全文获取类型
收费全文 | 3682篇 |
免费 | 64篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 36篇 |
综合类 | 4篇 |
化学工业 | 634篇 |
金属工艺 | 34篇 |
机械仪表 | 35篇 |
建筑科学 | 197篇 |
矿业工程 | 21篇 |
能源动力 | 62篇 |
轻工业 | 160篇 |
水利工程 | 27篇 |
石油天然气 | 48篇 |
无线电 | 171篇 |
一般工业技术 | 384篇 |
冶金工业 | 1497篇 |
原子能技术 | 19篇 |
自动化技术 | 420篇 |
出版年
2022年 | 27篇 |
2021年 | 35篇 |
2019年 | 34篇 |
2018年 | 36篇 |
2017年 | 54篇 |
2016年 | 48篇 |
2015年 | 42篇 |
2014年 | 42篇 |
2013年 | 179篇 |
2012年 | 71篇 |
2011年 | 104篇 |
2010年 | 83篇 |
2009年 | 93篇 |
2008年 | 105篇 |
2007年 | 109篇 |
2006年 | 95篇 |
2005年 | 110篇 |
2004年 | 74篇 |
2003年 | 96篇 |
2002年 | 69篇 |
2001年 | 78篇 |
2000年 | 51篇 |
1999年 | 75篇 |
1998年 | 286篇 |
1997年 | 157篇 |
1996年 | 152篇 |
1995年 | 73篇 |
1994年 | 80篇 |
1993年 | 84篇 |
1992年 | 44篇 |
1991年 | 49篇 |
1990年 | 66篇 |
1989年 | 55篇 |
1988年 | 58篇 |
1987年 | 60篇 |
1986年 | 51篇 |
1985年 | 56篇 |
1984年 | 39篇 |
1983年 | 37篇 |
1982年 | 43篇 |
1981年 | 36篇 |
1980年 | 32篇 |
1979年 | 35篇 |
1978年 | 37篇 |
1977年 | 58篇 |
1976年 | 102篇 |
1975年 | 33篇 |
1974年 | 32篇 |
1973年 | 42篇 |
1972年 | 23篇 |
排序方式: 共有3749条查询结果,搜索用时 15 毫秒
41.
Phenomenological softening points were measured on a series of 13 anionic, nearly monodisperse, atactic polystyrenes using a DuPont 943 thermomechanical analyzer (TMA) in a penetration mode. Although TMA cannot identify the nature of the “transition” observed as such, the results obtained support the evidence for the Tg, Tll, and T′ll transition in polystyrene discussed in recent literature. Tg and Tll were found to vary with molecular weight in a systematic manner, while T′ll could only be observed at very high molecular weight. The technique appears to be quite useful in offering rapid and reproducible information on the various transitions in the liquid state of polystyrene. 相似文献
42.
Oomen Raymond P.; Young N.Martin; Bundle David R. 《Protein engineering, design & selection : PEDS》1991,4(4):427-433
A molecular model of the binding site of an anti-carbohydrateantibody (YsT9.1) has been developed using computer-assistedmodeling techniques and molecular dynamics calculations. Sequencehomologies among YsT9.1 and the Fv regions of McPC603, J539and human Bence-Jones protein REI, all of which have solvedcrystal structures, provided the basis for the modeling. Thegroove-type combining site model had a topography which wascomplementary to low energy confonners of the polysaccharide,a Brucella O-antigen, and the site could be almost completelyfilled by a pentasaccharide epitope in either of two dockingmodes. Putative interactions between this epitope and the antibodyare consistent with the known structural requirements for bindingand lead to the design of oligosaccharide inhibitors that probethe veracity of the modeled docked complex. Ultimately boththe Fv model and the docked complex will be compared with independentcrystal structures of YsT9.1 Fab with and without pentasaccharideinhibitor, currently at the stage of refinement. 相似文献
43.
