全文获取类型
收费全文 | 2673篇 |
免费 | 190篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 21篇 |
综合类 | 5篇 |
化学工业 | 763篇 |
金属工艺 | 75篇 |
机械仪表 | 87篇 |
建筑科学 | 79篇 |
矿业工程 | 1篇 |
能源动力 | 202篇 |
轻工业 | 360篇 |
水利工程 | 33篇 |
石油天然气 | 28篇 |
武器工业 | 1篇 |
无线电 | 242篇 |
一般工业技术 | 543篇 |
冶金工业 | 78篇 |
原子能技术 | 18篇 |
自动化技术 | 335篇 |
出版年
2024年 | 10篇 |
2023年 | 57篇 |
2022年 | 111篇 |
2021年 | 200篇 |
2020年 | 133篇 |
2019年 | 153篇 |
2018年 | 153篇 |
2017年 | 144篇 |
2016年 | 150篇 |
2015年 | 108篇 |
2014年 | 170篇 |
2013年 | 264篇 |
2012年 | 169篇 |
2011年 | 229篇 |
2010年 | 143篇 |
2009年 | 113篇 |
2008年 | 77篇 |
2007年 | 68篇 |
2006年 | 49篇 |
2005年 | 28篇 |
2004年 | 22篇 |
2003年 | 31篇 |
2002年 | 23篇 |
2001年 | 21篇 |
2000年 | 22篇 |
1999年 | 15篇 |
1998年 | 20篇 |
1997年 | 14篇 |
1996年 | 13篇 |
1995年 | 8篇 |
1994年 | 10篇 |
1993年 | 12篇 |
1991年 | 7篇 |
1990年 | 7篇 |
1989年 | 5篇 |
1988年 | 9篇 |
1987年 | 5篇 |
1986年 | 8篇 |
1985年 | 7篇 |
1984年 | 5篇 |
1983年 | 6篇 |
1982年 | 9篇 |
1981年 | 7篇 |
1980年 | 6篇 |
1978年 | 5篇 |
1977年 | 5篇 |
1976年 | 5篇 |
1975年 | 7篇 |
1974年 | 5篇 |
1973年 | 6篇 |
排序方式: 共有2871条查询结果,搜索用时 15 毫秒
41.
42.
Jens Petter Johansen Petter Grytten Almklov Abdul Basit Mohammad 《Cognition, Technology & Work》2016,18(2):333-350
This paper explores how different forms of anticipatory work contribute to reliability in high-risk space operations. It is based on ethnographic field work, participant observation and interviews supplemented with video recordings from a control room responsible for operating a microgravity greenhouse at the International Space Station (ISS). Drawing on examples from different stages of a biological experiment on the ISS, we demonstrate how engineers, researchers and technicians work to anticipate and proactively mitigate possible problems. Space research is expensive and risky. The experiments are planned over the course of many years by a globally distributed network of organizations. Owing to the inaccessibility of the ISS, every trivial detail that could possibly cause a problem is subject to scrutiny. We discuss what we label anticipatory work: practices constituted of an entanglement of cognitive, social and technical elements involved in anticipating and proactively mitigating everything that might go wrong. We show how the nature of anticipatory work changes between planning and the operational phases of an experiment. In the planning phase, operators inscribe their anticipation into technology and procedures. In the operational phase, we show how troubleshooting involves the ability to look ahead in the evolving temporal trajectory of the ISS operations and to juggle pre-planned fixes along these trajectories. A key objective of this paper is to illustrate how anticipation is shared between humans and different forms of technology. Moreover, it illustrates the importance of including considerations of temporality in safety and reliability research. 相似文献
43.
M. Hariharan C.Y. Fook R. Sindhu Abdul Hamid Adom Sazali Yaacob 《Digital Signal Processing》2013,23(3):952-959
Dysfluency and stuttering are a break or interruption of normal speech such as repetition, prolongation, interjection of syllables, sounds, words or phrases and involuntary silent pauses or blocks in communication. Stuttering assessment through manual classification of speech dysfluencies is subjective, inconsistent, time consuming and prone to error. This paper proposes an objective evaluation of speech dysfluencies based on the wavelet packet transform with sample entropy features. Dysfluent speech signals are decomposed into six levels by using wavelet packet transform. Sample entropy (SampEn) features are extracted at every level of decomposition and they are used as features to characterize the speech dysfluencies (stuttered events). Three different classifiers such as k-nearest neighbor (kNN), linear discriminant analysis (LDA) based classifier and support vector machine (SVM) are used to investigate the performance of the sample entropy features for the classification of speech dysfluencies. 10-fold cross validation method is used for testing the reliability of the classifier results. The effect of different wavelet families on the classification performance is also performed. Experimental results demonstrate that the proposed features and classification algorithms give very promising classification accuracy of 96.67% with the standard deviation of 0.37 and also that the proposed method can be used to help speech language pathologist in classifying speech dysfluencies. 相似文献
44.
