全文获取类型
收费全文 | 670篇 |
免费 | 38篇 |
专业分类
电工技术 | 5篇 |
综合类 | 2篇 |
化学工业 | 198篇 |
金属工艺 | 18篇 |
机械仪表 | 9篇 |
建筑科学 | 50篇 |
矿业工程 | 2篇 |
能源动力 | 17篇 |
轻工业 | 39篇 |
水利工程 | 2篇 |
无线电 | 55篇 |
一般工业技术 | 134篇 |
冶金工业 | 34篇 |
原子能技术 | 6篇 |
自动化技术 | 137篇 |
出版年
2023年 | 16篇 |
2022年 | 18篇 |
2021年 | 20篇 |
2020年 | 12篇 |
2019年 | 11篇 |
2018年 | 12篇 |
2017年 | 17篇 |
2016年 | 28篇 |
2015年 | 15篇 |
2014年 | 32篇 |
2013年 | 33篇 |
2012年 | 34篇 |
2011年 | 43篇 |
2010年 | 47篇 |
2009年 | 46篇 |
2008年 | 38篇 |
2007年 | 43篇 |
2006年 | 16篇 |
2005年 | 25篇 |
2004年 | 25篇 |
2003年 | 14篇 |
2002年 | 6篇 |
2001年 | 9篇 |
2000年 | 15篇 |
1999年 | 13篇 |
1998年 | 6篇 |
1997年 | 12篇 |
1996年 | 11篇 |
1995年 | 2篇 |
1994年 | 7篇 |
1993年 | 6篇 |
1992年 | 9篇 |
1991年 | 6篇 |
1990年 | 2篇 |
1989年 | 3篇 |
1988年 | 6篇 |
1987年 | 4篇 |
1986年 | 8篇 |
1985年 | 2篇 |
1983年 | 4篇 |
1982年 | 4篇 |
1981年 | 6篇 |
1980年 | 2篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1974年 | 2篇 |
1966年 | 3篇 |
1964年 | 1篇 |
排序方式: 共有708条查询结果,搜索用时 0 毫秒
11.
A Comparison of Free BDDs and Transformed BDDs 总被引:2,自引:0,他引:2
Ordered binary decision diagrams (OBDDs) introduced by Bryant (IEEE Trans. on Computers, Vol. 35, pp. 677–691, 1986) have found a lot of applications in verification and CAD. Their use is limited if the OBDD size of the considered functions is too large. Therefore, a variety of generalized BDD models has been presented, among them FBDDs (free BDDs) and TBDDs (transformed BDDs). Here the quite tight relations between these models are revealed and their advantages and disadvantages are discussed. 相似文献
12.
The design of two custom sample holders with a spherical cavity for commercial vibrating sample magnetometer systems is described. For such cavities, the magnetization M[over ->] and the internal magnetic field H(i)[over ->] of a sample are both homogeneous. Consequently, the material parameter M(H(i)) of a sample can be determined even for liquids and powders with a high magnetic susceptibility. 相似文献
13.
Rose Nathan S.; Rendell Peter G.; McDaniel Mark A.; Aberle Ingo; Kliegel Matthias 《Canadian Metallurgical Quarterly》2010,25(3):595
Young (ages 18–22 years) and older (ages 61–87 years) adults (N = 106) played the Virtual Week board game, which involves simulating common prospective memory (PM) tasks of everyday life (e.g., taking medication), and performed working memory (WM) and vigilance tasks. The Virtual Week game includes regular (repeated) and irregular (nonrepeated) PM tasks with cues that are either more or less focal to other ongoing activities. Age differences in PM were reduced for repeated tasks, and performance improved over the course of the week, suggesting retrieval was more spontaneous or habitual. Correlations with WM within each age group were reduced for PM tasks that had more regular or focal cues. WM (but not vigilance) ability was a strong predictor of irregular PM tasks with less focal cues. Taken together, these results support the hypothesis that habitual and focally cued PM tasks are less demanding of attentional resources (specifically, WM), whereas tasks that are more demanding of controlled attentional processes produce larger age differences, which may be attributable to individual differences in WM. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
14.
Scott R Boss Laurie J Kirsch Ingo Angermeier Raymond A Shingler R Wayne Boss 《欧洲信息系统杂志》2009,18(2):151-164
Information security has become increasingly important to organizations. Despite the prevalence of technical security measures, individual employees remain the key link – and frequently the weakest link – in corporate defenses. When individuals choose to disregard security policies and procedures, the organization is at risk. How, then, can organizations motivate their employees to follow security guidelines? Using an organizational control lens, we build a model to explain individual information security precaution-taking behavior. Specific hypotheses are developed and tested using a field survey. We examine elements of control and introduce the concept of ‘mandatoriness,’ which we define as the degree to which individuals perceive that compliance with existing security policies and procedures is compulsory or expected by organizational management. We find that the acts of specifying policies and evaluating behaviors are effective in convincing individuals that security policies are mandatory. The perception of mandatoriness is effective in motivating individuals to take security precautions, thus if individuals believe that management watches, they will comply. 相似文献
15.
