全文获取类型
收费全文 | 1550篇 |
免费 | 72篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 18篇 |
综合类 | 2篇 |
化学工业 | 540篇 |
金属工艺 | 47篇 |
机械仪表 | 56篇 |
建筑科学 | 30篇 |
矿业工程 | 4篇 |
能源动力 | 60篇 |
轻工业 | 132篇 |
水利工程 | 2篇 |
石油天然气 | 3篇 |
无线电 | 104篇 |
一般工业技术 | 219篇 |
冶金工业 | 107篇 |
原子能技术 | 6篇 |
自动化技术 | 295篇 |
出版年
2023年 | 12篇 |
2022年 | 87篇 |
2021年 | 92篇 |
2020年 | 35篇 |
2019年 | 41篇 |
2018年 | 37篇 |
2017年 | 55篇 |
2016年 | 60篇 |
2015年 | 49篇 |
2014年 | 85篇 |
2013年 | 119篇 |
2012年 | 76篇 |
2011年 | 83篇 |
2010年 | 71篇 |
2009年 | 71篇 |
2008年 | 78篇 |
2007年 | 49篇 |
2006年 | 56篇 |
2005年 | 32篇 |
2004年 | 37篇 |
2003年 | 42篇 |
2002年 | 21篇 |
2001年 | 14篇 |
2000年 | 18篇 |
1999年 | 13篇 |
1998年 | 20篇 |
1997年 | 24篇 |
1996年 | 22篇 |
1995年 | 19篇 |
1994年 | 18篇 |
1993年 | 17篇 |
1992年 | 13篇 |
1991年 | 14篇 |
1990年 | 7篇 |
1989年 | 6篇 |
1988年 | 14篇 |
1987年 | 7篇 |
1986年 | 4篇 |
1985年 | 7篇 |
1984年 | 9篇 |
1983年 | 18篇 |
1982年 | 6篇 |
1981年 | 8篇 |
1980年 | 10篇 |
1979年 | 5篇 |
1978年 | 7篇 |
1977年 | 7篇 |
1973年 | 4篇 |
1971年 | 6篇 |
1965年 | 3篇 |
排序方式: 共有1625条查询结果,搜索用时 15 毫秒
91.
92.
93.
Lech Winnicki Marek Kwieciski Micha Kleiber 《International journal for numerical methods in engineering》1977,11(3):553-561
Full limit analysis is preseted of a thin plate under plane stress, perforated with circular holes arranged in a regular penetration pattern. The material is assumed to be elastic–perfectly plastic and to obey the Huber–Mises yield condition together with its associated flow law. The finite element tangential stiffness method is employed. Triangular constant-strain elements are used, the load being generated by means of constant edge displacements at the periphery of a suitably selected subregion. Load-displacement diagrams are obtained for various edge displacement programs and then an interaction curve is constructed for the perforated plate considered. Each computational step is associated with a certain plastic zone which develops until the limit state configuration is reached. The plate is provided with equilateral triangular configuration of holes with arbitrary cutout coefficients. The interaction curves are plotted against the Huber–Mises yield condition for the plate without openings. 相似文献
94.
95.
The possibility of the occurrence of critical point in /Agl-xKx/NbO3 solid solutions is discussed. 相似文献
96.
Kretowski M Rolland Y Bézy-Wendling J Coatrieux JL 《IEEE transactions on medical imaging》2003,22(2):248-257
In this paper, a model-based approach to medical image analysis is presented. It is aimed at understanding the influence of the physiological (related to tissue) and physical (related to image modality) processes underlying the image content. This methodology is exemplified by modeling first, the liver and its vascular network, and second, the standard computed tomography (CT) scan acquisition. After a brief survey on vascular modeling literature, a new method, aimed at the generation of growing three-dimensional vascular structures perfusing the tissue, is described. A solution is proposed in order to avoid intersections among vessels belonging to arterial and/or venous trees, which are physiologically connected. Then it is shown how the propagation of contrast material leads to simulate time-dependent sequences of enhanced liver CT slices. 相似文献
97.
