全文获取类型
收费全文 | 1960篇 |
免费 | 16篇 |
专业分类
电工技术 | 19篇 |
综合类 | 1篇 |
化学工业 | 179篇 |
金属工艺 | 11篇 |
机械仪表 | 17篇 |
建筑科学 | 60篇 |
矿业工程 | 1篇 |
能源动力 | 26篇 |
轻工业 | 202篇 |
水利工程 | 5篇 |
石油天然气 | 3篇 |
无线电 | 93篇 |
一般工业技术 | 179篇 |
冶金工业 | 962篇 |
原子能技术 | 10篇 |
自动化技术 | 208篇 |
出版年
2022年 | 7篇 |
2021年 | 10篇 |
2020年 | 12篇 |
2019年 | 26篇 |
2018年 | 21篇 |
2017年 | 25篇 |
2016年 | 13篇 |
2015年 | 14篇 |
2014年 | 13篇 |
2013年 | 82篇 |
2012年 | 43篇 |
2011年 | 58篇 |
2010年 | 45篇 |
2009年 | 41篇 |
2008年 | 54篇 |
2007年 | 55篇 |
2006年 | 52篇 |
2005年 | 45篇 |
2004年 | 51篇 |
2003年 | 42篇 |
2002年 | 34篇 |
2001年 | 32篇 |
2000年 | 28篇 |
1999年 | 54篇 |
1998年 | 266篇 |
1997年 | 163篇 |
1996年 | 117篇 |
1995年 | 67篇 |
1994年 | 55篇 |
1993年 | 68篇 |
1992年 | 20篇 |
1991年 | 15篇 |
1990年 | 17篇 |
1989年 | 20篇 |
1988年 | 17篇 |
1987年 | 24篇 |
1986年 | 20篇 |
1985年 | 24篇 |
1984年 | 12篇 |
1983年 | 8篇 |
1982年 | 15篇 |
1981年 | 18篇 |
1980年 | 16篇 |
1979年 | 19篇 |
1978年 | 7篇 |
1977年 | 29篇 |
1976年 | 52篇 |
1975年 | 13篇 |
1974年 | 9篇 |
1971年 | 7篇 |
排序方式: 共有1976条查询结果,搜索用时 15 毫秒
91.
Chris Christensen 《Cryptologia》2013,37(4):293-332
Abstract Lester Sanders Hill (1890–1961) is best known for the Hill cipher which he published in 1929. However, there seem to be four periods of Hill's career. First, in 1926 and 1927, Hill published a series of papers on mathematical error-detection. Hill's ideas for error-detection are similar to the ideas he used in his cipher. Next, in 1929 and 1931, Hill published two papers that describe the Hill cipher. The third period of Hill's career, from 1927 until 1960, was the time he served on the mathematics faculty of Hunter College. During his time at Hunter College, Hill seems to have had a relationship with the Navy in which he served during World War I. Finally, while teaching at Hunter College, in the 1950s, Hill wrote his “later papers” on cryptography, which were not published but were sent to Naval Communications. 相似文献
92.
Chris Christensen 《Cryptologia》2013,37(2):198-202
In this paper, a password authentication scheme based on a unit circle encoding is proposed. In our scheme, a one-way function and a cryptographic operation such as DES (data encryption standard) are adopted. Besides, in our scheme, the system only need to store a master secret key, and each user can select his own password freely. Instead of storing a password verification table inside the computer system, our method only has to store a corresponding table of identities, which is used by the computer system for validating the submitted passwords. Owing to this scheme the system can quickly and efficiently respond to any log-in attempt, and is suitable for real-time applications. Furthermore, in our scheme, the system does not need to reconstruct any term of the existing key table, when a new user is inserted into the system. Thus, our scheme is suitable for practical implementation. 相似文献
93.
Christensen M.G. Jakobsson A. Jensen S.H. 《IEEE transactions on audio, speech, and language processing》2007,15(5):1635-1644
In this paper, we present a novel method for joint estimation of the fundamental frequency and order of a set of harmonically related sinusoids based on the multiple signal classification (MUSIC) estimation criterion. The presented method, termed HMUSIC, is shown to have an efficient implementation using fast Fourier transforms (FFTs). Furthermore, refined estimates can be obtained using a gradient-based method. Illustrative examples of the application of the algorithm to real-life speech and audio signals are given, and the statistical performance of the estimator is evaluated using synthetic signals, demonstrating its good statistical properties. 相似文献
94.
Christensen AL Lundbye-Christensen S Dethlefsen C 《Computer methods and programs in biomedicine》2011,104(3):333-340
IntroductionSeveral statistical methods of assessing seasonal variation are available. Brookhart and Rothman [3] proposed a second-order moment-based estimator based on the geometrical model derived by Edwards [1], and reported that this estimator is superior in estimating the peak-to-trough ratio of seasonal variation compared with Edwards’ estimator with respect to bias and mean squared error. Alternatively, seasonal variation may be modelled using a Poisson regression model, which provides flexibility in modelling the pattern of seasonal variation and adjustments for covariates.MethodBased on a Monte Carlo simulation study three estimators, one based on the geometrical model, and two based on log-linear Poisson regression models, were evaluated in regards to bias and standard deviation (SD). We evaluated the estimators on data simulated according to schemes varying in seasonal variation and presence of a secular trend. All methods and analyses in this paper are available in the R package Peak2Trough [13].ResultsApplying a Poisson regression model resulted in lower absolute bias and SD for data simulated according to the corresponding model assumptions. Poisson regression models had lower bias and SD for data simulated to deviate from the corresponding model assumptions than the geometrical model.ConclusionThis simulation study encourages the use of Poisson regression models in estimating the peak-to-trough ratio of seasonal variation as opposed to the geometrical model. 相似文献
95.