16.
Günter Mistlberger Klaus Koren Elisabeth Scheucher Daniel Aigner Sergey M. Borisov Armin Zankel Peter Pölt Ingo Klimant 《Advanced functional materials》2010,20(11):1842-1851
Magnetic optical sensor particles with multifunctional cores and shells are synthesized via a facile nanoprecipitation method and the subsequent modification of the particle shell. The hydrophobic particle core includes optical oxygen indicators, a light harvesting system, photosensitizers, and magnetic nanoparticles. Further functionalities are introduced by modifying the shell with enzymes, antibodies, multiple layers of polyelectrolytes, stimuli‐responsive polymers, and luminescent indicator dyes. The hydrodynamic diameter is tunable by varying different precipitation parameters. 相似文献
17.
Andreas Vetter Finn S. Babbe Bernhard Hofbeck Peter Kubis Michael Richter Stephan J. Heise Jrg Ohland Ingo Riedel Christoph J. Brabec 《Progress in Photovoltaics: Research and Applications》2016,24(7):1001-1008
Local electric defects may result in considerable performance losses in solar cells. Infrared (IR) thermography is one important tool to detect these defects on photovoltaic modules. Qualitative interpretation of IR images has been carried out successfully, but quantitative interpretation has been hampered by the lack of “calibration” defects. The aims of this study are to (i) establish methods to induce well‐defined electric defects in thin‐film solar cells serving as “calibration” defects and to (ii) assess the accuracy of IR imaging methods by using these artificially induced defects. This approach paves the way for improving quality control methods based on imaging in photovoltaic. We created ohmic defects (“shunts”) by using a focused ion beam and weak diodes (“interface shunts”) by applying a femto‐second laser at rather low power on copper indium gallium selenide cells. The defects can be induced precisely and reproducibly, and the severity of the defects on the electrical performance can be well adjusted by focused ion beam/laser parameters. The successive assessment of the IR measurement (ILIT‐Voc) revealed that this method can predict the losses in Pmpp (maximal power extractable) with a mean error of below 10%. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献
18.
DLC protocols, scheduling, and multiplexing issues for broadband fixed wireless access networks based on ATM are discussed. The established DSA++ mac protocol has been developed at ComNets and has been widely applied within the German project ATMmobil. It has been a fundamental contribution to the etsi bran standardisation of HIPERLAN /2. The DSA++ is here modified to perform optimal within the fixed wireless access network environment. Therefore, realistic traffic as well as radio channel models for the respective scenarios are introduced. Simulation results are presented, showing the feasibility of the respective protocol stack for offering broadband multimedia services with reasonable quality of service. In addition to this advanced protocol approach, two systems are discussed which are currently under standardisation process. The IEEE 802.16 as well as the European hiperaccess systems are both proposed for fixed wireless access networks. Expected scenarios and applications are presented and basic requirements the standards have to fulfil are derived. As another aspect of access networks, their impact on the global information society is discussed. 相似文献
19.
Alan Bivens Rashim Gupta Ingo McLean Boleslaw Szymanski Jerome White 《International Journal of Network Management》2004,14(2):131-146
Rapid growth of computer network sizes and uses necessitate analysis of network application middleware in terms of its scalability as well as performance. In this paper we analyze a distributed network management middleware based on agents that can be dispatched to locations where they can execute close to the managed nodes. The described middleware operates between the network protocol layer and the application layer and uses standard TCP protocol and SNMP probes to interface the network. By aggregating requests from many users into a single agent, our system allows multiple managers to probe problem areas with minimal management traffic overhead. We discuss and quantify the benefits of the described middleware by implementing real‐time network managers using our system. The main result of this paper is a comparison of scalability and efficiency of our agent‐based management middleware and traditional SNMP‐based data collection. To this end, we measured traffic in both real and simulated networks. In the latter case, we designed, used and described here a method of separating simulated application flow into separate subflows to simplify design of simulations. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献
20.
Xinliang Feng Yanyu Liang Linjie Zhi Arne Thomas Dongqing Wu Ingo Lieberwirth Ute Kolb Klaus Müllen 《Advanced functional materials》2009,19(13):2125-2129
One‐dimensional fibers and tubes are constructed through the oriented carbon‐carbon cross‐linking reactions towards rigid conjugated polymer networks. As the result, a template‐free and one‐step synthesis of CNTs and CNFs is achieved through a simple carbonization of the as‐formed carbon‐rich tubular and fiberlike polyphenylene precursors under argon. Microporous CNTs and CNFs with a surface area up to 900 m2 g–1 are obtained, together with HR‐TEM characterizations indicating the formation of intrinsic microporous structure in these rigid carbon‐rich networks. The primary electrochemical experiments reveal their promising applications as advanced electrodes in electrochemical double‐layered capacitor (EDLC). 相似文献