全文获取类型
收费全文 | 1291篇 |
免费 | 85篇 |
专业分类
电工技术 | 2篇 |
化学工业 | 500篇 |
金属工艺 | 16篇 |
机械仪表 | 29篇 |
建筑科学 | 56篇 |
矿业工程 | 1篇 |
能源动力 | 33篇 |
轻工业 | 289篇 |
水利工程 | 7篇 |
石油天然气 | 6篇 |
无线电 | 52篇 |
一般工业技术 | 160篇 |
冶金工业 | 82篇 |
原子能技术 | 2篇 |
自动化技术 | 141篇 |
出版年
2024年 | 2篇 |
2023年 | 14篇 |
2022年 | 101篇 |
2021年 | 92篇 |
2020年 | 41篇 |
2019年 | 47篇 |
2018年 | 46篇 |
2017年 | 42篇 |
2016年 | 56篇 |
2015年 | 47篇 |
2014年 | 55篇 |
2013年 | 90篇 |
2012年 | 89篇 |
2011年 | 87篇 |
2010年 | 74篇 |
2009年 | 72篇 |
2008年 | 83篇 |
2007年 | 59篇 |
2006年 | 46篇 |
2005年 | 37篇 |
2004年 | 34篇 |
2003年 | 20篇 |
2002年 | 21篇 |
2001年 | 23篇 |
2000年 | 11篇 |
1999年 | 11篇 |
1998年 | 2篇 |
1997年 | 9篇 |
1996年 | 9篇 |
1995年 | 9篇 |
1994年 | 6篇 |
1993年 | 5篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 7篇 |
1989年 | 3篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1980年 | 2篇 |
1979年 | 2篇 |
1975年 | 1篇 |
1974年 | 2篇 |
1972年 | 2篇 |
排序方式: 共有1376条查询结果,搜索用时 9 毫秒
91.
Poly(ethylene terephthalate) (PET) is one of the most commonly employed polymers in the textile industry. Its relevance as a source of evidence in the reconstruction of criminal cases is nevertheless very limited because the properties and morphologies of fibers from different producers tend to be very similar. By integrating bands, obtained on single fibers by infrared (IR) microscopy, associated with trans and gauche conformation and to the O-H end-groups of the molecules, a method is proposed that can discriminate otherwise similar PET fibers. The absorbancies at 1370 and at 846 cm(-1) relative, respectively, to the gauche and trans conformation, were measured and ratioed. The end-group content was evaluated by ratioing the absorbancies of the signals at 3440 and at 874 cm(-1). Relative standard deviation (R. S. D.) was 1% for repetitive analyses on the same location of the same single fiber. Precision was reduced if the ratios were measured along the length of a single fiber (R. S. D. = 3%) and even further when different fibers of the same sample were examined (R. S. D. varied from 2 to 10%). This simple method can greatly enhance the evidential value of PET fibers by subclassifying them, thus helping the Court to better assess their significance. 相似文献
92.
This paper introduces the computer security domain of anomaly detection and formulates it as a machine learning task on temporal sequence data. In this domain, the goal is to develop a model or profile of the normal working state of a system user and to detect anomalous conditions as long-term deviations from the expected behavior patterns. We introduce two approaches to this problem: one employing instance-based learning (IBL) and the other using hidden Markov models (HMMs). Though not suitable for a comprehensive security solution, both approaches achieve anomaly identification performance sufficient for a low-level focus of attention detector in a multitier security system. Further, we evaluate model scaling techniques for the two approaches: two clustering techniques for the IBL approach and variation of the number of hidden states for the HMM approach. We find that over both model classes and a wide range of model scales, there is no significant difference in performance at recognizing the profiled user. We take this invariance as evidence that, in this security domain, limited memory models (e.g., fixed-length instances or low-order Markov models) can learn only part of the user identity information in which we're interested and that substantially different models will be necessary if dramatic improvements in user-based anomaly detection are to be achieved. 相似文献
93.
Douglas D. Gransberg Carla Lopez del Puerto Daniel Humphrey 《Canadian Metallurgical Quarterly》2007,133(6):404-408
Intuitively, there should be a relationship between the size of the design fee for a transportation project and the quality of the resulting design. This study sought that relationship by looking at the fee expressed as a percentage of the construction cost and the final construction cost growth from the engineer’s initial estimate of the construction cost at the time the design contract was awarded. The research team analyzed 31 projects from the Oklahoma Turnpike Authority with a total construction value of $90 million. The projects were divided into road and bridge projects. Based on the results of the analysis, it seems that as the design fee decreases, the absolute percentage of construction cost growth from the engineer’s early estimate increases. The relationship is strongest for bridge projects, which tend to be more technically complex to design than roadway projects. This confirms for U.S. projects the result of an earlier study in Saudi Arabia. This paper concludes that the design fee should be viewed as an investment at a point in time where the ability to impact the project is the highest and can accrue the benefit of reduced cost growth. 相似文献
94.
