全文获取类型
收费全文 | 3297篇 |
免费 | 75篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 38篇 |
综合类 | 6篇 |
化学工业 | 544篇 |
金属工艺 | 51篇 |
机械仪表 | 58篇 |
建筑科学 | 234篇 |
矿业工程 | 17篇 |
能源动力 | 68篇 |
轻工业 | 276篇 |
水利工程 | 33篇 |
石油天然气 | 12篇 |
武器工业 | 1篇 |
无线电 | 323篇 |
一般工业技术 | 410篇 |
冶金工业 | 687篇 |
原子能技术 | 60篇 |
自动化技术 | 557篇 |
出版年
2023年 | 11篇 |
2022年 | 21篇 |
2021年 | 40篇 |
2020年 | 34篇 |
2019年 | 41篇 |
2018年 | 38篇 |
2017年 | 62篇 |
2016年 | 55篇 |
2015年 | 37篇 |
2014年 | 92篇 |
2013年 | 218篇 |
2012年 | 117篇 |
2011年 | 157篇 |
2010年 | 147篇 |
2009年 | 134篇 |
2008年 | 161篇 |
2007年 | 157篇 |
2006年 | 169篇 |
2005年 | 128篇 |
2004年 | 126篇 |
2003年 | 114篇 |
2002年 | 92篇 |
2001年 | 60篇 |
2000年 | 60篇 |
1999年 | 70篇 |
1998年 | 152篇 |
1997年 | 110篇 |
1996年 | 96篇 |
1995年 | 62篇 |
1994年 | 52篇 |
1993年 | 52篇 |
1992年 | 35篇 |
1991年 | 23篇 |
1990年 | 29篇 |
1989年 | 29篇 |
1988年 | 17篇 |
1987年 | 25篇 |
1986年 | 20篇 |
1985年 | 20篇 |
1984年 | 27篇 |
1983年 | 25篇 |
1982年 | 27篇 |
1981年 | 26篇 |
1980年 | 21篇 |
1979年 | 21篇 |
1978年 | 22篇 |
1977年 | 24篇 |
1976年 | 42篇 |
1975年 | 9篇 |
1974年 | 11篇 |
排序方式: 共有3375条查询结果,搜索用时 484 毫秒
71.
NA Ellis S Ciocci M Proytcheva D Lennon J Groden J German 《Canadian Metallurgical Quarterly》1998,63(6):1685-1693
Bloom syndrome (BS) is more frequent in the Ashkenazic Jewish population than in any other. There the predominant mutation, referred to as "blmAsh," is a 6-bp deletion and 7-bp insertion at nucleotide position 2281 in the BLM cDNA. Using a convenient PCR assay, we have identified blmAsh on 58 of 60 chromosomes transmitted by Ashkenazic parents to persons with BS. In contrast, in 91 unrelated non-Ashkenazic persons with BS whom we examined, blmAsh was identified only in 5, these coming from Spanish-speaking Christian families from the southwestern United States, Mexico, or El Salvador. These data, along with haplotype analyses, show that blmAsh was independently established through a founder effect in Ashkenazic Jews and in immigrants to formerly Spanish colonies. This striking observation underscores the complexity of Jewish history and demonstrates the importance of migration and genetic drift in the formation of human populations. 相似文献
72.
Ellis SR 《Presence (Cambridge, Mass.)》1996,5(2):247-259
An operator's sense of remote presence during teleoperation or use of virtual environment interfaces is analyzed as to what characteristics it should have to qualify it as an explanatory scientific construct. But the implicit goal of designing virtual environment interfaces to maximize presence is itself questioned in a second section in which examples of human-machine interfaces beneficially designed to avoid a strong sense of egocentric presence are cited. In conclusion, it is argued that the design of a teleoperation or virtual environment system should generally focus on the efficient communication of causal interaction. In this view the sense of presence, that is of actually being at the simulated or remote workplace, is an epiphenomena of secondary importance for design. 相似文献
73.
Mike Espig Wolfgang Hackbusch Stefan Handschuh Reinhold Schneider 《Computing and Visualization in Science》2011,14(6):271-285
We discuss the calculus of variations in tensor representations with a special focus on tensor networks and apply it to functionals of practical interest. The survey provides all necessary ingredients for applying minimization methods in a general setting. The important cases of target functionals which are linear and quadratic with respect to the tensor product are discussed, and combinations of these functionals are presented in detail. As an example, we consider the representation rank compression in tensor networks. For the numerical treatment, we use the nonlinear block Gauss?CSeidel method. We demonstrate the rate of convergence in numerical tests. 相似文献
74.
Automating software testing activities can increase the quality and drastically decrease the cost of software development.
Toward this direction, various automated test data generation tools have been developed. The majority of existing tools aim
at structural testing, while a quite limited number aim at a higher level of testing thoroughness such as mutation. In this
paper, an attempt toward automating the generation of mutation-based test cases by utilizing existing automated tools is proposed.
This is achieved by reducing the killing mutants’ problem into a covering branches one. To this extent, this paper is motivated
by the use of state of the art techniques and tools suitable for covering program branches when performing mutation. Tools
and techniques such as symbolic execution, concolic execution, and evolutionary testing can be easily adopted toward automating
the test input generation activity for the weak mutation testing criterion by simply utilizing a special form of the mutant
schemata technique. The propositions made in this paper integrate three automated tools in order to illustrate and examine
the method’s feasibility and effectiveness. The obtained results, based on a set of Java program units, indicate the applicability
and effectiveness of the suggested technique. The results advocate that the proposed approach is able to guide existing automating
tools in producing test cases according to the weak mutation testing criterion. Additionally, experimental results with the
proposed mutation testing regime show that weak mutation is able to speedup the mutant execution time by at least 4.79 times
when compared with strong mutation. 相似文献
75.
