全文获取类型
收费全文 | 14088篇 |
免费 | 1395篇 |
国内免费 | 743篇 |
专业分类
电工技术 | 368篇 |
综合类 | 938篇 |
化学工业 | 2262篇 |
金属工艺 | 963篇 |
机械仪表 | 355篇 |
建筑科学 | 775篇 |
矿业工程 | 409篇 |
能源动力 | 290篇 |
轻工业 | 4445篇 |
水利工程 | 287篇 |
石油天然气 | 831篇 |
武器工业 | 218篇 |
无线电 | 512篇 |
一般工业技术 | 943篇 |
冶金工业 | 971篇 |
原子能技术 | 102篇 |
自动化技术 | 1557篇 |
出版年
2024年 | 99篇 |
2023年 | 250篇 |
2022年 | 419篇 |
2021年 | 456篇 |
2020年 | 529篇 |
2019年 | 504篇 |
2018年 | 456篇 |
2017年 | 543篇 |
2016年 | 523篇 |
2015年 | 544篇 |
2014年 | 759篇 |
2013年 | 831篇 |
2012年 | 959篇 |
2011年 | 1054篇 |
2010年 | 804篇 |
2009年 | 793篇 |
2008年 | 717篇 |
2007年 | 946篇 |
2006年 | 739篇 |
2005年 | 658篇 |
2004年 | 555篇 |
2003年 | 429篇 |
2002年 | 390篇 |
2001年 | 330篇 |
2000年 | 335篇 |
1999年 | 264篇 |
1998年 | 189篇 |
1997年 | 183篇 |
1996年 | 181篇 |
1995年 | 155篇 |
1994年 | 136篇 |
1993年 | 91篇 |
1992年 | 90篇 |
1991年 | 65篇 |
1990年 | 54篇 |
1989年 | 39篇 |
1988年 | 27篇 |
1987年 | 26篇 |
1986年 | 23篇 |
1985年 | 19篇 |
1984年 | 15篇 |
1983年 | 8篇 |
1982年 | 9篇 |
1981年 | 5篇 |
1980年 | 2篇 |
1979年 | 4篇 |
1977年 | 3篇 |
1976年 | 2篇 |
1975年 | 4篇 |
1961年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
It has recently been shown that authenticated Byzantine agreement,
in which more than a third of the parties are corrupted, cannot be
securely realized under concurrent or parallel (stateless)
composition. This result puts into question any usage of
authenticated Byzantine agreement in a setting where many
executions take place. In particular, this is true for the whole
body of work of secure multi-party protocols in the case that a
third or more of the parties are corrupted. This is because these
protocols strongly rely on the extensive use of a broadcast
channel, which is in turn realized using authenticated Byzantine
agreement. We remark that it was accepted folklore that the use of
a broadcast channel (or authenticated Byzantine agreement) is
actually essential for achieving meaningful secure multi-party
computation whenever a third or more of the parties are corrupted.
In this paper we show that this folklore is false. We present a
mild relaxation of the definition of secure computation allowing
abort. Our new definition captures all the central security issues
of secure computation, including privacy, correctness and
independence of inputs. However, the novelty of the definition is
in decoupling the issue of agreement from these issues. We
then show that this relaxation suffices for achieving secure
computation in a point-to-point network. That is, we show that
secure multi-party computation for this definition can be achieved
for any number of corrupted parties and without a
broadcast channel (or trusted pre-processing phase as required for
running authenticated Byzantine agreement). Furthermore, this is
achieved by just replacing the broadcast channel in known
protocols with a very simple and efficient echo-broadcast
protocol. An important corollary of our result is the ability to
obtain multi-party protocols that remain secure under composition,
without assuming a broadcast channel. 相似文献
22.
The aim of this study was to bring to the surface the strategic use of imitative processes in the context of a 2-route model: (a) direct imitation, used in reproducing new, meaningless actions, and (b) imitation based on stored semantic knowledge of familiar meaningful actions. Three experiments were carried out with healthy participants who reproduced meaningful and meaningless actions within an established time limit. The study investigated 3 factors that could potentially affect the selection of processes used for imitation: (a) the composition of the experimental list (blocked or mixed presentation), (b) the presence-absence of instructions (Experiments 1 and 2), and (c) the relative proportions of the stimuli (Experiment 3). Overall, the results suggest that each of these factors influences the selection of imitative strategies in healthy individuals with temporarily reduced capacities, as happens in the case of brain-damaged patients. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
23.
Dynamic neural networks with different time-scales include the aspects of fast and slow phenomenons. Some applications require
that the equilibrium points of the designed networks are stable. In this paper, the passivity-based approach is used to derive
stability conditions for dynamic neural networks with different time-scales. Several stability properties, such as passivity,
asymptotic stability, input-to-state stability and bounded input bounded output stability, are guaranteed in certain senses.
