全文获取类型
收费全文 | 464篇 |
免费 | 17篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 5篇 |
综合类 | 1篇 |
化学工业 | 92篇 |
金属工艺 | 10篇 |
机械仪表 | 17篇 |
建筑科学 | 23篇 |
矿业工程 | 1篇 |
能源动力 | 25篇 |
轻工业 | 43篇 |
水利工程 | 7篇 |
石油天然气 | 3篇 |
无线电 | 52篇 |
一般工业技术 | 99篇 |
冶金工业 | 15篇 |
原子能技术 | 3篇 |
自动化技术 | 90篇 |
出版年
2024年 | 3篇 |
2023年 | 8篇 |
2022年 | 23篇 |
2021年 | 25篇 |
2020年 | 20篇 |
2019年 | 20篇 |
2018年 | 27篇 |
2017年 | 16篇 |
2016年 | 21篇 |
2015年 | 14篇 |
2014年 | 22篇 |
2013年 | 37篇 |
2012年 | 32篇 |
2011年 | 39篇 |
2010年 | 19篇 |
2009年 | 18篇 |
2008年 | 21篇 |
2007年 | 15篇 |
2006年 | 13篇 |
2005年 | 13篇 |
2004年 | 7篇 |
2003年 | 2篇 |
2002年 | 12篇 |
2001年 | 4篇 |
2000年 | 1篇 |
1999年 | 3篇 |
1998年 | 5篇 |
1997年 | 11篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1993年 | 4篇 |
1991年 | 3篇 |
1990年 | 1篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1983年 | 3篇 |
1982年 | 3篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1974年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有486条查询结果,搜索用时 15 毫秒
1.
Usamah Salim Shahwan 《Creativity & Innovation Management》1993,2(4):221-227
The research aims at exploring the relationship between small business enterprises and their environments through an empirical investigation of the methods and strategies adopted by a number of industrial firms operating in the West Bank and the Gaza Strip in response to the exigencies and challenges of the uprising in the occupied territories in order to survive. Though the problems faced by the industrial sector as a result of the unique situation in the areas are almost unparalleled in other parts of the world, it has been possible to gain fresh insight into the dynamics of the environmental factors and their impact on organizational structure and function. Despite innumerable obstacles, the industrial sector has achieved a reasonable degree of growth. 相似文献
2.
D.R Hayhurst D.A Lavender N.G Worley A Salim 《International Journal of Pressure Vessels and Piping》1985,20(4):289-317
Constant stress creep data for a wrought 1%Cr, , steel obtained from six tests carried out at 565°C have been fitted and extrapolated using the θ-projection method. Creep curves for high stresses were fitted well, but curves extrapolated to stress levels below those used in the θ-projection did not represent well the available data for primary-secondary creep. To enable a satisfactory extrapolation of results, it was found necessary to redefine the failure condition to be less sensitive to the shape of the latter sections of the tertiary creep curve. This was achieved by defining lifetime as the point on the curve at which the strain rate reached a fixed multiple of the creep rate at half the rupture time. The extrapolated data compare well with the results of tests carried out independently on a cast 1%Cr, , steel. The extrapolation procedure not only predicts the ‘knee’ in the log stress-log lifetime curve but allows extrapolation of lifetimes by over a factor of thirty. In addition, acceptable predictions have been made of constant load experimental data. 相似文献
3.
Patrícia Carvalho de Souza André Salim Khayat Igor Chamon Seligmann Rommel Mario Rodríguez Burbano 《Biocell》2008,32(2):207-210
The collared peccary (Tayassu tajacu) is widely distributed over the American continent, being found from the south of the USA to the north of Argentina. In Brazil, it is spread all over the country, being one of the potential species to be raised in captivity. Therefore, the cytogenetic techniques could be a potential tool for reproductive monitoring of animals raised in captivity, mainly when destined for commercial purposes. This study had the objective of determining the chromosome number of two populations raised in captivity and characterizing them by GTG banding. For this purpose, an analysis was made of mitotic metaphases obtained from lymphocyte cultures made from blood samples of 11 animals, six of which from the Northeast and five from the North of Brazil. The results of this analysis showed the same karyotype pattern for the species (2n=30 chromosomes and NF=48), besides corresponding to the South American pattern of the species, i.e., without a translocation between autosomes 1 and 8, chromosome X acrocentric, and no differences were found between the two populations studied. However, chromosomal polymorphisms were observed compared to data from the literature on populations from North and South America. 相似文献
4.
5.
The relationship between the stability of crack propagation in, and the fracture surface appearance of, DGEBA epoxy resins cured with TETA has been investigated using a linear elastic fracture mechanics approach. In particular, the effect of varying the amount of curing agent and curing conditions and altering external variables such as testing rate, temperature and environment have been studied. Under certain conditions, propagation is found to be stable and fracture surfaces have a smooth appearance. Under other conditions the cracks propagate in an unstable stick-slip manner. In this case, arrest lines can be seen on the fracture surfaces and their intensity and roughness increases with the magnitude of the crack jumps. The roughness of the fracture surfaces has been measured using a Talysurf and this has been shown to be due principally to deviation of the cracks from the original fracture plane rather than any gross plastic deformation. 相似文献
6.