Zeli WANG Hai JIN Weiqi DAI Kim-Kwang Raymond CHOO Deqing ZOU 《Frontiers of Computer Science》2021,15(2):152802
Blockchain has recently emerged as a research trend, with potential applications in a broad range of industries and context. One particular successful Blockchain technology is smart contract, which is widely used in commercial settings (e.g., high value financial transactions). This, however, has security implications due to the potential to financially benefit froma security incident (e.g., identification and exploitation of a vulnerability in the smart contract or its implementation). Among, Ethereum is the most active and arresting. Hence, in this paper, we systematically review existing research efforts on Ethereum smart contract security, published between 2015 and 2019. Specifically, we focus on how smart contracts can be maliciously exploited and targeted, such as security issues of contract program model, vulnerabilities in the program and safety consideration introduced by program execution environment. We also identify potential research opportunities and future research agenda. 相似文献
44.
45.
Greedy scheduling heuristics provide a low complexity and scalable albeit particularly sub-optimal strategy for hardware-based crossbar schedulers. In contrast, the maximum matching algorithm for Bipartite graphs can be used to provide optimal scheduling for crossbar-based interconnection networks with a significant complexity and scalability cost. In this paper, we show how maximum matching can be reformulated in terms of Boolean operations rather than the more traditional formulations. By leveraging the inherent parallelism available in custom hardware design, we reformulate maximum matching in terms of Boolean operations rather than matrix computations and introduce three maximum matching implementations in hardware. Specifically, we examine a Pure Logic Scheduler with three dimensions of parallelism, a Matrix Scheduler with two dimensions of parallelism and a Vector Scheduler with one dimension of parallelism. These designs reduce the algorithmic complexity for an N×N network from O(N3) to O(1), O(K), and O(KN), respectively, where K is the number of optimization steps. While an optimal scheduling algorithm requires K=2N−1 steps, by starting with our hardware-based greedy strategy to generate an initial schedule, our simulation results show that the maximum matching scheduler can achieve 99% of the optimal schedule when K=9. We examine hardware and time complexity of these architectures for crossbar sizes of up to N=1024. Using FPGA synthesis results, we show that a greedy schedule for crossbars, ranging from 8×8 to 256×256, can be optimized in less than 20 ns per optimization step. For crossbars reaching 1024×1024 the scheduling can be completed in approximately 10 μs with current technology and could reach under 90 ns with future technologies. 相似文献
46.
We propose a finite structural translation of possibly recursive π-calculus terms into Petri nets. This is achieved by using high-level nets together with an equivalence on markings in order to model entering into recursive calls, which do not need to be guarded. We view a computing system as consisting of a main program (π-calculus term) together with procedure declarations (recursive definitions of π-calculus identifiers). The control structure of these components is represented using disjoint high-level Petri nets, one for the main program and one for each of the procedure declarations. The program is executed once, while each procedure can be invoked several times (even concurrently), each such invocation being uniquely identified by structured tokens which correspond to the sequence of recursive calls along the execution path leading to that invocation. 相似文献
47.
Raymond R Panko 《欧洲信息系统杂志》2008,17(3):182-197
In the 1990s, enrollments grew rapidly in information systems (IS) and computer science. Then, beginning in 2000 and 2001, enrollments declined precipitously. This paper looks at the enrollment bubble and the dotcom bubble that drove IT enrollments. Although the enrollment bubble occurred worldwide, this paper focuses primarily on U.S. data, which is widely available, and secondarily on Western Europe data. The paper notes that the dotcom bubble was an investment disaster but that U.S. IT employment fell surprisingly little and soon surpassed the bubble's peak IT employment. In addition, U.S. IT unemployment rose to almost the level of total unemployment in 2003, then fell to traditional low levels by 2005. Job prospects in the U.S. and most other countries are good for the short term, and the U.S. Bureau of Labor Statistics employment projections for 2006–2016 indicate that job prospects in the U.S. will continue to be good for most IT jobs. However, offshoring is a persistent concern for students in Western Europe and the United States. The data on offshoring are of poor quality, but several studies indicate that IT job losses from offshoring are small and may be counterbalanced by gains in IT inshoring jobs. At the same time, offshoring and productivity gains appear to be making low-level jobs such as programming and user support less attractive. This means that IS and computer science programs will have to focus on producing higher-level job skills among graduates. In addition, students may have to stop considering the undergraduate degree to be a terminal degree in IS and computer science. 相似文献
48.
