全文获取类型
收费全文 | 2735篇 |
免费 | 91篇 |
专业分类
电工技术 | 36篇 |
综合类 | 4篇 |
化学工业 | 555篇 |
金属工艺 | 63篇 |
机械仪表 | 37篇 |
建筑科学 | 102篇 |
矿业工程 | 3篇 |
能源动力 | 63篇 |
轻工业 | 211篇 |
水利工程 | 18篇 |
石油天然气 | 8篇 |
无线电 | 187篇 |
一般工业技术 | 359篇 |
冶金工业 | 668篇 |
原子能技术 | 35篇 |
自动化技术 | 477篇 |
出版年
2023年 | 21篇 |
2022年 | 39篇 |
2021年 | 71篇 |
2020年 | 47篇 |
2019年 | 41篇 |
2018年 | 51篇 |
2017年 | 50篇 |
2016年 | 71篇 |
2015年 | 69篇 |
2014年 | 81篇 |
2013年 | 137篇 |
2012年 | 101篇 |
2011年 | 145篇 |
2010年 | 109篇 |
2009年 | 112篇 |
2008年 | 129篇 |
2007年 | 110篇 |
2006年 | 101篇 |
2005年 | 76篇 |
2004年 | 60篇 |
2003年 | 47篇 |
2002年 | 44篇 |
2001年 | 44篇 |
2000年 | 40篇 |
1999年 | 67篇 |
1998年 | 168篇 |
1997年 | 108篇 |
1996年 | 65篇 |
1995年 | 49篇 |
1994年 | 57篇 |
1993年 | 48篇 |
1992年 | 18篇 |
1991年 | 23篇 |
1990年 | 26篇 |
1989年 | 23篇 |
1988年 | 18篇 |
1987年 | 21篇 |
1986年 | 16篇 |
1985年 | 23篇 |
1984年 | 22篇 |
1983年 | 12篇 |
1982年 | 21篇 |
1981年 | 23篇 |
1980年 | 20篇 |
1979年 | 19篇 |
1977年 | 32篇 |
1976年 | 25篇 |
1974年 | 13篇 |
1973年 | 11篇 |
1972年 | 11篇 |
排序方式: 共有2826条查询结果,搜索用时 359 毫秒
51.
Felix Gensch Sven Gall Christoph Fahrenson Sören Müller Walter Reimers 《Journal of Materials Science》2016,51(8):3888-3896
Extrusions of hollow profiles with weld seams were conducted using the magnesium alloy ME21 applying various extrusion ratios. Subsequent analysis of the profiles’ microstructure was performed comparing weld free with weld seam containing material using (polarized) light optical microscopy (LOM). Additionally, the local texture and microstructure in the weld-free material as well as in the weld seam region has been examined with a scanning electron microscope coupled with electron backscatter diffraction technique (SEM-EBSD). The weld-free material and the weld seam are characterized by recrystallized microstructures, whereas few residual cast grains were identified. The local texture distinctively changes from the weld-free material to the weld seam. The texture of the weld-free material is comparable with the typical ME21 sheet texture. In the weld seam area, a pole density is found, which is distributed towards the transverse direction (TD) combined with a split and broadening of the pole density in the extrusion direction (ED). This texture influences the mechanical anisotropy due to the dependence of the activation of basal 〈a〉-slip and \( \{ 10\bar{1}2\} \;\langle 10\bar{1}1\rangle \)-extension twinning on the loading direction in favorably oriented grains. 相似文献
52.
J Zimnicki K Rozniakowski B Wendler W Kalita J Hoffman 《Journal of Materials Science》1998,33(5):1385-1388
TiN paths have been created on the surface of the titanium alloy OT4-1 by the use of a laser beam. The results of investigations of structure, phase composition, microhardness and surface roughness of the created TiN paths are given in the paper. The paths created in the work are inhomogenous two-phase mixtures of TiN and -Ti, in which the TiN phase with strong (2 0 0) texture is predominant over the other phase and presents a dendritic structure. © 1998 Chapman & Hall 相似文献
53.
