires more time due to many operations. Further, we propose an efficient scheme that is secure against various known attacks and due to reduced time complexity our scheme is a preferred choice for the wireless mobile networks and hence for wireless multimedia systems. 相似文献
132.
Sriraam Natarajan Prasad Tadepalli Thomas G. Dietterich Alan Fern 《Annals of Mathematics and Artificial Intelligence》2008,54(1-3):223-256
Many real-world domains exhibit rich relational structure and stochasticity and motivate the development of models that combine predicate logic with probabilities. These models describe probabilistic influences between attributes of objects that are related to each other through known domain relationships. To keep these models succinct, each such influence is considered independent of others, which is called the assumption of “independence of causal influences” (ICI). In this paper, we describe a language that consists of quantified conditional influence statements and captures most relational probabilistic models based on directed graphs. The influences due to different statements are combined using a set of combining rules such as Noisy-OR. We motivate and introduce multi-level combining rules, where the lower level rules combine the influences due to different ground instances of the same statement, and the upper level rules combine the influences due to different statements. We present algorithms and empirical results for parameter learning in the presence of such combining rules. Specifically, we derive and implement algorithms based on gradient descent and expectation maximization for different combining rules and evaluate them on synthetic data and on a real-world task. The results demonstrate that the algorithms are able to learn both the conditional probability distributions of the influence statements and the parameters of the combining rules. 相似文献
133.
Andrew Walenstein Rachit Mathur Mohamed R. Chouchane Arun Lakhotia 《Journal in Computer Virology》2008,4(4):307-322
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation
engines are used at distribution sites or in self-propagating malware in order to create variation in the distributed programs.
Program normalization is a way to remove variety introduced by mutation engines, and can thus simplify the problem of detecting
variant strains. This paper introduces the “normalizer construction problem” (NCP), and formalizes a restricted form of the
problem called “NCP=”, which assumes a model of the engine is already known in the form of a term rewriting system. It is
shown that even this restricted version of the problem is undecidable. A procedure is provided that can, in certain cases,
automatically solve NCP= from the model of the engine. This procedure is analyzed in conjunction with term rewriting theory
to create a list of distinct classes of normalizer construction problems. These classes yield a list of possible attack vectors.
Three strategies are defined for approximate solutions of NCP=, and an analysis is provided of the risks they entail. A case
study using the virus suggests the approximations may be effective in practice for countering mutated malware.
R. Mathur is presently at McAfee AVERT Labs. 相似文献
134.
The paper presents thermal conductivity measurements of ethane over the temperature range of 290–600 K at pressures to 700 bar including the critical region with maximum uncertainty of 0.7 to 3% obtained with a transient line source instrument. A correlation of the data is presented and used to prepare tables of recommended values that are accurate to within 2.5% in the experimental range except near saturation, and in the critical region, where the anomalous thermal conductivity values are predicted to within 5%.Nomenclature
a
k
, b
ij
, b
k
, c
i
Parameters of the regression model, k=0 to n, i=0 to m, j=0 to n
-
P
Pressure, (MPa or bar)
-
Q
l
Heat flux per unit length (mW · m–1)
-
t
Time, s
-
T
Temperature, K
-
T
cr
Critical temperature, K
-
T
r
Reduced temperature = T/T
cr
-
T
w
Temperature rise of wire between times t
1 and t
2 K
-
T
*
Reduced temperature difference (T–T
cr)/T
cr
-
Thermal conductivity, mW · m–1 · K–1
-
1
Thermal conductivity at 1 bar, mW · m–1 · K–1
-
bg
Background thermal conductivity, mW · m–1 · K–1
-
cr
Thermal conductivity anomaly, mW · m–1 · K–1
-
e
Excess thermal conductivity, mW · m–1 · K–1
-
Density, g · cm–3
-
cr
Critical density, g · cm–3
-
r
Reduced density, = /
cr
-
*
Reduced density difference =(-
cr)/
cr 相似文献
135.
Chemical mediation of egg capsule deposition by mud snails 总被引:1,自引:0,他引:1
Mud snails (Ilyanassa obsoleta = Nassarius obsoletus = Nassa obsoleta) deposit eggs in protective capsules on hard substrata in soft bottom environments. We studied sites of egg capsule deposition and snail movement responses to odors to determine if chemoreception plays a role in deposition site selection. From results of field surveys, laboratory experiments, and field experiments, we conclude that mud snails use chemoreception for capsule deposition. Attractive odors originate from mud snail and whelk egg capsules and from living bivalves. Evidence for attractive odors from conspecifics is equivocal. Capsules are deposited on living odor sources and nearby hard substrates. We hypothesize that deposition of capsules on living substrates increases the likelihood that embryos will survive by decreasing the chance of smothering of embryos by sediments. 相似文献
136.
