全文获取类型
收费全文 | 7097篇 |
免费 | 203篇 |
国内免费 | 28篇 |
专业分类
电工技术 | 104篇 |
综合类 | 2篇 |
化学工业 | 1489篇 |
金属工艺 | 286篇 |
机械仪表 | 190篇 |
建筑科学 | 105篇 |
矿业工程 | 8篇 |
能源动力 | 330篇 |
轻工业 | 285篇 |
水利工程 | 59篇 |
石油天然气 | 15篇 |
无线电 | 987篇 |
一般工业技术 | 1535篇 |
冶金工业 | 866篇 |
原子能技术 | 74篇 |
自动化技术 | 993篇 |
出版年
2023年 | 72篇 |
2022年 | 149篇 |
2021年 | 185篇 |
2020年 | 171篇 |
2019年 | 164篇 |
2018年 | 238篇 |
2017年 | 199篇 |
2016年 | 209篇 |
2015年 | 111篇 |
2014年 | 217篇 |
2013年 | 410篇 |
2012年 | 238篇 |
2011年 | 316篇 |
2010年 | 241篇 |
2009年 | 282篇 |
2008年 | 249篇 |
2007年 | 199篇 |
2006年 | 216篇 |
2005年 | 155篇 |
2004年 | 130篇 |
2003年 | 130篇 |
2002年 | 136篇 |
2001年 | 126篇 |
2000年 | 129篇 |
1999年 | 114篇 |
1998年 | 266篇 |
1997年 | 183篇 |
1996年 | 134篇 |
1995年 | 132篇 |
1994年 | 105篇 |
1993年 | 135篇 |
1992年 | 108篇 |
1991年 | 97篇 |
1990年 | 85篇 |
1989年 | 75篇 |
1988年 | 73篇 |
1987年 | 78篇 |
1986年 | 88篇 |
1985年 | 107篇 |
1984年 | 100篇 |
1983年 | 95篇 |
1982年 | 78篇 |
1981年 | 64篇 |
1980年 | 49篇 |
1979年 | 46篇 |
1978年 | 49篇 |
1977年 | 62篇 |
1976年 | 82篇 |
1975年 | 43篇 |
1973年 | 42篇 |
排序方式: 共有7328条查询结果,搜索用时 0 毫秒
71.
Correlation between a dithering signal and the prediction error has been used for detecting model mismatch in univariate model based control systems. This paper extends that approach to MIMO control systems. A closed-loop cross-correlation method is presented to detect which specific input-output pairings of a model-based controller are mismatched. This method may be used in screening the complete set of models and in selecting candidate models for re-identification. The method first finds the rows and columns of the transfer function matrix that contain mismatch, and then the candidates are found by the intersection of the said rows and columns. Placing the system under partial control, whereby one or more of the manipulated variables are held constant, can be used to further reduce the set of candidate models. 相似文献
72.
Entrance pressure losses for the creeping flow of a power-law fluid are calculated for an abrupt contraction of ratio 2, 4, 8 and ∞ for both the axisymmetric and planar cases using P2P1 and PP1 finite elements. Contrary to some earlier findings in the literature, the entrance pressure loss obtained by using the two different types of finite elements, both of which satisfy the Babus?ka-Brezzi condition, are found to converge to the same results. The present results also confirm that the variational method of Duda and Vrentas gives excellent upper bounds for both the axisymmetric and planar cases with infinite contraction ratio. 相似文献
73.
A recently developed laser-induced incandescence technique is used to make novel planar measurements of soot volume fraction within turbulent diffusion flames and droplet flames. The two-dimensional imaging technique is developed and assessed by systematic experiments in a coannular laminar diffusion flame, in which the soot characteristics have been well established. With a single point calibration procedure, agreement to within 10% was found between the values of soot volume fraction measured by this technique and those determined by conventional laser scattering-extinction methods in the flame. As a demonstration of the wide range of applicability of the technique, soot volume fraction images are also obtained from both turbulent ethene diffusion flames and from a freely falling droplet flame that burns the mixture of 75% benzene and 25% methanol. For the turbulent diffusion flames, approximately an 80% reduction in soot volume fraction was found when the Reynolds number of the fuel jet increased from 4000 to 8000. In the droplet flame case, the distribution of soot field was found to be similar to that observed in coannular laminar diffusion flames. 相似文献
74.
