全文获取类型
收费全文 | 2820篇 |
免费 | 232篇 |
国内免费 | 10篇 |
专业分类
电工技术 | 44篇 |
综合类 | 13篇 |
化学工业 | 806篇 |
金属工艺 | 129篇 |
机械仪表 | 107篇 |
建筑科学 | 71篇 |
矿业工程 | 3篇 |
能源动力 | 98篇 |
轻工业 | 218篇 |
水利工程 | 11篇 |
石油天然气 | 7篇 |
无线电 | 478篇 |
一般工业技术 | 572篇 |
冶金工业 | 125篇 |
原子能技术 | 31篇 |
自动化技术 | 349篇 |
出版年
2024年 | 4篇 |
2023年 | 47篇 |
2022年 | 86篇 |
2021年 | 139篇 |
2020年 | 98篇 |
2019年 | 120篇 |
2018年 | 118篇 |
2017年 | 130篇 |
2016年 | 184篇 |
2015年 | 94篇 |
2014年 | 117篇 |
2013年 | 184篇 |
2012年 | 217篇 |
2011年 | 223篇 |
2010年 | 154篇 |
2009年 | 147篇 |
2008年 | 128篇 |
2007年 | 108篇 |
2006年 | 97篇 |
2005年 | 76篇 |
2004年 | 49篇 |
2003年 | 58篇 |
2002年 | 58篇 |
2001年 | 39篇 |
2000年 | 47篇 |
1999年 | 24篇 |
1998年 | 53篇 |
1997年 | 27篇 |
1996年 | 39篇 |
1995年 | 25篇 |
1994年 | 9篇 |
1993年 | 10篇 |
1992年 | 11篇 |
1991年 | 11篇 |
1990年 | 12篇 |
1989年 | 16篇 |
1988年 | 8篇 |
1987年 | 10篇 |
1986年 | 7篇 |
1985年 | 6篇 |
1984年 | 6篇 |
1983年 | 11篇 |
1982年 | 10篇 |
1981年 | 9篇 |
1980年 | 5篇 |
1979年 | 7篇 |
1977年 | 5篇 |
1976年 | 4篇 |
1973年 | 3篇 |
1972年 | 3篇 |
排序方式: 共有3062条查询结果,搜索用时 15 毫秒
41.
This paper deals with the stability radii of implicit dynamic equations on time scales when the structured perturbations act on both the coefficient of derivative and the right-hand side. Formulas of the stability radii are derived as a unification and generalization of some previous results. A special case where the real stability radius and the complex stability radius are equal is studied. Examples are derived to illustrate results. 相似文献
42.
Tich Phuoc Tran Thi Thanh Sang Nguyen Poshiang Tsai Xiaoying Kong 《Artificial Intelligence Review》2011,35(4):369-382
In the modern age of Internet connectivity, advanced information systems have accumulated huge volumes of data. Such fast
growing, tremendous amount of data, collected and stored in large databases has far exceeded our human ability to comprehend
without proper tools. There has been a great deal of research conducted to explore the potential applications of Machine Learning
technologies in Security Informatics. This article studies the Network Security Detection problems in which predictive models
are constructed to detect network security breaches such as spamming. Due to overwhelming volume of data, complexity and dynamics
of computer networks and evolving cyber threats, current security systems suffer limited performance with low detection accuracy
and high number of false alarms. To address such performance issues, a novel Machine Learning algorithm, namely Boosted Subspace
Probabilistic Neural Network (BSPNN), has been proposed which combines a Radial Basis Function Neural Network with an innovative
diversity-based ensemble learning framework. Extensive empirical analyses suggested that BSPNN achieved high detection accuracy
with relatively small computational complexity compared with other conventional detection methods. 相似文献
43.
WLAN (Wireless Local Area Network) has been seen to be one of the promising access technologies that adapts to 4G cellular network systems in providing very high speed connection with QoS guarantee through the polling function. However, when the handover happens, the contention-based medium access mechanism which is mainly used in WLAN is invoked and introduces unbounded transmission delay due to idle time periods and retransmission because of collision during the handover. If this technique is expanded to use in a microcellular network such as connected WLAN micro-cells, contention-based mechanism, therefore, should not be used to handle the MT’s handover, especially for vehicular users who change access point every few seconds. To overcome these difficulties in handover, we introduce parallel polling scheme in dynamic LMC (Logical Macro Cell) which can reduce delays much and remove packet loss rate. LMC is a virtual single macro cell which is built on a multicast group of adjacent micro-cells. In the same LMC, polling signals are sent from every BS (base station) to give MT (mobile terminal) permission to access one of these BSs. Instead of wasting much time to contend for resources of a new BS during handover, the MT answers the polling as an acknowledgment to connect to that new BS. The polling response is controlled to multicast to all BSs of the same LMC via the core network to synchronize for the next polling cycle. LMC is controlled to dynamically change when the MT comes in a new BS to make polling signals be continuous in a new LMC. Through analytical and simulation results, we show that the parallel polling scheme can achieve no handover latency, no packet loss and maintain mobile users’ throughput stably in the high traffic load condition though it causes overhead on the neighboring cells in both of wired and wireless sections. At speeds of up to70 m/s, the MT can still maintain its stable connection. OMNeT++ simulator with INET project is used to evaluate our proposal. 相似文献
44.
