全文获取类型
收费全文 | 1150篇 |
免费 | 81篇 |
专业分类
电工技术 | 21篇 |
化学工业 | 313篇 |
金属工艺 | 17篇 |
机械仪表 | 29篇 |
建筑科学 | 48篇 |
矿业工程 | 1篇 |
能源动力 | 30篇 |
轻工业 | 119篇 |
水利工程 | 5篇 |
石油天然气 | 2篇 |
武器工业 | 1篇 |
无线电 | 96篇 |
一般工业技术 | 187篇 |
冶金工业 | 74篇 |
原子能技术 | 6篇 |
自动化技术 | 282篇 |
出版年
2023年 | 8篇 |
2022年 | 52篇 |
2021年 | 51篇 |
2020年 | 35篇 |
2019年 | 35篇 |
2018年 | 38篇 |
2017年 | 21篇 |
2016年 | 49篇 |
2015年 | 44篇 |
2014年 | 37篇 |
2013年 | 75篇 |
2012年 | 60篇 |
2011年 | 84篇 |
2010年 | 60篇 |
2009年 | 63篇 |
2008年 | 53篇 |
2007年 | 51篇 |
2006年 | 45篇 |
2005年 | 41篇 |
2004年 | 30篇 |
2003年 | 36篇 |
2002年 | 28篇 |
2001年 | 21篇 |
2000年 | 13篇 |
1999年 | 18篇 |
1998年 | 17篇 |
1997年 | 12篇 |
1996年 | 12篇 |
1995年 | 18篇 |
1994年 | 20篇 |
1993年 | 7篇 |
1992年 | 7篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1989年 | 6篇 |
1988年 | 5篇 |
1987年 | 2篇 |
1986年 | 6篇 |
1985年 | 7篇 |
1984年 | 9篇 |
1983年 | 8篇 |
1982年 | 6篇 |
1981年 | 7篇 |
1980年 | 4篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 2篇 |
1976年 | 7篇 |
1975年 | 2篇 |
1974年 | 2篇 |
排序方式: 共有1231条查询结果,搜索用时 10 毫秒
61.
Davide Barreca Giorgio Carraro Alberto Gasparotto Chiara Maccato Cinzia Sada Aadesh P. Singh Sanjay Mathur Andreas Mettenbörger Elza Bontempi Laura E. Depero 《International Journal of Hydrogen Energy》2013
A single-step plasma enhanced-chemical vapor deposition (PE-CVD) route for the synthesis of F-doped iron(III) oxide nanomaterials is presented. Growth experiments, performed from a fluorinated Fe(II) β-diketonate precursor on Indium Tin Oxide (ITO) between 200 and 400 °C, yielded columnar β-Fe2O3 arrays with a preferential (100) growth direction. The fluorine content in the deposits could be adjusted by the sole variation of the deposition temperature controlling, in turn, the optical absorption and energy bandgap. Photocurrent measurements and Mott–Schottky analyses, carried out in Na2SO4 solution under one sun illumination, evidenced a conductivity switch from n- to p-type upon increasing fluorine amount in the obtained nanomaterials. The sample photocurrent density, donor content and flatband potential support the hypothesis that a progressive substitution of oxygen by fluorine in the iron(III) oxide lattice can alter electronic structure and extend charge carrier lifetimes, making anion-doped β-Fe2O3 an efficient water oxidation catalyst. 相似文献
62.
Modern strategies for protein quantification in proteome analysis: advantages and limitations 总被引:9,自引:0,他引:9
Over the last 3 years, a number of mass spectrometry-based methods for the simultaneous identification and quantification of individual proteins within complex mixtures have been reported. Most, if not all, of such strategies apply a two-step approach: the first for the separation of proteins or peptides, and the second uses mass spectrometry to identify and quantify the individual components. To simplify the outcome of both steps, certain chemicals and heavy-isotope-labeling are commonly used in the early stages of sample preparation (except in differential fluorescence labeling protocols). The ultimate goal of these strategies is to be able to identify every protein expressed in a cell or tissue, and to determine each protein's abundance, state of modification, and possible involvement in multi-protein complexes. In this review, an attempt is made to highlight the salient characteristics of the existing strategies with particular attention to their strengths and weaknesses. 相似文献
63.
