全文获取类型
收费全文 | 51631篇 |
免费 | 2610篇 |
国内免费 | 160篇 |
专业分类
电工技术 | 725篇 |
综合类 | 66篇 |
化学工业 | 11167篇 |
金属工艺 | 2210篇 |
机械仪表 | 3363篇 |
建筑科学 | 1143篇 |
矿业工程 | 25篇 |
能源动力 | 2232篇 |
轻工业 | 4039篇 |
水利工程 | 280篇 |
石油天然气 | 90篇 |
武器工业 | 2篇 |
无线电 | 8167篇 |
一般工业技术 | 11041篇 |
冶金工业 | 3957篇 |
原子能技术 | 695篇 |
自动化技术 | 5199篇 |
出版年
2024年 | 52篇 |
2023年 | 582篇 |
2022年 | 901篇 |
2021年 | 1522篇 |
2020年 | 1108篇 |
2019年 | 1218篇 |
2018年 | 1482篇 |
2017年 | 1481篇 |
2016年 | 1816篇 |
2015年 | 1362篇 |
2014年 | 2182篇 |
2013年 | 3138篇 |
2012年 | 3405篇 |
2011年 | 4085篇 |
2010年 | 2944篇 |
2009年 | 3053篇 |
2008年 | 2896篇 |
2007年 | 2267篇 |
2006年 | 2101篇 |
2005年 | 1786篇 |
2004年 | 1627篇 |
2003年 | 1576篇 |
2002年 | 1384篇 |
2001年 | 1185篇 |
2000年 | 1052篇 |
1999年 | 962篇 |
1998年 | 1588篇 |
1997年 | 1015篇 |
1996年 | 832篇 |
1995年 | 577篇 |
1994年 | 484篇 |
1993年 | 416篇 |
1992年 | 303篇 |
1991年 | 289篇 |
1990年 | 267篇 |
1989年 | 257篇 |
1988年 | 216篇 |
1987年 | 175篇 |
1986年 | 131篇 |
1985年 | 125篇 |
1984年 | 99篇 |
1983年 | 64篇 |
1982年 | 38篇 |
1981年 | 40篇 |
1980年 | 32篇 |
1979年 | 33篇 |
1978年 | 31篇 |
1977年 | 41篇 |
1976年 | 64篇 |
1973年 | 21篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
941.
Kwang Hee Ko Taezoon Park Kyong-Hwan Kim Yonghwan Kim Dong Ho Yoon 《Computer aided design》2011,(8):848-862
In this paper, a panel generation system for analyzing seakeeping performance of a ship is developed. Given a set of offset data representing the ship hull, the system first creates a surface model of the ship. From the surface model, the wetted part of the ship is obtained by computing the intersection between the water surface and the hull, which is then processed to generate quadrilateral panels for the hull and the water surface. The system is designed to handle various kinds of ships such as ships with a mono-skeg, a twin-skeg and/or a bulbous bow in either an automatic or an interactive manner. Moreover, it can generate input panels for three different seakeeping analysis methods. Examples are provided to demonstrate the capabilities of the system. 相似文献
942.
Byung Chul Kim Duhwan Mun Soonhung Han Michael J. Pratt 《Computer aided design》2011,43(12):1717-1728
Procedural models have the advantage of being easy to edit simply by changing the values of the parameters of their constructional operations. Such models are said to embody design intent, in the sense that modifications to them conform to the method of creation used by their original creator. They also comply with any constraints implied by the particular constructional operations used. This paper introduces the development and standardization process of the ISO 10303-112 specification and describes the concept of procedural 2D modeling, a method of representing procedural 2D CAD models in STEP in harmony with other STEP resources. The feasibility of procedural 2D modeling commands for the exchange of procedurally represented 2D CAD model data is demonstrated through an experiment where procedural 2D CAD model data in neutral form generated with an in-house 2D modeling system are translated to and modified in a commercial 3D mechanical CAD system. 相似文献
943.
The objective of this study was to evaluate individual finger force and contribution to a gripping force, the difference between actual and expected finger forces and subjective discomfort rating at 10 different submaximal voluntary contraction (%MVC) levels (10-100% in 10 increments). Seventy-two participants randomly exerted gripping force with a multi-finger force measurement system. The individual finger force, gripping force and discomfort increased as %MVC levels increased. The middle and ring fingers exerted more force and contributed to a gripping force more than the index and little fingers due to their larger mass fractions of the digit flexor muscles. It was apparent at <50% MVC; however, the index finger increased its contribution and exerted even more force than expected at more than 50% MVC. Subjective discomfort supported the results of the objective measures. This could explain the conflicting findings between index and ring fingers in previous finger contribution studies. STATEMENT OF RELEVANCE: Hand tool design is of special interest in ergonomics due to its association with musculoskeletal disorders in the hand. This study reveals a different contribution pattern of the fingers in submaximal voluntary contraction of gripping exertion. 相似文献
944.
In the cold, Purdue Pegboard (PP) performance declines. The purpose of this study was to determine if this cold-induced impairment is consistent across days (i.e. test-retest reliability) in 5°C. In thermoneutral air (25°C), 14 men were familiarised to the dominant hand (PPa) and bimanual (PPb) PP tasks. They then experienced two 90-min cold exposures (Day 1, Day 2) while wearing ~1 clo. Bare hands were maintained throughout. Performance on both tasks showed high reliability from day to day (intraclass correlations >0.700) in both thermoneutral and cold conditions. However for both tasks, room temperature performance did not predict performance in the cold (intraclass correlations <0.450). When screening applicants for manual labour in the cold, one must consider that room temperature dexterity does not correlate with dexterity in the cold. It is recommended that a 60-min period of cold exposure be employed to assess manual dexterity in these workers. STATEMENT OF RELEVANCE: This study shows that PP performance in room temperature does not predict performance in the cold but performance in the cold is consistent from day to day. When screening applicants for manual labour in the cold, it is recommended that dexterity tests be conducted in the same ambient conditions. 相似文献
945.