Mohajeri S Aziz HA Zahed MA Mohajeri L Bashir MJ Aziz SQ Adlan MN Isa MH 《Water science and technology》2011,64(8):1652-1660
Landfill leachate is one of the most recalcitrant wastes for biotreatment and can be considered a potential source of contamination to surface and groundwater ecosystems. In the present study, Fenton oxidation was employed for degradation of stabilized landfill leachate. Response surface methodology was applied to analyze, model and optimize the process parameters, i.e. pH and reaction time as well as the initial concentrations of hydrogen peroxide and ferrous ion. Analysis of variance showed that good coefficients of determination were obtained (R2 > 0.99), thus ensuring satisfactory agreement of the second-order regression model with the experimental data. The results indicated that, pH and its quadratic effects were the main factors influencing Fenton oxidation. Furthermore, antagonistic effects between pH and other variables were observed. The optimum H2O2 concentration, Fe(II) concentration, pH and reaction time were 0.033 mol/L, 0.011 mol/L, 3 and 145 min, respectively, with 58.3% COD, 79.0% color and 82.1% iron removals. 相似文献
45.
The increasing number of mobile users raises issues about coverage extension in some areas such as rural zones, indoor or underground locations: one of suggestion solution to accommodate this growing of mobile user is femtocell. Femtocell have been attracting considerable attention in mobile communications, it is a small base station that install to improve the indoor coverage of a given cellular and to enhance user's capacity. Call admission control and resource allocation infemtocell's hybrid mode are an essential performance promotion issue. Developing methods for femtocell utilization is very comparative nowadays. The two major limitations of wireless communication are capacity and range. The main contribution of our paper is developing resource allocation scheme that can manage the femocell resources between subscriber (femtocell user) and non-subscriber (macrocell user in order to maximizing the system utilizations, we provide a mechanism that leads to serve more users by admitting more subscribers basing on adjusting QoS of the connected users. 相似文献
46.
S. Saravanan A.K. Abdul Hakeem P. Kandaswamy J. Lee 《Computers & Mathematics with Applications》2008,55(12):2903-2912
Buoyancy driven convection in a square cavity induced by two mutually orthogonal arbitrarily placed heated thin plates is studied numerically under isothermal and isoflux boundary conditions. The flow is assumed to be two-dimensional. The coupled governing equations were solved by the finite difference method using the Alternating Direction Implicit technique and Successive Over Relaxation method. The steady state results are depicted in terms of streamline and isotherm plots. It is found that the resulting convection pattern is stronger for the isothermal boundary condition. A better overall heat transfer can be achieved by placing one of the plates far away from the center of the cavity for isothermal boundary condition and near the center of the cavity for isoflux boundary condition. 相似文献
47.
This paper describes the design and modelling of ultrasonic tomography for two-component high-acoustic impedance mixture such as liquid/gas and oil/gas flow which commonly found in chemical columns and industrial pipelines. The information obtained through this research has proven to be useful for further development of ultrasonic tomography. This includes acquiring and processing ultrasonic signals from the transducers to obtain the information of the spatial distributions of liquid and gas in an experimental column. Analysis on the transducers’ signals has been carried out to distinguish between the observation time and the Lamb waves. The information obtained from the observation time is useful for further development of the image reconstruction. 相似文献
48.
Yawar Abbas Bangash Waseem Iqbal Saddaf Rubab Abdul Waheed Khan Waqas Aman 《International Journal of Communication Systems》2023,36(17):e5601
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy. 相似文献
49.
Ashit Kumar Dutta Mazen Mushabab Alqahtani Yasser Albagory Abdul Rahaman Wahab Sait Majed Alsanea 《计算机系统科学与工程》2023,44(3):2277-2292
Learning Management System (LMS) is an application software that is used in automation, delivery, administration, tracking, and reporting of courses and programs in educational sector. The LMS which exploits machine learning (ML) has the ability of accessing user data and exploit it for improving the learning experience. The recently developed artificial intelligence (AI) and ML models helps to accomplish effective performance monitoring for LMS. Among the different processes involved in ML based LMS, feature selection and classification processes find beneficial. In this motivation, this study introduces Glowworm-based Feature Selection with Machine Learning Enabled Performance Monitoring (GSO-MFWELM) technique for LMS. The key objective of the proposed GSO-MFWELM technique is to effectually monitor the performance in LMS. The proposed GSO-MFWELM technique involves GSO-based feature selection technique to select the optimal features. Besides, Weighted Extreme Learning Machine (WELM) model is applied for classification process whereas the parameters involved in WELM model are optimally fine-tuned with the help of Mayfly Optimization (MFO) algorithm. The design of GSO and MFO techniques result in reduced computation complexity and improved classification performance. The presented GSO-MFWELM technique was validated for its performance against benchmark dataset and the results were inspected under several aspects. The simulation results established the supremacy of GSO-MFWELM technique over recent approaches with the maximum classification accuracy of 0.9589. 相似文献
50.
An efficient numerical algorithm for the study of time fractional Tricomi and Keldysh type equations
Ghafoor Abdul Haq Sirajul Rasool Amir Baleanu Dumitru 《Engineering with Computers》2022,38(4):3185-3195
Engineering with Computers - This work addresses a hybrid scheme for the numerical solutions of time fractional Tricomi and Keldysh type equations. In proposed methodology, Haar wavelets are used... 相似文献