全文获取类型
收费全文 | 969篇 |
免费 | 61篇 |
国内免费 | 1篇 |
学科分类
工业技术 | 1031篇 |
出版年
2024年 | 2篇 |
2023年 | 12篇 |
2022年 | 18篇 |
2021年 | 63篇 |
2020年 | 28篇 |
2019年 | 24篇 |
2018年 | 33篇 |
2017年 | 23篇 |
2016年 | 53篇 |
2015年 | 32篇 |
2014年 | 51篇 |
2013年 | 76篇 |
2012年 | 63篇 |
2011年 | 82篇 |
2010年 | 42篇 |
2009年 | 52篇 |
2008年 | 31篇 |
2007年 | 47篇 |
2006年 | 37篇 |
2005年 | 29篇 |
2004年 | 26篇 |
2003年 | 19篇 |
2002年 | 21篇 |
2001年 | 15篇 |
2000年 | 14篇 |
1999年 | 8篇 |
1998年 | 22篇 |
1997年 | 9篇 |
1996年 | 13篇 |
1995年 | 7篇 |
1994年 | 11篇 |
1993年 | 7篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 2篇 |
1987年 | 5篇 |
1985年 | 6篇 |
1984年 | 4篇 |
1983年 | 2篇 |
1982年 | 4篇 |
1981年 | 2篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1978年 | 5篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1965年 | 1篇 |
1954年 | 1篇 |
排序方式: 共有1031条查询结果,搜索用时 15 毫秒
71.
The reflecting grating interferometer (RGI) is a folded and reversal wave-front interferometer sensitive only to asymmetrical aberrations such as third-order coma. The RGI can isolate and evaluate coma both in nearly collimated and in noncollimated beams. We propose a RGI with a different optical configuration that includes a lateral shearing in addition to folding and reversal operations. With lateral shear, the RGI also becomes sensitive to other terms of third-order aberrations such as defocusing, astigmatism, and spherical aberration. Optical path difference equations for interpreting interferograms and numerical simulations are presented to show how the interferometer works in the shearing configuration. Its potential applications are described and discussed. 相似文献
72.
73.
Modeling and performance evaluation of supply chains using batch deterministic and stochastic Petri nets 总被引:3,自引:0,他引:3
Haoxun Chen Amodeo L. Feng Chu Labadi K. 《Automation Science and Engineering, IEEE Transactions on》2005,2(2):132-144
Batch deterministic and stochastic Petri nets are introduced as a tool for modeling and performance evaluation of supply chains. The new model is developed by enhancing deterministic and stochastic Petri nets (DSPNs) with batch places and batch tokens. By incorporating stochastic Petri nets (SPNs) with the batch features, inhibitor arcs, and marking-dependent weights, operational policies of supply chains such as inventory policies can be easily described in the model. Methods for structural and performance analysis of the model are developed by extending existing ones for DSPNs. As applications, an inventory system and an industrial supply chain are modeled and their performances are evaluated analytically and by simulation, respectively, using this BSPN model. The applications demonstrate that our model and associated methods can solve some important supply chain modeling and analysis issues. Note to Practitioners-This paper was motivated by the problem of performance analysis and optimization of supply chains but it also applies to other discrete event systems where materials are processed in finite discrete quantities (batches) and operations are performed in a batch way because of batch inputs and/or in order to take advantages of the economies of scale. Existing Petri net modeling and analysis tools for such systems ignore their batch features, making their modeling complicated. This paper suggests a new model called batch deterministic and stochastic Petri nets (BDSPNs) by enhancing deterministic and stochastic Petri nets with batch places and batch tokens. Methods for structural and performance analysis of the model are developed. We then show how an inventory system and a real-life supply chain can be modeled and their performances can be evaluated analytically and by simulation respectively based on the model. The model and associated analysis methods therefore provide a promising tool for modeling and performance evaluation of supply chains. 相似文献
74.
Pietro Cenciarelli Alessandro Tiberi 《Electronic Notes in Theoretical Computer Science》2005,127(5):3
We present a case study where Synchronising Graphs, a system of parallel graph transformation, are used to solve the syntactic unification problem for first order rational terms (with possibly infinite unifier). The solution we offer is efficient, that is quasi-linear, and simple: a program of 28 characters. 相似文献
75.
Reviews the literature on predictable and unpredictable shock conditions relative to physiological measures of stressfulness and considers the possible role of stress-induced analgesia in both physiological and behavioral effects. Findings suggest that unpredictable conditions are physiologically more stressful than predictable conditions when Ss are exposed to them for one or a few sessions and when parameters of stress are relatively severe. However, predictable conditions may be more stressful than unpredictable conditions when sessions are long and extend over days and when parameters of stress are less severe. The effect of extended stress appears to depend on the physiological measure used. These findings are discussed in terms of the phasic vs chronic nature of predictable vs unpredictable stress and the organism's ability to adapt physiologically to these conditions. Data on stress-induced analgesia are also reviewed. It is concluded that stress-induced analgesia does not significantly contribute to either preference for predictable over unpredictable stress or to their differential physiological effects. (88 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
76.
