全文获取类型
收费全文 | 5506篇 |
免费 | 105篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 57篇 |
综合类 | 2篇 |
化学工业 | 683篇 |
金属工艺 | 60篇 |
机械仪表 | 147篇 |
建筑科学 | 203篇 |
矿业工程 | 10篇 |
能源动力 | 120篇 |
轻工业 | 386篇 |
水利工程 | 37篇 |
石油天然气 | 25篇 |
无线电 | 543篇 |
一般工业技术 | 833篇 |
冶金工业 | 1867篇 |
原子能技术 | 77篇 |
自动化技术 | 564篇 |
出版年
2021年 | 59篇 |
2020年 | 44篇 |
2019年 | 56篇 |
2018年 | 51篇 |
2017年 | 56篇 |
2016年 | 51篇 |
2015年 | 43篇 |
2014年 | 80篇 |
2013年 | 217篇 |
2012年 | 96篇 |
2011年 | 179篇 |
2010年 | 140篇 |
2009年 | 127篇 |
2008年 | 185篇 |
2007年 | 165篇 |
2006年 | 148篇 |
2005年 | 137篇 |
2004年 | 117篇 |
2003年 | 117篇 |
2002年 | 156篇 |
2001年 | 113篇 |
2000年 | 112篇 |
1999年 | 162篇 |
1998年 | 522篇 |
1997年 | 356篇 |
1996年 | 243篇 |
1995年 | 138篇 |
1994年 | 129篇 |
1993年 | 139篇 |
1992年 | 63篇 |
1991年 | 77篇 |
1990年 | 54篇 |
1989年 | 66篇 |
1988年 | 84篇 |
1987年 | 47篇 |
1986年 | 51篇 |
1985年 | 63篇 |
1984年 | 77篇 |
1983年 | 53篇 |
1982年 | 52篇 |
1981年 | 58篇 |
1980年 | 57篇 |
1979年 | 56篇 |
1978年 | 52篇 |
1977年 | 87篇 |
1976年 | 146篇 |
1975年 | 30篇 |
1974年 | 47篇 |
1973年 | 41篇 |
1972年 | 29篇 |
排序方式: 共有5614条查询结果,搜索用时 31 毫秒
131.
In this article, energy efficient ensemble clustering method (EECM) with black widow optimization (EECM-BWO) algorithm is proposed for effective data transmission with the help of real time flood disaster monitoring wireless sensor network (WSN). Initially, unified scalable ensemble clustering algorithm based on ensemble generation and consensus function is proposed for selecting the optimal routing path among the node using BWO algorithm. Then, biologically inspired routing black widow spiders optimization algorithm is proposed to trade off the nodes energy level, self-organization, and self-configuration in the WSN. The simulation is performed using NS2 simulator for validating the performance of the proposed EECM-BWO method. Here, in node, low delay achieves 24.07%, 72.58%, 51.36%, 81.75%, 77.74%, high packet delivery ratio achieves 70.83%, 53.93%, 90.23%, 43.58%, 24.58%, low packet drop attains 77.93%, 72.76%, 61.56%, 51.87%, 34.35%, low energy consumption attains 75.9%, 52.94%, 65.81%, 58%, 41.2% compared with existing energy-efficient clustering approach consolidated game theory as well as dual-cluster-head mode for WSNs energy-aware clustering by cuckoo optimization approach (EECM-COA), energy-aware clustering-based routing using multi-path reliable transmission with routing and control board (EECM-RCB-MRT), adaptive repair algorithm with temporally ordered routing algorithms for flood control strategy (EECM-AR-TORA-FCS), passive multi-hop clustering algorithm (EECM-PMC), dynamic source routing protocol based on genetic algorithm-bacterial foraging optimization (DSR-GA-BFO). 相似文献
132.
