全文获取类型
收费全文 | 7098篇 |
免费 | 324篇 |
国内免费 | 53篇 |
专业分类
电工技术 | 135篇 |
综合类 | 26篇 |
化学工业 | 1786篇 |
金属工艺 | 118篇 |
机械仪表 | 211篇 |
建筑科学 | 277篇 |
矿业工程 | 6篇 |
能源动力 | 464篇 |
轻工业 | 725篇 |
水利工程 | 76篇 |
石油天然气 | 115篇 |
无线电 | 654篇 |
一般工业技术 | 1142篇 |
冶金工业 | 337篇 |
原子能技术 | 83篇 |
自动化技术 | 1320篇 |
出版年
2024年 | 24篇 |
2023年 | 151篇 |
2022年 | 317篇 |
2021年 | 405篇 |
2020年 | 295篇 |
2019年 | 335篇 |
2018年 | 416篇 |
2017年 | 358篇 |
2016年 | 355篇 |
2015年 | 236篇 |
2014年 | 319篇 |
2013年 | 642篇 |
2012年 | 357篇 |
2011年 | 506篇 |
2010年 | 351篇 |
2009年 | 327篇 |
2008年 | 288篇 |
2007年 | 217篇 |
2006年 | 201篇 |
2005年 | 140篇 |
2004年 | 111篇 |
2003年 | 117篇 |
2002年 | 90篇 |
2001年 | 64篇 |
2000年 | 73篇 |
1999年 | 50篇 |
1998年 | 77篇 |
1997年 | 41篇 |
1996年 | 49篇 |
1995年 | 40篇 |
1994年 | 36篇 |
1993年 | 44篇 |
1992年 | 36篇 |
1991年 | 32篇 |
1990年 | 30篇 |
1989年 | 20篇 |
1988年 | 35篇 |
1987年 | 30篇 |
1986年 | 20篇 |
1985年 | 15篇 |
1984年 | 27篇 |
1983年 | 22篇 |
1982年 | 22篇 |
1981年 | 16篇 |
1980年 | 20篇 |
1979年 | 16篇 |
1978年 | 17篇 |
1976年 | 18篇 |
1975年 | 19篇 |
1974年 | 12篇 |
排序方式: 共有7475条查询结果,搜索用时 15 毫秒
21.
Mohamed Sadok Cherif Habib Chabchoub Belaïd Aouni 《International Transactions in Operational Research》2010,17(1):85-102
Quality function deployment (QFD) is a customer-oriented design tool for developing new or improved products to achieve higher customer satisfaction by integrating various functions of an organization. The engineering characteristics (ECs) affecting the product performances are designed to match the customer attributes (CAs). However, from the viewpoint of the QFD team, product design processes are performed in imprecise environments, and more than one factor must be taken into account in determining the target levels of ECs, especially the limited resources and increased market competition. This paper presents an imprecise goal programming (GP) approach to determine the optimum target levels of ECs in QFD for maximizing customer satisfaction under resource limitation and considerations of market competition. Based on benchmarking data of CAs, the concept of satisfaction functions is utilized to formulate explicitly the customer's preferences and to integrate the competitive analysis of target market into the modelling and solution process. In addition, the relationships linking CAs and ECs and the ECs to each other are integrated by functional relationships. The proposed approach will be illustrated through a car door design example. 相似文献
22.
We present a secure routing protocol that is immune to Sybil attacks and that can tolerate collusion of Byzantine routers. It can tolerate either initial collusion of Byzantine routers or runtime collusion of non-adjacent Byzantine routers, both in the absence of runtime collusion between adjacent routers. For these settings, the calculated distance from a destination to a node is not smaller than the actual shortest distance from the destination to the node. The protocol can also simultaneously tolerate initial collusion of Byzantine routers and runtime collusion of adjacent Byzantine routers but in the absence of runtime collusion between non-adjacent routers. For this setting, it guarantees a bound on the difference between the calculated distance and the actual shortest distance. The bound depends on the number of Byzantine routers on a path. The protocol makes very weak timing assumptions and requires synchronization only between neighbors or second neighbors. We propose to use this protocol for secure localization of routers using hop-count distances, which can be then used as a proof of identity of nodes. 相似文献
23.
Mohamed Sahli Christine Millot Claude Roques-Carmes Chantal Khan Malek 《Microsystem Technologies》2009,15(6):827-835
Numerical modelling of the deformation of a polymer using the finite elements method in axisymetrical mode was performed using the LsDyna® software to describe the filling of micro-cavities during the forming process of the material using the hot embossing. These simulations firstly allow verifying whether the chosen forming process conditions promote or not an optimized filling of the superficial cavities in order to achieve precise replicas which best reproduce the superficial topography of the mould. The simulations were carried out to evaluate the filling of the cavities taking into account the mechanical behaviour of the selected polymer into the model. Moreover, these models were developed to verify the effect of the distribution of the mould cavities on their filling. The influence of the mobility of non deformable rigid plates on the filling of the cavities represents an auxiliary variable. In the approach presented, the compression plates are assumed to be parallel and non deformable, whereas the polymer disk follows a rubbery behaviour around a temperature equal to 140°C. Globally the modelling results are satisfactory for they are rather close to the experimental observations conducted. In summary, the effect of the normal stress as also the distribution of micro-cavities at the mould surface seem to prevail in the case of the forming process by hot embossing. 相似文献
24.
Andrew Walenstein Rachit Mathur Mohamed R. Chouchane Arun Lakhotia 《Journal in Computer Virology》2008,4(4):307-322
A malware mutation engine is able to transform a malicious program to create a different version of the program. Such mutation
engines are used at distribution sites or in self-propagating malware in order to create variation in the distributed programs.