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode 总被引:1,自引:0,他引:1
CHOO Kim-Kwang Raymond 《中国科学F辑(英文版)》2009,52(8):1358-1370
The majority of existing escrowable identity-based key agreement protocols only provide partial forward secrecy. Such protocols are, arguably, not suitable for many real-word applications, as the latter tends to require a stronger sense of forward secrecy—perfect forward secrecy. In this paper, we propose an efficient perfect forward-secure identity-based key agreement protocol in the escrow mode. We prove the security of our protocol in the random oracle model, assuming the intractability of the Gap Biline... 相似文献
49.
Mayuresh Patole Santanu Bandyopadhyay Dominic C. Y. Foo Raymond R. Tan 《Clean Technologies and Environmental Policy》2017,19(7):1967-1975
Pinch analysis was initially developed as a methodology for optimizing energy efficiency in process plants. Applications of pinch analysis applications are based on common principles of using stream quantity and quality to determine optimal system targets. This initial targeting step identifies the pinch point, which then allows complex problems to be decomposed for the subsequent design of an optimal network using insights drawn from the targeting stage. One important class of pinch analysis problems is energy planning with footprint constraints, which began with the development of carbon emissions pinch analysis; in such problems, energy sources and demands are characterized by carbon footprint as the quality index. This methodology has been extended by using alternative quality indexes that measure different sustainability dimensions, such as water footprint, land footprint, emergy transformity, inoperability risk, energy return on investment and human fatalities. Pinch analysis variants still have the limitation of being able to use one quality index at a time, while previous attempts to develop pinch analysis methods using multiple indices have only been partially successful for special cases. In this work, a multiple-index pinch analysis method is developed by using an aggregate quality index, based on a weighted linear function of different quality indexes normally used in energy planning. The weights used to compute the aggregate index are determined via the analytic hierarchy process. A case study for Indian power sector is solved to illustrate how this approach allows multiple sustainability dimensions to be accounted for in energy planning. 相似文献
50.
Nutrition-induced effects on the activity of enzymes of lipogenesis, fatty acid synthase (FAS: EC 2.3.1.85), ATP citrate lyase (ACL: EC 4.1.3.8), malic enzyme (ME; EC 1.1.1.40), glucose-6-phosphate dehydrogenase (G6PDH: EC 1.1.1.49) and 6-phosphogluconate dehydrogenase (PGDH; EC 1.1.1.44) were investigated in liver and interscapular brown adipose tissue (BAT) of rats. The lipogenic enzymes could be grouped into two categories according to their response to dietary manipulations: FAS and ACL, both key enzymes of lipogenesis, responded fast and strongly to dietary manipulations. ME, G6PDH and PGDH, enzymes which also contribute to metabolic pathways other than lipogenesis, responded in a more sustained and less pronounced fashion. Feed deprivation caused the specific activities of lipogenic enzymes to decline several-fold. Refeeding of previously fasted (up to 3 days) animals increased the activities dramatically (10-to 25-fold) to far above pre-fasting levels ("overshoot"). Repetition of the fasting/refeeding regimen increasingly impaired the ability of both tissues to synthesize overshooting enzyme activities in the subsequent refeeding period. The fasting-induced decline of the activities was prevented when sugars were provided to the animals via drinking water. The sugars displayed different effectivities: sucrose = glucose > fructose > maltose > > lactose. Sugars as the sole nutrient after fasting were also able to induce overshooting enzyme activities. Again, activities of FAS and ACL responded in a more pronounced fashion than the other three enzymes. Transition from feeding one diet to feeding a new diet of different composition led to adaptation of the lipogenic enzyme activities to levels characteristic for the new diet. Replacing a low-carbohydrate with a high-carbohydrate diet proceeded with major alterations of enzyme activities. This process of attaining a new level took up to 20 days and involved pronounced oscillations of the specific activities. In contrast, when a high-carbohydrate diet was replaced with another diet. particular one high in fat, transition to new enzyme activities was completed within 2-3 days and proceeded without oscillations. All dietary manipulations caused more pronounced responses in young (35d-old) than in adult (180d-old) animals. 相似文献