Furey-Kurkjian Maura L.; Pietrini Pietro; Graff-Radford Neill R.; Alexander Gene E.; Freo Ulderico; Szczepanik Joanna; Schapiro Mark B. 《Canadian Metallurgical Quarterly》1996,10(2):294
A subgroup of patients with probable Alzheimer disease (AD) reported a history of isolated visual disturbances (VS) early in the course of disease, without the characteristic memory complaints. Brain imaging and neuropathologic studies indicated that this subgroup had larger involvement of visual cortical areas and relative sparing of temporal. frontal, and limbic structures compared with classic AD. Consistent with these findings, the authors hypothesized that the cognitive deficits in this subgroup would be distinctly different from those seen in more typical AD patients. The authors studied 10 probable AD patients with VS (AD&±&|S), 22 patients without VS (AD–), and 25 healthy controls with a neuropsychological test battery. Compared with AD–, AD&±&|S patients performed significantly better on tests of verbal memory and had greater impairment on tests of visuospatial skills, suggesting a distinct pattern of cognitive dysfunction consistent with metabolic and neuropathologic reports. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
77.
Pappalardo G Amodeo A Pandolfi M Wandinger U Ansmann A Bösenberg J Matthias V Amiridis V De Tomasi F Frioud M Larlori M Komguem L Papayannis A Rocadenbosch F Wang X 《Applied optics》2004,43(28):5370-5385
An intercomparison of the algorithms used to retrieve aerosol extinction and backscatter starting from Raman lidar signals has been performed by 11 groups of lidar scientists involved in the European Aerosol Research Lidar Network (EARLINET). This intercomparison is part of an extended quality assurance program performed on aerosol lidars in the EARLINET. Lidar instruments and aerosol backscatter algorithms were tested separately. The Raman lidar algorithms were tested by use of synthetic lidar data, simulated at 355, 532, 386, and 607 nm, with realistic experimental and atmospheric conditions taken into account. The intercomparison demonstrates that the data-handling procedures used by all the lidar groups provide satisfactory results. Extinction profiles show mean deviations from the correct solution within 10% in the planetary boundary layer (PBL), and backscatter profiles, retrieved by use of algorithms based on the combined Raman elastic-backscatter lidar technique, show mean deviations from solutions within 20% up to 2 km. The intercomparison was also carried out for the lidar ratio and produced profiles that show a mean deviation from the solution within 20% in the PBL. The mean value of this parameter was also calculated within a lofted aerosol layer at higher altitudes that is representative of typical layers related to special events such as Saharan dust outbreaks, forest fires, and volcanic eruptions. Here deviations were within 15%. 相似文献
78.
Aerosol lidar intercomparison in the framework of the EARLINET project. 1. Instruments 总被引:1,自引:0,他引:1
Matthais V Freudenthaler V Amodeo A Balin I Balis D Bösenberg J Chaikovsky A Chourdakis G Comeron A Delaval A De Tomasi F Eixmann R Hågård A Komguem L Kreipl S Matthey R Rizi V Rodrigues JA Wandinger U Wang X 《Applied optics》2004,43(4):961-976
In the framework of the European Aerosol Research Lidar Network to Establish an Aerosol Climatology (EARLINET), 19 aerosol lidar systems from 11 European countries were compared. Aerosol extinction or backscatter coefficient profiles were measured by at least two systems for each comparison. Aerosol extinction coefficients were derived from Raman lidar measurements in the UV (351 or 355 nm), and aerosol backscatter profiles were calculated from pure elastic backscatter measurements at 351 or 355, 532, or 1064 nm. The results were compared for height ranges with high and low aerosol content. Some systems were additionally compared with sunphotometers and starphotometers. Predefined maximum deviations were used for quality control of the results. Lidar systems with results outside those limits could not meet the quality assurance criterion. The algorithms for deriving aerosol backscatter profiles from elastic lidar measurements were tested separately, and the results are described in Part 2 of this series of papers [Appl. Opt. 43, 977-989 (2004)]. In the end, all systems were quality assured, although some had to be modified to improve their performance. Typical deviations between aerosol backscatter profiles were 10% in the planetary boundary layer and 0.1 x 10(-6) m(-1) sr(-1) in the free troposphere. 相似文献
79.
Walid Bagga Stefano Crosta Pietro Michiardi Refik Molva 《Electronic Notes in Theoretical Computer Science》2007,171(1):107
A policy-based encryption scheme allows to encrypt a message according to a credential-based policy formalized as monotone Boolean expression written in standard normal form. The encryption is so that only the users having access to a qualified set of credentials for the policy are able to decrypt the message. In this paper, we first revisit the formal definition of policy-based encryption and describe a policy-based encryption scheme from bilinear pairings. Our scheme improves the one proposed in [W. Bagga and R. Molva. Policy-based cryptography and applications. In Proceedings of Financial Cryptography and Data Security (FC'05), volume 3570 of LNCS, pages 72–87. Springer-Verlag, 2005] in terms of ciphertext size, while at the same time preserving the computational efficiency. Then, we describe an application of policy-based encryption in the context of ad-hoc networks. More precisely, we show how the policy-based encryption primitive can be used to achieve a privacy-enhanced secure establishment of ad-hoc communities. 相似文献
80.