全文获取类型
收费全文 | 1974篇 |
免费 | 96篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 22篇 |
综合类 | 5篇 |
化学工业 | 489篇 |
金属工艺 | 30篇 |
机械仪表 | 39篇 |
建筑科学 | 120篇 |
矿业工程 | 32篇 |
能源动力 | 37篇 |
轻工业 | 154篇 |
水利工程 | 29篇 |
石油天然气 | 4篇 |
无线电 | 142篇 |
一般工业技术 | 310篇 |
冶金工业 | 147篇 |
原子能技术 | 5篇 |
自动化技术 | 511篇 |
出版年
2023年 | 20篇 |
2022年 | 25篇 |
2021年 | 59篇 |
2020年 | 28篇 |
2019年 | 26篇 |
2018年 | 59篇 |
2017年 | 51篇 |
2016年 | 79篇 |
2015年 | 69篇 |
2014年 | 80篇 |
2013年 | 98篇 |
2012年 | 111篇 |
2011年 | 134篇 |
2010年 | 79篇 |
2009年 | 120篇 |
2008年 | 103篇 |
2007年 | 91篇 |
2006年 | 100篇 |
2005年 | 69篇 |
2004年 | 64篇 |
2003年 | 46篇 |
2002年 | 53篇 |
2001年 | 31篇 |
2000年 | 28篇 |
1999年 | 35篇 |
1998年 | 33篇 |
1997年 | 36篇 |
1996年 | 37篇 |
1995年 | 38篇 |
1994年 | 30篇 |
1993年 | 20篇 |
1992年 | 15篇 |
1991年 | 17篇 |
1990年 | 13篇 |
1989年 | 6篇 |
1988年 | 8篇 |
1987年 | 14篇 |
1985年 | 14篇 |
1984年 | 12篇 |
1983年 | 12篇 |
1982年 | 5篇 |
1981年 | 9篇 |
1980年 | 9篇 |
1979年 | 7篇 |
1978年 | 11篇 |
1977年 | 6篇 |
1976年 | 12篇 |
1975年 | 8篇 |
1973年 | 4篇 |
1971年 | 6篇 |
排序方式: 共有2076条查询结果,搜索用时 203 毫秒
71.
Bernhard Klinger 《Computing》1997,59(3):223-236
We investigate quasi-Monte Carlo integration for functions on thes-dimensional unit cube having point singularities. Error bounds are proved and the theoretical results are verified by computations
using Halton, Sobol’ and Niederreiter sequences.
Supported by the Austrian Science Foundation (Project 10223-PHY). 相似文献
72.
In a vehicle tracking system computers aboard moving vehicles determine periodically their geographical position and transmit it to a control center. This paper presents a commercial vehicle tracking system as an example of a distributed real-time system with mobile components and focuses on the issue of clock synchronization. The mobile components of the system obtain highly accurate timing information from the Global Positioning System which is used to synchronize their local clocks to UTC world time. Thus a tight clock synchronization is achieved without imposing additional load on the communication channels of the system. 相似文献
73.
Sabine Anderweit Christoph Licht Angela Kribs Christiane Woopen Klaus Bergdolt Prof. Dr. Bernhard Roth 《Ethik in der Medizin》2004,16(1):37-47
Definition of the problem: Physicians and nurses who work in neonatology—as in intensive care at all—are often forced to decide whether to stop or to continue with the treatment of a severely ill patient. The literature provides several decision making instruments, which are meant to help and to rationalize such decisions. Method and conclusion: Two of these instruments (“Schema zur ethischen Urteilsbildung nach dem Muster der aristotelischen Ethik”, Honnefelder 1994; “Nimwegener Methode für ethische Fallbesprechung”, Gordijn 1998) were tested by retrospectively examining two cases of our NICU. Results of our study show that the use of a decision making instrument is basically helpful. But the above mentioned instruments showed also shortcomings when used in the framework of neonatology. Therefore we developed the “Kölner Arbeitsbogen zur ethischen Entscheidungsfindung in der Neonatologie”, which is adapted to the specific needs of neonatology. 相似文献
74.
Marc Rennhard Sandro Rafaeli Laurent Mathy Bernhard Plattner David Hutchison 《Electronic Commerce Research》2004,4(1-2):83-111
The lack of privacy is one of the main reasons that limits trust in e-commerce. Current e-commerce practice enforces a customer to disclose her identity to the e-shop and the use of credit cards makes it straightforward for an e-shop to know the real identity of its customers. Although there are some payment systems based on untraceable tokens, they are not as widely used as credit cards. Furthermore, even without buying anything, a customer is already disclosing some information about who or where she may be by just connecting to the e-shop's web server and leaving behind an IP-address. In this paper, we present novel components that enable secure pseudonymous e-commerce. On the one hand, these components allow a customer to browse through an e-shop, select goods, and pay the goods with her credit card such that neither the e-shop operator nor the credit card issuer nor an eavesdropper is able to get any information about the customer's identity. On the other hand, it is guaranteed that none of the involved parties is able to act dishonestly during the credit card payment. Such a system could greatly enhance trust in e-commerce since it overcomes the customers' privacy concerns. 相似文献
75.
