全文获取类型
收费全文 | 2663篇 |
免费 | 151篇 |
国内免费 | 12篇 |
专业分类
电工技术 | 28篇 |
化学工业 | 811篇 |
金属工艺 | 56篇 |
机械仪表 | 83篇 |
建筑科学 | 91篇 |
矿业工程 | 21篇 |
能源动力 | 85篇 |
轻工业 | 194篇 |
水利工程 | 18篇 |
石油天然气 | 8篇 |
武器工业 | 1篇 |
无线电 | 221篇 |
一般工业技术 | 520篇 |
冶金工业 | 160篇 |
原子能技术 | 33篇 |
自动化技术 | 496篇 |
出版年
2023年 | 31篇 |
2022年 | 121篇 |
2021年 | 116篇 |
2020年 | 86篇 |
2019年 | 65篇 |
2018年 | 97篇 |
2017年 | 100篇 |
2016年 | 97篇 |
2015年 | 94篇 |
2014年 | 128篇 |
2013年 | 210篇 |
2012年 | 156篇 |
2011年 | 180篇 |
2010年 | 132篇 |
2009年 | 125篇 |
2008年 | 135篇 |
2007年 | 104篇 |
2006年 | 89篇 |
2005年 | 82篇 |
2004年 | 59篇 |
2003年 | 56篇 |
2002年 | 48篇 |
2001年 | 30篇 |
2000年 | 27篇 |
1999年 | 28篇 |
1998年 | 41篇 |
1997年 | 23篇 |
1996年 | 18篇 |
1995年 | 25篇 |
1994年 | 24篇 |
1993年 | 22篇 |
1992年 | 15篇 |
1991年 | 16篇 |
1990年 | 11篇 |
1989年 | 13篇 |
1988年 | 11篇 |
1987年 | 24篇 |
1986年 | 15篇 |
1985年 | 15篇 |
1984年 | 13篇 |
1983年 | 9篇 |
1982年 | 16篇 |
1981年 | 9篇 |
1980年 | 8篇 |
1979年 | 11篇 |
1976年 | 7篇 |
1975年 | 9篇 |
1974年 | 7篇 |
1973年 | 13篇 |
1972年 | 8篇 |
排序方式: 共有2826条查询结果,搜索用时 15 毫秒
41.
The flow structure of a continuous‐flow reactor stirred by a Rushton turbine was investigated by laser Doppler velocimetry for two different mean residence time‐mixing time ratios. Velocity measurements were obtained for two inlet locations, corresponding to the incoming liquid stream being fed co‐currently or counter‐currently to the flow discharged by the turbine. In all investigated configurations and for all operating conditions, it was found that the flow disruption caused by the incoming liquid stream was observable mainly in the first vessel quarter, which followed the feed‐tube plane. From comparison of the velocities encountered in the various planes in the continuous‐flow reactor to the velocities of the batch reactor, it was also concluded that it may be possible to intensify the usage of the turbine‐stirred vessel by decreasing the characteristic times ratio, without considerable flow by‐pass and/or short‐circuiting problems. 相似文献
42.
Ruihuan Cai Hongyi Xiao Ivan C. Christov Yongzhi Zhao 《American Institute of Chemical Engineers》2021,67(2):e17109
The diffusion of nonspherical particles has not been well understood due to the complexity of their contact mechanics and self-organization of their orientations. We perform discrete element method simulations of monodisperse ellipsoids in a shear flow with Lees-Edwards boundary conditions to quantify the relation between the diffusion coefficient and the flow parameters. The results indicate that the particle aspect ratio strongly affects the diffusion coefficient by influencing the particle orientation and alignment. We develop a scaling law for the diffusion coefficient perpendicular to the flow direction, Dyy, which combines the influences of the shear rate , the solids fraction f, the effective particle diameter deff and the particle aspect ratio Z. We show that , where kd is a dimensionless pre-factor, and a fit is obtained for the functional form of χ(f, Z). This scaling law will be useful in developing continuum transport models for applications. 相似文献
43.
Kaio C. S. Rodrigues Ivan I. K. Veloso Marcelo P. A. Ribeiro Antonio J. G. Cruz Alberto C. Badino 《加拿大化工杂志》2021,99(1):401-409
Fast, simple, accurate, and inexpensive methods for obtaining analyte concentration data are desirable in the industrial sector. In the present study, the use of Fourier transform mid‐infrared (FT‐MIR) spectroscopy, combined with partial least squares (PLS) regression, was investigated as a tool for real‐time monitoring of processes of ethanol absorption in glycols. Calibration was performed using simple synthetic samples containing ethanol, water, and monoethylene glycol (MEG) or diethylene glycol (DEG). The PLS models presented excellent performance, with correlation coefficients (R2) close to unity and root‐mean‐square errors of cross‐validation (RMSECV) and prediction (RMSEP) lower than 2% of the calibration data ranges for both analytes (ethanol and water) in both absorbents (MEG and DEG). The monitoring technique developed has potential to be applied in absorption processes and could also be used in other large‐scale unit operations, providing information in real time and enhancing process control. 相似文献
44.
This work investigates applicability of magnetic hysteresis method for non-destructive testing of plastically deformed low-carbon steel. Recently introduced Magnetic Adaptive Testing procedure was used for evaluation of hysteresis minor loop data-sets to find the most sensitive parameter/s for indication of the material degradation stage. Inductive measurements were carried out on two identically degraded series of samples: magnetically closed window-shaped specimens, equipped with the magnetizing and the induction coils, and magnetically open strips, measured by an attached magnetizing yoke. The aim was to compare the results between these sample series in order to determine applicability and limitations of the single-yoke measurement technique. As a result, new magnetic parameters with the best sensitivity–stability ratio in a wide deformation range were introduced and proposed for utilization. Good qualitative coincidence between the measurement results on the closed and the open sample series was obtained in all range of magnetization. Several quantitative distinctions were explained and analyzed in order to improve the single-yoke technique. 相似文献
45.
