全文获取类型
收费全文 | 2980篇 |
免费 | 104篇 |
国内免费 | 40篇 |
专业分类
电工技术 | 92篇 |
综合类 | 39篇 |
化学工业 | 744篇 |
金属工艺 | 67篇 |
机械仪表 | 136篇 |
建筑科学 | 113篇 |
矿业工程 | 23篇 |
能源动力 | 91篇 |
轻工业 | 266篇 |
水利工程 | 26篇 |
石油天然气 | 10篇 |
武器工业 | 2篇 |
无线电 | 262篇 |
一般工业技术 | 416篇 |
冶金工业 | 266篇 |
原子能技术 | 43篇 |
自动化技术 | 528篇 |
出版年
2023年 | 12篇 |
2022年 | 49篇 |
2021年 | 65篇 |
2020年 | 28篇 |
2019年 | 56篇 |
2018年 | 66篇 |
2017年 | 44篇 |
2016年 | 57篇 |
2015年 | 63篇 |
2014年 | 81篇 |
2013年 | 166篇 |
2012年 | 138篇 |
2011年 | 209篇 |
2010年 | 194篇 |
2009年 | 202篇 |
2008年 | 212篇 |
2007年 | 180篇 |
2006年 | 141篇 |
2005年 | 163篇 |
2004年 | 95篇 |
2003年 | 101篇 |
2002年 | 100篇 |
2001年 | 64篇 |
2000年 | 56篇 |
1999年 | 42篇 |
1998年 | 61篇 |
1997年 | 49篇 |
1996年 | 47篇 |
1995年 | 36篇 |
1994年 | 31篇 |
1993年 | 46篇 |
1992年 | 31篇 |
1991年 | 23篇 |
1990年 | 23篇 |
1989年 | 15篇 |
1988年 | 21篇 |
1987年 | 19篇 |
1986年 | 9篇 |
1985年 | 22篇 |
1984年 | 17篇 |
1983年 | 19篇 |
1982年 | 9篇 |
1981年 | 17篇 |
1980年 | 11篇 |
1979年 | 6篇 |
1977年 | 6篇 |
1976年 | 7篇 |
1974年 | 2篇 |
1973年 | 5篇 |
1964年 | 2篇 |
排序方式: 共有3124条查询结果,搜索用时 15 毫秒
991.
992.
A localization method based on distance function of projected features is presented to solve the accuracy reduction or failure problem due to occlusion and blurring caused by smog, when dealing with vision based localization for target oil and gas wellhead (OGWH). Firstly, the target OGWH is modeled as a cylinder with marker, and a vector with redundant parameter is used to describe its pose. Secondly, the explicit mapping relationship between the pose vector with redundant parameter and projected features is derived. Then, a 2D-point-to-feature distance function is proposed, as well as its derivative. Finally, based on this distance function and its derivative, an algorithm is proposed to estimate the pose of target OGWH directly according to the 2D image information, and the validity of the method is verified by both synthetic data and real image experiments. The results show that this method is able to accomplish the localization in the case of occlusion and blurring, and its anti-noise ability is good especially with noise ratio of less than 70%. 相似文献
993.
994.
Majority of the buildings,including industrial buildings,are constructed using either structural steel (plates and structural shapes) or deformed bar steel reinforced concrete.Such buildings,however,must be designed to be safe and serviceable during construction and during use and occupancy.These objectives can be easily achieved by the use of steels having superior mechanical properties,ductility,weldability,fire resistance,etc.Over the years,the steel industry has made improvements in steel making technologies resulting in high strength low alloy (HSLA) steels with superior steel properties well suited for building construction.First part of this paper presents the structural design considerations,and the constructional considerations associated with the building structures in general,and steel structures in particular.This second part of the paper looks at the acceptance criteria for HSLA steels for North American building codes and construction.The third part of the paper presents the structural properties of currently available HSLA steels for building construction.The discussion focuses on hot-rolled structural steel shapes as well as deformed steel bars for concrete reinforcement.The paper argues that Niobium microalloying is the key to achieving superior properties in such steels. 相似文献
995.
A Flexible,Stretchable and Shape‐Adaptive Approach for Versatile Energy Conversion and Self‐Powered Biomedical Monitoring 下载免费PDF全文
996.
997.
Ken Dunham CISSP GREM GSEC GCIH Gold Honors GCFA 《Information Security Journal: A Global Perspective》2013,22(4):233-238
ABSTRACT Mitigation of malicious code is increasingly complicated by multi-staged and mutli-variant attacks taking place daily on the Internet today. It is now common for computers to be infected for long periods of time, with malicious browser help objects, rootkits, and similar stealth codes. Identification and removal from a computer can be especially difficult. In some cases, the only reasonable effort may be to completely wipe and reinstall an image of the system, known to be free of malicious code. Manual mitigation of malicious code is a sophisticated process of threat identification, research, mitigation, and monitoring to properly remove all threat components related to an attack. 相似文献
998.
Jefferson Heard Sidharth Thakur Jessica Losego Ken Galluppi 《Computer Supported Cooperative Work (CSCW)》2014,23(1):51-74
Collaborative technologies for information sharing are an invaluable resource for emergency managers to respond to and manage highly dynamic events such as natural disasters and other emergencies. However, many standard collaboration tools can be limited either because they provide passive presentation and dissemination of information, or because they are targeted towards highly specific usage scenarios that require considerable training to use the tools. We present a real-time gather and share system called “Big Board” which facilitates collaboration over maps. The Big Board is an open-source, web based, real time visual collaborative environment that runs on all modern web browsers and uses open-source web standards developed by the Open Geospatial Consortium (OGC) and WorldWideWeb Consortium (W3C). An evaluation of Big Board was conducted by school representatives in North Carolina for use in situational understanding for school closure decisions during winter weather events. The decision to close schools has major societal impacts and is one that is usually made based on how well a teenage driver could handle wintry precipitation on a road. Collecting information on the conditions of roads is especially critical, however gathering and sharing of this information within a county can be difficult. Participants in the study found the Big Board intuitive and useful for sharing real time information, such as road conditions and temperatures, leading up to and during a winter storm scenario. We have adapted the Big Board to manage risks and hazards during other types of emergencies such as tropical storm conditions. 相似文献
999.
Precisely Controlled Ultrastrong Photoinduced Doping at Graphene–Heterostructures Assisted by Trap‐State‐Mediated Charge Transfer 下载免费PDF全文
1000.
Revisiting the Formation and Tunable Dissociation of a [2]Pseudorotaxane Formed by Slippage Approach
Ken Cham-Fai Leung Kwun-Ngai Lau Wing-Yan Wong 《International journal of molecular sciences》2015,16(4):8254-8265
A new [2]pseudorotaxane DB24C8⊃1-H·PF6 with dibenzo[24]crown-8 (DB24C8) crown ether-dibenzylammonium (1-H·PF6) binding which was formed by slippage approach at different solvents and temperature, had been isolated and characterized by NMR spectroscopy and mass spectrometry. The [2]pseudorotaxane DB24C8⊃1-H·PF6 was stable at room temperature. The dissociation rate of [2]pseudorotaxane DB24C8⊃1-H·PF6 could be tuned by using different stimuli such as triethylamine (TEA)/diisopropylethylamine (DIPEA) and dimethyl sulfoxide (DMSO). In particular, the dissociation of [2]pseudorotaxane DB24C8⊃1-H·PF6 by an excess of TEA/DIPEA base mixture possessed a long and sustained, complete dissociation over 60 days. Other stimuli by DMSO possessed a relatively fast dissociation over 24 h. 相似文献