全文获取类型
收费全文 | 560篇 |
免费 | 18篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 7篇 |
化学工业 | 108篇 |
金属工艺 | 31篇 |
机械仪表 | 19篇 |
建筑科学 | 7篇 |
能源动力 | 34篇 |
轻工业 | 45篇 |
石油天然气 | 3篇 |
无线电 | 102篇 |
一般工业技术 | 117篇 |
冶金工业 | 49篇 |
自动化技术 | 60篇 |
出版年
2023年 | 3篇 |
2022年 | 9篇 |
2021年 | 9篇 |
2020年 | 3篇 |
2019年 | 11篇 |
2018年 | 14篇 |
2017年 | 19篇 |
2016年 | 13篇 |
2015年 | 13篇 |
2014年 | 22篇 |
2013年 | 37篇 |
2012年 | 24篇 |
2011年 | 46篇 |
2010年 | 22篇 |
2009年 | 33篇 |
2008年 | 18篇 |
2007年 | 21篇 |
2006年 | 25篇 |
2005年 | 18篇 |
2004年 | 17篇 |
2003年 | 12篇 |
2002年 | 11篇 |
2001年 | 9篇 |
2000年 | 15篇 |
1999年 | 15篇 |
1998年 | 25篇 |
1997年 | 11篇 |
1996年 | 15篇 |
1995年 | 14篇 |
1994年 | 12篇 |
1993年 | 11篇 |
1992年 | 3篇 |
1991年 | 7篇 |
1990年 | 5篇 |
1989年 | 4篇 |
1987年 | 4篇 |
1986年 | 2篇 |
1984年 | 7篇 |
1983年 | 3篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 4篇 |
1974年 | 2篇 |
1972年 | 1篇 |
1971年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有582条查询结果,搜索用时 15 毫秒
111.
Deep wellbores/boreholes are generally drilled into rocks for oil and gas exploration, monitoring of tectonic stresses purposes. Wellbore and tunnel in depth are generally in true triaxial stress state, even if the ground is under axisymmetric loading condition. Stability of such wellbores is very critical and collapse of wellbore must be avoided. Mogi-Coulomb failure criterion is a better representation of rock strength under true triaxial condition. In this paper, an analytical solution is proposed using Mogi-Coulomb failure criterion. The solution is obtained for rock mass exhibiting elastic-perfectly plastic or elastic-brittle-plastic behaviour considering in-plane isotropic stresses. The proposed solution is then compared with exact analytical solution for incompressible material and experimental results of thick-wall cylinder. It is shown that the results obtained by the proposed analytical solution are in good agreement with the experimental results and exact analytical solution. A reduction of about 13%–20% in plastic zone from the proposed closed-form solution is observed, as compared to the results from the finite element method (FEM) based Mohr-Coulomb criterion. Next, the influences of various parameters such as Poisson's ratio, internal pressure (mud weight), dilation angle, and out-of-plane stress are studied in terms of stress and deformation responses of wellbore. The results of the parametric study reveal that variation in the out-of-plane stress has an inverse relation with the radius of plastic zone. Poisson's ratio does not have an appreciable influence on the tangential stress, radial stress and radial deformation. Dilation angle has a direct relation with the deformation. Internal pressure is found to have an inverse relation with the radial deformation and the radius of plastic zone. 相似文献
112.
The behavior and suitability of cold-formed lipped angle members for X-bracing with redundant have been studied. For the purpose, two full-scale panel tests were carried out. The first panel was designed so that the compression member would fail by buckling in flexural mode and the second panel in flexural-torsional mode. The members were designed using ASCE Manual No. 52. Theoretical aspects of least radius of gyration and buckling behavior of this bracing system have been discussed. The investigation on first panel, revealed that the member would buckle only in the flexural-torsional mode although flexural buckling would govern the design. The second panel test result showed that, the buckling mode and strength of the system for lipped angle sections can be predicted reasonably well. 相似文献
113.
Human faces undergo considerable amounts of varialions with aging. While face recognition systems have been proven to be sensitive to factors such as illumination and pose, their sensitivity to facial aging effects is yet to be studied. How does age progression affect the similarity between a pair of face images of an individual? What is the confidence associated with establishing the identity between a pair of age separated face images? In this paper, we develop a Bayesian age difference classifier that classifies face images of individuals based on age differences and performs face verification across age progression. Further, we study the similarity of faces across age progression. Since age separated face images invariably differ in illumination and pose, we propose preprocessing methods for minimizing such variations. Experimental results using a database comprising of pairs of face images that were retrieved from the passports of 465 individuals are presented. The verification system for faces separated by as many as nine years, attains an equal error rate of 8.5%. 相似文献
114.
