全文获取类型
收费全文 | 2850篇 |
免费 | 28篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 3篇 |
综合类 | 1篇 |
化学工业 | 157篇 |
金属工艺 | 13篇 |
机械仪表 | 10篇 |
建筑科学 | 14篇 |
能源动力 | 10篇 |
轻工业 | 72篇 |
水利工程 | 2篇 |
石油天然气 | 8篇 |
武器工业 | 1篇 |
无线电 | 169篇 |
一般工业技术 | 105篇 |
冶金工业 | 2211篇 |
自动化技术 | 105篇 |
出版年
2023年 | 5篇 |
2022年 | 7篇 |
2021年 | 9篇 |
2020年 | 6篇 |
2019年 | 11篇 |
2018年 | 17篇 |
2017年 | 8篇 |
2016年 | 17篇 |
2015年 | 13篇 |
2014年 | 26篇 |
2013年 | 41篇 |
2012年 | 29篇 |
2011年 | 23篇 |
2010年 | 24篇 |
2009年 | 31篇 |
2008年 | 30篇 |
2007年 | 15篇 |
2006年 | 25篇 |
2005年 | 29篇 |
2004年 | 28篇 |
2003年 | 20篇 |
2002年 | 20篇 |
2001年 | 13篇 |
2000年 | 19篇 |
1999年 | 82篇 |
1998年 | 668篇 |
1997年 | 385篇 |
1996年 | 282篇 |
1995年 | 172篇 |
1994年 | 133篇 |
1993年 | 138篇 |
1992年 | 34篇 |
1991年 | 41篇 |
1990年 | 31篇 |
1989年 | 49篇 |
1988年 | 48篇 |
1987年 | 43篇 |
1986年 | 29篇 |
1985年 | 43篇 |
1984年 | 11篇 |
1983年 | 11篇 |
1982年 | 16篇 |
1981年 | 20篇 |
1980年 | 18篇 |
1978年 | 8篇 |
1977年 | 44篇 |
1976年 | 93篇 |
1975年 | 4篇 |
1972年 | 2篇 |
1955年 | 1篇 |
排序方式: 共有2881条查询结果,搜索用时 31 毫秒
101.
102.
Lee Connie M. S. Fong Kenneth N. K. Mok Maggie M. Y. Lam M. K. Kung Y. Chan Paven P. W. Ma Maggie K. M. Lui S. L. Kwan Lorraine P. Y. Chu W. L. Hui P. C. Yau Christina S. F. Kwan Ivan W. L. Chan Kelsey Y. M. Chan T. M. 《Virtual Reality》2023,27(3):1571-1583
Virtual Reality - Cognitive impairment is not uncommon in patients with end-stage renal disease and can make it more difficult for these patients to carry out peritoneal dialysis (PD) on their own.... 相似文献
103.
In mean–variance (M–V) analysis, an investor with a holding period [0,T] operates in a two-dimensional space—one is the mean and the other is the variance. At time 0, he/she evaluates alternative portfolios based on their means and variances, and holds a combination of the market portfolio (e.g., an index fund) and the risk-free asset to maximize his/her expected utility at time T. In our continuous-time model, we operate in a three-dimensional space—the first is the spot rate, the second is the expected return on the risky asset (e.g., an index fund), and the third is time. At various times over [0,T], we determine, for each combination of the spot rate and expected return, the optimum fractions invested in the risky and risk-free assets to maximize our expected utility at time T. Hence, unlike those static M–V models, our dynamic model allows investors to trade at any time in response to changes in the market conditions and the length of their holding period. Our results show that (1) the optimum fraction y*(t) in the risky asset increases as the expected return increases but decreases as the spot rate increases; (2) y*(t) decreases as the holding period shortens; and (3) y*(t) decreases as the risk aversion parameter-γ is larger. 相似文献
104.
In this paper, a novel clustering method in the kernel space is proposed. It effectively integrates several existing algorithms to become an iterative clustering scheme, which can handle clusters with arbitrary shapes. In our proposed approach, a reasonable initial core for each of the cluster is estimated. This allows us to adopt a cluster growing technique, and the growing cores offer partial hints on the cluster association. Consequently, the methods used for classification, such as support vector machines (SVMs), can be useful in our approach. To obtain initial clusters effectively, the notion of the incomplete Cholesky decomposition is adopted so that the fuzzy c‐means (FCM) can be used to partition the data in a kernel defined‐like space. Then a one‐class and a multiclass soft margin SVMs are adopted to detect the data within the main distributions (the cores) of the clusters and to repartition the data into new clusters iteratively. The structure of the data set is explored by pruning the data in the low‐density region of the clusters. Then data are gradually added back to the main distributions to assure exact cluster boundaries. Unlike the ordinary SVM algorithm, whose performance relies heavily on the kernel parameters given by the user, the parameters are estimated from the data set naturally in our approach. The experimental evaluations on two synthetic data sets and four University of California Irvine real data benchmarks indicate that the proposed algorithms outperform several popular clustering algorithms, such as FCM, support vector clustering (SVC), hierarchical clustering (HC), self‐organizing maps (SOM), and non‐Euclidean norm fuzzy c‐means (NEFCM). © 2009 Wiley Periodicals, Inc.4 相似文献
105.
