全文获取类型
收费全文 | 7520篇 |
免费 | 120篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 73篇 |
综合类 | 5篇 |
化学工业 | 1093篇 |
金属工艺 | 113篇 |
机械仪表 | 207篇 |
建筑科学 | 235篇 |
矿业工程 | 33篇 |
能源动力 | 188篇 |
轻工业 | 530篇 |
水利工程 | 47篇 |
石油天然气 | 13篇 |
武器工业 | 2篇 |
无线电 | 640篇 |
一般工业技术 | 1174篇 |
冶金工业 | 2535篇 |
原子能技术 | 118篇 |
自动化技术 | 640篇 |
出版年
2021年 | 64篇 |
2020年 | 49篇 |
2019年 | 53篇 |
2018年 | 59篇 |
2017年 | 69篇 |
2016年 | 71篇 |
2015年 | 59篇 |
2014年 | 106篇 |
2013年 | 236篇 |
2012年 | 160篇 |
2011年 | 256篇 |
2010年 | 184篇 |
2009年 | 187篇 |
2008年 | 216篇 |
2007年 | 208篇 |
2006年 | 220篇 |
2005年 | 153篇 |
2004年 | 167篇 |
2003年 | 156篇 |
2002年 | 144篇 |
2001年 | 146篇 |
2000年 | 136篇 |
1999年 | 176篇 |
1998年 | 731篇 |
1997年 | 401篇 |
1996年 | 339篇 |
1995年 | 199篇 |
1994年 | 188篇 |
1993年 | 217篇 |
1992年 | 115篇 |
1991年 | 112篇 |
1990年 | 108篇 |
1989年 | 112篇 |
1988年 | 88篇 |
1987年 | 95篇 |
1986年 | 101篇 |
1985年 | 103篇 |
1984年 | 104篇 |
1983年 | 85篇 |
1982年 | 82篇 |
1981年 | 114篇 |
1980年 | 101篇 |
1979年 | 93篇 |
1978年 | 82篇 |
1977年 | 110篇 |
1976年 | 183篇 |
1975年 | 76篇 |
1974年 | 47篇 |
1973年 | 68篇 |
1972年 | 46篇 |
排序方式: 共有7646条查询结果,搜索用时 15 毫秒
111.
R. J. J. Williams M. A. Benavente R. A. Ruseckaite M. S. Churio H. G. Hack 《Polymer Engineering and Science》1990,30(18):1140-1145
Room temperature mechanical properties, such as flexural strength and impact resistance, of epoxies and graphite/epoxy composites go through a maximum as a function of epoxy conversion. For tetraglycidyl 4,4′-diaminodiphenylmethane (TGDDM)-4,4′-diamlnodiphenylsulfone (DDS) formulations, the recommended cure cycle prescribes a maximum temperature close to 177°C. The maximum extent of reaction that may be obtained at this temperature is determined from the vitrification curve. At this maximum conversion, balanced mechanical and physical properties are attained in the partially cured specimen. However, if the standard cycle is used to cure thick parts, the maximum temperature inside the sample increases beyond 177°C. This leads to a complete conversion in most of the part and a consequent impairment of resulting physical and mechanical properties. It is shown how numerical solutions of differential energy and mass balances may be used to propose alternative cure cycles such that the maximum conversion at every point remains bounded by the vitrification curve. An illustration for a particular thickness is provided. 相似文献
112.
A model of the manufacture of rigid polyurethane foams by free rising is presented. The extent of cream and rise periods as well as the amount of blowing agent necessary to give the desired foam density are theoretically predicted. The rate of blowing agent evaporation is calculated from an experimental boiling temperature vs. composition curve. Experimental runs were carried out with a formulation consisting of a polymeric isocyanate, a polyether polyol based on sorbitol, a silicone-polyol block-copolymer as surfactant, dibutyltin dilaurate as catalyst, and trichlorofluoromethane as blowing agent. Mixing was performed in situ in the mold using a commercial foaming machine. Experimental results gave a satisfactory agreement with model predictions. A diagram containing all the relevant information may be theoretically built and used for the selection of adequate operating parameters for a given formulation. 相似文献
113.