A numerical example is also given to demonstrate the effectiveness of the theoretical results. 相似文献
24.
In this study, a single unit of planar micro-solid-oxide fuel cell (μSOFC) is investigated numerically to evaluate the influences of flow channel design, oxygen composition, and thermal operating conditions on cell performance. Four flow channel designs are examined under the co-flow configuration: serpentine, double serpentine, rod bundle, and oblique rib. For all designs, the contacts areas of interconnect to electrodes are kept consistent to maintain the ohmic losses at the same level. To characterize the mass transport effects, there are three different compositions, 100% O2, 50% O2/50% N2 and air, fed to the cathode inlet. Different thermal conditions, adiabatic and isothermal, are applied to the outer boundary of the μSOFC and the results are compared. The outcomes suggest that both thermal conditions and oxidant composition show remarkable influences on μSOFC performance. Under adiabatic conditions, the rise of cell temperature causes a decrease in reversible voltage, deteriorating the overall cell competence. When oxygen is diluted with nitrogen, local gas diffusion becomes dominant to the cathode reaction. Bulk flow, on the other hand, plays a minor role in cell performance since there is little deviation in the polarization curves for all flow channel designs, even at high current densities. For comparison, the flow visualization technique is employed to observe the transport phenomena in various flow channel designs. The flow patterns are found to resemble the concentration distribution, providing a useful tool to design μSOFCs. 相似文献
25.
The effect of hydrogen heat treatment on impurity contents in aluminum nitride powder of different fineness is studied. Thermodynamic calculations are provided pointing to the possibility of forming gaseous hydrogen compounds with impurity elements. It is established that as a result of treatment the contents of impurity elements, i.e. oxygen, carbon, sulfur, are reduced by a factor of 3-13. The optimum hydrogen heat treatment regime is determined: a temperature of 1323 K and an exposure time of 30 min. 相似文献
26.
CH_4、CO_2与O_2制合成气的研究 Ⅱ工艺条件的影响 总被引:1,自引:0,他引:1
在固定床反应器中考察了12%Ni-5%RE-2%Cu-2%Li/Al2O3(mass)催化剂在CH4、CO2与O2催化氧化重整制合成气反应中催化剂粒径、工艺操作条件(空速与温度)及原料气配比对反应的影响,确定了较佳的操作条件:催化剂粒径20~40目,反应最佳温度为800℃,SV=4×104ml/(g·h)。同时看到在不同的原料气配比的条件下该催化剂的活性亦很稳定,不仅达到了反应平衡,且产物V(CO)/V(H2)比有很强的调变性。 相似文献
27.
文章阐述了建设一支适合本企业IT运维的专业队伍,通过应用IT技术掌控运维队伍,使IT运维业务正常、有序、高效开展的思路,为生产管理服务,提供一个安全、可靠、高效、快捷的信息网络平台。 相似文献
28.
提出了一种新的图像分割与合成方法。对于图像的分割,提出了新的分割算法,先是手工将一些明显属于物体和明显属于背景的像素分割出来,然后创建一个小矩形区域进行像素拓展迭代,迭代到图像边界为止。对于图像的合成,采用平均法,设计了新的算法,使物体的基本颜色保持不变的同时,降低了合成图像中从源图像分割的物体与新背景的差异,并使得其饱和度、色度、强度更加自然真实。 相似文献
29.
指出了高职计算机文化课程教学面临的诸多问题,这些问题的存在严重制约了课程教学效果的提高.为此,在深入企业调研和对教学对象调查的基础上,结合各专业类别特点及其对计算机基本操作技能的不同需求,选取不同专业的班级作为研究对象,采用“横向分专业,纵向分层次”的教学方法进行了实践教学.实践结果表明,分专业分层次教学方法能有效解决高职“计算机文化”课程教学中存在的主要问题. 相似文献
30.
This paper describes a heuristic approach to the discovery of useful macro-operators (macros) in problem solving. The approach has been implemented in a program, MACLEARN, that has three parts: macro-proposer, static filter, and dynamic filter. Learning occurs during problem solving, so that performance improves in the course of a single problem trial. Primitive operators and macros are both represented within a uniform representational framework that is closed under composition. This means that new macros can be defined in terms of others, which leads to a definitional hierarchy. The representation also supports the transfer of macros to related problems. MACLEARN is embedded in a supporting system that carries out best-first search. Experiments in macro learning were conducted for two classes of problems: peg solitaire (generalized Hi-Q puzzle), and tile sliding (generalized Fifteen puzzle). The results indicate that MACLEARN'S filtering heuristics all improve search performance, sometimes dramatically. When the system was given practice on simpler training problems, it learned a set of macros that led to successful solutions of several much harder problems. 相似文献