Past research has extensively investigated the effect of media, especially focusing on how anonymity increases risk-related behaviors of groups when using computer-mediated communication (CMC). This study extends prior research by examining the differences in group risk-taking behaviors between face-to-face groups and completely non-anonymous CMC groups (i.e., groups working in a fully identified, synchronous CMC environment similar to popular instant messaging systems utilized widely within organizations). Drawing on the “decision analysis” perspective, a key framework for understanding organizational decision-making, the study also examines the effects of the firm's risk preferences as well as the type of information distribution among group members (i.e., full information known to all group members versus partial information know by only some of the members) on the groups' risk-taking behaviors. Results from a laboratory experiment using student subjects found no differences in risk-taking behaviors between CMC and face-to-face groups; additionally, no differences were found related to how information was distributed among group members. A significant effect was found, however, for the risk preference of the firm, showing that risk-neutral firms influenced groups to make riskier decisions than groups from risk-averse firms. Finally, groups within risk-neutral firms receiving partial information made riskier decisions than groups receiving full information. The implications of these results for future research and practice are examined. 相似文献
76.
Steven Hancock Mathias Disney Jan-Peter Muller Philip Lewis Mike Foster 《Remote sensing of environment》2011,115(12):3286-3297
Lidars have the unique ability to make direct, physical measurements of forest height and vertical structure in much denser canopies than is possible with passive optical or short wavelength radars. However the literature reports a consistent underestimate of tree height when using physically based methods, necessitating empirical corrections. This bias is a result of overestimating the range to the canopy top due to background noise and failing to correctly identify the ground.This paper introduces a method, referred to as “noise tracking”, to avoid biases when determining the range to the canopy top. Simulated waveforms, created with Monte-Carlo ray tracing over geometrically explicit forest models, are used to test noise tracking against simple thresholding over a range of forest and system characteristics. It was found that noise tracking almost completely removed the bias in all situations except for very high noise levels and very low (< 10%) canopy covers. In all cases noise tracking gave lower errors than simple thresholding and had a lower sensitivity to the initial noise threshold.Finite laser pulses spread out the measured signal, potentially overriding the benefit of noise tracking. In the past laser pulse length has been corrected by adding half that length to the signal start range. This investigation suggests that this is not always appropriate for simple thresholding and that the results for noise tracking were more directly related to pulse length than for simple thresholding. That this effect has not been commented on before may be due to the possible confounding impacts of instrument and survey characteristics inherent in field data. This method should help improve the accuracy of waveform lidar measurements of forests, whether using airborne or spaceborne instruments. 相似文献
77.
X-machines were proposed by Holcombe as a possible specification language and since then a number of further investigations
have demonstrated that the model is intuitive and easy to use as well as general enough to cater for a wide range of applications.
In particular (generalised) stream X-machines have been found to be extremely useful as a specification method and most of
the theory developed so far has concentrated on this particular class of X-machines. Furthermore, a method for testing systems
specified by stream X-machines exists and is proved to detect all faults of the implementation provided that the system meets
certain initial requirements. However, this method can only be used to generate test sequences from deterministic X-machine
specifications. In this paper we present the theoretical basis for a method for generating test sets from non-deterministic
generalised stream X-machines.
Received November 1999 / Accepted in revised form September 2000 相似文献
78.
Hussein Abdel-Jaber Mike Woodward Fadi Thabtah Amer Abu-Ali 《Journal of Network and Computer Applications》2008,31(4):750-770
Due to the rapid development in computer networks, congestion becomes a critical issue. Congestion usually occurs when the connection demands on network resources, i.e. buffer spaces, exceed the available ones. We propose in this paper a new discrete-time queueing network analytical model based on dynamic random early drop (DRED) algorithm to control the congestion in early stages. We apply our analytical model on two-queue nodes queueing network. Furthermore, we compare between the proposed analytical model and three known active queue management (AQM) algorithms, including DRED, random early detection (RED) and adaptive RED, in order to figure out which of them offers better quality of service (QoS). We also experimentally compare the queue nodes of the proposed analytical model and the three AQM methods in terms of different performance measures, including, average queue length, average queueing delay, throughput, packet loss probability, etc., aiming to determine the queue node that offers better performance. 相似文献
79.
Information visualisation is about gaining insight into data through a visual representation. This data is often multivariate and increasingly, the datasets are very large. To help us explore all this data, numerous visualisation applications, both commercial and research prototypes, have been designed using a variety of techniques and algorithms. Whether they are dedicated to geo-spatial data or skewed hierarchical data, most of the visualisations need to adopt strategies for dealing with overcrowded displays, brought about by too much data to fit in too small a display space. This paper analyses a large number of these clutter reduction methods, classifying them both in terms of how they deal with clutter reduction and more importantly, in terms of the benefits and losses. The aim of the resulting taxonomy is to act as a guide to match techniques to problems where different criteria may have different importance, and more importantly as a means to critique and hence develop existing and new techniques. 相似文献
80.
Visualization of heterogeneous data 总被引:1,自引:0,他引:1