96.
Suna Løwe Nielsen Birgitte Norlyk Poul Rind Christensen 《Creativity & Innovation Management》2018,27(3):358-369
The present study offers new input to the discussion of how entrepreneurship education and training programmes can be tailored to suit design professionals. To a large extent, existing entrepreneurship teaching for creative people is based on a traditional administrative management logic that often results in a clash between entrepreneurial demands and creative identities. The paper is based on the following rationale: the better we understand designers' reasoning and their struggles concerning becoming entrepreneurs, the better we are able to design entrepreneurship learning experiences that meet their needs. Since designers' career‐making tends to be highly driven by their strong sense of identity, the paper takes an identity perspective. The empirical foundation of the research is based on observation studies and phenomenological interviews conducted during an eight‐week entrepreneurship training program. Twenty‐five nascent design entrepreneurs with a professional background as designers participated in the voluntary programme. The paper offers novel and critical insights into designers' experiences of the entrepreneurial identity and reasoning as they participate in entrepreneurship training. 相似文献
97.
In an attempt to produce optical structures with a lower humidity sensitivity than that of structures deposited by conventional evaporation, we used r.f.-biased r.f. sputtering for the preparation of coatings. The sensitivity was effectively reduced owing to the high density of bias-sputtered films which are subjected to controlled ion bombardment during their growth. Our experiments suggest that neither rate monitoring nor optical monitoring is necessary, at least not in the preparation of simple structures with few layers, if glow discharge sputtering processes comprising r.f. substrate biasing in diode, triode or magnetron set-ups are used to deposit the coatings. 相似文献
98.
A Bloom filter is a space-efficient data structure used for probabilistic set membership testing. When testing an object for set membership, a Bloom filter may give a false positive. The analysis of the false positive rate is a key to understanding the Bloom filter and applications that use it. We show experimentally that the classic analysis for false positive rate is wrong. We formally derive a correct formula using a balls-and-bins model and show how to numerically compute the new, correct formula in a stable manner. We also prove that the new formula always results in a predicted greater false positive rate than the classic formula. This correct formula is numerically compared to the classic formula for relative error - for a small Bloom filter the prediction of false positive rate will be in error when the classic formula is used. 相似文献
99.
Henrik Bærbak Christensen Author Vitae Klaus Marius Hansen Author Vitae 《Journal of Systems and Software》2010,83(1):133-142
Architectural prototyping is the process of using executable code to investigate stakeholders’ software architecture concerns with respect to a system under development. Previous work has established this as a useful and cost-effective way of exploration and learning of the design space of a system and in addressing issues regarding quality attributes, architectural risks, and the problem of knowledge transfer and conformance. However, the actual industrial use of architectural prototyping has not been thoroughly researched so far. In this article, we report from three studies of architectural prototyping in practice. First, we report findings from an ethnographic study of practicing software architects. Secondly, we report from a focus group on architectural prototyping involving architects from four companies. And, thirdly, we report from a survey study of 20 practicing software architects and software developers. Our findings indicate that architectural prototyping plays an important and frequent role in resolving problems experimentally, but less so in exploring alternative solutions. Furthermore, architectural prototypes include end-user or business related functionality rather than purely architectural functionality. Based on these observations we provide recommendations for effective industrial architectural prototyping. 相似文献
100.
Christensen JK Lamberth K Nielsen M Lundegaard C Worning P Lauemøller SL Buus S Brunak S Lund O 《Neural computation》2003,15(12):2931-2942
Strategies for selecting informative data points for training prediction algorithms are important, particularly when data points are difficult and costly to obtain. A Query by Committee (QBC) training strategy for selecting new data points uses the disagreement between a committee of different algorithms to suggest new data points, which most rationally complement existing data, that is, they are the most informative data points. In order to evaluate this QBC approach on a real-world problem, we compared strategies for selecting new data points. We trained neural network algorithms to obtain methods to predict the binding affinity of peptides binding to the MHC class I molecule, HLA-A2. We show that the QBC strategy leads to a higher performance than a baseline strategy where new data points are selected at random from a pool of available data. Most peptides bind HLA-A2 with a low affinity, and as expected using a strategy of selecting peptides that are predicted to have high binding affinities also lead to more accurate predictors than the base line strategy. The QBC value is shown to correlate with the measured binding affinity. This demonstrates that the different predictors can easily learn if a peptide will fail to bind, but often conflict in predicting if a peptide binds. Using a carefully constructed computational setup, we demonstrate that selecting peptides with a high QBC performs better than low QBC peptides independently from binding affinity. When predictors are trained on a very limited set of data they cannot be expected to disagree in a meaningful way and we find a data limit below which the QBC strategy fails. Finally, it should be noted that data selection strategies similar to those used here might be of use in other settings in which generation of more data is a costly process. 相似文献