Xiaofeng Chen Qianhong Wu Haibo Tian Byoungcheon Lee Kwangjo Kim 《Information Sciences》2011,181(8):1493-1502
It is considered to be the most suitable solution for large scale elections to design an electronic voting scheme using blind signatures and anonymous channels. Based on this framework, Okamoto first proposed a receipt-free voting scheme [30] for large scale elections. However, in the following paper, Okamoto [31] proved that the scheme [30] was not receipt-free and presented two improved schemes. One scheme requires the help of the parameter registration committee and the other needs a stronger physical assumption of the voting booth. In this paper, we utilize the double-trapdoor commitment to propose a new receipt-free voting scheme based on blind signatures for large scale elections. Neither the parameter registration committee nor the voting booth is required in our scheme. We also present a more efficient zero-knowledge proof for secret permutation. Therefore, our scheme is much more efficient than Okamoto’s schemes [30] and [31] with the weaker physical assumptions. Moreover, we prove that our scheme can achieve the desired security properties. 相似文献
946.
Zhang’s three countermeasures are known to be secure against certain first-order side channel attacks such as differential power analysis and correlation power analysis. This security comes from the countermeasures’ use of random points to blind the message and random integers to blind the secret scalar. In this paper, we propose first-order side channel attack methods that can perfectly break these three countermeasures. Even though Zhang’s countermeasures use random points and random integers our attacks are made possible by the fact that intermediate values computed by these countermeasures are dependent on specific values that we can guess. The experimental results verify that the proposed attack methods can successfully break existing countermeasures. 相似文献
947.
In this paper, we examine user registration patterns in empirical WLAN traces, identify elusive patterns that are abused as user movements in constructing empirical mobility models, and analyze them to build up a realistic user mobility model. The examination shows that about 38–90% of transitions are irrelevant to actual user movements. In order to refine the elusive movements, we investigate the geographical relationships among APs and propose a filtering framework for removing them from the trace data. We then analyze the impact of the false-positive movements on an empirical mobility model. The numerical results indicate that the proposed framework improves the fidelity of the empirical mobility model. Finally, we devise an analytical model for characterizing realistic user movements, based on the analysis on the elusive user registration patterns, which emulates elusive user registration patterns and generates true user mobile patterns. 相似文献
948.
Byung-Hyuk Lee Jong-Chun Park Moo-Hyun Kim Sung-Chul Hwang 《Computer Methods in Applied Mechanics and Engineering》2011,200(9-12):1113-1125
The violent free-surface motions and the corresponding impact loads are numerically simulated by using the Moving Particle Semi-implicit (MPS) method, which was originally proposed by Koshizuka and Oka [10] for incompressible flows. In the original MPS method, there were several defects including non-optimal source term, gradient and collision models, and search of free-surface particles, which led to less-accurate fluid motions and non-physical pressure fluctuations. In the present study, how those defects can be remedied is illustrated by step-by-step improvements in the respective processes of the revised MPS method. For illustration, two examples are studied; (i) dam breaking problem and (ii) liquid sloshing inside a rectangular tank. The improvement of each step is explained and numerically demonstrated. The numerical results are also compared against the experimental results of Martin and Moyce [12] for dam-breaking problem and Kishev et al. [9] for sloshing problem. The numerical results for violent free-surface motions and impact pressures are in good agreement with their experimental data. 相似文献
949.
Contrast-enhanced ultrasound (CEUS) has recently become an important technology for lesion detection and characterization in cancer diagnosis. CEUS is used to investigate the perfusion kinetics in tissue over time, which relates to tissue vascularization. In this paper we present a pipeline that enables interactive visual exploration and semi-automatic segmentation and classification of CEUS data.For the visual analysis of this challenging data, with characteristic noise patterns and residual movements, we propose a robust method to derive expressive enhancement measures from small spatio-temporal neighborhoods. We use this information in a staged visual analysis pipeline that leads from a more local investigation to global results such as the delineation of anatomic regions according to their perfusion properties. To make the visual exploration interactive, we have developed an accelerated framework based on the OpenCL library, that exploits modern many-cores hardware. Using our application, we were able to analyze datasets from CEUS liver examinations, being able to identify several focal liver lesions, segment and analyze them quickly and precisely, and eventually characterize them. 相似文献
950.
Opportunistic routing is a candidate for multihop wireless routing where the network topology and radio channels vary rapidly. However, there are not many opportunistic routing algorithms that can be implemented in a real multihop wireless network while exploiting the node mobility. It motivates us to implement an opportunistic routing, random basketball routing (BR), in a real multi-robot network to see if it can enhance the capacity of the multihop network as mobility increases. For implementation purposes, we added some features, such as destination RSSI measuring, a loop-free procedure and distributed relay probability updating, to the original BR. We carried out the experiments on a real multi-robot network and compared BR with AODV combined with CSMA/CA (routing + MAC protocol). We considered both static and dynamic scenarios. Our experiments are encouraging in that BR outperforms AODV + CSMA/CA, particularly in dynamic cases; the throughput of BR is 6.6 times higher than that of AODV + CSMA/CA. BR with dynamic networks shows 1.4 times higher throughput performance than BR with static networks. We investigate the performance of BR in the large-scale network using NS-2 simulation. We verify the effect of node density, speed, destination beacon signal and loop-free procedure. According to the large-scale simulation, the end-to-end throughput grows with the node speed. 相似文献