95.
Juntunen Cindy L.; Atkinson Donald R.; Reyes Carla; Gutierrez Maria 《Canadian Metallurgical Quarterly》1994,31(2):327
Investigated whether (1) feminist identity development for women therapists was related to their use of feminist therapy behaviors (FTBs) and (2) feminist identity development and use of FTBs for women therapists were related to self-identification as a feminist therapist. 153 women psychologists (aged 30–77 yrs) were administered a women's issues in therapy questionnaire, which included a short version of the Feminist Identity Scale (FIS; K. M. Rickard, 1989, 1990). Ss were categorized into stages of feminine identity development according to their scores on 4 subscales of the FIS: Passive-Acceptance (PA), Revelation (REV), Embeddedness (EMB), and Synthesis (SYN). Ss scoring high on SYN and REV, and low on PA, reported greater use of FTBs; scores on the EMB were not related to the use of FTBs. All 4 subscales were predictive of women therapists who self-identified as feminist therapists. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
96.
In this paper we present algorithms for solving some combinatorial problems on one-dimensional processor arrays in which data flows in only one direction through the array. The problems we consider are: ranking the elements in a chain of sizen, rooting a spanning tree withn vertices, and computing biconnected components of a connected graph withn vertices. We show that each of these problems can be solved using arrays of sizen in which the data enters at the first cell and flows through the array in only one direction until it leaves the last cell as output. We also show how the biconnectivity algorithm for the array yields a new sequential algorithm for computing biconnected components which uses onlyO(n) locations of random access memory. 相似文献
97.
Self‐welding 1‐butene/ethylene copolymers from metallocene catalysts: Structure,morphology, and mechanical properties 下载免费PDF全文
Samples of random copolymers consisting of 1‐butene modified with a low ethylene content (4, 5, 8% by weight) produced with metallocene catalysts were studied to elucidate the polymorphic behavior of this new class of materials and to characterize them from a structural, morphological, and mechanical point of view. The samples cooled down from the melt are in amorphous phase and crystallize in a mixture of form I and I′ or in pure form I′ with aging time, according to the C2 content. Infrared and nuclear magnetic resonance spectroscopy, X‐ray diffraction and microscopic techniques were used to follow the changes of the material with aging time and to correlate the structural and morphological behavior with the peculiar mechanical properties that differentiate the samples with increasing C2 content. The presence, in the aged samples with higher C2 content, of the pure form I′ induces the peculiar ability to self‐welding and these copolymers combine high flexibility with good elasticity and ductility and can be processed directly or used as modifying agents in polymers. © 2013 Wiley Periodicals, Inc. J. Appl. Polym. Sci. 2014 , 131, 40119. 相似文献
98.
Reinaldo Barros Geraldo Plínio Cunha Sathler André Luiz Louren?o Max Seidy Saito Lucio M. Cabral Pabulo Henrique Rampelotto Helena Carla Castro 《International journal of molecular sciences》2014,15(10):17901-17919
Platelets are cytoplasmatic fragments from bone marrow megakaryocytes present in blood. In this work, we review the basis of platelet mechanisms, their participation in syndromes and in arterial thrombosis, and their potential as a target for designing new antithrombotic agents. The option of new biotechnological sources is also explored. 相似文献
99.
100.
Gloria Lazzeri Carla L. Busceti Francesca Biagioni Cinzia Fabrizi Gabriele Morucci Filippo S. Giorgi Michela Ferrucci Paola Lenzi Stefano Puglisi-Allegra Francesco Fornai 《International journal of molecular sciences》2021,22(13)
Norepinephrine (NE) neurons and extracellular NE exert some protective effects against a variety of insults, including methamphetamine (Meth)-induced cell damage. The intimate mechanism of protection remains difficult to be analyzed in vivo. In fact, this may occur directly on target neurons or as the indirect consequence of NE-induced alterations in the activity of trans-synaptic loops. Therefore, to elude neuronal networks, which may contribute to these effects in vivo, the present study investigates whether NE still protects when directly applied to Meth-treated PC12 cells. Meth was selected based on its detrimental effects along various specific brain areas. The study shows that NE directly protects in vitro against Meth-induced cell damage. The present study indicates that such an effect fully depends on the activation of plasma membrane β2-adrenergic receptors (ARs). Evidence indicates that β2-ARs activation restores autophagy, which is impaired by Meth administration. This occurs via restoration of the autophagy flux and, as assessed by ultrastructural morphometry, by preventing the dissipation of microtubule-associated protein 1 light chain 3 (LC3) from autophagy vacuoles to the cytosol, which is produced instead during Meth toxicity. These findings may have an impact in a variety of degenerative conditions characterized by NE deficiency along with autophagy impairment. 相似文献