Wojciech Zalewski Beata Niezgoda-
elasko Marek Litwin 《International Journal of Refrigeration》2000,23(7):553
In the paper the optimization of geometrical and operating parameters for evaporative fluid coolers has been presented. The algorithm of optimizational calculations contains:
- • the mathematical model of heat and mass transfer in evaporative fluid coolers;
- • model of operating costs based, among others, on the Zalewski–Gryglaszewski relations developed by the authors for evaluation of air pressure drops in the heat exchanger;
- • model of evaporative heat exchangers production costs.
98.
Philippe Baptiste Peter Brucker Marek Chrobak Christoph Dürr Svetlana A. Kravchenko Francis Sourd 《Journal of Scheduling》2007,10(2):139-146
We study the problem of preemptive scheduling of n} jobs with given release times on m identical parallel machines. The objective is to minimize the average flow time. In this paper, show that when all jobs have
equal processing times then the problem can be solved in polynomial time using linear programming. Our algorithm can also
be applied to the open-shop problem with release times and unit processing times. For the general case (when processing times
are arbitrary), we show that the problem is unary NP-hard.
P. Baptiste and C. Dürr: Supported by the NSF/CNRS grant 17171 and ANR/Alpage.
P. Brucker: Supported by INTAS Project 00-217 and by DAAD PROCOPE Project D/0427360.
M. Chrobak: Supported by NSF grants CCR-0208856 and INT-0340752.
S. A. Kravchenko: Supported by the Alexander von Humboldt Foundation. 相似文献
99.
In a mobile ad hoc network (MANET), the nodes act both as traffic sources and as relays that forward packets from other nodes along multi-hop routes to the destination. Such networks are suited to situations in which a wireless infrastructure is unavailable, infeasible, or prohibitively expensive. However, the lack of a secure, trusted infrastructure in such networks make secure and reliable packet delivery very challenging. A given node acting as a relay may exhibit Byzantine behavior with respect to packet forwarding, i.e., arbitrary, deviant behavior, which disrupts packet transmission in the network. For example, a Byzantine node may arbitrarily choose to drop or misroute a certain percentage of the packets that are passed to it for forwarding to the next hop. In earlier work, we proposed a trust establishment framework, called Hermes, which enables a given node to determine the “trustworthiness” of other nodes with respect to reliable packet delivery by combining first-hand trust information obtained independently of other nodes and second-hand trust information obtained via recommendations from other nodes. A deficiency of the Hermes scheme is that a node can fail to detect certain types of Byzantine behavior, such as packet misforwarding directed at a particular source node. In this paper, we propose new mechanisms to make Hermes robust to Byzantine behavior and introduce a punishment policy that discourages selfish node behavior. We present simulation results that demonstrate the effectiveness of the proposed scheme in a variety of scenarios involving Byzantine nodes that are malicious both with respect to packet forwarding and trust propagation. 相似文献
100.
Understanding how forces propagate in granular assemblages is important for equipment design and process control in many technologies. Yet, it remains poorly understood. In this study, a cuboidal assembly comprising cylinders of various lengths (aspect ratios AR ranging from 0.9 to 3.6) were subjected to uniaxial confined compression tests. Samples were vertically compressed until the top platen exerted a pressure of 50 kPa on the uppermost particles. This maximum pressure corresponds to the hydrostatic pressure of an approximately 15 m high column of chopped wood that may be encountered in real storage structures. The nonlinear loading curves were obtained depended on the aspect ratios of the cylinders. The modulus of elasticity, calculated from the linear elastic part of the stress–strain curve, monotonically decreased from 10.2 to 8.6 MPa as the aspect ratio increased from 1.2 to 3.6. The elastic modulus and volume fraction exhibited similar trends as functions of the aspect ratio. The horizontal-to-vertical pressure ratio was calculated as the horizontal pressure exerted on the wider walls to the vertical pressure exerted on the top lid during loading–unloading cycles. For ARs up to 3.6, the pressure ratio was approximately 0.31; for the longest cylinders (AR = 3.6), it decreased to approximately 0.27, probably because the assumption of the representative chamber volume was invalidated at this AR. 相似文献