全文获取类型
收费全文 | 361篇 |
免费 | 6篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 4篇 |
化学工业 | 57篇 |
金属工艺 | 7篇 |
机械仪表 | 5篇 |
建筑科学 | 37篇 |
矿业工程 | 2篇 |
能源动力 | 9篇 |
轻工业 | 32篇 |
水利工程 | 5篇 |
石油天然气 | 1篇 |
无线电 | 20篇 |
一般工业技术 | 61篇 |
冶金工业 | 72篇 |
原子能技术 | 2篇 |
自动化技术 | 55篇 |
出版年
2022年 | 1篇 |
2021年 | 4篇 |
2020年 | 3篇 |
2019年 | 3篇 |
2018年 | 8篇 |
2017年 | 7篇 |
2016年 | 8篇 |
2015年 | 6篇 |
2014年 | 11篇 |
2013年 | 17篇 |
2012年 | 13篇 |
2011年 | 20篇 |
2010年 | 6篇 |
2009年 | 17篇 |
2008年 | 15篇 |
2007年 | 15篇 |
2006年 | 9篇 |
2005年 | 28篇 |
2004年 | 12篇 |
2003年 | 10篇 |
2002年 | 7篇 |
2001年 | 7篇 |
2000年 | 2篇 |
1999年 | 5篇 |
1998年 | 23篇 |
1997年 | 16篇 |
1996年 | 13篇 |
1995年 | 10篇 |
1994年 | 10篇 |
1993年 | 6篇 |
1992年 | 3篇 |
1991年 | 8篇 |
1990年 | 6篇 |
1989年 | 4篇 |
1988年 | 2篇 |
1987年 | 3篇 |
1986年 | 2篇 |
1984年 | 3篇 |
1982年 | 2篇 |
1980年 | 2篇 |
1979年 | 2篇 |
1977年 | 4篇 |
1976年 | 5篇 |
1974年 | 2篇 |
1973年 | 3篇 |
1972年 | 1篇 |
1967年 | 1篇 |
1965年 | 1篇 |
1961年 | 1篇 |
1960年 | 1篇 |
排序方式: 共有369条查询结果,搜索用时 15 毫秒
1.
2.
Ken Mattsson 《Journal of scientific computing》2003,18(1):133-153
Four different methods of imposing boundary conditions for the linear advection-diffusion equation and a linear hyperbolic system are considered. The methods are analyzed using the energy method and the Laplace transform technique. Numerical calculations are done, considering in particular the case when the initial data and boundary data are inconsistent. 相似文献
3.
In most industrialized countries, the end of the Cold War marked a change in focus from preparedness for war to an increasing focus on civil society's own vulnerability and safety. To meet new threats and changing risks, there is also a need for new analytical concepts. Societal safety is a concept developed in Norway during the last decade. It could be defined as: ‘The society's ability to maintain critical social functions, to protect the life and health of the citizens and to meet the citizens' basic requirements in a variety of stress situations’. It aims to be a systematic approach for understanding, mitigating and responding to social problems such as extraordinary stresses and losses, interferences in complex and mutual dependent systems, or lack of trust in vital social institutions. Future threats to society are not limited to specific sectors or areas, but stem from complex interactions amongst economic, technological, social and cultural factors. Thus, the main challenges to improve societal safety will be the ability to coordinate, organize and assign clear roles to different actors at the international, national and local levels. Societal safety has interfaces with other safety‐related areas such as national security, sustainable development, human security and incident management (handling of isolated accidents, common illness and ordinary criminal acts). Societal safety is, however, a sensitive political issue containing dilemmas and value choices that are hardly possible to perceive or solve as pure scientific problems. 相似文献
4.