Pancreatic cancer is a highly aggressive and treatment-refractory cancer. A clinically-relevant animal model is necessary to develop therapy for metastatic pancreatic cancer. In this study we evaluated the efficacy of mitomycin C (MMC) and 5-FU against the human pancreatic adenocarcinoma cell line PAN-12 in an orthotopic human metastatic pancreatic cancer nude mice model. The model is constructed by surgical orthotopic implantation (SOI) of histologically intact tumor tissue in the tail portion of the pancreas near the spleen. PAN-12 grew very aggressively in the control group of nude mice with extensive local invasion and distant metastasis to various organs with a propensity for the lung but to other organs as well, including the liver, kidney and regional and distant lymph nodes. In a striking effect none of the mice in the MMC-treated group developed tumor. Although mice in the 5-FU treated group survived statistically significantly longer than those in the untreated control, the overall incidence of metastasis in these mice was equivalent to those in the control. However no liver or kidney metastases were found in the 5-FU treated animals perhaps accounting in part for their longer survival. This "clinical" nude mouse model of highly metastatic pancreatic cancer can now be used to discover new effective agents for this disease. 相似文献
54.
Sven A. Carlsson Stefan Henningsson Stefan Hrastinski Christina Keller 《Information Systems and E-Business Management》2011,9(1):109-131
Design science research is an essential part of IS research since the field should not only try to understand how the world
is, but also how to change it. We argue that the aim of IS design science research should be to develop practical knowledge
not only for the design of novel information technology (IT), but also for IS governance and management. Whereas at least
some methodological support exists for researchers engaged in IT-centric design science research, limited support is available
for researchers who want to develop design knowledge and theory for IS governance and management. To overcome this shortcoming,
we suggest a socio-technical IS design science research approach. The approach has four main activities: (1) identifying problem
situations and desired outcomes, (2) reviewing extant theories, knowledge and data, (3) proposing/refining design theory and
knowledge, and (4) testing design theory and knowledge. The applicability and usefulness of the proposed approach is shown
by means of a design science research project concerning IS integration management in the context of mergers and acquisitions. 相似文献
55.
Yves Younan Pieter Philippaerts Frank Piessens Wouter Joosen Sven Lachmund Thomas Walter 《Journal in Computer Virology》2011,7(3):173-188
Code injection attacks are one of the most powerful and important classes of attacks on software. In these attacks, the attacker sends malicious input to a software application, where it is stored in memory. The malicious input is chosen in such a way that its representation in memory is also a valid representation of a machine code program that performs actions chosen by the attacker. The attacker then triggers a bug in the application to divert the control flow to this injected machine code. A typical action of the injected code is to launch a command interpreter shell, and hence the malicious input is often called shellcode. Attacks are usually performed against network facing applications, and such applications often perform validations or encodings on input. Hence, a typical hurdle for attackers, is that the shellcode has to pass one or more filtering methods before it is stored in the vulnerable application??s memory space. Clearly, for a code injection attack to succeed, the malicious input must survive such validations and transformations. Alphanumeric input (consisting only of letters and digits) is typically very robust for this purpose: it passes most filters and is untouched by most transformations. This paper studies the power of alphanumeric shellcode on the ARM architecture. It shows that the subset of ARM machine code programs that (when interpreted as data) consist only of alphanumerical characters is a Turing complete subset. This is a non-trivial result, as the number of instructions that consist only of alphanumeric characters is very limited. To craft useful exploit code (and to achieve Turing completeness), several tricks are needed, including the use of self-modifying code. 相似文献
56.
57.
Feature-Oriented Software Development provides a multitude of formalisms, methods, languages, and tools for building variable, customizable, and extensible software. Along different lines of research, different notions of a feature have been developed. Although these notions have similar goals, no common basis for evaluation, comparison, and integration exists. We present a feature algebra that captures the key ideas of feature orientation and that provides a common ground for current and future research in this field, on which also alternative options can be explored. Furthermore, our algebraic framework is meant to serve as a basis for the development of the technology of automatic feature-based program synthesis and architectural metaprogramming. 相似文献
58.
