全文获取类型
收费全文 | 2402篇 |
免费 | 51篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 66篇 |
综合类 | 6篇 |
化学工业 | 472篇 |
金属工艺 | 94篇 |
机械仪表 | 34篇 |
建筑科学 | 53篇 |
矿业工程 | 13篇 |
能源动力 | 30篇 |
轻工业 | 264篇 |
水利工程 | 20篇 |
石油天然气 | 1篇 |
无线电 | 183篇 |
一般工业技术 | 394篇 |
冶金工业 | 588篇 |
原子能技术 | 31篇 |
自动化技术 | 209篇 |
出版年
2023年 | 22篇 |
2022年 | 20篇 |
2021年 | 28篇 |
2020年 | 16篇 |
2019年 | 19篇 |
2018年 | 35篇 |
2017年 | 26篇 |
2016年 | 26篇 |
2015年 | 18篇 |
2014年 | 57篇 |
2013年 | 74篇 |
2012年 | 80篇 |
2011年 | 95篇 |
2010年 | 78篇 |
2009年 | 76篇 |
2008年 | 76篇 |
2007年 | 65篇 |
2006年 | 71篇 |
2005年 | 67篇 |
2004年 | 69篇 |
2003年 | 63篇 |
2002年 | 60篇 |
2001年 | 40篇 |
2000年 | 33篇 |
1999年 | 53篇 |
1998年 | 173篇 |
1997年 | 106篇 |
1996年 | 76篇 |
1995年 | 50篇 |
1994年 | 56篇 |
1993年 | 48篇 |
1992年 | 33篇 |
1991年 | 42篇 |
1990年 | 34篇 |
1989年 | 30篇 |
1988年 | 27篇 |
1987年 | 24篇 |
1986年 | 29篇 |
1985年 | 39篇 |
1984年 | 31篇 |
1983年 | 17篇 |
1982年 | 23篇 |
1981年 | 22篇 |
1979年 | 24篇 |
1977年 | 30篇 |
1976年 | 32篇 |
1974年 | 22篇 |
1973年 | 20篇 |
1972年 | 20篇 |
1966年 | 18篇 |
排序方式: 共有2458条查询结果,搜索用时 15 毫秒
41.
B. Holzapfel M. Leghissa P. Bauer G. Kreiselmeyer M. Kraus S. Bouffard L. Schultz G. Saemann-Ischenko 《Journal of Superconductivity》1994,7(1):205-207
Epitaxial YBa2Cu3O7–
thin films (YBCO) and YBa2Cu3O7–
/PrBa2Cu3O7–
multilayers (Y/Pr) were irradiated with high-energy heavy ions (770 Mev208Pb) under various directions relative to thec-axis. The irradiation resulted in columnar defects tilted by from thec-axis. The angular dependence of their pinning activity was studied by measuring the anisotropy of the critical current density. TheJ
c
(B, T,) behavior of the irradiated YBCO thin films showed an additional peak, which exceeds the intrinsic pinning peak, exactly at the irradiation direction. The Y/Pr multilayers, however, showed an isotropicT
c
-enhancement by a factor of 5, without any additional structure in theJ
c(B, T,) curve. 相似文献
42.
Kasem K. Kasem Franklin A. Schultz 《Journal of Inorganic and Organometallic Polymers》1994,4(4):377-390
Multiply charged electroactive anions [IrCl
6
2–
, Fe(CN)
6
3–
, and W(CN)
8
4–
] are electrostatically incorporated in polymeric films of tris(4-vinyl-4-methyl-2,2-bipyridine) ruthenium(II) [poly-Ru(vbpy)
3
2+
] from aqueous trifluoroacetate solution. Values of apparent diffusion coefficients (D
ct) and heterogenous electron transfer rates (k
et) are measured for these anions as a function of their relative concentration (
M/
Ru) in the film.D
ct andk
et decrease systematically as
M/
Ru increases in a manner that is independent of charge and chemical identity of the ion. This result suggests that a nonchemical process, presumably electrostatic cross-linking, limits diffusional motion and is responsible for the decrease inD
ct andk
et with increasing anion content. Protonated polyvinyl-pyridine films exhibit similar ranges and variations inD
ct andk
et, which suggest similar structures and mechanisms of charge transport for these films and poly-Ru(vbpy)
3
2+
. 相似文献
43.
An exploratory, comparative survey design was used to describe and compare similarities and differences in perception of caring behaviors between hospitalized antepartum and short-stay postpartum patients. Forty-two patients completed the 63-item Caring Behavior Assessment instrument (CBA). The scale, based on Watson's theory of caring, contains seven categories. There were no statistically significant differences in age, education, gravida, or para between the two groups. Significantly more women in the postpartum group were married. There were no statistically significant differences or correlations in the total CBA scores and the demographic variables. No statistically significant differences in total CBA scores were found between antepartum participants and postpartum participants. These findings corroborate the results of "caring" studies in other patient populations, that satisfying basic needs--that is, evidence of technical knowledge and skills--is more important to patients than meeting higher order needs. 相似文献
44.
45.
Swarm Intelligence Approaches for Grid Load Balancing 总被引:1,自引:0,他引:1
With the rapid growth of data and computational needs, distributed systems and computational Grids are gaining more and more
attention. The huge amount of computations a Grid can fulfill in a specific amount of time cannot be performed by the best
supercomputers. However, Grid performance can still be improved by making sure all the resources available in the Grid are
utilized optimally using a good load balancing algorithm. This research proposes two new distributed swarm intelligence inspired
load balancing algorithms. One algorithm is based on ant colony optimization and the other algorithm is based on particle
swarm optimization. A simulation of the proposed approaches using a Grid simulation toolkit (GridSim) is conducted. The performance
of the algorithms are evaluated using performance criteria such as makespan and load balancing level. A comparison of our
proposed approaches with a classical approach called State Broadcast Algorithm and two random approaches is provided. Experimental
results show the proposed algorithms perform very well in a Grid environment. Especially the application of particle swarm
optimization, can yield better performance results in many scenarios than the ant colony approach. 相似文献
46.