Metamaterials are man‐made materials which get their properties from their structure rather than their chemical composition. Their mesostructure is specifically designed to create functionalities not found in nature. However, despite the broad variety of metamaterials developed in recent years, a straightforward procedure to design these complex materials with tailored properties has not yet been established. Here, the inverse design problem is tackled by introducing a general optimization tool to explore the range of material properties that can be achieved. Specifically, a stochastic optimization algorithm is applied and its applicability to disjoint problems is demonstrated, with a focus on tuning the buckling properties of mechanical metamaterials, including experimental verification of the predictions. Besides this problem, this algorithm can be applied to a large variety of systems that, because of their complexity, would be challenging otherwise. Potential applications range from the design of optomechanical resonators, acoustic band gap materials, to dielectric metasurfaces. 相似文献
64.
Inclusion between XML types is important but expensive, and is much more expensive when unordered types are considered. We prove here that inclusion for XML types with interleaving and counting can be decided in polynomial time in the presence of two important restrictions: no element appears twice in the same content model, and Kleene star is only applied to disjunctions of single elements. 相似文献
65.
On measuring the accuracy of SLAM algorithms 总被引:1,自引:0,他引:1
Rainer Kümmerle Bastian Steder Christian Dornhege Michael Ruhnke Giorgio Grisetti Cyrill Stachniss Alexander Kleiner 《Autonomous Robots》2009,27(4):387-407
In this paper, we address the problem of creating an objective benchmark for evaluating SLAM approaches. We propose a framework
for analyzing the results of a SLAM approach based on a metric for measuring the error of the corrected trajectory. This metric
uses only relative relations between poses and does not rely on a global reference frame. This overcomes serious shortcomings
of approaches using a global reference frame to compute the error. Our method furthermore allows us to compare SLAM approaches
that use different estimation techniques or different sensor modalities since all computations are made based on the corrected
trajectory of the robot.
We provide sets of relative relations needed to compute our metric for an extensive set of datasets frequently used in the
robotics community. The relations have been obtained by manually matching laser-range observations to avoid the errors caused
by matching algorithms. Our benchmark framework allows the user to easily analyze and objectively compare different SLAM approaches. 相似文献
66.
Luigi Palopoli Domenico Rosaci Giorgio Terracina Domenico Ursino 《Knowledge and Information Systems》2005,8(4):462-497
The problem of handling both the integration and the cooperation of a large number of information sources characterised by
heterogeneous representation formats is a challenging issue. In this context, a central role can be played by the knowledge
about the semantic relationships holding between concepts belonging to different information sources (intersource properties).
In this paper, we propose a semiautomatic approach for extracting two kinds of intersource properties, namely synonymies and
homonymies, from heterogeneous information sources. In order to carry out the extraction task, we introduce both a conceptual
model, for representing involved sources, and a metrics, for measuring the strength of the semantic relationships holding
among concepts represented within the same source. 相似文献
67.
Luca Becchetti Paola Bertolazzi Carlo Gaibisso Giorgio Gambosi 《Theoretical computer science》2002,270(1-2):341-359
In this paper we deal with the problem of designing virtual path layouts in ATM networks when the hop-count is given and the load has to be minimized. We first prove a lower bound for networks with arbitrary topology and arbitrary set of connection requests. This result is then applied to derive lower bounds for the following settings: (i) one-to-all (one node has to be connected to all other nodes of the network) in arbitrary networks; (ii) all-to-all (each node has to be connected to all other nodes in the network) in several classes of networks, including planar and k-separable networks and networks of bounded genus. We finally study the all-to-all setting on two-dimensional meshes and we design a virtual path layout for this problem. When the hop-count and the network degree are bounded by constants, our results show that the upper bounds proposed in this paper for the one-to-all problem in arbitrary networks and for the all-to-all problem in two-dimensional mesh networks are asymptotically optimal. Moreover, the general lower bound shows that the algorithm proposed in Gerstel (Ph.D. Thesis, Technion-Haifa, Israel, 1995) for the all-to-all problem in k-separable networks is also asymptotically optimal. The upper bound for mesh networks also shows that the lower bound presented in this paper for the all-to-all problem in planar networks is asymptotically tight. 相似文献
68.
