全文获取类型
收费全文 | 2038篇 |
免费 | 130篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 22篇 |
化学工业 | 648篇 |
金属工艺 | 28篇 |
机械仪表 | 60篇 |
建筑科学 | 93篇 |
矿业工程 | 2篇 |
能源动力 | 89篇 |
轻工业 | 207篇 |
水利工程 | 10篇 |
石油天然气 | 13篇 |
无线电 | 157篇 |
一般工业技术 | 329篇 |
冶金工业 | 124篇 |
原子能技术 | 10篇 |
自动化技术 | 379篇 |
出版年
2024年 | 3篇 |
2023年 | 18篇 |
2022年 | 81篇 |
2021年 | 106篇 |
2020年 | 53篇 |
2019年 | 58篇 |
2018年 | 64篇 |
2017年 | 74篇 |
2016年 | 83篇 |
2015年 | 62篇 |
2014年 | 87篇 |
2013年 | 131篇 |
2012年 | 102篇 |
2011年 | 168篇 |
2010年 | 93篇 |
2009年 | 107篇 |
2008年 | 117篇 |
2007年 | 94篇 |
2006年 | 79篇 |
2005年 | 57篇 |
2004年 | 65篇 |
2003年 | 65篇 |
2002年 | 51篇 |
2001年 | 26篇 |
2000年 | 31篇 |
1999年 | 31篇 |
1998年 | 44篇 |
1997年 | 23篇 |
1996年 | 27篇 |
1995年 | 19篇 |
1994年 | 10篇 |
1993年 | 17篇 |
1992年 | 10篇 |
1991年 | 8篇 |
1990年 | 9篇 |
1989年 | 11篇 |
1988年 | 3篇 |
1987年 | 4篇 |
1986年 | 7篇 |
1985年 | 11篇 |
1984年 | 8篇 |
1983年 | 8篇 |
1982年 | 6篇 |
1981年 | 7篇 |
1980年 | 6篇 |
1979年 | 5篇 |
1977年 | 3篇 |
1976年 | 5篇 |
1972年 | 2篇 |
1965年 | 4篇 |
排序方式: 共有2171条查询结果,搜索用时 15 毫秒
41.
Marco Domenichini Ranjana Sahai Piero Castrataro Roberto Valsecchi Claudio Tonelli Francesco Greco Paolo Dario 《Microfluidics and nanofluidics》2013,15(6):753-762
The development of multilayer soft lithography methodology has seen polydimethysiloxane (PDMS) as the preferred material for the fabrication of microfluidic devices. However, the functionality of these PDMS microfluidic chips is often limited by the poor chemical resistance of PDMS to certain solvents. Here, we propose the use of a photocurable perfluoropolyether (PFPE), specifically FOMBLIN® MD40 PFPE, as a candidate material to provide a solvent-resistant buffer layer to make the device substantially impervious to chemically induced swelling. We first carried out a systematic study of the solvent resistance properties of FOMBLIN® MD40 PFPE as compared with PDMS. The comparison presented here demonstrates the superiority of FOMBLIN® MD40 PFPE over PDMS in this regard; moreover, the results permitted to categorize solvents in four different groups depending on their swelling ratio. We then present a step-by-step recipe for a novel fabrication process that uses multilayer lithography to construct a comprehensive solvent-resistant device with fluid and control channels integrated with a valve structure and also permitting easy establishment of outside connections. 相似文献
42.
Andrea Bettidi Antonio Cetronio Walter Ciccognani Marco De Dominicis Claudio Lanzieri Ernesto Limiti Antonio Manna Marco Peroni Claudio Proietti Paolo Romanini 《国际射频与微波计算机辅助工程杂志》2009,19(5):598-606
In this article, the design, fabrication, and on‐wafer test of X‐Band and 2–18 GHz wideband high‐power SPDT MMIC switches in AlGaN/GaN technology are presented. The switches have demonstrated state‐of‐the‐art performance and RF fabrication yield better than 65%. Linear and power measurements for different control voltages have been reported and an explanation of the dependence of the power performances on the control voltage is given. In particular, the X‐band switch exhibits a 0.4 dB compression level at 10 GHz when driven by a 38 dBm input signal. The wideband switch shows a compression level of 1 dB at an input drive higher than 38 dBm across the entire bandwidth. © 2009 Wiley Periodicals, Inc. Int J RF and Microwave CAE, 2009. 相似文献
43.
