首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   654篇
  免费   20篇
电工技术   26篇
综合类   2篇
化学工业   102篇
金属工艺   4篇
机械仪表   10篇
建筑科学   46篇
矿业工程   2篇
能源动力   11篇
轻工业   108篇
水利工程   2篇
石油天然气   1篇
无线电   58篇
一般工业技术   64篇
冶金工业   132篇
原子能技术   11篇
自动化技术   95篇
  2023年   4篇
  2022年   9篇
  2021年   7篇
  2019年   8篇
  2018年   10篇
  2017年   6篇
  2016年   15篇
  2015年   11篇
  2014年   8篇
  2013年   24篇
  2012年   19篇
  2011年   27篇
  2010年   24篇
  2009年   31篇
  2008年   28篇
  2007年   30篇
  2006年   16篇
  2005年   21篇
  2004年   22篇
  2003年   22篇
  2002年   8篇
  2001年   11篇
  2000年   14篇
  1999年   16篇
  1998年   32篇
  1997年   25篇
  1996年   19篇
  1995年   11篇
  1994年   12篇
  1993年   7篇
  1992年   5篇
  1991年   5篇
  1989年   9篇
  1988年   8篇
  1985年   5篇
  1984年   14篇
  1983年   6篇
  1982年   8篇
  1981年   5篇
  1980年   7篇
  1979年   4篇
  1977年   4篇
  1976年   6篇
  1970年   4篇
  1969年   13篇
  1967年   4篇
  1943年   8篇
  1942年   11篇
  1941年   6篇
  1914年   3篇
排序方式: 共有674条查询结果,搜索用时 15 毫秒
1.
Kuo  Shu-Chun  Chien  Tsair-Wei  Chou  Willy 《Scientometrics》2022,127(2):1191-1194
Scientometrics - The article published on 5 July 2021 is well-written and of interest. However, some improvements could be made, such as ten Tables/Figures can be shortened to highlight the focused...  相似文献   
2.
International Journal of Information Security - Data integrity is a critical security issue in cloud storage. The data integrity checking schemes by a third-party auditor (TPA) have attracted a lot...  相似文献   
3.
RanGen: A Random Network Generator for Activity-on-the-Node Networks   总被引:2,自引:0,他引:2  
In this paper, we describe RanGen, a random network generator for generating activity-on-the-node networks and accompanying data for different classes of project scheduling problems. The objective is to construct random networks which satisfy preset values of the parameters used to control the hardness of a problem instance. Both parameters which are related to the network topology and resource-related parameters are implemented. The network generator meets the shortcomings of former network generators since it employs a wide range of different parameters which have been shown to serve as possible predictors of the hardness of different project scheduling problems. Some of them have been implemented in former network generators while others have not.  相似文献   
4.
5.
Summary Linear discriminant analysis of GLC-aromagram data is used to separate several classes of wine distillates, namely cognac, armagnac and brandy. In this paper we demonstrate how this method was used to detect adulteration. The adulteration was confirmed by the presence of ethyl heptanoate and limonene, which are well-known flavour compounds. They were analysed by means of a Purge and Trap headspace technique. Mass spectrometry was used to identify these flavours.
Ein Beispiel für die Verfälschung von Cognac
Zusammenfassung Die Linear-Discriminanz-Analyse von GLC-Aromagramm-Daten wird zur Klassifizierung von Weindestillaten wie Cognac, Armagnac und Brandy verwendet. In dieser Arbeit werden mit dieser Methode Verfälschungen nachgewiesen, die durch die Gegenwart der Ethylester der Heptansäure und des Limonen belegt werden konnten. Diese Substanzen wurden mit der Purge- und Trap-Methode erfaßt und massenspektrometrisch identifiziert.
  相似文献   
6.
A classification of predictive-reactive project scheduling procedures   总被引:3,自引:0,他引:3  
The vast majority of the project scheduling research efforts over the past several years have concentrated on the development of workable predictive baseline schedules, assuming complete information and a static and deterministic environment. During execution, however, a project may be subject to numerous schedule disruptions. Proactive-reactive project scheduling procedures try to cope with these disruptions through the combination of a proactive scheduling procedure for generating predictive baseline schedules that are hopefully robust in that they incorporate safety time to absorb anticipated disruptions with a reactive procedure that is invoked when a schedule breakage occurs during project execution. In this paper we discuss the results obtained by a large experimental design set up to evaluate several predictive-reactive resource-constrained project scheduling procedures under the composite objective of maximizing both the schedule stability and the timely project completion probability.  相似文献   
7.
8.
41 heifers of 260-440 kg body weight used in an experiment were polyovulated with PGF2 alpha and PMSG (1000 IU). Animals were slaughtered during luteal phase of ovarian cycle (day 12-15). Shortly before slaughter ovarian structures were defined by rectal palpation und ultrasonographical examination. Post mortem ovaries were collected to compare their structures with previously performed in vivo diagnosis. More follicular structures were detected sonographically (109%) than could be found by morphologic examination (100%). Concerning corpora lutea a right diagnosis was made by palpation in 94% of cases, whereas the rate was only 85% for ultrasonographical examination. Main reasons for false diagnoses of ultrasonographical examination are as follows: multiple ovarian structures, corpora lutea with holes inside, atypical shape of ovaries, atypical ultrasonographical pictures and irregular shape of follicles.  相似文献   
9.
We discuss how the standard Cost-Benefit Analysis should be modified in order to take risk (and uncertainty) into account. We propose different approaches used in finance (Value at Risk, Conditional Value at Risk, Downside Risk Measures, and Efficiency Ratio) as useful tools to model the impact of risk in project evaluation. After introducing the concepts, we show how they could be used in CBA and provide some simple examples to illustrate how such concepts can be applied to evaluate the desirability of a new project infrastructure.  相似文献   
10.
Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i.e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption (IBE) and show that one-round OSBE and semantically secure IBE against the adaptively chosen identity attack (IND-ID-CPA) are equivalent, if the signature in the OSBE scheme is existentially unforgeable against adaptively chosen message attacks. We propose an oblivious access control scheme to protect user privacy without the aid of any zero-knowledge proof. Finally, we also highlight some other novel applications of OSBE, such as attributed-based encryption.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号