The potential hazard of a carbonate-based, phosphate-free detergent was compared with that of a variety of granular and liquid
phosphate detergents. Evaluations were made using methods prescribed by the Federal Hazardous Substances Act (FHSA) and others
designed to more closely approximate exposure in actual use. Some phosphate products produced esophageal and gastric mucosal
irritation similar to that produced by the nonphosphate detergent, while others caused varying, lesser degrees of injury.
The nonphosphate detergent, as well as several phosphate products, was seriously irritating to the unwashed eye at required
FHSA test levels. Under more realistic conditions, eye irritation was reduced significantly. Skin irritation by the nonphosphate
product was comparable to that by phosphate detergents, and in some cases was lower. In skin irritation tests with human subjects,
results with the carbonate detergent were equal to or lower than those obtained with phosphate detergents. The carbonate detergent
was found not to be phototoxic, nor a contact- nor photo-sensitizer. Total alkalinity was shown not to correlate with the
severity of tissue injury in either test animals or in man.
Presented at the AOCS Short Course, “Update on Detergents and Raw Materials,” Lake Placid, New York, June 1971. 相似文献
114.
Mutation testing has traditionally been used as a defect injection technique to assess the effectiveness of a test suite as
represented by a “mutation score.” Recently, mutation testing tools have become more efficient, and industrial usage of mutation
analysis is experiencing growth. Mutation analysis entails adding or modifying test cases until the test suite is sufficient
to detect as many mutants as possible and the mutation score is satisfactory. The augmented test suite resulting from mutation
analysis may reveal latent faults and provides a stronger test suite to detect future errors which might be injected. Software
engineers often look for guidance on how to augment their test suite using information provided by line and/or branch coverage
tools. As the use of mutation analysis grows, software engineers will want to know how the emerging technique compares with
and/or complements coverage analysis for guiding the augmentation of an automated test suite. Additionally, software engineers
can benefit from an enhanced understanding of efficient mutation analysis techniques. To address these needs for additional
information about mutation analysis, we conducted an empirical study of the use of mutation analysis on two open source projects.
Our results indicate that a focused effort on increasing mutation score leads to a corresponding increase in line and branch
coverage to the point that line coverage, branch coverage and mutation score reach a maximum but leave some types of code
structures uncovered. Mutation analysis guides the creation of additional “common programmer error” tests beyond those written
to increase line and branch coverage. We also found that 74% of our chosen set of mutation operators is useful, on average,
for producing new tests. The remaining 26% of mutation operators did not produce new test cases because their mutants were
immediately detected by the initial test suite, indirectly detected by test suites we added to detect other mutants, or were
not able to be detected by any test.