James E. Corter Sven K. Esche Constantin Chassapis Jing Ma Jeffrey V. Nickerson 《Computers & Education》2011
A large-scale, multi-year, randomized study compared learning activities and outcomes for hands-on, remotely-operated, and simulation-based educational laboratories in an undergraduate engineering course. Students (N = 458) worked in small-group lab teams to perform two experiments involving stress on a cantilever beam. Each team conducted the experiments in one of three lab formats (hands-on, remotely-operated, or simulation-based), collecting data either individually or as a team. Lab format and data-collection mode showed an interaction, such that for the hands-on lab format learning outcomes were higher when the lab team collected data sets working as a group rather than individually collecting data sets to be combined later, while for remotely-operated labs individual data collection was best. The pattern of time spent on various lab-related activities suggests that working with real instead of simulated data may induce higher levels of motivation. The results also suggest that learning with computer-mediated technologies can be improved by careful design and coordination of group and individual activities. 相似文献
59.
Sven Groppe Jinghua Groppe Stefan Böttcher Thomas Wycisk Le Gruenwald 《Knowledge and Information Systems》2009,18(3):331-391
We have to deal with different data formats whenever data formats evolve or data must be integrated from heterogeneous systems.
These data when implemented in XML for data exchange cannot be shared freely among applications without data transformation.
A common approach to solve this problem is to convert the entire XML data from their source format to the applications’ target
formats using the transformations rules specified in XSLT stylesheets. However, in many cases, not all XML data are required
to be transformed except for a smaller part described by a user’s query (application). In this paper, we present an approach
that optimizes the execution time of an XSLT stylesheet for answering a given XPath query by modifying the XSLT stylesheet
in such a way that it would (a) capture only the parts in the XML data that are relevant to the query and (b) process only
those XSLT instructions that are relevant to the query. We prove the correctness of our optimization approach, analyze its
complexity and present experimental results. The experimental results show that our approach performs the best in terms of
execution time, especially when many cost-intensive XSLT instructions can be excluded in the XSLT stylesheet. 相似文献
60.
Aspect-oriented programming (AOP) seeks to improve software modularity via the separation of cross-cutting concerns. AOP proponents often advocate a development strategy where programmers write the main application (base code), ignoring cross-cutting concerns, and then aspect programmers, domain experts in their specific concerns, weave in the logic for these more specialized cross-cutting concerns. This purely oblivious strategy, however, has empirically been shown to tightly couple aspects to base code in many cases, hindering aspect modularity and reuse. In essence, the more intricate the weaving between the cross-cutting concern and the base code (lexically and/or semantically), the harder it becomes to: (a) robustly specify how to weave the aspects in at the required points, (b) capture interactions between aspects and base code, and (c) preserve the correct weaving as the base code evolves.We propose an alternate methodology, termed cooperative aspect-oriented programming (Co-AOP), where complete lexical separation of concerns is not taken as an absolute requirement. Instead, cross-cutting concerns are explicitly modeled as abstract interfaces through explicit join points (EJPs). Programmers specify where these interfaces interact with base code either through explicit lexical references or via traditional oblivious aspects. This explicit awareness allows base code and aspects to cooperate in ways that were previously not possible: arbitrary blocks of code can be advised, advice can be explicitly parameterized, base code can guide aspects in where to apply advice, and aspects can statically enforce new constraints upon the base code that they advise. These new techniques allow aspect modularity and program safety to increase, and bring us towards a cooperative AOP paradigm.We illustrate our methodology via an example on transactions, and also give an initial evaluation of cooperative AOP through an empirical study on program extensibility comparing both the traditional and cooperative AOP methodologies. Initial results show that cooperative AOP techniques result in code that is less complex with lower overall coupling, facilitating extensibility. 相似文献