Lars Wittmaack Bernhard Esslinger Ludger Schmidt Benjamin Strenge Arno Wacker 《Datenschutz und Datensicherheit - DuD》2016,40(5):271-277
Der ?elektronische Brief“ bzw. die elektronische Mail (E-Mail) ist seit über 30 Jahren im privaten wie beruflichen Umfeld im Einsatz. Behörden, Steuerbüros, Krankenhäuser, Finanzinstitute und viele weitere Gruppen versenden und empfangen E-Mails, um Informationen auszutauschen. Innerhalb kurzer Zeit findet eine E-Mail ihren Weg vom Sender in Deutschland zum Empfänger in beispielsweise den USA. Wie funktioniert das? Und was hat es mit E-Mail-Verschlüsselung auf sich? Dieser Artikel betrachtet die grundlegende technische Funktionsweise der E-Mail sowie Hintergründe und Funktionsweise der Verschlüsselung mit S/MIME und PGP. 相似文献
76.
This article reports the design concept of a novel acoustic beam aperture modifier using butt-jointed gradient-index phononic crystals (GRIN PCs) consisting of steel cylinders embedded in a homogeneous epoxy background. By gradually tuning the period of a GRIN PC, the propagating direction of acoustic waves can be continuously bent to follow a sinusoidal trajectory in the structure. The aperture of an acoustic beam can therefore be shrunk or expanded through change of the gradient refractive index profiles of the butt-jointed GRIN PCs. Our computational results elucidate the effectiveness of the proposed acoustic beam aperture modifier. Such an acoustic device can be fabricated through a simple process and will be valuable in applications, such as biomedical imaging and surgery, nondestructive evaluation, communication, and acoustic absorbers. 相似文献
77.
78.
Andreas Haider Michael Reitberger Jürgen Leßlhumer Bernhard Plank Ulrich Müller 《Holz als Roh- und Werkstoff》2014,72(6):815-823
This article deals with the differences in the long-term durability and thermal stability under load of terrace deckings from various materials. The tested materials were deckings made of wood, thermally modified timber (TMT), and wood–polymer–composites (WPC). For the determination of the test temperatures for component testing according to EN 310, the surface temperatures of the decks during a normal hot summer day were measured. A cyclic test according to EN 321 was applied to all decking materials. Afterwards the component testing was repeated. All wooden samples reveal considerable cracks, some were twisted, and few were even broken. In particular regarding the optical appearance, wood decks show advantages against the TMT decks. Some WPC decks show very fine cracks on the face, which were additionally analyzed by means of X-ray computed tomography (CT). Except for the WPC deck with higher wood content, no WPC deck revealed significant changes after the cyclic test. The CT analysis was also suitable to find cracks inside the materials and illustrate them. Thus, the whole damage inside a sample could be characterized by calculating a kind of error pattern. No considerable cracks or failures could be observed on the WPC decks. 相似文献
79.
Dr. Lisa C. Kühnel Dr. Bettina M. Nestl Prof. Dr. Bernhard Hauer 《Chembiochem : a European journal of chemical biology》2017,18(22):2222-2225
Squalene–hopene cyclases (SHCs) catalyze the polycyclization of squalene into a mixture of hopene and hopanol. Recently, amino-acid residues lining the catalytic cavity of the SHC from Alicyclobacillus acidocaldarius were replaced by small and large hydrophobic amino acids. The alteration of leucine 607 to phenylalanine resulted in increased enzymatic activity towards the formation of an intermolecular farnesyl–farnesyl ether product from farnesol. Furthermore, the addition of small-chain alcohols acting as nucleophiles led to the formation of non-natural ether-linked terpenoids and, thus, to significant alteration of the product pattern relative to that obtained with the wild type. It is proposed that the mutation of leucine at position 607 may facilitate premature quenching of the intermediate by small alcohol nucleophiles. This mutagenesis-based study opens the field for further intermolecular bond-forming reactions and the generation of non-natural products. 相似文献
80.
D. Bernhard G. Fuchsbauer E. Ghadafi N. P. Smart B. Warinschi 《International Journal of Information Security》2013,12(3):219-249
This paper is motivated by the observation that existing security models for direct anonymous attestation (DAA) have problems to the extent that insecure protocols may be deemed secure when analysed under these models. This is particularly disturbing as DAA is one of the few complex cryptographic protocols resulting from recent theoretical advances actually deployed in real life. Moreover, standardization bodies are currently looking into designing the next generation of such protocols. Our first contribution is to identify issues in existing models for DAA and explain how these errors allow for proving security of insecure protocols. These issues are exhibited in all deployed and proposed DAA protocols (although they can often be easily fixed). Our second contribution is a new security model for a class of “pre-DAA scheme”, that is, DAA schemes where the computation on the user side takes place entirely on the trusted platform. Our model captures more accurately than any previous model the security properties demanded from DAA by the trusted computing group (TCG), the group that maintains the DAA standard. Extending the model from pre-DAA to full DAA is only a matter of refining the trust models on the parties involved. Finally, we present a generic construction of a DAA protocol from new building blocks tailored for anonymous attestation. Some of them are new variations on established ideas and may be of independent interest. We give instantiations for these building blocks that yield a DAA scheme more efficient than the one currently deployed, and as efficient as the one about to be standardized by the TCG which has no valid security proof. 相似文献