We formulate the problem of multicast tree generation as one of computing a directed Steiner tree of minimal cost. In this context, we present a polynomial-time algorithm that provides for trade-off selection, using a single parameter κ, between the tree-cost (Steiner cost) and the run time efficiency. Further, the same algorithm may be used for delay optimization or tree-cost minimization simply by configuring the value of κ appropriately. We present theoretical and experimental analysis characterizing the problem and the performance of our algorithm. Theoretically, we show that it is highly unlikely that there exists a polynomial-time algorithm with a performance guarantee of constant times optimum cost, introduce metrics for measuring the asymmetry of graphs, and show that the worst-case cost of the tree produced by our algorithm is, at most, twice the optimum cost times the asymmetry, for two of these asymmetry metrics. For graphs with bounded asymmetry, this gives constant times optimum performance guarantee. We also show that three well-known algorithms for (undirected) Steiner trees are but particular cases of our algorithm. Our experimental study shows that operating at a low κ gives nearly best possible expected tree cost while maintaining acceptable run-time efficiency 相似文献
115.
Metzger A.G. Ramanathan R. Jiang Li Hsiang-Chih Sun Cismaru C. Hongxiao Shao Rushing L. Weller K.P. Ce-Jun Wei Yu Zhu Klimashov A. Tkachenko Y.A. Bin Li Zampardi P.J. 《Solid-State Circuits, IEEE Journal of》2007,42(10):2137-2148
The last decade has seen GaAs HBTs emerge as the dominant technology in wireless handset power amplifiers. Modern application requirements and size limitations have driven industry leaders towards the co-integration of depletion mode n-FET and GaAs HBT. The merger of Bipolar and FET, or BiFET, gives an additional degree of freedom in the design of advanced power amplifiers independent of a silicon controller. This paper provides an overview of the various techniques that can be used to join the two device technologies and then shows how a merged epitaxial structure, where an FET is formed in the emitter layers of an HBT, combines functional versatility with the high volume manufacturability needed to supply millions of power amplifiers at low cost. A large-signal model of the FET structure is developed which takes into account the unique physics and geometries of the device, including voltage-dependant parameters and charges on all four electrical terminals. Specific handset applications that can benefit or be enabled by BiFET are presented, such as on-off switching, low voltage bias controllers , Auto-Bias power amplifiers, and bias circuits with low or no voltage reference. When npn-only bias circuitry is limited to low voltage reference levels, HBT power amplifiers with BiFET bias stages are shown to have superior RF performance to their npn-only counterparts. 相似文献
116.
Ramanathan L.N. Mitchell D. 《Components and Packaging Technologies, IEEE Transactions on》2001,24(3):425-430
Shrinking die sizes and increasing I/O density is motivating the push toward flip chip packages. A flip chip interconnection system with a under bump metallurgy stack containing sputtered TiWNX/sputtered Cu/electroplated Cu stud/electroplated 95%Pb-5%Sn was developed. An important step in the above process is the selective etching of the sputtered Cu bus layer and the TiWNX barrier layer, in the presence of the Pb-Sn solder. The Cu bus layer was selectively etched using commercial etchants. However, no commercial etchants were available for selectively etching the TiWNX layer, H2O2-NH4OH based etching systems, popularly known as Standard Clean-1 cleaning solutions, have been extensively used to clean silicon wafers in front end wafer fabrication where only trace metal contamination exists. Since metals like lead, copper, titanium, tin and tungsten catalyze the heterogeneous decomposition of the peroxide, the unstable H2O2-NH4OH based etching systems are rarely used to etch metal films. In this paper the development of a H 2O2-NH4OH based etchant to selectively etch the sputtered TiWNX films in the presence of electroplated 95%Pb-5%Sn solder bumps is discussed. A 23 full factorial experiment with mid point was conducted to establish the etchant composition, as well as process temperature, that give satisfactory responses with respect to etch time, permissable undercut of the Cu stud (caused by the NH4OH), and acceptable bump shape after reflow. Statistical analysis was used to understand the significant factors influencing the etch rate and undercut. An etchant containing 6% by volume of 30%-H2O2 and 0.75% by volume of 30%-NH4OH operated at a temperature of 37°C was found to give satisfactory results 相似文献
117.