K Andersson E Stadberg LA Mattsson G Rybo G Samsioe 《Canadian Metallurgical Quarterly》1996,41(5):476-483
Electrical stimulation of the basal temporal region of the dominant hemisphere before partial temporal lobectomy for epilepsy sometimes produces temporary interruption of language function, but the significance of removal of this area is unknown. We evaluated the correlation between resection of the basal temporal language areas (BTLA) and certain types of postoperative language deficits. In a population of 25 patients, we mapped the inferolateral temporal lobe with cortical electrical stimulation, verifying the positions of the stimulating electrodes with three-dimensional computed tomography (CT). Eighty percent of the patients developed transient language deficits with stimulation, particularly with tests of confrontation naming and comprehension. BTLA was primarily located in the fusiform gyrus, from 1 to 9 cm from the temporal tip. At testing 6-12 months after operation, patients with BTLA resection performed worse (mean 9% decrease) than those with no BTLA resection (mean 4% improvement) on tests of confrontation naming (p = 0.03). Resection size accounted for less of the variance in decrease in confrontation naming than did resection of the BTLA. Tests of performance I.Q. (PIQ), verbal I.Q. (VIQ), or recognition memory for word and verbal learning showed no significant difference between these groups. Most patients do not have language decrease with removal of basal temporal lobe 5-6 cm from the tip, even with removal of BTLA. Some patients, however, have persistent decrease in naming. 相似文献
5.
An Operator-integration-factor splitting method for time-dependent problems: Application to incompressible fluid flow 总被引:1,自引:1,他引:0
In this paper we present a simple, general methodology for the generation of high-order operator decomposition (splitting) techniques for the solution of time-dependent problems arising in ordinary and partial differential equations. The new approach exploits operator integration factors to reduce multiple-operator equations to an associated series of single-operator initial-value subproblems. Two illustrations of the procedure are presented: the first, a second-order method in time applied to velocity-pressure decoupling in the incompressible Stokes problem; the second, a third-order method in time applied to convection-Stokes decoupling in the incompressible Navier-Stokes equations. Critical open questions are briefly described. 相似文献
6.
Transport of phosphorus forms and of nitrate through a clay soil under grass and cereal production 总被引:1,自引:0,他引:1
Many nutrients are lost from soil to water viatile drains. However, there are very few reliable studies of such phosphorus(P)losses under Swedish agriculture practices, especially in connection tofertiliser and slurry applications and related to nutrient balances. Tile drainlosses were measured from nine experimental plots in south-west Sweden; fourplots were measured for 7 years and five plots for 2–3 years. Cereals,mainly spring barley (Hordeum vulgare, L.) and oats(Avena sativa, L.), were grown in six plots, while oneplotwas cultivated with grass, timothy (Phleum pratense L.)andmeadow fescue (Festuca pratensis, L.), one with lucerne(Medicago sativa, L.) and meadow fescue (F.pratensis, L.), and the last one was a set-aside withgrass (Lolium perenne, L. and Trifoliumrepens, L.) that was neither fertilised nor used for crop removal.Attention was paid to the forms in which P was transported to water since thishas important ecological implications. Average losses of particulate P (PP)fromthe set-aside land was significantly lower than from the cerealproduction, but the average losses of soluble reactive P (SRP) and dissolvednonreactive P (DUP) were the same. Average loss of PP from the grass ley during 3years (0.09 kg per ha–1 y–1) wassignificantly less than the losses from cereal production. Total P loss of 0.3kg per ha–1 y–1 was equal to the averagelossfrom the Swedish monitoring network of observation fields. Compared to theaverage nitrate-nitrogen (NO3-N) leaching, which was 7 kg perha–1 y–1 from cereals, the NO3-Nleaching was very low from the plots with lucerne-grass and set-aside.After applying and directly ploughing in 80 kg ha–1 ofsuperphosphate for cereal production in November 1998, 0.6–1.8 kgSRP ha–1 y–1 was lost through the drain tiles.Surface application of cattle slurry in spring 1999 to the grass ley alsoresulted in a very pronounced increased base level of SRP. This paper documentsthe importance of applying slurry during dry conditions and of placingfertiliser into the soil according to crop requirements in the time perspectiveof one year. 相似文献
7.
Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol 总被引:1,自引:0,他引:1
In the quest for open systems, standardization of security mechanisms, framework, and protocols are becoming increasingly important. This puts high demands on the correctness of the standards. In this paper we use a formal logic-based approach to protocol analysis introduced by Burrows et al. [1]. We extend this logic to deal with protocols using public key cryptography, and with the notion of duration to capture some time-related aspects. The extended logic is used to analyse an important CCITT standard, the X.509 Authentication Framework. We conclude that protocol analysis can benefit from the use of the notation and that it highlights important aspects of the protocol analysed. Some aspects of the formalism need further study.This research was sponsored by the Royal Norwegian Council for Scientific and Industrial Research under Grant IT 0333.22222, and was performed while K. Gaarder was at Alcatel STK Research Centre. 相似文献
8.
Feature selection is an important aspect of solving data-mining and machine-learning problems. This paper proposes a feature-selection
method for the Support Vector Machine (SVM) learning. Like most feature-selection methods, the proposed method ranks all features
in decreasing order of importance so that more relevant features can be identified. It uses a novel criterion based on the
probabilistic outputs of SVM. This criterion, termed Feature-based Sensitivity of Posterior Probabilities (FSPP), evaluates
the importance of a specific feature by computing the aggregate value, over the feature space, of the absolute difference
of the probabilistic outputs of SVM with and without the feature. The exact form of this criterion is not easily computable
and approximation is needed. Four approximations, FSPP1-FSPP4, are proposed for this purpose. The first two approximations
evaluate the criterion by randomly permuting the values of the feature among samples of the training data. They differ in
their choices of the mapping function from standard SVM output to its probabilistic output: FSPP1 uses a simple threshold
function while FSPP2 uses a sigmoid function. The second two directly approximate the criterion but differ in the smoothness
assumptions of criterion with respect to the features. The performance of these approximations, used in an overall feature-selection
scheme, is then evaluated on various artificial problems and real-world problems, including datasets from the recent Neural
Information Processing Systems (NIPS) feature selection competition. FSPP1-3 show good performance consistently with FSPP2
being the best overall by a slight margin. The performance of FSPP2 is competitive with some of the best performing feature-selection
methods in the literature on the datasets that we have tested. Its associated computations are modest and hence it is suitable
as a feature-selection method for SVM applications.
Editor: Risto Miikkulainen. 相似文献
9.
Anita Gupta Jingyue Li Reidar Conradi Harald Rønneberg Einar Landre 《Empirical Software Engineering》2009,14(2):227-255
The benefits of software reuse have been studied for many years. Several previous studies have observed that reused software
has a lower defect density than newly built software. However, few studies have investigated empirically the reasons for this
phenomenon. To date, we have only the common sense observation that as software is reused over time, the fixed defects will
accumulate and will result in high-quality software. This paper reports on an industrial case study in a large Norwegian Oil
and Gas company, involving a reused Java class framework and two applications that use that framework. We analyzed all trouble
reports from the use of the framework and the applications according to the Orthogonal Defect Classification (ODC), followed
by a qualitative Root Cause Analysis (RCA). The results reveal that the framework has a much lower defect density in total
than one application and a slightly higher defect density than the other. In addition, the defect densities of the most severe
defects of the reused framework are similar to those of the applications that are reusing it. The results of the ODC and RCA
analyses reveal that systematic reuse (i.e. clearly defined and stable requirements, better design, hesitance to change, and
solid testing) lead to lower defect densities of the functional-type defects in the reused framework than in applications
that are reusing it. However, the different “nature” of the framework and the applications (e.g. interaction with other software,
number and complexity of business logic, and functionality of the software) may confound the causal relationship between systematic
reuse and the lower defect density of the reused software. Using the results of the study as a basis, we present an improved
overall cause–effect model between systematic reuse and lower defect density that will facilitate further studies and implementations
of software reuse.
相似文献
Anita GuptaEmail: |
10.
To successfully manage today’s complex production systems it is essential to study operators’ perception of the system. The paper presents perceived production complexity assessed at seven manufacturing companies with the CompleXity Index (CXI) method. While other methods have measured product variants, layout, work content, tools and information items, CXI combines them into three areas. These three complexity areas (Station design, Work variance and Disturbance handling) help to create an understanding of the complex system by visualising how they contribute to complexity, and show the need to support the operators’ ability to handle the varying work. 相似文献