Claudio Agostino Ardagna Marco Cremonini Gabriele Gianini 《Journal of Systems Architecture》2009,55(4):243-254
Mobile network providers have developed a variety of location-based services (LBSs), such as friend-finder, point of interest services, emergency rescue and many other safety and security services. The protection of location-privacy has consequently become a key aspect to the success of LBSs, since users consider their own physical location and movements highly privacy-sensitive, and demand for solutions able to protect such an information in a variety of environments. The idea behind location-privacy protection is that the individual should be able to set the level at which the location information is released to avoid undesired exploitation by a potential attacker: one of the approaches to this problem is given by the application of spatial obfuscation techniques, actuated by a trusted agent, and consisting in artificial perturbations of the location information collected by sensing technologies, before its disclosure to third parties. In many situations, however, landscape/map information can help a third party to perform Bayesian inference over spatially obfuscated data and to refine the user’s location estimate up to a violation of the original user’s location-privacy requirements. The goal of this paper is to provide a map-dependent obfuscation procedure that enables the release of the maximum possible user’s location information, that does not lead to a violation of the original user’s location-privacy requirements, even when refined through map-based inference. 相似文献
44.
van Oostrum J Calonder C Rechsteiner D Ehrat M Mestan J Fabbro D Voshol H 《Proteomics. Clinical applications》2009,3(4):412-422
Controlling aberrant protein kinase activity is a promising strategy for a variety of diseases, particularly cancer. Hence, the development of kinase inhibitors is currently a focal point for pharmaceutical research. In this study we utilize a chip-based reverse phase protein array (RPA) platform for profiling of kinase inhibitors in cell-based assays. In combination with the planar wave-guide technology the assay system has an absolute LOD down to the low zeptomole range. A431 cell lysates were analyzed for the activation state of key effectors in the epidermal growth factor (EGF) and insulin signaling pathways to validate this model for compound screening. A microtiter-plate format for growing, treating, and lysing cells was shown to be suitable for this approach, establishing the value of the technology as a screening tool for characterization of large numbers of kinase inhibitors against a wide variety of cellular signaling pathways. Moreover, the reverse array format allows rapid development of site-specific phosphorylation assays, since in contrast to ELISA type systems only a single antigen-specific antibody is required. 相似文献
45.
Molly K. Floyd Kash Barker Claudio M. Rocco Mackenzie G. Whitman 《Engineering Management Journal; EMJ》2017,29(3):165-178
Inherent in project management is the risk that a project fails to meet planned completion deadlines due to delays experienced in individual tasks. As such, certain critical tasks may be candidates for risk management (e.g., the allocation of additional resources such as labor, materials, and equipment) to prevent delays. A common means to identify such critical tasks is with the critical path method (CPM), which identifies a path of tasks in a project network that, when delayed, result in project delays. This work offers a complementary, stochastic approach to CPM that ranks tasks according to their effect on the project completion time distribution, when the distributions of task completion time are delayed. The new hybrid approach is based on the use of a Monte Carlo simulation and a multi-criteria decision analysis technique. Monte Carlo simulation allows for approximating the cumulative distribution function of the total duration of the project, while the multi-criteria decision analysis technique is used to compare and rank the tasks across percentiles of the resulting project completion time distributions. Doing so allows for different percentile weighting schemes to represent decision maker risk preferences. The suggested approach is applied to two project network examples. The examples illustrate that the proposed approach highlights some tasks as risky, which may not always lie on the critical path as identified by CPM. This is valuable for practicing managers as it allows them to properly consider their risk preferences when determining task criticality based on the distribution of project completion time (e.g., emphasizing median vs. upper tail completion time). 相似文献
46.
