全文获取类型
收费全文 | 2595篇 |
免费 | 191篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 37篇 |
综合类 | 4篇 |
化学工业 | 703篇 |
金属工艺 | 52篇 |
机械仪表 | 60篇 |
建筑科学 | 72篇 |
矿业工程 | 11篇 |
能源动力 | 93篇 |
轻工业 | 442篇 |
水利工程 | 22篇 |
石油天然气 | 9篇 |
无线电 | 116篇 |
一般工业技术 | 398篇 |
冶金工业 | 393篇 |
原子能技术 | 11篇 |
自动化技术 | 364篇 |
出版年
2024年 | 5篇 |
2023年 | 17篇 |
2022年 | 63篇 |
2021年 | 118篇 |
2020年 | 78篇 |
2019年 | 89篇 |
2018年 | 112篇 |
2017年 | 110篇 |
2016年 | 119篇 |
2015年 | 83篇 |
2014年 | 98篇 |
2013年 | 191篇 |
2012年 | 147篇 |
2011年 | 162篇 |
2010年 | 144篇 |
2009年 | 164篇 |
2008年 | 127篇 |
2007年 | 110篇 |
2006年 | 98篇 |
2005年 | 60篇 |
2004年 | 49篇 |
2003年 | 60篇 |
2002年 | 45篇 |
2001年 | 42篇 |
2000年 | 29篇 |
1999年 | 29篇 |
1998年 | 105篇 |
1997年 | 82篇 |
1996年 | 50篇 |
1995年 | 36篇 |
1994年 | 31篇 |
1993年 | 27篇 |
1992年 | 10篇 |
1991年 | 8篇 |
1990年 | 5篇 |
1989年 | 12篇 |
1988年 | 9篇 |
1987年 | 5篇 |
1986年 | 9篇 |
1985年 | 10篇 |
1983年 | 4篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1980年 | 5篇 |
1977年 | 3篇 |
1976年 | 12篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1970年 | 2篇 |
1965年 | 1篇 |
排序方式: 共有2787条查询结果,搜索用时 46 毫秒
51.
A general topology-based framework for adaptive insertion of cohesive elements in finite element meshes 总被引:1,自引:1,他引:0
Glaucio?H.?PaulinoEmail author Waldemar?Celes Rodrigo?Espinha Zhengyu??Zhang 《Engineering with Computers》2008,24(1):59-78
Large-scale simulation of separation phenomena in solids such as fracture, branching, and fragmentation requires a scalable
data structure representation of the evolving model. Modeling of such phenomena can be successfully accomplished by means
of cohesive models of fracture, which are versatile and effective tools for computational analysis. A common approach to insert
cohesive elements in finite element meshes consists of adding discrete special interfaces (cohesive elements) between bulk
elements. The insertion of cohesive elements along bulk element interfaces for fragmentation simulation imposes changes in
the topology of the mesh. This paper presents a unified topology-based framework for supporting adaptive fragmentation simulations,
being able to handle two- and three-dimensional models, with finite elements of any order. We represent the finite element
model using a compact and “complete” topological data structure, which is capable of retrieving all adjacency relationships
needed for the simulation. Moreover, we introduce a new topology-based algorithm that systematically classifies fractured
facets (i.e., facets along which fracture has occurred). The algorithm follows a set of procedures that consistently perform
all the topological changes needed to update the model. The proposed topology-based framework is general and ensures that
the model representation remains always valid during fragmentation, even when very complex crack patterns are involved. The
framework correctness and efficiency are illustrated by arbitrary insertion of cohesive elements in various finite element
meshes of self-similar geometries, including both two- and three-dimensional models. These computational tests clearly show
linear scaling in time, which is a key feature of the present data-structure representation. The effectiveness of the proposed
approach is also demonstrated by dynamic fracture analysis through finite element simulations of actual engineering problems.
相似文献
Glaucio H. PaulinoEmail: |
52.
We define and study an optimization problem that is motivated by bandwidth allocation in radio networks. Because radio transmissions are subject to interference constraints in radio networks, physical space is a common resource that the nodes have to share in such a way, that concurrent transmissions do not interfere. The bandwidth allocation problem we study under these constraints is the following. Given bandwidth (traffic) demands between the nodes of the network, the objective is to schedule the radio transmissions in such a way that the traffic demands are satisfied. The problem is similar to a multicommodity flow problem, where the capacity constraints are replaced by the more complex notion of non-interfering transmissions. We provide a formal specification of the problem that we call round weighting . By modeling non-interfering radio transmissions as independent sets, we relate the complexity of round weighting to the complexity of various independent set problems (e.g. maximum weight independent set, vertex coloring, fractional coloring). From this relation, we deduce that in general, round weighting is hard to approximate within n1−ε (n being the size of the radio network). We also provide polynomial (exact or approximation) algorithms e.g. in the following two cases: (a) when the interference constraints are specific (for instance for a network whose vertices belong to the Euclidean space), or (b) when the traffic demands are directed towards a unique node in the network (also called gathering, analogous to single commodity flow). 相似文献
53.
Redox and acid–base properties of thionine immobilized in crosslinked chitosan films are analyzed. The experimental conditions for the preparation of the films are described. Results obtained with cyclic voltammetry, spectroelectrochemistry and spectrophotometry indicate that the immobilized dye retains the redox and acid–base activity of free thionine. An acid dissociation constant (Ka) for the immobilized dye of Ka = 2.7 × 10−11 was obtained.