Sub‐Micron Polymeric Stomatocytes as Promising Templates for Confined Crystallization and Diffraction Experiments
下载免费PDF全文
![点击此处可从《Small (Weinheim an der Bergstrasse, Germany)》网站下载免费的PDF全文](/ch/ext_images/free.gif)
The possibility of using sub‐micrometer polymeric stomatocytes is investigated to effectuate confined crystallization of inorganic compounds. These bowl‐shaped polymeric compartments facilitate confined crystallization while their glassy surfaces provide their crystalline cargos with convenient shielding from the electron beam's harsh effects during transmission electron microscopy experiments. Stomatocytes host the growth of a single nanocrystal per nanocavity, and the electron diffraction experiments reveal that their glassy membranes do not interfere with the diffraction patterns obtained from their crystalline cargos. Therefore, it is expected that the encapsulation and crystallization within these compartments can be considered as a promising template (nanovials) that hold and protect nanocrystals and protein clusters from the direct radiation damage before data acquisition, while they are examined by modern crystallography methodologies such as serial femtosecond crystallography. 相似文献
133.
There is growing evidence that face recognition is "special" but less certainty concerning the way in which it is special. The authors review and compare previous proposals and their own more recent hypothesis, that faces are recognized "holistically" (i.e., using relatively less part decomposition than other types of objects). This hypothesis, which can account for a variety of data from experiments on face memory, was tested with 4 new experiments on face perception. A selective attention paradigm and a masking paradigm were used to compare the perception of faces with the perception of inverted faces, words, and houses. Evidence was found of relatively less part-based shape representation for faces. The literatures on machine vision and single unit recording in monkey temporal cortex are also reviewed for converging evidence on face representation. The neuropsychological literature is reviewed for-evidence on the question of whether face representation differs in degree or kind from the representation of other types of objects. 相似文献
134.
AM Ballangrud PJ Wilson K Brown GG Miller RB Moore MS McPhee J Tulip 《Canadian Metallurgical Quarterly》1996,19(4):471-479
OBJECTIVE: To compare the prevalence of conduct problems (CP) according to level of urbanization and to determine which factors account for the potential difference in prevalence rates. METHOD: Study 1 used a questionnaire survey of a nationally representative sample of 10,462 Norwegian adolescents. Study 2 used a questionnaire survey of a representative sample of 1,346 adolescents living in Oslo. Self-reported CP included most DSM-III-R criteria for conduct disorder. RESULTS: CP rates were similar in all levels of urbanization, except for the only semimetropolitan city in the country, the capital Oslo, which had CP rates twice those of the rest of the country. This increase rate could not be explained by a series of commonly advocated explanations: family structure and parental practices, social network, socioeconomic status, integration in community activities, religious involvement, and race. However, involvement in "soft" drugs and associating with antisocial peers could explain the statistically differential rates. Furthermore, in the Oslo study, adolescents' CP did not vary according to density of population or region within the city. CONCLUSIONS: The results support previous studies showing increased rates of CP in urban areas. However, urbanization must pass a certain threshold before it has this effect. Moreover, the lack of support for commonly advocated explanations for the difference between urban and nonurban areas suggests that investigations specifically addressing potential explanations for this difference should be conducted. The results indicate that the increased rates of substance use in highly urbanized areas may account for the difference in CP rates by prolonging and aggravating CP. 相似文献
135.
This paper is concerned with the complexity of computing winning strategies for poset games. While it is reasonably clear
that such strategies can be computed in PSPACE, we give a simple proof of this fact by a reduction to the game of geography. We also show how to formalize the reasoning
about poset games in Skelley’s theory W11\mathbf{W}_{1}^{1} for PSPACE reasoning. We conclude that W11\mathbf{W}_{1}^{1} can use the “strategy stealing argument” to prove that in poset games with a supremum the first player always has a winning
strategy. 相似文献
136.
We consider Constraint Satisfaction Problems in which constraints can be initially incomplete, where it is unknown whether
certain tuples satisfy the constraint or not. We assume that we can determine the satisfaction of such an unknown tuple, i.e.,
find out whether this tuple is in the constraint or not, but doing so incurs a known cost, which may vary between tuples.
We also assume that we know the probability of an unknown tuple satisfying a constraint. We define algorithms for this problem,
based on backtracking search. Specifically, we consider a simple iterative algorithm based on a cost limit on the unknowns
that may be determined, and a more complex algorithm that delays determining an unknown in order to estimate better whether
doing so is worthwhile. We show experimentally that the more sophisticated algorithms can greatly reduce the average cost. 相似文献
137.