Daniele Di Gioacchino Nicola Poccia Martijn Lankhorst Claudio Gatti Bruno Buonomo Luca Foggetta Augusto Marcelli Hans Hilgenkamp 《Journal of Superconductivity and Novel Magnetism》2017,30(2):359-363
The current frontiers in the investigation of high-energy particles demand for new detection methods. Higher sensitivity to low-energy deposition, high-energy resolution to identify events and improve the background rejection, and large detector masses have to be developed to detect even an individual particle that weakly interacts with ordinary matter. Here, we will describe the concept and the layout of a novel superconducting proximity array which show dynamic vortex Mott insulator to metal transitions, as an ultra-sensitive compact radiation-particle detector. 相似文献
47.
Gianmarco de Felice Maria Antonietta Aiello Carmelo Caggegi Francesca Ceroni Stefano De Santis Enrico Garbin Natalino Gattesco Łukasz Hojdys Piotr Krajewski Arkadiusz Kwiecień Marianovella Leone Gian Piero Lignola Claudio Mazzotti Daniel Oliveira Corina Papanicolaou Carlo Poggi Thanasis Triantafillou Maria Rosa Valluzzi Alberto Viskovic 《Materials and Structures》2018,51(4):95
Textile Reinforced Mortar (TRM), also known as Fabric Reinforced Mortar or Fabric Reinforced Cementitious Matrix, composites are an emerging technology for the external repair and strengthening of existing structures. For most applications, the effectiveness of the TRM reinforcement relies on its bond performance. This recommendation identifies the best practice to characterize the bond behaviour of TRM. A shear bond test method is proposed to determine the peak axial stress (associated with the maximum load that can be transferred from the structural member to the externally bonded TRM reinforcement), the stress–slip relationship and the failure mode that controls the TRM-to-substrate load transfer capacity. Guidelines on specimen manufacturing, experimental setup, test execution, and determination of test results are provided. 相似文献
48.
We present a categorical logic formulation of induction and coinduction principles for reasoning about inductively and coinductively defined types. Our main results provide sufficient criteria for the validity of such principles: in the presence of comprehension, the induction principle for initial algebras is admissible, and dually, in the presence of quotient types, the coinduction principle for terminal coalgebras is admissible. After giving an alternative formulation of induction in terms of binary relations, we combine both principles and obtain a mixed induction/coinduction principle which allows us to reason about minimal solutionsX≅σ(X) whereXmay occur both positively and negatively in the type constructor σ. We further strengthen these logical principles to deal with contexts and prove that such strengthening is valid when the (abstract) logic we consider is contextually/functionally complete. All the main results follow from a basic result about adjunctions between “categories of algebras” (inserters). 相似文献
49.
Human activity recognition is a challenging problem for context-aware systems and applications. Research in this field has
mainly adopted techniques based on supervised learning algorithms, but these systems suffer from scalability issues with respect
to the number of considered activities and contextual data. In this paper, we propose a solution based on the use of ontologies
and ontological reasoning combined with statistical inferencing. Structured symbolic knowledge about the environment surrounding
the user allows the recognition system to infer which activities among the candidates identified by statistical methods are
more likely to be the actual activity that the user is performing. Ontological reasoning is also integrated with statistical
methods to recognize complex activities that cannot be derived by statistical methods alone. The effectiveness of the proposed
technique is supported by experiments with a complete implementation of the system using commercially available sensors and
an Android-based handheld device as the host for the main activity recognition module. 相似文献
50.
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies 总被引:2,自引:0,他引:2
Sergio Mascetti Dario Freni Claudio Bettini X. Sean Wang Sushil Jajodia 《The VLDB Journal The International Journal on Very Large Data Bases》2011,20(4):541-566
A major feature of the emerging geo-social networks is the ability to notify a user when any of his friends (also called buddies)
happens to be geographically in proximity. This proximity service is usually offered by the network itself or by a third party service provider (SP) using location data acquired from the
users. This paper provides a rigorous theoretical and experimental analysis of the existing solutions for the location privacy
problem in proximity services. This is a serious problem for users who do not trust the SP to handle their location data and
would only like to release their location information in a generalized form to participating buddies. The paper presents two
new protocols providing complete privacy with respect to the SP and controllable privacy with respect to the buddies. The
analytical and experimental analysis of the protocols takes into account privacy, service precision, and computation and communication
costs, showing the superiority of the new protocols compared to those appeared in the literature to date. The proposed protocols
have also been tested in a full system implementation of the proximity service. 相似文献