Man-Wai?MakEmail author Chin-Hung?Sit Sun-Yuan?Kung 《International Journal of Speech Technology》2005,8(1):67-77
The ETSI has recently published a front-end processing standard for distributed speech recognition systems. The key idea of the standard is to extract the spectral features of speech signals at the front-end terminals so that acoustic distortion caused by communication channels can be avoided. This paper investigates the effect of extracting spectral features from different stages of the front-end processing on the performance of distributed speaker verification systems. A technique that combines handset selectors with stochastic feature transformation is also employed in a back-end speaker verification system to reduce the acoustic mismatch between different handsets. Because the feature vectors obtained from the back-end server are vector quantized, the paper proposes two approaches to adding Gaussian noise to the quantized feature vectors for training the Gaussian mixture speaker models. In one approach, the variances of the Gaussian noise are made dependent on the codeword distance. In another approach, the variances are a function of the distance between some unquantized training vectors and their closest code vector. The HTIMIT corpus was used in the experiments and results based on 150 speakers show that stochastic feature transformation can be added to the back-end server for compensating transducer distortion. It is also found that better verification performance can be achieved when the LMS-based blind equalization in the standard is replaced by stochastic feature transformation. 相似文献
106.
Mohammad Sabzinejad Farash SK Hafizul Islam Mohammad S. Obaidat 《Concurrency and Computation》2015,27(17):4897-4913
Password‐based two‐party authenticated key exchange (2PAKE) protocol enables two or more entities, who only share a low‐entropy password between them, to authenticate each other and establish a high‐entropy secret session key. Recently, Zheng et al. proposed a password‐based 2PAKE protocol based on bilinear pairings and claimed that their protocol is secure against the known security attacks. However, in this paper, we indicate that the protocol of Zheng et al. is insecure against the off‐line password guessing attack, which is a serious threat to such protocols. Consequently, we show that an attacker who obtained the users' password by applying the off‐line password guessing attack can easily obtain the secret session key. In addition, the protocol of Zheng et al. does not provide the forward secrecy of the session key. As a remedy, we also improve the protocol of Zheng et al. and prove the security of our enhanced protocol in the random oracle model. The simulation result shows that the execution time of our 2PAKE protocol is less compared with other existing protocols. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
107.
7,8-Dichloro-1,2,3,4-tetrahydroisoquinoline (DCTQ) (50 mg/kg i.p.) antagonized the inactivation of MAO by pargyline as measured by direct enzyme assays in brain homogenates and by accumulation of hypothalamic catecholamines. These findings lend credence to the earlier interpretation that changes in brain concentrations of biogenic amines and their metabolites in DCTQ-treated rats were due at least in part to MAO inhibition. 相似文献
108.
A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem 总被引:1,自引:0,他引:1
Recently, Yang and Chang proposed an identity-based remote login scheme using elliptic curve cryptography for the users of mobile devices. We have analyzed the security aspects of the Yang and Chang's scheme and identified some security flaws. Also two improvements of the Yang and Chang's scheme have been proposed recently, however, it has been found that the schemes have similar security flaws as in the Yang and Chang's scheme. In order to remove the security pitfalls of the Yang and Chang and the subsequent schemes, we proposed an enhanced remote user mutual authentication scheme that uses elliptic curve cryptography and identity-based cryptosystem with three-way challenge-response handshake technique. It supports flawless mutual authentication of participants, agreement of session key and the leaked key revocation capability. In addition, the proposed scheme possesses low power consumption, low computation cost and better security attributes. As a result, the proposed scheme seems to be more practical and suitable for mobile users for secure Internet banking, online shopping, online voting, etc. 相似文献
109.
To clarify the role of carbon impurities in the formation of oxygen precipitates, the behavior of CZ silicon wafers with varying carbon concentrations from 0.2 ppm to 2 ppm were studied under different heat treatment conditions. It is found that the rate of reduction in interstitial oxygen is not a function of carbon concentration as reported previously for both the cases of medium and low temperature annealing. Under medium temperature (1050°C) annealing no carbon reduction was detected, even though the reduction in interstitial oxygen can be very large, while with low temperature (750°C) annealing, oxygen reduction is always associated with the carbon reduction, but is not dependent on carbon concentration alone. A heterogenous precipitation model is presented to explain the observed phenomena. 相似文献
110.
The two-level hierarchical control scheme is adopted to solve a dual-chain robotic system formed by two redundant manipulators grasping a common object with hard point contacts. The upper-level coordinator gathers all the necessary information to resolve the force distribution problem so as to generate all the desired contact forces With all the desired contact forces being specified, the dynamics of each chain are decoupled. Therefore, the lower-level local control problem can be treated as a general open-chain redundant manipulator problem. Furthermore, the Compact-Dual LP method is applied to resolve the upper-level coordination problem; while the Compact QP method associated with the computed torque control method is adopted to solve the redundant manipulator problem. To obtain proper simulation results, the simulated actual contact forces are formulated and the corresponding simulation problem of the closed-chain robotic system is also completely solved in the article. Simulation results show that the two-level hierarchical control scheme is an effective and efficient algorithm for resolving the large-scale control problem of multiple-chain robotic systems. © 1995 John Wiley & Sons, Inc. 相似文献