P. Muthuswamy C. R. Ranganathan V. Murugappan P. Santhy G. Ramanathan 《Nutrient Cycling in Agroecosystems》1990,23(3):135-140
A mathematical model has been proposed for predicting the changes in soil nitrogen status due to continuous fertilization in a continuous cropping sequence. The model also enabled the prediction of the steady state of soil nitrogen for a specified fertilizer practice.The model was applied to six years nitrogen availability data of four fertilizer practices in finger millet-maize-cowpea sequence followed in the Long Term Fertilizer Experiments conducted at Tamil Nadu Agricultural University, Coimbatore, India. The agreement between the predicted soil nitrogen status by the model and the actuals was proved by employing reliability index. 相似文献
118.
Networks that use the timed token protocol (such as the 100 Mbit/s FDDI network) are well suited for real-time applications because they guarantee, to each node, an average bandwidth and a bounded access time to the communication network. This guarantee is necessary but not sufficient for the timely delivery of deadline-constrained messages; protocol parameters must be carefully selected to ensure that these messages meet their deadlines. This paper addresses the issue of selecting the protocol parameters TTRT (target token rotation time) and the synchronous capacities assigned to each node. The objective is to guarantee that each synchronous message is transmitted before its deadline. An upper bound is derived on the worst case achievable utilization (WCAU) of any parameter selection scheme. The WCAU of a scheme is defined as the maximum utilization U such that the scheme guarantees all synchronous messages as long as their utilization is less than U. An algorithm for selecting the above parameters is proposed, The algorithm is shown to have a WCAU that is very close to the upper bound 相似文献
119.
Ramanathan P. Sivalingam K.M. Agrawal P. Kishore S. 《Selected Areas in Communications, IEEE Journal on》1999,17(7):1270-1283
User mobility management is one of the important components of mobile multimedia systems. In a cell-based network, a mobile should be able to seamlessly obtain transmission resources after handoff to a new base station. This is essential for both service continuity and quality of service assurance. In this paper, we present strategies for accommodating continuous service to mobile users through estimating resource requirements of potential handoff connections. A diverse mix of heterogeneous traffic with diverse resource requirements is considered. The investigate static and dynamic resource allocation schemes. The dynamic scheme probabilistically estimates the potential number of connections that will be handed off from neighboring cells, for each class of traffic. The performance of these strategies in terms of connection blocking probabilities for handoff and local new connection requests are evaluated. The performance is also compared to a scheme previously proposed by Yu and Leung (see IEEE J. Select. Areas Commun., vol.15, p.1208-25, 1997). The results indicate that using dynamic estimation and allocation, we can significantly reduce the dropping probability for handoff connections 相似文献
120.
Using service models for management of Internet services 总被引:2,自引:0,他引:2
As Internet services grow in complexity, Internet Service Providers (ISPs) are finding out that the ad hoc methods that they have employed thus far to monitor and diagnose their services are not sufficient to provide acceptable service quality to their subscribers. In this paper, we demonstrate how service models can he used by ISPs to effectively manage their service offerings. A service model encapsulates a human expert's knowledge of a service, its components, and its interdependencies with other services. In addition, using ongoing measurements, a service model tracks the health of the different services and their components. By traversing a service model top-down, an operator can not only assess the overall health of a service, but also easily correlate the health of all the services and service components to determine the root cause of any problems that may occur. By minimizing the time and effort needed to diagnose problems, service models enable ISP operators to efficiently resolve problems that occur in an ISP environment. Since each ISP system is unique in many respects, unique service models have to be crafted for each of the services in every ISP system. Handcrafting customized service models requires enormous effort and time on the part of a human expert, a luxury that few ISPs can afford. In this paper, we describe a methodology for constructing customized service models for a target ISP system with minimal human intervention. This methodology relies on a service model creation engine that composes a custom service model for an ISP system using a predefined service model template specification and automatically discovered information about the target ISP system. We describe a prototype implementation of this methodology and present an example of a service model obtained from a real-world ISP system. The concepts described are applicable for the management of networks and services in enterprise systems as well 相似文献