全文获取类型
收费全文 | 2074篇 |
免费 | 80篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 18篇 |
综合类 | 2篇 |
化学工业 | 685篇 |
金属工艺 | 70篇 |
机械仪表 | 28篇 |
建筑科学 | 52篇 |
能源动力 | 129篇 |
轻工业 | 127篇 |
水利工程 | 13篇 |
石油天然气 | 9篇 |
无线电 | 157篇 |
一般工业技术 | 442篇 |
冶金工业 | 151篇 |
原子能技术 | 30篇 |
自动化技术 | 247篇 |
出版年
2024年 | 6篇 |
2023年 | 23篇 |
2022年 | 44篇 |
2021年 | 69篇 |
2020年 | 55篇 |
2019年 | 51篇 |
2018年 | 87篇 |
2017年 | 66篇 |
2016年 | 88篇 |
2015年 | 33篇 |
2014年 | 63篇 |
2013年 | 147篇 |
2012年 | 109篇 |
2011年 | 142篇 |
2010年 | 88篇 |
2009年 | 88篇 |
2008年 | 101篇 |
2007年 | 81篇 |
2006年 | 81篇 |
2005年 | 66篇 |
2004年 | 49篇 |
2003年 | 32篇 |
2002年 | 44篇 |
2001年 | 21篇 |
2000年 | 26篇 |
1999年 | 27篇 |
1998年 | 29篇 |
1997年 | 24篇 |
1996年 | 21篇 |
1995年 | 32篇 |
1994年 | 20篇 |
1993年 | 31篇 |
1992年 | 30篇 |
1991年 | 20篇 |
1990年 | 28篇 |
1989年 | 18篇 |
1988年 | 18篇 |
1987年 | 26篇 |
1986年 | 18篇 |
1985年 | 21篇 |
1984年 | 16篇 |
1983年 | 25篇 |
1982年 | 21篇 |
1981年 | 21篇 |
1980年 | 12篇 |
1979年 | 12篇 |
1978年 | 6篇 |
1977年 | 5篇 |
1976年 | 6篇 |
1970年 | 3篇 |
排序方式: 共有2160条查询结果,搜索用时 328 毫秒
51.
Chlorinated ground rubber tire (Cl‐GRT) particles were used as filler in a plasticized polyvinylchloride (PVC) to develop a melt‐processable rubber composition. Physical properties of the Cl‐GRT‐filled PVC compound showed improvement compared to the nonchlorinated counterpart. Interaction between Cl‐GRT and PVC was examined on the basis of results of stress relaxation, dynamic mechanical thermal analysis, and solvent swelling studies. The Cl‐GRT could be loaded upto 40 parts per hundred parts of PVC, and the composition still retains the elastomeric characteristics. The Cl‐GRT‐filled composite was found to be reprocessable like the unfilled PVC compound. © 2002 Wiley Periodicals, Inc. J Appl Polym Sci 84: 622–631, 2002; DOI 10.1002/app.10352 相似文献
52.
A technique that is sensitive to change in texture is more reliable than mechanical property measurements for the study of
recrystallization behavior in alloys where recrystallization is coupled with precipitation. Hence, ultrasonic velocity measurements
have been employed to characterize microstructural changes during annealing of cold worked Ti-modified austenitic stainless
steel where precipitation of TiC is known to retard recrystallization. Mechanical property measurements, such as strength
and hardness, could not distinguish the recovery and recrystallization regimes, and it was difficult to determine the exact
time or temperature for onset of recrystallization. The variation of velocity with annealing time or annealing temperature
exhibited a three-stage behavior. The velocity exhibited a slight increase in the recovery region followed by a sharp and
continuous decrease in the recrystallization region and reached saturation on completion of recrystallization. Based on the
microstructural investigations, the three stages were identified to be recovery, progress of recrystallization, and completion
of recrystallization. Velocity measurements could sense the onset, progress, and completion of recrystallization more accurately
compared with that of hardness and strength measurements. 相似文献
53.
54.
