全文获取类型
收费全文 | 1503篇 |
免费 | 53篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 14篇 |
综合类 | 1篇 |
化学工业 | 224篇 |
金属工艺 | 26篇 |
机械仪表 | 40篇 |
建筑科学 | 78篇 |
矿业工程 | 4篇 |
能源动力 | 24篇 |
轻工业 | 164篇 |
水利工程 | 10篇 |
石油天然气 | 1篇 |
武器工业 | 2篇 |
无线电 | 98篇 |
一般工业技术 | 251篇 |
冶金工业 | 426篇 |
原子能技术 | 5篇 |
自动化技术 | 190篇 |
出版年
2022年 | 13篇 |
2021年 | 15篇 |
2020年 | 11篇 |
2019年 | 18篇 |
2018年 | 24篇 |
2017年 | 19篇 |
2016年 | 21篇 |
2015年 | 21篇 |
2014年 | 41篇 |
2013年 | 68篇 |
2012年 | 39篇 |
2011年 | 65篇 |
2010年 | 50篇 |
2009年 | 51篇 |
2008年 | 69篇 |
2007年 | 65篇 |
2006年 | 44篇 |
2005年 | 45篇 |
2004年 | 39篇 |
2003年 | 39篇 |
2002年 | 33篇 |
2001年 | 25篇 |
2000年 | 29篇 |
1999年 | 32篇 |
1998年 | 96篇 |
1997年 | 77篇 |
1996年 | 69篇 |
1995年 | 29篇 |
1994年 | 34篇 |
1993年 | 34篇 |
1992年 | 12篇 |
1991年 | 10篇 |
1990年 | 14篇 |
1989年 | 11篇 |
1988年 | 15篇 |
1987年 | 16篇 |
1986年 | 18篇 |
1985年 | 15篇 |
1984年 | 16篇 |
1983年 | 17篇 |
1982年 | 9篇 |
1981年 | 15篇 |
1980年 | 15篇 |
1979年 | 18篇 |
1978年 | 10篇 |
1977年 | 20篇 |
1976年 | 26篇 |
1975年 | 9篇 |
1974年 | 13篇 |
1973年 | 14篇 |
排序方式: 共有1558条查询结果,搜索用时 15 毫秒
31.
Yan Wang Kwei-Jay Lin Duncan S. Wong Vijay Varadharajan 《Service Oriented Computing and Applications》2009,3(2):129-146
In service-oriented computing (SOC) environments, service clients interact with service providers for services or transactions.
From the point view of service clients, the trust status of a service provider is a critical issue to consider, particularly
when the service provider is unknown to them. Typically, the trust evaluation is based on the feedback on the service quality
provided by service clients. In this paper, we first present a trust management framework that is event-driven and rule-based.
In this framework, trust computation is based on formulae. But rules are defined to determine which formula to use and what
arguments to use, according to the event occurred during the transaction or service. In addition, we propose some trust evaluation
metrics and a formula for trust computation. The formula is designed to be adaptable to different application domains by setting
suitable arguments. Particularly, the proposed model addresses the incremental characteristics of trust establishment process.
Furthermore, we propose a fuzzy logic based approach for determining reputation ranks that particularly differentiates new
service providers and old (long-existing) ones. This is further incentive to new service providers and penalize poor quality
services from service providers. Finally, a set of empirical studies has been conducted to study the properties of the proposed
approaches, and the method to control the trust changes in both trust increment and decrement cases. The proposed framework
is adaptable for different domains and complex trust evaluation systems.
相似文献
Vijay VaradharajanEmail: |
32.
Farrugia Russell Portelli Barnaby Grech Ivan Camilleri Duncan Casha Owen Micallef Joseph Gatt Edward 《Microsystem Technologies》2022,28(6):1451-1465
Microsystem Technologies - The maximum scan angle amplitude of resonating micro-mirrors, intended for micro-projection display applications is limited by air damping. Three-dimensional transient... 相似文献
33.
Xiaoying Cheng Xuyang Cao Zhenyu Wu Zhiping Ying Duncan Camilleri Xudong Hu 《Advanced Engineering Materials》2023,25(19):2300341
Carbon fiber-reinforced polymer (CFRP) materials are widely applied in various areas as key structure components. The structural health monitoring of the CFRP components is crucial to prevent catastrophic failure. However, the nonplane surfaces of CFRP components hinder the attaching of monitoring sensors with hard substrates. Therefore, the substrate conditions for sensor preparation are mainly considered in this study. To adapt the proposed sensors to the curved substrate, including nondevelopable surfaces, electrospinning method is used to prepare conformal piezoresistive fiber films, in which polymethyl methacrylate is served as the matrix and carbon nanotubes are utilized as the conductive filler. The piezoresistive fibers covered on CFRP substrates have a gauge factor up to 207.95 and can response to the strain less than 0.05%. Moreover, the sensor also has high durability and the ability to follow the dynamic excitation signals with as high as 50 Hz. 相似文献
34.