Due to the stable and reversible pH dependent optical signal of the studied film, this membrane can be used as a building component of an optical pH sensor. 相似文献
54.
Aggregation of system-wide information in large-scale distributed systems, such as p2p systems and Grids, can be unfairly influenced by nodes that are selfish, colluding with each other, or are offline most of the time. We present AVCOL, which uses probabilistic and gossip-style techniques to provide availability-aware aggregation. Concretely, AVCOL is the first aggregation system that: (1) implements any (arbitrary) global predicate that explicitly specifies any node’s probability of inclusion in the global aggregate, as a mathematical function of that node’s availability (i.e., percentage time online); (2) probabilistically tolerates large numbers of selfish nodes and large groups of colluders; and (3) scales well with hundreds to thousands of nodes. AVCOL uses several unique design decisions: per-aggregation tree construction where nodes are allowed a limited but flexible probabilistic choice of parents or children, probabilistic aggregation along trees, and auditing of nodes both during aggregation as well as in gossip-style (i.e., periodically). We have implemented AVCOL, and we experimentally evaluated it using real-life churn traces. Our evaluation and our mathematical analysis show that AVCOL satisfies arbitrary predicates, scales well, and withstands a variety of selfish and colluding attacks. 相似文献
55.
This article proposes an approach for reconstructing physical parameters of a sample in a rectangular resonator during microwave radiation, knowing a priori, its electric field distribution. The inverse problem was solved using two global optimization algorithms and the peak signal-to-noise ratio (PSNR) criterion. First, the Self-regulated Fretwidth Harmony Search algorithm (SFHS) identified suitable resonant frequencies for a given configuration. Next, the unified Particle Swarm Optimization (UPSO) optimized said configuration. Together, they became a maximization strategy of the PSNR through a dual optimization process. Results showed the ability of the approach for estimating the height of each sample block and the resonating frequency of the cavity. This process takes longer to finish as a higher PSNR is demanded (mainly due to the aforementioned dual optimization). Even so, it allows for more similar electric field distributions between both, the direct and inverse problems. 相似文献
56.
Many optimization models in engineering are formulated as bilevel problems. Bilevel optimization problems are mathematical programs where a subset of variables is constrained to be an optimal solution of another mathematical program. Due to the lack of optimization software that can directly handle and solve bilevel problems, most existing solution methods reformulate the bilevel problem as a mathematical program with complementarity conditions (MPCC) by replacing the lower-level problem with its necessary and sufficient optimality conditions. MPCCs are single-level non-convex optimization problems that do not satisfy the standard constraint qualifications and therefore, nonlinear solvers may fail to provide even local optimal solutions. In this paper we propose a method that first solves iteratively a set of regularized MPCCs using an off-the-shelf nonlinear solver to find a local optimal solution. Local optimal information is then used to reduce the computational burden of solving the Fortuny-Amat reformulation of the MPCC to global optimality using off-the-shelf mixed-integer solvers. This method is tested using a wide range of randomly generated examples. The results show that our method outperforms existing general-purpose methods in terms of computational burden and global optimality. 相似文献
57.
To perform a null test of aspherical surfaces we used a computer-generated hologram or a lens or a mirror compensator to compensate the aspherical aberration. When compensating in a convergent light beam the axial position of this hologram or compensator is critical. A holographic compensator to be used in the convergent beam of light was designed and constructed. We have established some relations to determine the tolerance in the axial positioning of these compensators. 相似文献
58.
Corynebacterium urealyticum is usually resistant to multiple antibiotics. We analyzed whether previous hospitalization and/or the use of antibiotics was a factor associated with the appearance of resistance to different antibiotics in C. urealyticum. Our findings suggest that resistant strains of C. urealyticum are likely to be acquired directly from the hospital environment and that the use of antibiotics in the hospital setting could favor the appearance of multiresistant strains. 相似文献
59.
This paper presents three projects involving the design and fabrication of architectural structures through the use of different
parametric software and digital manufacturing methods. The first project is a flexible partition composed of interlocking
elements shaped using a laser-cutter. The second project is a university exhibition unit made with various wooden panels manufactured
through a computer numerical controlled (CNC) system. The third project is a system of metal sheets folded by digital machines
to create urban circulation spaces. The three works develop a parametric programming of geometry based on certain technical
factors, enabling the recognition of patterns of interaction between formal and constructive issues involved in the definition
of shapes through parametric controls. Differences in materials and processes are contrasted by similarities of function and
conditions involved, creating a system of local, global, productive and environmental parameters that produces a repertoire
of self-similar dimensions and variations as well as multiple possibilities of initial setups and final configurations. It
suggests a specific field of design exploration focusing on the development of differentiated components and variable architectural
configurations, in a kind of open parametric system. 相似文献
60.
College students (n = 140) were examined to test whether sensation seeking and perceived stress would predict abuse of the Internet. Previous studies have found that disinhibition, boredom susceptibility, and total sensation seeking scores were related to Internet abuse ( 9 and 30). Because stress has been documented to have a negative effect on students ( Pierceall & Keim, 2007), and may be linked to Internet use ( Lavoie & Pychyl, 2001), it was tested as a possible predictor of Internet abuse. This study also analyzed abuse of the Internet for sexual purposes, because sexuality is prevalent online, and college students are in an age of sexual exploration. Results of stepwise regression analyses revealed that disinhibition and total perceived stress were predictive of Internet abuse for sexual purposes, and perceived hopelessness and boredom susceptibility were predictive of Internet abuse for non-sexual purposes. Implications for students and Internet abuse are discussed. 相似文献