Ben Smith is a second year Ph.D. student in Computer Science at North Carolina State University working as an RA under Dr. Laurie Williams. He received his Bachelor’s degree in Computer Science in May of 2007 and he hopes to receive his doctorate in 2012. He has begun work on developing SQL Coverage Metrics as a predictive measure of the security of a web application. This fall, he will be beginning the doctoral preliminary exam and working as a Testing Manager for the NCSU CSC Senior Design Center: North Carolina State’s capstone course for Computer Science. Finally, he has designed and maintained the websites for the Center for Open Software Engineering and ESEM 2009. Laurie Williams is an Associate Professor in the Computer Science Department of the College of Engineering at North Carolina State University. She leads the Software Engineering Reasearch group and is also the Director of the North Carolina State University Laboratory for Collaborative System Development and the Center for Open Software Engineering. She is also technical co-director of the Center for Open Software Engineering (COSE) and the area technical director of the Secure Open Systems Initiative (SOSI) at North Carolina State University. Laurie received her Ph.D. in Computer Science from the University of Utah, her MBA from Duke University, and her BS in Industrial Engineering from Lehigh University. She worked for IBM for nine years in Raleigh, NC before returning to academia. Laurie’s research interests include agile software development methodologies and practices, collaborative/pair programming, software reliability and testing, and software engineering for secure systems development. 相似文献
Laurie WilliamsEmail: |
Ben Smith is a second year Ph.D. student in Computer Science at North Carolina State University working as an RA under Dr. Laurie Williams. He received his Bachelor’s degree in Computer Science in May of 2007 and he hopes to receive his doctorate in 2012. He has begun work on developing SQL Coverage Metrics as a predictive measure of the security of a web application. This fall, he will be beginning the doctoral preliminary exam and working as a Testing Manager for the NCSU CSC Senior Design Center: North Carolina State’s capstone course for Computer Science. Finally, he has designed and maintained the websites for the Center for Open Software Engineering and ESEM 2009. Laurie Williams is an Associate Professor in the Computer Science Department of the College of Engineering at North Carolina State University. She leads the Software Engineering Reasearch group and is also the Director of the North Carolina State University Laboratory for Collaborative System Development and the Center for Open Software Engineering. She is also technical co-director of the Center for Open Software Engineering (COSE) and the area technical director of the Secure Open Systems Initiative (SOSI) at North Carolina State University. Laurie received her Ph.D. in Computer Science from the University of Utah, her MBA from Duke University, and her BS in Industrial Engineering from Lehigh University. She worked for IBM for nine years in Raleigh, NC before returning to academia. Laurie’s research interests include agile software development methodologies and practices, collaborative/pair programming, software reliability and testing, and software engineering for secure systems development. 相似文献
115.
A taxonomy of system attacker behavior reveals security vulnerabilities in RFID authorization and monitoring systems. RFID systems are classified by their informational goals-typically, authorization and monitoring. Authorization systems replace the more traditional approaches of granting an entity access to a particular zone, whereas monitoring systems establish an entity's location in that zone. Although their informational goals differ, the underlying hardware is identical for both types of systems; consequently, attacks at the hardware level are the same. However, because attacker behavior invalidates each subsystem's informational goals differently, RFID security requirements should consider these goals individually. 相似文献
116.
Williams RD 《FDA consumer》1994,28(8):16-19
To a child, pain and fear are inseparable. How to safely relieve both is a subject of growing debate and research. Only recently has a narcotic drug been approved specifically for children, and its use is controversial. 相似文献
117.
118.
We describe a photometer that measures light transmitted through excised eyes. The instrument, an ocular transmission photometer, employs sensitive single photon-counting techniques, and its usefulness has been tested by the study of the absorbance of rhodopsin in retinal rod cells in situ. We find that absorbances of rat rods agree well with those predicted by microspectrophotometry without making corrections for cellular mosaics. Additional tests of the ocular transmission photometer show that (a) the instrument is sensitive to subtle differences in rhodopsin absorbance, known to exist in specific locations in the rat retina, and (b) using the rate of rhodopsin bleaching as the measure of intensity, we can determine the intensity distribution at several locations across the rat retina. 相似文献
119.
LM Williams 《Canadian Metallurgical Quarterly》1995,8(4):649-673
This study provides evidence that some adults who claim to have recovered memories of sexual abuse recall actual events that occurred in childhood. One hundred twenty-nine women with documented histories of sexual victimization in childhood were interviewed and asked about abuse history. Seventeen years following the initial report of the abuse, 80 of the women recalled the victimization. One in 10 women (16% of those who recalled the abuse) reported that at some time in the past they had forgotten about the abuse. Those with a prior period of forgetting--the women with "recovered memories"--were younger at the time of abuse and were less likely to have received support from their mothers than the women who reported that they had always remembered their victimization. The women who had recovered memories and those who had always remembered had the same number of discrepancies when their accounts of the abuse were compared to the reports from the early 1970s. 相似文献
120.