GH Gilbert RP Duncan MW Heft TA Dolan WB Vogel 《Canadian Metallurgical Quarterly》1998,36(7):988-1001
OBJECTIVES: An understanding of the validity and usefulness of self-reported measures (as distinct from clinically determined measures) of oral health is emerging. These self-reported measures include self-rated oral health (SROH). Three objectives were to: (1) describe self-rated oral health in dentate adults, (2) quantify associations between self-rated oral health and other measures of oral health (oral disease and tissue damage, pain and discomfort, functional limitation, and disadvantage), and (3) assess the construct validity of a model of oral health proposed herein. METHODS: The Florida Dental Care Study is a longitudinal study of oral health, which included at baseline 873 subjects who had at least one tooth, were 45 years or older, and who participated for an interview and clinical examination. RESULTS: The prevalence of self-rated oral health decrements was substantial; approximately one fourth of subjects reported their oral health as only fair or poor. Bivariate and multivariate results provided consistent evidence of the construct validity of the proposed model of oral health. Additionally, the salience of one measure of dental appearance suggests that persons may use esthetic cues when rating their oral health. CONCLUSIONS: The proposed multidimensional model of oral health has construct validity. Self-rated oral health is affected by oral disease and tissue damage, oral pain and discomfort, oral functional limitation, and oral disadvantage. These self-reported measures and the proposed model should provide useful information for dental care effectiveness research. General health status has been disaggregated into the "physical" and the "mental;" an additional separation into the "oral" aspects of health seems warranted. 相似文献
35.
The gradual reorientations in crystal geometry encountered during angle-multiplexed holographic recording with obliquely incident recording beams can create significant parametric exposure-time and recording-angle dependencies in both grating writing- and erasure-time constants. We present a parametric extension of the classically derived backward-recursion algorithm that compensates for the intermingling effects of recording geometry, writing-beam intensity variations, and unique crystal behavior. We present experimental data for a sequence of 301 holograms recorded with the goal of equal hologram strength and, separately, the same sequence recorded with the goal of equal hologram reconstruction intensity-which are different cases for a steeply incident readout beam. 相似文献
36.
R. V. Duncan P. K. Day S. S. McCready W. A. Moeur F-C. Liu D. A. Sergatskov 《Journal of Low Temperature Physics》1998,113(5-6):861-866
We have recently observed nonlinear heat transport within 30 nK of the superfluid transition temperature using heat flux, Q, in the range 0.1 < Q < 2 erg/(s cm
2
). While Haussmann and Dohm (HD) accurately predict the initial departure of the thermal conductivity, , from the linear response region, is greater than expected very close to T
. We anticipate that the nature of the thermal conductivity's nonlinearity may depend upon Earth's gravity in the low heat flux limit (Q < 0.5 erg/(s cm
2
)). Comparison of our data to similar data to be taken in a microgravity laboratory will provide an experimental determination of the effect of gravity on nonlinear heat transport near the superfluid transition. The microgravity measurements will also permit the first experimental test of theories that do not consider gravitational effects, such as those by HD. 相似文献
37.
JD Reveille GS Alarcón SE Fowler SR Pillemer R Neuner DO Clegg IS Mikhail DE Trentham JC Leisen G Bluhm SM Cooper H Duncan M Tuttleman SP Heyse JT Sharp B Tilley 《Canadian Metallurgical Quarterly》1996,39(11):1802-1807
OBJECTIVE: To examine the effect of alleles encoding the "shared"/"rheumatoid" epitope on rheumatoid arthritis (RA) disease severity in patients who participated in the minocycline in RA (MIRA) trial. METHODS: Of 205 patients with a week-48 visit, blood was available for typing of HLA-DRB1 and HLA-DQB1 in 174 (85%) and successfully completed in 169 (82%). Baseline erosions were used to assess disease severity and new erosions at the last visit served as a proxy for progression. RESULTS: At baseline, there was no association between the presence of erosive disease or rheumatoid factor status and the dose of rheumatoid epitope (homozygous, heterozygous, none) or the specific alleles identified. At the final visit, a gradient was observed for the 3 allelic subgroups (and their gene doses) in the occurrence of new erosions among the Caucasian placebo-treated, but not the minocycline-treated, patients. A treatment group/HLA-DR4 epitope interaction was demonstrated in multivariate analyses. Approximately two-thirds of African-American patients did not have the rheumatoid epitope. CONCLUSION: HLA-DRB1 oligotyping may be useful in predicting the progression of disease in some Caucasian patients. Our study corroborates the infrequency of the epitope among African-American patients with RA. 相似文献
38.