Ivan Caravela Artur Arsenio Nuno Borges 《Journal of Network and Systems Management》2016,24(4):974-1003
As telecommunication networks grow in size and complexity, monitoring systems need to scale up accordingly. Alarm data generated in a large network are often highly correlated. These correlations can be explored to simplify the process of network fault management, by reducing the number of alarms presented to the network-monitoring operator. This makes it easier to react to network failures. But in some scenarios, it is highly desired to prevent the occurrence of these failures by predicting the occurrence of alarms before hand. This work investigates the usage of data mining methods to generate knowledge from historical alarm data, and using such knowledge to train a machine learning system, in order to predict the occurrence of the most relevant alarms in the network. The learning system was designed to be retrained periodically in order to keep an updated knowledge base. 相似文献
46.
Ivan Chajda Jan Kühr 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2013,17(3):401-410
MV-algebras as well as orthomodular lattices can be seen as a particular case of so-called “basic algebras” which are an alter ego of bounded lattices whose sections are equipped with fixed antitone involutions. The class of basic algebras is an ideal variety. In the paper, we give an internal characterization of congruence kernels (ideals) and find a finite basis of ideal terms, with focus on monotone and effect basic algebras. We also axiomatize basic algebras that are subdirect products of linearly ordered ones. 相似文献
47.
Validation of GOES and MODIS active fire detection products using ASTER and ETM+ data 总被引:2,自引:0,他引:2
Wilfrid Schroeder Elaine Prins Louis Giglio Ivan Csiszar Christopher Schmidt Jeffrey Morisette Douglas Morton 《Remote sensing of environment》2008,112(5):2711-2726
In this study we implemented a comprehensive analysis to validate the MODIS and GOES satellite active fire detection products (MOD14 and WFABBA, respectively) and characterize their major sources of omission and commission errors which have important implications for a large community of fire data users. Our analyses were primarily based on the use of 30 m resolution ASTER and ETM+ imagery as our validation data. We found that at the 50% true positive detection probability mark, WFABBA requires four times more active fire area than is necessary for MOD14 to achieve the same probability of detection, despite the 16× factor separating the nominal spatial resolutions of the two products. Approximately 75% and 95% of all fires sampled were omitted by the MOD14 and WFABBA instantaneous products, respectively; whereas an omission error of 38% was obtained for WFABBA when considering the 30-minute interval of the GOES data. Commission errors for MOD14 and WFABBA were found to be similar and highly dependent on the vegetation conditions of the areas imaged, with the larger commission errors (approximately 35%) estimated over regions of active deforestation. Nonetheless, the vast majority (> 80%) of the commission errors were indeed associated with recent burning activity where scars could be visually confirmed in the higher resolution data. Differences in thermal dynamics of vegetated and non-vegetated areas were found to produce a reduction of approximately 50% in the commission errors estimated towards the hours of maximum fire activity (i.e., early-afternoon hours) which coincided with the MODIS/Aqua overpass. Lastly, we demonstrate the potential use of temporal metrics applied to the mid-infrared bands of MODIS and GOES data to reduce the commission errors found with the validation analyses. 相似文献
48.
49.
Franjo Ivančić Zijiang Yang Malay K. Ganai Aarti Gupta Pranav Ashar 《Theoretical computer science》2008
This paper discusses our methodology for formal analysis and automatic verification of software programs. It is applicable to a large subset of the C programming language that includes pointer arithmetic and bounded recursion. We consider reachability properties, in particular whether certain assertions or basic blocks are reachable in the source code, or whether certain standard property violations can occur. We perform this analysis via a translation to a Boolean circuit representation based on modeling basic blocks. The program is then analyzed by a back-end SAT-based bounded model checker, where each unrolling is mapped to one step in a block-wise execution of the program. 相似文献
50.
Ivan Martinovic Paul Pichota Matthias Wilhelm Frank A. Zdarsky Jens B. Schmitt 《Pervasive and Mobile Computing》2009,5(5):510-525
To improve the tarnished reputation of WLAN security, the new IEEE 802.11i standard provides means for mutual user authentication and assures confidentiality of user data. However, the IEEE 802.11 link-layer is still highly vulnerable to a plethora of simple, yet effective attacks which further jeopardize the already fragile security of wireless communications.Some of these vulnerabilities are related to limited hardware capabilities of access points and their abuse may result in serious degradation of control over the wireless connection, which, especially in the case of broadcast communication, allows for client hijacking attacks. Although these issues are known and their impact is expected to be less prevalent on modern equipment, this work demonstrates the opposite. In our experimental analysis, we tested frequently used access points, and by forcing them to operate on their performance limits, we identified significant operational anomalies and demonstrated their impact on security by implementing a novel version of the Man-In-The-Middle attack, to which we refer as the Muzzle attack.Secondly, this work describes DiscoSec, a solution for “patching” WLANs against a variety of such link-layer attacks. DiscoSec provides DoS-resilient key exchange, an efficient frame authentication, and a performance-oriented implementation. By means of extensive real-world measurements DiscoSec is evaluated, showing that even on very resource-limited devices the network throughput is decreased by only 22% compared to the throughput without any authentication, and by 6% on more performance-capable hardware. To demonstrate its effectiveness, DiscoSec is available as an open-source IEEE 802.11 device driver utilizing well-established cryptographic primitives provided by the Linux Crypto API and OpenSSL library. 相似文献