全文获取类型
收费全文 | 1266篇 |
免费 | 38篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 16篇 |
综合类 | 2篇 |
化学工业 | 173篇 |
金属工艺 | 22篇 |
机械仪表 | 24篇 |
建筑科学 | 53篇 |
矿业工程 | 4篇 |
能源动力 | 26篇 |
轻工业 | 181篇 |
水利工程 | 6篇 |
石油天然气 | 5篇 |
无线电 | 152篇 |
一般工业技术 | 132篇 |
冶金工业 | 358篇 |
原子能技术 | 12篇 |
自动化技术 | 140篇 |
出版年
2023年 | 5篇 |
2021年 | 13篇 |
2020年 | 8篇 |
2019年 | 7篇 |
2018年 | 19篇 |
2017年 | 22篇 |
2016年 | 16篇 |
2015年 | 20篇 |
2014年 | 26篇 |
2013年 | 43篇 |
2012年 | 42篇 |
2011年 | 68篇 |
2010年 | 53篇 |
2009年 | 40篇 |
2008年 | 43篇 |
2007年 | 45篇 |
2006年 | 50篇 |
2005年 | 28篇 |
2004年 | 33篇 |
2003年 | 33篇 |
2002年 | 22篇 |
2001年 | 16篇 |
2000年 | 19篇 |
1999年 | 30篇 |
1998年 | 99篇 |
1997年 | 64篇 |
1996年 | 53篇 |
1995年 | 32篇 |
1994年 | 24篇 |
1993年 | 47篇 |
1992年 | 17篇 |
1991年 | 22篇 |
1990年 | 24篇 |
1989年 | 15篇 |
1988年 | 12篇 |
1987年 | 21篇 |
1986年 | 15篇 |
1985年 | 13篇 |
1984年 | 10篇 |
1982年 | 11篇 |
1981年 | 14篇 |
1980年 | 12篇 |
1979年 | 11篇 |
1978年 | 7篇 |
1977年 | 15篇 |
1976年 | 20篇 |
1975年 | 5篇 |
1974年 | 6篇 |
1973年 | 8篇 |
1972年 | 5篇 |
排序方式: 共有1306条查询结果,搜索用时 31 毫秒
21.
Ioanna Constantiou Morten Fosselius Legarth Kasper Birch Olsen 《Electronic Markets》2012,22(2):105-115
This study investigates user behaviour in massively multiplayer online games from the perspective of their intentions to engage in real money trading. Players who engage in real money trading purchase resources instead of spending time to acquire them in the game. This behaviour influences not just their own gaming experience, but those of other players as well as the operator??s revenues. We present an online survey which targets the players of World of Warcraft. Players?? relationships with real money trading are investigated using insights from behavioural economics. We propose a model which includes a set of behavioural determinants grounded in empirical research on online games. The study??s findings indicate that a player??s social status and the disinhibiting effects of online play are positive influences on players?? intentions to engage in real money trading, while perceived fairness, anticipated regret and uncertainty about the seller??s behaviour are negative influences. Interestingly, neither the perceived enjoyment nor the potential punishments influence intentions. 相似文献
22.
The intramuscular fat content, its fatty acid composition and that from the triglyceride fraction, were determined in several muscles from the right sides of four Duroc Jersey and four Hampshire castrated male pigs slaughtered at 100 kg liveweight. The Hampshires had heavier muscles than the Duroc Jersey pigs, but did not show significant differences in the percentages of intramuscular fat. The concentrations of linoleic acid were, in general, higher in the Hampshire than in the Duroc Jersey pigs and in many muscles the differences were highly significant (p < 0·05) The concentrations of linoleic acid (18:2) in the triglyceride fraction did not differ among muscles within breeds but were higher in Hampshire than in Duroc Jersey pigs. 相似文献
23.
Mikael P.J. Olsen 《Cement and Concrete Research》1984,14(1):113-122
A two dimensional finite element computer model for predicting frost penetration in saturated porous materials is presented. Based on available second order parabolic differential equations for predicting temperature and moisture content, and equations relating freezing temperature and water potential, the finite element model predicts temperature, water and ice content, frost penetration, and generated pore water pressures as a function of freezing time and given boundary conditions, Comparison of models results with available experimental data for mature cement pastes rendered reasonable agreement between the model and data. 相似文献
24.
Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol 总被引:1,自引:0,他引:1
In the quest for open systems, standardization of security mechanisms, framework, and protocols are becoming increasingly important. This puts high demands on the correctness of the standards. In this paper we use a formal logic-based approach to protocol analysis introduced by Burrows et al. [1]. We extend this logic to deal with protocols using public key cryptography, and with the notion of duration to capture some time-related aspects. The extended logic is used to analyse an important CCITT standard, the X.509 Authentication Framework. We conclude that protocol analysis can benefit from the use of the notation and that it highlights important aspects of the protocol analysed. Some aspects of the formalism need further study.This research was sponsored by the Royal Norwegian Council for Scientific and Industrial Research under Grant IT 0333.22222, and was performed while K. Gaarder was at Alcatel STK Research Centre. 相似文献
25.
Feature selection is an important aspect of solving data-mining and machine-learning problems. This paper proposes a feature-selection
method for the Support Vector Machine (SVM) learning. Like most feature-selection methods, the proposed method ranks all features
in decreasing order of importance so that more relevant features can be identified. It uses a novel criterion based on the
probabilistic outputs of SVM. This criterion, termed Feature-based Sensitivity of Posterior Probabilities (FSPP), evaluates
the importance of a specific feature by computing the aggregate value, over the feature space, of the absolute difference
of the probabilistic outputs of SVM with and without the feature. The exact form of this criterion is not easily computable
and approximation is needed. Four approximations, FSPP1-FSPP4, are proposed for this purpose. The first two approximations
evaluate the criterion by randomly permuting the values of the feature among samples of the training data. They differ in
their choices of the mapping function from standard SVM output to its probabilistic output: FSPP1 uses a simple threshold
function while FSPP2 uses a sigmoid function. The second two directly approximate the criterion but differ in the smoothness
assumptions of criterion with respect to the features. The performance of these approximations, used in an overall feature-selection
scheme, is then evaluated on various artificial problems and real-world problems, including datasets from the recent Neural
Information Processing Systems (NIPS) feature selection competition. FSPP1-3 show good performance consistently with FSPP2
being the best overall by a slight margin. The performance of FSPP2 is competitive with some of the best performing feature-selection
methods in the literature on the datasets that we have tested. Its associated computations are modest and hence it is suitable
as a feature-selection method for SVM applications.
Editor: Risto Miikkulainen. 相似文献
26.
Anita Gupta Jingyue Li Reidar Conradi Harald Rønneberg Einar Landre 《Empirical Software Engineering》2009,14(2):227-255
The benefits of software reuse have been studied for many years. Several previous studies have observed that reused software
has a lower defect density than newly built software. However, few studies have investigated empirically the reasons for this
phenomenon. To date, we have only the common sense observation that as software is reused over time, the fixed defects will
accumulate and will result in high-quality software. This paper reports on an industrial case study in a large Norwegian Oil
and Gas company, involving a reused Java class framework and two applications that use that framework. We analyzed all trouble
reports from the use of the framework and the applications according to the Orthogonal Defect Classification (ODC), followed
by a qualitative Root Cause Analysis (RCA). The results reveal that the framework has a much lower defect density in total
than one application and a slightly higher defect density than the other. In addition, the defect densities of the most severe
defects of the reused framework are similar to those of the applications that are reusing it. The results of the ODC and RCA
analyses reveal that systematic reuse (i.e. clearly defined and stable requirements, better design, hesitance to change, and
solid testing) lead to lower defect densities of the functional-type defects in the reused framework than in applications
that are reusing it. However, the different “nature” of the framework and the applications (e.g. interaction with other software,
number and complexity of business logic, and functionality of the software) may confound the causal relationship between systematic
reuse and the lower defect density of the reused software. Using the results of the study as a basis, we present an improved
overall cause–effect model between systematic reuse and lower defect density that will facilitate further studies and implementations
of software reuse.
相似文献
Anita GuptaEmail: |
27.
