全文获取类型
收费全文 | 1101篇 |
免费 | 66篇 |
国内免费 | 48篇 |
专业分类
电工技术 | 90篇 |
综合类 | 103篇 |
化学工业 | 63篇 |
金属工艺 | 9篇 |
机械仪表 | 23篇 |
建筑科学 | 93篇 |
矿业工程 | 28篇 |
能源动力 | 55篇 |
轻工业 | 5篇 |
水利工程 | 67篇 |
石油天然气 | 10篇 |
武器工业 | 8篇 |
无线电 | 109篇 |
一般工业技术 | 135篇 |
冶金工业 | 16篇 |
原子能技术 | 4篇 |
自动化技术 | 397篇 |
出版年
2024年 | 2篇 |
2023年 | 7篇 |
2022年 | 10篇 |
2021年 | 8篇 |
2020年 | 19篇 |
2019年 | 23篇 |
2018年 | 25篇 |
2017年 | 25篇 |
2016年 | 23篇 |
2015年 | 29篇 |
2014年 | 36篇 |
2013年 | 52篇 |
2012年 | 72篇 |
2011年 | 82篇 |
2010年 | 63篇 |
2009年 | 59篇 |
2008年 | 65篇 |
2007年 | 78篇 |
2006年 | 80篇 |
2005年 | 63篇 |
2004年 | 68篇 |
2003年 | 46篇 |
2002年 | 45篇 |
2001年 | 33篇 |
2000年 | 43篇 |
1999年 | 27篇 |
1998年 | 12篇 |
1997年 | 24篇 |
1996年 | 13篇 |
1995年 | 11篇 |
1994年 | 6篇 |
1993年 | 10篇 |
1992年 | 7篇 |
1991年 | 6篇 |
1990年 | 9篇 |
1989年 | 7篇 |
1988年 | 6篇 |
1987年 | 4篇 |
1986年 | 4篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1979年 | 2篇 |
1978年 | 1篇 |
排序方式: 共有1215条查询结果,搜索用时 281 毫秒
31.
This paper discusses the basic design of the encoding scheme described by the Text Encoding Initiative'sGuidelines for Electronic Text Encoding and Interchange (TEI document number TEI P3, hereafter simplyP3 orthe Guidelines). It first reviews the basic design goals of the TEI project and their development during the course of the project. Next, it outlines some basic notions relevant for the design of any markup language and uses those notions to describe the basic structure of the TEI encoding scheme. It also describes briefly the core tag set defined in chapter 6 of P3, and the default text structure defined in chapter 7 of that work. The final section of the paper attempts an evaluation of P3 in the light of its original design goals, and outlines areas in which further work is still needed.C. M. Sperberg-McQueen is a Senior Research Programmer at the academic computer center of the University of Illinois at Chicago; his interests include medieval Germanic languages and literatures and the theory of electronic text markup. Since 1988 he has been editor in chief of the ACH/ACL/ALLC Text Encoding Initiative. Lou Burnard is Director of the Oxford Text Archive at Oxford University Computing Services, with interests in electronic text and database technology. He is European Editor of the Text Encoding Initiative's Guidelines. 相似文献
32.
Babar Zaman Muhammad Riaz Saddam Akbar Abbasi 《Quality and Reliability Engineering International》2016,32(2):663-671
There are two main types of variations, namely, common and special causes leading to in‐control and out‐of‐control states, respectively. Control charts are popular tools used to differentiate between these two states of a process. Implementation of runs rules schemes with control charts is an attractive approach for process monitoring. This study is designed to describe the methodology of runs rules schemes and discuss their implementation for different types of control charts. We have considered memory‐less charts, namely, , S, and R charts for our study purposes. It is examined that the efficiency gain depends on the number of decision points utilized to implement a given rule. Moreover, superiority of runs rules schemes may vary for different types of location and dispersion charts. An application example using a dataset is also included in the study for practical considerations. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
33.
GOST 34.10 is Russia's DSA. Like its US counterpart, GOST is an ElGamal-like signature scheme used in Schnorr mode. It is similar to NIST DSA in many aspects. In this paper we will overview GOST 34.10 and discuss the three main differences between the two algorithms, (i) GOST's principal design criterion does not seem to be computational efficiency: the algorithm is 1.6 times slower than the DSA and produces 512-bit signatures. This is mainly due to the usage of the modulus q which is at least 254 bits long. During verification, modular inverses are computed by exponentiation (while the Extended Euclidian algorithm is roughly 100 times faster for this parameter size) and the generation of the public parameters is much more complicated than in the DSA. This choice of the parameters makes GOST 34.10 very secure. (ii) GOST signers do not have to generate modular inverses as the basic signature equation is s = xr + mk (mod q) instead of (mod q). (iii) GOST's hash function (the Russian equivalent of the SHA) is the standard GOST 34.11 which uses the block cipher GOST 28147 (partially classified) as a building block. The hash function will be briefly described. Copyright 相似文献
34.