Rebecca Randell Stephanie Wilson Peter Woodward 《Computer Supported Cooperative Work (CSCW)》2011,20(1-2):37-59
Workplace studies have made a major contribution to the field of CSCW, drawing attention to subtle practices that enable effective collaboration. However, workplace studies typically focus on a single setting, making it difficult to assess the generalisability of the findings. Through a multi-site workplace study, we explore a specific collaborative process, that of the handover which occurs when a patient is transferred from one hospital or ward to another. The study demonstrates that the term ??handover?? captures a variety of collaborative practices that vary in both their form and content, reflecting aspects of the setting in which they occur. Multi-site workplace studies are shown to be essential for CSCW, not only generating findings that have relevance beyond a single setting but also focusing attention on aspects of work practice that may otherwise go unnoticed. 相似文献
138.
Purpose: About two million new cases of leishmaniasis with 50 000 associated deaths occur worldwide each year. Promastigotes of the causative Leishmania spp. develop from the procyclic stage to the highly virulent metacyclic stage within the sand fly vector. We hypothesized that proteins important for promastigote virulence might be uniquely represented in the plasma membrane of metacyclic, but not procyclic, promastigotes. Experimental design: Procyclic (logarithmic) promastigotes and purified metacyclic promastigotes from stationary phase cultures of Leishmania chagasi were used to prepare membrane preparations either by surface biotinylation‐streptavidin affinity separation or by octyl glucoside detergent extraction. Results: These membrane fractions were enriched over 130‐ and 250‐fold, respectively, as estimated by Western blotting for the plasma membrane's major surface protease. Hundreds or dozens of proteins were identified by LC‐MS/MS in the surface biotinylation or detergent extraction, respectively. Confocal microscopy suggested the difference between the lists was due to the fact that proteins localized both on the surface membrane and within the flagellar pocket were accessible to surface biotinylation, whereas only proteins on the membrane were obtained by detergent extraction. Using detergent extraction, we found different proteins were present in membranes of the procyclic stage compared to metacyclic stage promastigotes. Several dozen were stage specific. Conclusions and clinical relevance: These data provide a foundation for identifying virulence factors in the plasma membranes of Leishmania spp. promastigotes during metacyclogenesis. 相似文献
139.
Richard S. Stansbury Manan A. Vyas Timothy A. Wilson 《Journal of Intelligent and Robotic Systems》2009,54(1-3):61-78
The integration of unmanned aircraft systems (UAS) into the National Airspace System (NAS) presents many challenges including airworthiness certification. As an alternative to the time consuming process of modifying the Federal Aviation Regulations (FARs), guidance materials may be generated that apply existing airworthiness regulations toward UAS. This paper discusses research to assist in the development of such guidance material. The results of a technology survey of command, control, and communication (C3) technologies for UAS are presented. Technologies supporting both line-of-sight and beyond line-of-sight UAS operations are examined. For each, data link technologies, flight control, and air traffic control (ATC) coordination are considered. Existing protocols and standards for UAS and aircraft communication technologies are discussed. Finally, future work toward developing the guidance material is discussed. 相似文献
140.
On the basis of media hype alone, you might conclude that biometric passwords will soon replace their alphanumeric counterparts with versions that cannot be stolen, forgotten, lost, or given to another person. But what if the actual performance of these systems falls short of the estimates? The authors designed this article to provide sufficient information to know what questions to ask when evaluating a biometric system, and to assist in determining whether performance levels meet the requirements of an application. For example, a low-performance biometric is probably sufficient for reducing-as opposed to eliminating-fraud. Likewise, completely replacing an existing security system with a biometric-based one may require a high-performance biometric system, or the required performance may be beyond what current technology can provide. Of the biometrics that give the user some control over data acquisition, voice, face, and fingerprint systems have undergone the most study and testing-and therefore occupy the bulk of this discussion. This article also covers the tools and techniques of biometric testing 相似文献