We propose a novel approach to self-regenerating continuously-operating systems. Such systems provide best-case solutions in security surveillance or decision making centers. We introduce HADES, a self-regenerating system whose agents acknowledge their “citizenship” or faithfulness to the good of the system and are able to monitor their environment. When agents of HADES find irregularity in themselves they first try to repair, and will self-kill if repair fails. When an agent senses that there are persistent malfunctioning agents in its environment, it sends messages to entice them to self-kill. The neighbors then proceed to generate new healthy agents to replace the killed agent. We experiment with HADES on various impairments including the most difficult one of excessive regeneration of irregular aggressive agents. These agents may use all of the system's resources and thus take over the system, reminiscent of biologically grown tumors. We study how irregular growth may occur and then develop protocols of killing these agents to optimize the system's longevity. While some of the inspiration is from the immune system and tumor therapy, we contribute to the field of AI by introducing protocols for system robustness via the notion of active citizenship and the fundamental property of programmed death. 相似文献
28.
Contact dynamics (CD) is a powerful method to solve the dynamics of large systems of colliding rigid bodies. CD can be computationally more efficient than classical penalty-based discrete element methods (DEM) for simulating contact between stiff materials such as rock, glass, or engineering metals. However, by idealizing bodies as perfectly rigid, contact forces computed by CD can be non-unique due to indeterminacy in the contact network, which is a common occurence in dense granular flows. We propose a frictionless CD method that is designed to identify only the unique set of contact forces that would be predicted by a soft particle method, such as DEM, in the limit of large stiffness. The method involves applying an elastic compatibility condition to the contact forces, which maintains no-penetration constraints but filters out force distributions that could not have arisen from stiff elastic contacts. The method can be used as a post-processing step that could be integrated into existing CD codes with minimal effort. We demonstrate its efficacy in a variety of indeterminate problems, including some involving multiple materials, non-spherical shapes, and nonlinear contact constitutive laws. 相似文献
29.
Bai-Lin Qin Barbosa-Canovas G.V. Swanson B.G. Pedrow P.D. Olsen R.G. 《Industry Applications, IEEE Transactions on》1998,34(1):43-50
High-voltage pulsed electric fields (PEFs) can be used to inactivate microorganisms in liquids. Applying PEF technology to food pasteurization is a promising nonthermal method, which may radically change food preservation processes and provide consumers with microbiologically safe, minimally processed, fresh-like products. A continuous-flow system in a laboratory-size prototype was constructed for the nonthermal pasteurization of liquid foods with PEF technology. Major components in the prototype include a high-voltage repetitive pulse generator, a coaxial liquid food treatment chamber, a fiber-optic temperature sensing instrument and a data acquisition system. Microbial inactivation tests were conducted in the continuous PEF treatment system. Repetitive high-voltage pulses with an exponential decaying waveshape were applied to the liquid food which was pumped through the treatment chamber. Test microorganisms selected for inactivation were Escherichia coli, Staphylococcus aureus and Saccharomyces cerevisiae. Over 6-order-of-magnitude reductions in the viability of selected microorganisms were achieved while the food temperature was maintained below 40°C 相似文献
30.
Growing public awareness of environmental hazards has led to an increased demand for public health authorities to investigate geographical clustering of diseases. Although such cluster analysis is nearly always ineffective in identifying causes of disease, it often has to be used to address public concern about environmental hazards. Interpreting the resulting data is not straightforward, however, and this paper presents a guide for the non-specialist. The pitfalls include the fact that cluster analyses are usually done post hoc, and not as a result of a prior hypothesis. This is particularly true for investigations prompted by reported clusters, which have the inherent danger of overestimating the disease rate through "boundary shrinkage" of the population from which the cases are assumed to have arisen. In disease surveillance the problem of making multiple comparisons can be overcome by testing for clustering and autocorrelation. When rates of disease are illustrated in disease maps undue focus on areas where random fluctuation is greatest can be minimised by smoothing techniques. Despite the fact that cluster analyses rarely prove fruitful in identifying causation, they may-like single case reports-have the potential to generate new knowledge. 相似文献