Schultz T Kindlmann GL 《IEEE transactions on visualization and computer graphics》2010,16(6):1595-1604
Symmetric second-order tensor fields play a central role in scientific and biomedical studies as well as in image analysis and feature-extraction methods. The utility of displaying tensor field samples has driven the development of visualization techniques that encode the tensor shape and orientation into the geometry of a tensor glyph. With some exceptions, these methods work only for positive-definite tensors (i.e. having positive eigenvalues, such as diffusion tensors). We expand the scope of tensor glyphs to all symmetric second-order tensors in two and three dimensions, gracefully and unambiguously depicting any combination of positive and negative eigenvalues. We generalize a previous method of superquadric glyphs for positive-definite tensors by drawing upon a larger portion of the superquadric shape space, supplemented with a coloring that indicates the quadratic form (including eigenvalue sign). We show that encoding arbitrary eigenvalue magnitudes requires design choices that differ fundamentally from those in previous work on traceless tensors that arise in the study of liquid crystals. Our method starts with a design of 2-D tensor glyphs guided by principles of scale-preservation and symmetry, and creates 3-D glyphs that include the 2-D glyphs in their axis-aligned cross-sections. A key ingredient of our method is a novel way of mapping from the shape space of three-dimensional symmetric second-order tensors to the unit square. We apply our new glyphs to stress tensors from mechanics, geometry tensors and Hessians from image analysis, and rate-of-deformation tensors in computational fluid dynamics. 相似文献
47.
Schultz Thomas Theisel Holger Seidel Hans-Peter 《IEEE transactions on visualization and computer graphics》2010,16(1):109-119
Crease surfaces are two-dimensional manifolds along which a scalar field assumes a local maximum (ridge) or a local minimum (valley) in a constrained space. Unlike isosurfaces, they are able to capture extremal structures in the data. Creases have a long tradition in image processing and computer vision, and have recently become a popular tool for visualization. When extracting crease surfaces, degeneracies of the Hessian (i.e., lines along which two eigenvalues are equal) have so far been ignored. We show that these loci, however, have two important consequences for the topology of crease surfaces: First, creases are bounded not only by a side constraint on eigenvalue sign, but also by Hessian degeneracies. Second, crease surfaces are not, in general, orientable. We describe an efficient algorithm for the extraction of crease surfaces which takes these insights into account and demonstrate that it produces more accurate results than previous approaches. Finally, we show that diffusion tensor magnetic resonance imaging (DT-MRI) stream surfaces, which were previously used for the analysis of planar regions in diffusion tensor MRI data, are mathematically ill-defined. As an example application of our method, creases in a measure of planarity are presented as a viable substitute. 相似文献
48.
One of congress’ goals for 2007 was for 80% of all tax and informational returns to be filed electronically. However, to date
that lofty goal has fallen well short. This research proposes a model of e-filing adoption. To test the model a survey is
administered to 260 participants. The instrument assesses citizen perceptions of trust, risk and optimism bias. Structural
equation modeling is used to evaluate the relationships between these three concepts and intention to use. The results indicate
that trust of the Internet, trust of the e-filer, perceived risk and optimism bias all have an impact on intention to use
e-filing. Implications for practice and research are discussed. 相似文献
49.
In this work, we describe an autonomous mobile robotic system for finding, investigating, and modeling ambient noise sources
in the environment. The system has been fully implemented in two different environments, using two different robotic platforms
and a variety of sound source types. Making use of a two-step approach to autonomous exploration of the auditory scene, the
robot first quickly moves through the environment to find and roughly localize unknown sound sources using the auditory evidence
grid algorithm. Then, using the knowledge gained from the initial exploration, the robot investigates each source in more
depth, improving upon the initial localization accuracy, identifying volume and directivity, and, finally, building a classification
vector useful for detecting the sound source in the future. 相似文献
50.
Marco Tiloca Christian Gehrmann Ludwig Seitz 《International Journal of Information Security》2017,16(2):173-193
DTLS is a transport layer security protocol designed to provide secure communication over unreliable datagram protocols. Before starting to communicate, a DTLS client and server perform a specific handshake in order to establish a secure session and agree on a common security context. However, the DTLS handshake is affected by two relevant issues. First, the DTLS server is vulnerable to a specific Denial of Service (DoS) attack aimed at forcing the establishment of several half-open sessions. This may exhaust memory and network resources on the server, so making it less responsive or even unavailable to legitimate clients. Second, although it is one of the most efficient key provisioning approaches adopted in DTLS, the pre-shared key provisioning mode does not scale well with the number of clients, it may result in scalability issues on the server side, and it complicates key re-provisioning in dynamic scenarios. This paper presents a single and efficient security architecture which addresses both issues, by substantially limiting the impact of DoS, and reducing the number of keys stored on the server side to one unit only. Our approach does not break the existing standard and does not require any additional message exchange between DTLS client and server. Our experimental results show that our approach requires a shorter amount of time to complete a handshake execution and consistently reduces the time a DTLS server is exposed to a DoS instance. We also show that it considerably improves a DTLS server in terms of service availability and robustness against DoS attack. 相似文献