C. Melody Carswell Cindy H. Lio Martina I. Klein Duncan Clarke Stephen Strup 《Applied ergonomics》2010,42(1):138-145
Introduction
Subjective workload measures are usually administered in a visual-manual format, either electronically or by paper and pencil. However, vocal responses to spoken queries may sometimes be preferable, for example when experimental manipulations require continuous manual responding or when participants have certain sensory/motor impairments. In the present study, we evaluated the acceptability of the hands-free administration of two subjective workload questionnaires - the NASA Task Load Index (NASA-TLX) and the Multiple Resources Questionnaire (MRQ) - in a surgical training environment where manual responding is often constrained.Method
Sixty-four undergraduates performed fifteen 90-s trials of laparoscopic training tasks (five replications of 3 tasks - cannulation, ring transfer, and rope manipulation). Half of the participants provided workload ratings using a traditional paper-and-pencil version of the NASA-TLX and MRQ; the remainder used a vocal (hands-free) version of the questionnaires. A follow-up experiment extended the evaluation of the hands-free version to actual medical students in a Minimally Invasive Surgery (MIS) training facility.Results
The NASA-TLX was scored in 2 ways - (1) the traditional procedure using participant-specific weights to combine its 6 subscales, and (2) a simplified procedure - the NASA Raw Task Load Index (NASA-RTLX) - using the unweighted mean of the subscale scores. Comparison of the scores obtained from the hands-free and written administration conditions yielded coefficients of equivalence of r = 0.85 (NASA-TLX) and r = 0.81 (NASA-RTLX). Equivalence estimates for the individual subscales ranged from r = 0.78 (“mental demand”) to r = 0.31 (“effort”). Both administration formats and scoring methods were equally sensitive to task and repetition effects. For the MRQ, the coefficient of equivalence for the hands-free and written versions was r = 0.96 when tested on undergraduates. However, the sensitivity of the hands-free MRQ to task demands (ηpartial2 = 0.138) was substantially less than that for the written version (ηpartial2 = 0.252). This potential shortcoming of the hands-free MRQ did not seem to generalize to medical students who showed robust task effects when using the hands-free MRQ (ηpartial2 = 0.396). A detailed analysis of the MRQ subscales also revealed differences that may be attributable to a “spillover” effect in which participants’ judgments about the demands of completing the questionnaires contaminated their judgments about the primary surgical training tasks.Conclusion
Vocal versions of the NASA-TLX are acceptable alternatives to standard written formats when researchers wish to obtain global workload estimates. However, care should be used when interpreting the individual subscales if the object is to make comparisons between studies or conditions that use different administration modalities. For the MRQ, the vocal version was less sensitive to experimental manipulations than its written counterpart; however, when medical students rather than undergraduates used the vocal version, the instrument’s sensitivity increased well beyond that obtained with any other combination of administration modality and instrument in this study. Thus, the vocal version of the MRQ may be an acceptable workload assessment technique for selected populations, and it may even be a suitable substitute for the NASA-TLX. 相似文献39.
Tomás Sánchez López Damith Chinthana Ranasinghe Bela Patkai Duncan McFarlane 《Information Systems Frontiers》2011,13(2):281-300
Deployment of embedded technologies is increasingly being examined in industrial supply chains as a means for improving efficiency
through greater control over purchase orders, inventory and product related information. Central to this development has been
the advent of technologies such as bar codes, Radio Frequency Identification (RFID) systems, and wireless sensors which when
attached to a product, form part of the product’s embedded systems infrastructure. The increasing integration of these technologies
dramatically contributes to the evolving notion of a “smart product”, a product which is capable of incorporating itself into
both physical and information environments. The future of this revolution in objects equipped with smart embedded technologies
is one in which objects can not only identify themselves, but can also sense and store their condition, communicate with other
objects and distributed infrastructures, and take decisions related to managing their life cycle. The object can essentially
“plug” itself into a compatible systems infrastructure owned by different partners in a supply chain. However, as in any development
process that will involve more than one end user, the establishment of a common foundation and understanding is essential
for interoperability, efficient communication among involved parties and for developing novel applications. In this paper,
we contribute to creating that common ground by providing a characterization to aid the specification and construction of
“smart objects” and their underlying technologies. Furthermore, our work provides an extensive set of examples and potential
applications of different categories of smart objects. 相似文献
40.
Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model 总被引:1,自引:0,他引:1
下载免费PDF全文
![点击此处可从《计算机科学技术学报》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Despite the large number of certificateless encryption schemes proposed recently, many of them have been found insecure under
a practical attack, called malicious-but-passive KGC (Key Generation Center) attack. In this work we propose the first generic construction of certificateless encryption, which can be proven secure against malicious-but-passive KGC attacks in the standard
model. In order to encrypt a message of any length, we consider the KEM/DEM (key encapsulation mechanism/data encapsulation
mechanism) framework in the certificateless setting, and propose a generic construction of certificateless key encapsulation mechanism (CL-KEM) secure against malicious-but-passive KGC attacks in
the standard model. It is based on an identity-based KEM, a public key encryption and a message authentication code. The high
efficiency of our construction is due to the efficient implementations of these underlying building blocks, and is comparable
to Bentahar et al.’s CL-KEMs, which have only been proven secure under the random oracle model with no consideration of the malicious-but-passive
KGC attack. We also introduce the notion of certificateless tag-based KEM (CL-TKEM), which is an extension of Abe et al.’ s work to the certificateless setting. We show that an efficient CL-TKEM can be constructed by modifying our CL-KEM scheme.
We also show that with a CL-TKEM and a data encapsulation mechanism secure under our proposed security model, an efficient
certificateless hybrid encryption can be constructed by applying Abe et al.'s transformation in the certificateless setting. 相似文献