Program normalization is a way to remove variety introduced by mutation engines, and can thus simplify the problem of detecting
variant strains. This paper introduces the “normalizer construction problem” (NCP), and formalizes a restricted form of the
problem called “NCP=”, which assumes a model of the engine is already known in the form of a term rewriting system. It is
shown that even this restricted version of the problem is undecidable. A procedure is provided that can, in certain cases,
automatically solve NCP= from the model of the engine. This procedure is analyzed in conjunction with term rewriting theory
to create a list of distinct classes of normalizer construction problems. These classes yield a list of possible attack vectors.
Three strategies are defined for approximate solutions of NCP=, and an analysis is provided of the risks they entail. A case
study using the virus suggests the approximations may be effective in practice for countering mutated malware.
R. Mathur is presently at McAfee AVERT Labs. 相似文献
25.
Disruption damage conditions for future large tokamaks like ITER are nearly impossible to simulate on current tokamaks. The electrothermal plasma source SIRENS has been designed, constructed, and operated to produce high density (> 1025/m3), low temperature (1–3 eV) plasma formed by the ablation of the insulator with currents of up to 100 kA (100 s pulse length) and energies up to 15 kJ. The source heat fluence (variable from 0.2 to 7 MJ/m2) is adequate for simulation of the thermal quench phase of plasma disruption in future fusion tokamaks. Different materials have been exposed to the high heat flux in SIRENS, where comparative erosion behavior was obtained. Vapor shield phenomena has been characterized for different materials, and the energy transmission factor through the shielding layer is obtained. The device is also equipped with a magnet capable of producing a parallel magnetic field (up to 16 T) over a 8 msec pulse length. The magnetic field is produced to decrease the turbulent energy transport through the vapor shield, which provides further reduction of surface erosion (magnetic vapor shield effect). 相似文献
26.
27.
This study considers the content of the papers published by ASCE’s Journal of Management in Engineering, which has witnessed a growth in number of papers and breadth of participation, particularly of international origin, during the 1985–2002 period. The content is analyzed in two main dimensions: the type of subject and its composing topics, and the type of contributors to the journal. The analysis shows the evolution of the engineering management discipline as represented in the journal. Over the years the discipline has been enriched by an increasing number of contributions on corporate strategies and programs, organizational change, and cultures issues, as well as a growing interest in project management topics, such as quality planning and evaluation of alternative project delivery systems. The number of papers by practitioners, initially the largest contributing group to the journal, has declined significantly over the years. 相似文献
28.
Mohamed I. Ali Mohamed A.-F. El-Kaschef Abou-Elfotooh G. Hammam 《Advanced Synthesis \u0026amp; Catalysis》1974,316(2):259-266
2,3,4,5-Tetrahydro-benzo[b]thiepin-5-one, its 7-methyl derivative, and their S, S-dioxides condense with aromatic aldehydes to give the corresponding 4-arylidene derivatives 3 and 4 . Compounds 4 react with hydrazine and phenylhydrazine to yield 3, 3a, 4, 5-tetrahydro-2 H-benzo-[b]thiepino[4, 5-c]pyrazole S, S-dioxide derivatives 5 and 6 . Some of the arylidene derivatives 4 add GRIGNARD reagents to give 7 . The IR spectra of representative examples are discussed. 相似文献
29.
Nazmi Abdel Latif Kassab Mohamed Helmy El Nagdy Hamed Abdel Reheem Ead 《Advanced Synthesis \u0026amp; Catalysis》1973,315(2):265-273
The reaction of 5-arylidene-4-arylimino-2-thiazolidinones 4 with GRIGNARD reagents effected 1,4-addition to the exocyclic CC bond with the formation of 5 . Alkylation of the arylidene derivatives 4 with diazomethane or methyl iodide results in the formation of the N-methyl derivatives 6 . Treatment of 6 with phenylmagnesium bromide effects addition of the reagent to the double bond of the lateral chain to yield products, proved to have structure 8 . The 5-arylazo derivatives 9 of 4-arylimino-2-thiazolidinones were obtained by coupling 4 with aromatic diazonium chlorides. Compounds 9 were N-methylated with diazomethane to yield 10 . 相似文献
30.
Ahmed R. Weshahy Ahmed K. Sakr Ayman A. Gouda Bahig M. Atia H. H. Somaily Mohamed Y. Hanfi M. I. Sayyed Ragaa El Sheikh Enass M. El-Sheikh Hend A. Radwan Mohamed F. Cheira Mohamed A. Gado 《International journal of molecular sciences》2022,23(15)
Spent Ni–Cd batteries are now considered an important source for many valuable metals. The recovery of cadmium, cobalt, and nickel from spent Ni–Cd Batteries has been performed in this study. The optimum leaching process was achieved using 20% H2SO4, solid/liquid (S/L) 1/5 at 80 °C for 6 h. The leaching efficiency of Fe, Cd, and Co was nearly 100%, whereas the leaching efficiency of Ni was 95%. The recovery of the concerned elements was attained using successive different separation techniques. Cd(II) ions were extracted by a solvent, namely, Adogen® 464, and precipitated as CdS with 0.5% Na2S solution at pH of 1.25 and room temperature. The extraction process corresponded to pseudo-2nd-order. The prepared PTU-MS silica was applied for adsorption of Co(II) ions from aqueous solution, while the desorption process was performed using 0.3 M H2SO4. Cobalt was precipitated at pH 9.0 as Co(OH)2 using NH4OH. The kinetic and thermodynamic parameters were also investigated. Nickel was directly precipitated at pH 8.25 using a 10% NaOH solution at ambient temperature. FTIR, SEM, and EDX confirm the structure of the products. 相似文献