A kinetic flux-vector splitting (KFVS) scheme for the shallow water magnetohydrodynamic (SWMHD) equations in one- and two-space dimensions is formulated and applied. These equations model the dynamics of a thin layer of nearly incompressible and electrically conducting fluids for which the evolution is nearly two-dimensional with magnetic equilibrium in the third direction. The proposed numerical scheme is based on the direct splitting of macroscopic flux functions of the SWMHD equations. In two-space dimensions the scheme is derived in a usual dimensionally split manner; that is, the formulae for the fluxes can be used along each coordinate direction. The high-order resolution of the scheme is achieved by using a MUSCL-type initial reconstruction and Runge-Kutta time stepping method. Both one- and two-dimensional test computations are presented. For validation, the results of KFVS scheme are compared with those obtained from the space-time conservation element and solution element (CE/SE) method. The accuracy, efficiency and simplicity of the KFVS scheme demonstrate its potential in modeling SWMHD equations. 相似文献
35.
Simulations of the interaction between a vortex and a NACA0012 airfoil are performed with a stable, high-order accurate (in space and time), multi-block finite difference solver for the compressible Navier-Stokes equations.We begin by computing a benchmark test case to validate the code. Next, the flow with steady inflow conditions are computed on several different grids. The resolution of the boundary layer as well as the amount of the artificial dissipation is studied to establish the necessary resolution requirements. We propose an accuracy test based on the weak imposition of the boundary conditions that does not require a grid refinement.Finally, we compute the vortex-airfoil interaction and calculate the lift and drag coefficients. It is shown that the viscous terms add the effect of detailed small scale structures to the lift and drag coefficients. 相似文献
36.
孙伟 《数码设计:surface》2010,(5):234-235
服装印花色彩设计是时代的一面镜子,从其特有的角度,映照出人类社会物质及精神文明进步、发展的面貌。探析服装印花色彩,掌握好和运用好色彩是服装印花色彩设计的重要之事,为使其对人们产生艺术魅力,给社会创造更多的经济价值,在服装印花设计中,色彩显然要担负起至关重要的使命。 相似文献
37.
Yingda Cheng Irene M. Gamba Armando Majorana Chi-Wang Shu 《Computer Methods in Applied Mechanics and Engineering》2009,198(37-40):3130-3150
In this paper, we present results of a discontinuous Galerkin (DG) scheme applied to deterministic computations of the transients for the Boltzmann–Poisson system describing electron transport in semiconductor devices. The collisional term models optical-phonon interactions which become dominant under strong energetic conditions corresponding to nano-scale active regions under applied bias. The proposed numerical technique is a finite element method using discontinuous piecewise polynomials as basis functions on unstructured meshes. It is applied to simulate hot electron transport in bulk silicon, in a silicon n+–n–n+ diode and in a double gated 12 nm MOSFET. Additionally, the obtained results are compared to those of a high order WENO scheme simulation and DSMC (Discrete Simulation Monte Carlo) solvers. 相似文献
38.
39.
A multi-secret sharing scheme is a protocol to share m arbitrarily related secrets s1, … , sm among a set of n participants. In this paper, we propose an ideal linear multi-secret sharing scheme, based on monotone span programs, where each subset of the set of participants may have the associated secret. Our scheme can be used to meet the security requirement in practical applications, such as secure group communication and privacy preserving data mining etc. We also prove that our proposed scheme satisfies the definition of a perfect multi-secret sharing scheme. 相似文献
40.
Semi-implicit and Newton-like finite element methods are developed for the stationary compressible Euler equations. The Galerkin discretization of the inviscid fluxes is potentially oscillatory and unstable. To suppress numerical oscillations, the spatial discretization is performed by a high-resolution finite element scheme based on algebraic flux correction. A multidimensional limiter of TVD type is employed. An important goal is the efficient computation of stationary solutions in a wide range of Mach numbers, which is a challenging task due to oscillatory correction factors associated with TVD-type flux limiters. A semi-implicit scheme is derived by a time-lagged linearization of the nonlinear residual, and a Newton-like method is obtained in the limit of infinite CFL numbers. Special emphasis is laid on the numerical treatment of weakly imposed characteristic boundary conditions. Numerical evidence for unconditional stability is presented. It is shown that the proposed approach offers higher accuracy and better convergence behavior than algorithms in which the boundary conditions are implemented in a strong sense. 相似文献