全文获取类型
收费全文 | 9545篇 |
免费 | 176篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 40篇 |
综合类 | 1篇 |
化学工业 | 846篇 |
金属工艺 | 40篇 |
机械仪表 | 84篇 |
建筑科学 | 129篇 |
矿业工程 | 5篇 |
能源动力 | 114篇 |
轻工业 | 569篇 |
水利工程 | 30篇 |
石油天然气 | 20篇 |
无线电 | 206篇 |
一般工业技术 | 479篇 |
冶金工业 | 6361篇 |
原子能技术 | 13篇 |
自动化技术 | 792篇 |
出版年
2024年 | 10篇 |
2023年 | 45篇 |
2022年 | 127篇 |
2021年 | 143篇 |
2020年 | 115篇 |
2019年 | 134篇 |
2018年 | 121篇 |
2017年 | 110篇 |
2016年 | 142篇 |
2015年 | 114篇 |
2014年 | 147篇 |
2013年 | 288篇 |
2012年 | 236篇 |
2011年 | 264篇 |
2010年 | 211篇 |
2009年 | 193篇 |
2008年 | 179篇 |
2007年 | 153篇 |
2006年 | 124篇 |
2005年 | 98篇 |
2004年 | 80篇 |
2003年 | 81篇 |
2002年 | 70篇 |
2001年 | 36篇 |
2000年 | 34篇 |
1999年 | 229篇 |
1998年 | 2012篇 |
1997年 | 1101篇 |
1996年 | 798篇 |
1995年 | 421篇 |
1994年 | 345篇 |
1993年 | 384篇 |
1992年 | 49篇 |
1991年 | 95篇 |
1990年 | 56篇 |
1989年 | 72篇 |
1988年 | 67篇 |
1987年 | 67篇 |
1986年 | 69篇 |
1985年 | 53篇 |
1983年 | 11篇 |
1982年 | 27篇 |
1981年 | 43篇 |
1980年 | 63篇 |
1979年 | 7篇 |
1978年 | 17篇 |
1977年 | 140篇 |
1976年 | 316篇 |
1975年 | 11篇 |
1973年 | 6篇 |
排序方式: 共有9729条查询结果,搜索用时 0 毫秒
131.
Lasserre S Hernando J Hill S Schümann F Anasagasti Pde M Jaoudé GA Markram H 《IEEE transactions on visualization and computer graphics》2012,18(2):214-227
We present a process to automatically generate three-dimensional mesh representations of the complex, arborized cell membrane surface of cortical neurons (the principal information processing cells of the brain) from nonuniform morphological measurements. Starting from manually sampled morphological points (3D points and diameters) from neurons in a brain slice preparation, we construct a polygonal mesh representation that realistically represents the continuous membrane surface, closely matching the original experimental data. A mapping between the original morphological points and the newly generated mesh enables simulations of electrophysiolgical activity to be visualized on this new membrane representation. We compare the new mesh representation with the state of the art and present a series of use cases and applications of this technique to visualize simulations of single neurons and networks of multiple neurons. 相似文献
132.
Enrique Álvarez‐Casado Bing Zhang Sonia Tello Sandoval Mondelo Pedro 《人机工程学与制造业中的人性因素》2012,22(3):I-I
The following article from Human Factors and Ergonomics in Manufacturing & Service Industries, “Using ergonomic digital human modeling in evaluation of workplace design and prevention of workrelated musculoskeletal disorders onboard small fishing vessel,” by Enrique Álvarez‐Casado, Bing Zhang, Sonia Tello Sandoval and Mondelo Pedro, published online on October 11, 2011 in Wiley Online Library ( www.onlinelibrary.wiley.com ), has been retracted by agreement between the authors, the journal Editors‐in‐Chief, Waldemar Karwowski and Gavriel Salvendy, and Publisher Wiley Periodicals, Inc. The retraction has been agreed as these articles were mistakenly published after being rejected. 相似文献
133.
Vehicular sensor networks are an emerging network paradigm, suitable for various applications in vehicular environment making use of vehicles’ sensors as data sources and Inter-Vehicle Communication systems for the transmissions. We present a solution, based on vehicular sensor networks, for gathering data from a certain geographic area while satisfying with a specific delay bound. The method leverages the time interval during which the query is active in order to make the gathering process efficient, properly alternating data muling and multi-hop forwarding strategies like in delay-bounded routing protocols. Simulations show that our proposed solution succeeds in performing efficient data gathering outperforming other solutions. 相似文献
134.
Vapor-liquid equilibrium data for the binary systems methyl butanoate/ethanol and methyl butanoate/propan-l-ol at pressures of 114.66 and 127.99 kPa are presented. Both mixtures yield an azeotrope, the compositions (ester) of which decrease quasi-linearly as the pressure increases. The experimental data for all the binary mixtures were fitted to a suitable equation and then used for comparison with predictions by ASOG and UNIFAC methods. These group contribution models give a good estimation of activity coefficients with an overall mean error less than 5% for all cases. 相似文献
135.
Invertible Bloom Lookup Tables (IBLTs) have been recently introduced as an extension of traditional Bloom filters. IBLTs store key-value pairs. Unlike traditional Bloom filters, IBLTs support both a lookup operation (given a key, return a value) and an operation that lists out all the key-value pairs stored. One issue with IBLTs is that there is a probability that a lookup operation will return “not found” for a key. In this paper, a technique to reduce this probability without affecting the storage requirement and only moderately increasing the search time is presented and evaluated. The results show that it can significantly reduce the probability of not returning a value that is actually stored in the IBLT. The overhead of the modified search procedure, compared to the standard IBLT search procedure, is small and has little impact on the average search time. 相似文献
136.
David F. Barrero Julio César Hernández‐Castro Pedro Peris‐Lopez David Camacho María D. R‐Moreno 《Expert Systems》2014,31(1):9-19
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack. 相似文献
137.
138.
A model for atmospheric pollutant transport is proposed considering an advection–diffusion–reaction equation. A splitting method is used to decouple the advection, diffusion and reaction parts. A scheme based on finite volume, finite difference and backward differentiation formula is used for solving an atmospheric transport-chemistry problem. 相似文献
139.
Modelling students' behaviours has reached a status that can only be overcome by improving the ability of predicting the results on teamwork. Indeed, teamwork is an important piece on the learning process, but understanding their mechanisms and predicting the results achieved is far from being solved by traditional classifiers. In this paper, we address the problem of predicting teamwork results, and propose a recommender system that suggests new teams, in the context of a given curricular unit. Any student, who is looking for a team, may use the system; in particular, he may ask for the best team to join, either considering all available colleagues or just the set of his previous teammates. Our system makes use of social network analysis and classification methods as the algorithmic core of the decision‐making process. System evaluation is presented through a set of experimental results, which report the performance of social network analysis and classification algorithms over real datasets. 相似文献
140.
This paper presents a novel integrated guidance and control strategy for docking of autonomous underwater vehicles. The approach to the base, and hence the control design, is divided in two steps: (i) in the first, at higher speed, the vehicle dynamics is assumed to be underactuated, and an appropriate control law is derived to steer the vehicle towards the final docking path, achieving convergence to zero of the appropriate error variables for almost all initial conditions; (ii) in the second stage, at low speed, the vehicle is assumed to be fully actuated, and a robust control law is designed that achieves convergence to zero of the appropriate error variables for all initial conditions, in the presence of parametric model uncertainty. Simulations are presented illustrating the performance of the proposed controllers, including model uncertainty and sensor noise. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献