Delayed settling of the ash particles and poor drainage of water from the pond ash are the major problems faced during the hydraulic stowing of pond ash. In this study the effect of polymeric flocculant on settling of the ash particles and drainage of water during pond ash stowing are investigated. In addition, the parameters, viz. drainage and absorption of water during pond ash stowing are quantified by stowing a mine goaf model with pond ash slurries of five different concentrations added with and without flocculant. The study revealed that addition of only 5 × 10?6 of Sodium Carboxymethyl Cellulose (Na-CMC) flocculant with the pond ash slurries during stowing offers best result in terms of quicker settling of the ash particles and enhanced water drainage from the hydraulically stowed pond ash. Besides, it resulted in drainage of more than 85% of the total water used in the initial 45 min of stowing. The improvement in drainage is caused due to coagulation and flocculation of the pond ash particles because of charge neutralization and particle–particle bridging. This study may provide a basis for estimating the drainage and absorption of water during the real pond ash stowing operation in underground mines. 相似文献
137.
A rapid screening system for heterogeneous catalyst discovery has been developed by coupling an in-house designed and fabricated high temperature vapor phase pulse reactor on-line to a GC-MS. The incorporation of gas chromatography for separation of the products with the mass spectrometry system allowed simultaneous identification and determination of reaction products and substrate conversion. This system was employed to study the vapor phase catalytic hydride transfer reduction (CHTR) of nitrobenzene with methanol as hydrogen donor on an MgO catalyst as a model reaction. Structural information of all the by-products that were formed was useful to understand the reaction mechanism. The products obtained with the new screening technique were in good agreement with conventional bench scale experiments. The rapid online screening provided an efficient methodology for optimization of reaction conditions such as catalyst loading, reaction temperature, and mole ratios. Response Surface Methodology (RSM) was used to optimize the conversion of reactants and selectivity of products. 相似文献
138.
139.
Prasad Chebolu Leslie Ann Goldberg Russell Martin 《Journal of Computer and System Sciences》2012,78(5):1579-1605
We investigate the complexity of approximately counting stable roommate assignments in two models: (i) the k-attribute model, in which the preference lists are determined by dot products of “preference vectors” with “attribute vectors” and (ii) the k-Euclidean model, in which the preference lists are determined by the closeness of the “positions” of the people to their “preferred positions”. Exactly counting the number of assignments is #P-complete, since Irving and Leather demonstrated #P-completeness for the special case of the stable marriage problem (Irving and Leather, 1986 [11]). We show that counting the number of stable roommate assignments in the k-attribute model (#k-attribute SR, ) and the 3-Euclidean model (#k-Euclidean SR, ) is interreducible, in an approximation-preserving sense, with counting independent sets (of all sizes) () in a graph, or counting the number of satisfying assignments of a Boolean formula (). This means that there can be no FPRAS for any of these problems unless NP = RP. As a consequence, we infer that there is no FPRAS for counting stable roommate assignments () unless NP = RP. Utilizing previous results by Chebolu, Goldberg and Martin (2010) [3], we give an approximation-preserving reduction from counting the number of independent sets in a bipartite graph () to counting the number of stable roommate assignments both in the 3-attribute model and in the 2-Euclidean model. is complete with respect to approximation-preserving reductions in the logically-defined complexity class . Hence, our result shows that an FPRAS for counting stable roommate assignments in the 3-attribute model would give an FPRAS for all . We also show that the 1-attribute stable roommate problem always has either one or two stable roommate assignments, so the number of assignments can be determined exactly in polynomial time. 相似文献
140.
In component‐based development, software systems are built by assembling components already developed and prepared for integration. To estimate the quality of components, complexity, reusability, dependability, and maintainability are the key aspects. The quality of an individual component influences the quality of the overall system. Therefore, there is a strong need to select the best quality component, both from functional and nonfunctional aspects. The present paper produces a critical analysis of metrics for various quality aspects for components and component‐based systems. These aspects include four main quality factors: complexity, dependency, reusability, and maintainability. A systematic study is applied to find as much literature as possible. A total of 49 papers were found suitable after a defined search criteria. The analysis provided in this paper has a different objective as we focused on efficiency and practical ability of the proposed approach in the selected papers. The various key attributes from these two are defined. Each paper is evaluated based on the various key parameters viz. metrics definition, implementation technique, validation, usability, data source, comparative analysis, practicability, and extendibility. The paper critically examines various quality aspects and their metrics for component‐based systems. In some papers, authors have also compared the results with other techniques. For characteristics like complexity and dependency, most of the proposed metrics are analytical. Soft computing and evolutionary approaches are either not being used or much less explored so far for these aspects, which may be the future concern for the researchers. In addition, hybrid approaches like neuro‐fuzzy, neuro‐genetic, etc., may also be examined for evaluation of these aspects. However, to conclude that one particular technique is better than others may not be appropriate. It may be true for one characteristic by considering different set of inputs and dataset but may not be true for the same with different inputs. The intension in the proposed work is to give a score for each metric proposed by the researchers based on the selected parameters, but certainly not to criticize any research contribution by authors. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献