Logan Molyneux Krishnan Vasudevan Homero Gil de Zúñiga 《Journal of Computer-Mediated Communication》2015,20(4):381-399
Recent research suggests that social interactions in video games may lead to the development of community bonding and prosocial attitudes. Building on this line of research, a national survey of U.S. adults finds that gamers who develop ties with a community of fellow gamers possess gaming social capital, a new gaming‐related community construct that is shown to be a positive antecedent in predicting both face‐to‐face social capital and civic participation. 相似文献
55.
Shree?GargEmail authorView authors OrcID profile Sateesh?K.?Peddoju Anil?K.?Sarje 《Peer-to-Peer Networking and Applications》2016,9(6):1209-1225
P2P Botnets are one of the most malevolent threats to the Internet users due to their resiliency against takedown efforts. In this paper, we propose a bot detection system that is capable of detecting stealthy bots in a network. This system treats network traffic as a data stream, segregating the traffic into two parallel streams. The detection is based on failure traffic and communication traffic. The traffic is analyzed during small time window, and the infected hosts are reported immediately. The network administrator can monitor the status of hosts in the network and can take the necessary action before the infected hosts harm the system or can involve in the attacks. Experiments and evaluation of the proposed system on a variety of P2P data transfer applications and P2P botnets have demonstrated high accuracy of detection. The scalability of the proposed system is exhibited through its implementation on Hadoop MapReduce. 相似文献
56.
57.
58.
In mobile commerce, companies provide location based services to mobile users, who report their locations with a certain level of granularity to maintain a degree of anonymity. This level of granularity depends on their perceived risk as well as the incentives they receive in the form of monetary benefits or improved mobile services. This paper formulates a quantitative model in which information theoretic metrics such as entropy, quantify the anonymity level of mobile users. The individual perceived risks of users and the benefits they obtain are defined as functions of their chosen location information granularity. The interaction between the mobile commerce company and its users is investigated using mechanism design techniques as a privacy game. The user best responses and optimal strategies for the company are derived under budgetary constraints on incentives, which are provided to users in order to convince them to share their private information at the desired level of granularity. Information limitations in the system are analyzed to capture more realistic scenarios where the companies do not have access to user utility functions. Iterative distributed algorithm and regression learning methods are investigated to design mechanisms that overcome these limitations. The results obtained are demonstrated with a numerical example and simulations based on real GPS data. 相似文献
59.
Anil?Kumar?Karanam Kenneth?E.?JansenEmail author Christian?H.?Whiting 《Engineering with Computers》2008,24(1):17-26
The pre-processing stage of finite element analysis of the Navier–Stokes equations is becoming increasingly important as the
desire for more general boundary conditions, as well as applications to parallel computers increases. The set up of general
boundary conditions and communication structures for parallel computations should be accomplished during the pre-processing
phase of the analysis, if possible, to ensure efficient computations for large scale problems in computational fluid dynamics.
This paper introduces a general methodology for geometry based boundary condition application and pre-computing of parallel
communication tasks.
A. K. Karanam was supported by NSF Grant No. 9985340.
C. H. Whiting was supported by a grant from NASA LaRC. 相似文献
60.
Jiayang Liu Lin Zhong Jehan Wickramasuriya Venu Vasudevan 《Pervasive and Mobile Computing》2009,5(6):657-675
The proliferation of accelerometers on consumer electronics has brought an opportunity for interaction based on gestures. We present uWave, an efficient recognition algorithm for such interaction using a single three-axis accelerometer. uWave requires a single training sample for each gesture pattern and allows users to employ personalized gestures. We evaluate uWave using a large gesture library with over 4000 samples for eight gesture patterns collected from eight users over one month. uWave achieves 98.6% accuracy, competitive with statistical methods that require significantly more training samples. We also present applications of uWave in gesture-based user authentication and interaction with 3D mobile user interfaces. In particular, we report a series of user studies that evaluates the feasibility and usability of lightweight user authentication. Our evaluation shows both the strength and limitations of gesture-based user authentication. 相似文献