Arterial bypass grafts tend to fail after some years due to the development of intimal thickening (restenosis). Non-uniform hemodynamics following a bypass operation contributes to restenosis and bypass failure can occur due to the focal development of anastomotic intimal hyperplasia. Additionally, surgical injury aggravated by compliance mismatch between the graft and artery has been suggested as an initiating factor for progress of wall thickening along the suture line Vascular grafts that are small in diameter tend to occlude rapidly. Computational fluid dynamics (CFD) methods have been effectively used to simulate the physical and geometrical parameters characterizing the hemodynamics of various arteries and bypass configurations. The effects of such changes on the pressure and flow characteristics as well as the wall shear stress during a cardiac cycle can be simulated. Recently, utilization of fluid and structure interactions have been used to determine fluid flow parameters and structure forces including stress and strains relationships under steady and transient conditions. In parallel to this, experimental diagnostics techniques such as Laser Doppler Anemometry, Particle Image Velocimetry, Doppler Guide wire and Magnetic Resonance Imaging have been used to provide essential information and to validate the numerical results. Moreover, clinical imaging techniques such as magnetic resonance or computed tomography have assisted considerably in gaining a detailed patient-specific picture of the blood flow and structure dynamics. This paper gives a review of recent numerical investigations of various configurations of coronary artery bypass grafts (CABG). In addition, the paper ends with a summary of the findings and the future directions. 相似文献
45.
Modeling and experimental investigation for electrolytic corrosion prevention in high frequency micro EDM using deionized water 总被引:1,自引:0,他引:1
The characteristics of the prevention of electrolytic corrosion during micro electrical discharge machining (EDM) using deionized water and high frequency bipolar pulse were investigated. Electrolytic corrosion during micro EDM using deionized water was analyzed using an equivalent electrical circuit based on the electrical double layer theory. Based on the analysis and experimental verification, a narrow positive pulse duration should be provided to the workpiece to prevent corrosion. A negative voltage with zero average applied voltage (Vavg, app) is also essential for this purpose. If Vavg, app is positive or negative, electrolytic corrosion occurs on the workpiece or tool, respectively. Micro holes and 3D structures without corrosion were successfully fabricated using a high frequency bipolar pulse with a pulse duration of 0.2?μs and a period of 1?μs, as well as Vavg, app?=?0?V. 相似文献
46.
47.
1. | The long-term strength of polygonized aluminum at 100°C depends on the subgrain size and on the dislocation density within the subgrains, while that of the recrystallized metal depends on the grain size: The long-term strength of aluminum increases (at least for lives up to 1000h) with reduction in the grain or subgrain size and with increase in the density of internal dislocations. |
2. | The rate of loss of strength (the tangent of the angle of slope of the long-term strength curves) decreases with increase in the grain or subgrain size of aluminum; this leads to the convergence of the long-term strength curves of metal with different subgrains (or grains) at long lives. |
3. | An analogy has been found between the behavior of polygonized and recrystallized in long-term strength tests at relatively short times to failure and that in short-term tensile tests. |
48.
Using predeveloped software, a digital safety system is designed that meets the quality standards of a safety system. To demonstrate the quality, the design process and operating history of the product are reviewed along with configuration management practices. The application software of the safety system is developed in accordance with the planned life cycle. Testing, which is a major phase that takes a significant time in the overall life cycle, can be optimized if the testability of the software can be evaluated. The proposed testability measure of the software is based on the entropy of the importance of basic statements and the failure probability from a software fault tree. To calculate testability, a fault tree is used in the analysis of a source code. With a quantitative measure of testability, testing can be optimized. The proposed testability can also be used to demonstrate whether the test cases based on uniform partitions, such as branch coverage criteria, result in homogeneous partitions that is known to be more effective than random testing. In this paper, the testability measure is calculated for the modules of a nuclear power plant's safety software. The module testing with branch coverage criteria required fewer test cases if the module has higher testability. The result shows that the testability measure can be used to evaluate whether partitions have homogeneous characteristics. 相似文献
49.
Xiaomeng Shi Kiat Seng Yeo Jian-Guo Ma Manh Anh Do Erping Li 《Advanced Packaging, IEEE Transactions on》2006,29(4):770-776
This paper describes the development of an equivalent circuit model of on-wafer interconnects for high-speed CMOS integrated circuits. By strategically cascading two-pi blocks together, the lumped model can characterize the distributed effects. Besides, the elaborately proposed model characterizes the frequency-variant characteristics with frequency-independent components. Thus, the model can be easily plugged into commercial computer-aided design tools. By adopting a newly invented optimization algorithm, namely, particle swarm optimization (PSO), the model parameters are extracted and formulated as empirical expressions. Therein, with each set of the geometrical parameters, the interconnect behaviors can be accurately predicted. The accuracy of the model is validated by comparisons with the on-wafer measurements up to 30 GHz. Moreover, the scalability of the proposed model is also discussed 相似文献
50.
C. Bui Thanh H. Klaudel F. Pommereau 《Electronic Notes in Theoretical Computer Science》2003,68(5):85-100
We present a new approach to the modelling of time constrained systems. It is based on untimed high-level Petri nets using the concept of causal time. With this concept, the progression of time is modelled in the system by the occurrence of a distinguished event, tick, which serves as a reference to the rest of the system. In order to validate this approach as suitable for automated verification, a case study is provided and the results obtained using a model-checker on high-level Petri nets are compared with those obtained for timed automata using prominent tools. The comparison is encouraging and shows that the causal time approach is intuitive and modular. It also potentially allows for efficient verification. 相似文献