Caio Bezerra Machado Leidivan Sousa da Cunha Jersey Heitor da Silva Maus Flvia Melo Cunha de Pinho Pessoa Marcelo Braga de Oliveira Rodrigo Monteiro Ribeiro Germison Silva Lopes Manoel Odorico de Moraes Filho Maria Elisabete Amaral de Moraes Andr Salim Khayat Caroline Aquino Moreira-Nunes 《International journal of molecular sciences》2022,23(10)
Human T cell leukemia virus type 1 (HTLV-1) was identified as the first pathogenic human retrovirus and is estimated to infect 5 to 10 million individuals worldwide. Unlike other retroviruses, there is no effective therapy to prevent the onset of the most alarming diseases caused by HTLV-1, and the more severe cases manifest as the malignant phenotype of adult T cell leukemia (ATL). MicroRNA (miRNA) dysfunction is a common feature of leukemogenesis, and it is no different in ATL cases. Therefore, we sought to analyze studies that reported deregulated miRNA expression in HTLV-1 infected cells and patients’ samples to understand how this deregulation could induce malignancy. Through in silico analysis, we identified 12 miRNAs that stood out in the prediction of targets, and we performed functional annotation of the genes linked to these 12 miRNAs that appeared to have a major biological interaction. A total of 90 genes were enriched in 14 KEGG pathways with significant values, including TP53, WNT, MAPK, TGF-β, and Ras signaling pathways. These miRNAs and gene interactions are discussed in further detail for elucidation of how they may act as probable drivers for ATL onset, and while our data provide solid starting points for comprehension of miRNAs’ roles in HTLV-1 infection, continuous effort in oncologic research is still needed to improve our understanding of HTLV-1 induced leukemia. 相似文献
7.
Tuning fuzzy PD and PI controllers using reinforcement learning 总被引:1,自引:0,他引:1
Hamid Boubertakh Mohamed Tadjine Pierre-Yves Glorennec Salim Labiod 《ISA transactions》2010,49(4):543-551
In this paper, we propose a new auto-tuning fuzzy PD and PI controllers using reinforcement Q-learning (QL) algorithm for SISO (single-input single-output) and TITO (two-input two-output) systems. We first, investigate the design parameters and settings of a typical class of Fuzzy PD (FPD) and Fuzzy PI (FPI) controllers: zero-order Takagi–Sugeno controllers with equidistant triangular membership functions for inputs, equidistant singleton membership functions for output, Larsen’s implication method, and average sum defuzzification method. Secondly, the analytical structures of these typical fuzzy PD and PI controllers are compared to their classical counterpart PD and PI controllers. Finally, the effectiveness of the proposed method is proven through simulation examples. 相似文献
8.
Leila Benarous Benamar Kadri Salim Bitam Abdelhamid Mellouk 《International Journal of Communication Systems》2020,33(10)
Privacy in Vehicular Ad Hoc Networks (VANET) is fundamental because the user's safety may be threatened by the identity and the real‐time spatiotemporal data exchanged on the network. This issue is commonly addressed by the use of certified temporal pseudonyms and their updating strategies to ensure the user's unlinkability and anonymity. IEEE 1609.2 Standard specified the process of certifying pseudonym along with certificates structure. However, the communication procedure between the certifying authority and the requesting vehicle was not defined. In this paper, a new privacy‐preserving solution for pseudonym on‐road on‐demand refilling is proposed where the vehicle anonymously authenticates itself to the regional authority subsidiary of the central trusted authority to request a new pseudonyms pool. The authentication method has two phases, the first one uses anonymous tickets, and the second one is a challenge‐based authentication. The anonymous tickets are certificates that do not include the identity of the user. Instead, it contains a reference number and the certifying authority signature. The challenge authentication is identity‐less to preserve the privacy, yet it is used to prevent the misuse of tickets and the impersonation of its owner. Our proposed scheme is analyzed by the use of Burrows, Abadi and Needham (BAN) logic to demonstrate its correctness. It is also specified and checked by using the Security Protocol ANimator (SPAN) and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tools. The logical demonstration proved that this privacy‐preserving authentication is assured. The SPAN and AVISPA tools illustrated that it is resilient to security attacks. 相似文献
9.
Wireless sensor networks (WSNs) are composed of many low cost, low power devices with sensing, local processing and wireless communication capabilities. Recent advances in wireless networks have led to many new protocols specifically designed for WSNs where energy awareness is an essential consideration. Most of the attention, however, has been given to the routing protocols since they might differ depending on the application and network architecture. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of routing protocols for WSNs. In this paper, the low-energy adaptive clustering hierarchy (LEACH) routing protocol is considered and improved. We propose a clustering routing protocol named intra-balanced LEACH (IBLEACH), which extends LEACH protocol by balancing the energy consumption in the network. The simulation results show that IBLEACH outperforms LEACH and the existing improvements of LEACH in terms of network lifetime and energy consumption minimization. 相似文献
10.
Chakraborty Debasish Zabir Salahuddin Muhammad Salim Chayabejara Apichet Chakraborty Goutam 《Telecommunication Systems》2004,25(3-4):299-315
Single point, sender based control does not scale well for multicast delivery. For applications, such as group video or teleconferencing a low total cost multicast tree is required. In this article we present a destination driven algorithm to minimize the total tree cost of multicast tree in a dynamic situation for the whole session duration. In this heuristic approach we considered the staying duration of participants are available at the time of joining. The performance of our algorithm is analyzed through extensive simulation and evaluated against several other existing dynamic multicast routing and also against one well known near optimum heuristic algorithm used for solving Steiner tree problem. We have further tested our algorithm using erroneous information given by the joining participants. Simulation results show that its performance does not degrade that much even when the range of error is considerably high, which proves the robustness of our algorithm. 相似文献