G Giammona F Pattí V Sambataro A Reggio L Rampello RM Di Giorgio C Maccagnano DF Condorelli F Nicoletti 《Canadian Metallurgical Quarterly》1981,57(20):2074-2079
The activity of gamma-aminobutyric acid (GABA) synthesizing enzyme glutamic acid decarboxylase (GAD, EC 4.1.1.15) was assayed in the rat substantia nigra (SN) and medial basal hypothalamus (MBH) following systemic injection of different doses of the dopamine receptor agonist apomorphine. In SN, the highest dose of apomorphine (1000 micrograms/kg) causes an increase of the GAD activity whilst an opposite effect is observed with the lowest dose (35 micrograms/kg). Results obtained in SN are in accordance with previous neurochemical and behavioural data suggesting an opposite action of high (500 micrograms/kg) and low doses (100 micrograms/kg) of apomorphine in nigro-striatal system, probably due to the existence of two classes of dopamine receptors, i.e. classical postsynaptic dopamine receptors and presynaptic inhibitory dopamine autoreceptors. In MBH, the evidence for similar effects of low and high doses of apomorphine (the decrease of GAD activity) may suggest that, as already reported, at this level only one class of dopamine receptors is present. 相似文献
69.
Giorgio Delzanno 《Formal Methods in System Design》2003,23(3):257-301
We propose a new method for the parameterized verification of formal specifications of cache coherence protocols. The goal of parameterized verification is to establish system properties for an arbitrary number of caches. In order to achieve this purpose we define abstractions that allow us to reduce the original parameterized verification problem to a control state reachability problem for a system with integer data variables. Specifically, the methodology we propose consists of the following steps. We first define an abstraction in which we only keep track of the number of caches in a given state during the execution of a protocol. Then, we use linear arithmetic constraints to symbolically represent infinite sets of global states of the resulting abstract protocol. For reasons of efficiency, we relax the constraint operations by interpreting constraints over real numbers. Finally, we check parameterized safety properties of abstract protocols using symbolic backward reachability, a strategy that allows us to obtain sufficient conditions for termination for an interesting class of protocols. The latter problem can be solved by using the infinite-state model checker HyTech: Henzinger, Ho, and Wong-Toi, A model checker for hybrid systems, Proc. of the 9th International Conference on Computer Aided Verification (CAV'97), Lecture Notes in Computer Science, Springer, Haifa, Israel, 1997, Vol. 1254, pp. 460–463. HyTech handles linear arithmetic constraints using the polyhedra library of Halbwachs and Proy, Verification of real-time systems using linear relation analysis, Formal Methods in System Design, Vol. 11, No. 2, pp. 157–185, 1997. By using this methodology, we have automatically validated parameterized versions of widely implemented write-invalidate and write-update cache coherence protocols like Synapse, MESI, MOESI, Berkeley, Illinois, Firefly and Dragon (Handy, The Cache Memory Book, Academic Press, 1993). With this application, we have shown that symbolic model checking tools like HyTech, originally designed for the verification of hybrid systems, can be applied successfully to new classes of infinite-state systems of practical interest. 相似文献
70.
A Technique for Extracting Sub-source Similarities from Information Sources Having Different Formats
In this paper we propose a semi-automatic technique for deriving the similarity degree between two portions of heterogeneous information sources (hereafter, sub-sources). The proposed technique consists in two phases: the first one selects the most promising pairs of sub-sources, whereas the second one computes the similarity degree relative to each promising pair. We show that the detection of sub-source similarities is a special case (and a very interesting one, for semi-structured information sources) of the more general problem of Scheme Match. In addition, we present a real example case to clarify the proposed technique, a set of experiments we have conducted to verify the quality of its results, a discussion about its computational complexity and its classification in the context of related literature. Finally, we discuss some possible applications which can benefit by derived similarities. 相似文献