When individuals encounter new information (data), that information is incorporated with their existing beliefs (prior) to form a new belief (posterior) in a process referred to as belief updating. While most studies on rational belief updating in visual data analysis elicit beliefs immediately after data is shown, we posit that there may be critical movement in an individual's beliefs when elicited immediately after data is shown v. after a temporal delay (e.g., due to forgetfulness or weak incorporation of the data). Our paper investigates the hypothesis that posterior beliefs elicited after a time interval will “decay” back towards the prior beliefs compared to the posterior beliefs elicited immediately after new data is presented. In this study, we recruit 101 participants to complete three tasks where beliefs are elicited immediately after seeing new data and again after a brief distractor task. We conduct (1) a quantitative analysis of the results to understand if there are any systematic differences in beliefs elicited immediately after seeing new data or after a distractor task and (2) a qualitative analysis of participants' reflections on the reasons for their belief update. While we find no statistically significant global trends across the participants beliefs elicited immediately v. after the delay, the qualitative analysis provides rich insight into the reasons for an individual's belief movement across 9 prototypical scenarios, which includes (i) decay of beliefs as a result of either forgetting the information shown or strongly held prior beliefs, (ii) strengthening of confidence in updated beliefs by positively integrating the new data and (iii) maintaining a consistently updated belief over time, among others. These results can guide subsequent experiments to disambiguate when and by what mechanism new data is truly incorporated into one's belief system. 相似文献
75.
Dharminder Dharminder Pradeep Kumar Dadsena Pratik Gupta Sathya Sankaran 《International Journal of Satellite Communications and Networking》2023,41(1):14-28
Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable. Since all the data are exchanged over a public channel, so the security of the data is an essential component for the communicating parties. Both key exchange and authentication are two cryptographic tools to establish a secure communication between two parties. Currently, various kinds of authentication protocols are available to establish a secure network, but all of them depend on number–theoretical (discrete logarithm problem/factorization assumption) hard assumptions. Due to Shor's and Grover's computing algorithm number theoretic assumptions are breakable by quantum computers. Although Kumar and Garg have proposed a quantum attack-resistant protocol for satellite communication, it cannot resist stolen smart card attack. We have analyzed that how Kumar and Garg is vulnerable to the stolen smart card attack using differential power analysis attack described in He et al and Chen and Chen. We have also analyzed the modified version of signal leakage attack and sometimes called improved signal leakage attack on Kumar and Garg's protocol. We have tried to construct a secure and efficient authentication protocol for satellites communication that is secure against quantum computing. This is more efficient as it requires only three messages of exchange. This paper includes security proof and performance of the proposed authentication and key agreement protocol. 相似文献
76.
Kaur Amanpreet Gupta Govind P. Mittal Sangeeta 《Wireless Personal Communications》2022,123(2):1625-1667
Wireless Personal Communications - Node localization is one of the essential services where sensor nodes in the wireless sensor network collaborate to provide location information of sensor nodes... 相似文献
77.
Shishir Gupta 《先进材料力学与结构力学》2017,24(1):64-72
The present work is concerned with a detailed illustration on the study of horizontally polarized shear waves (SH-type) propagation in a prestressed fluid saturated anisotropic porous layer sandwiched by prestressed orthotropic medium and nonhomogeneous mantles. The frequency equation for the assumed model is derived and their medium characteristics, such as porosity, prestress, anisotropy, and nonhomogeneity, are discussed. Numerical treatment is given to analyze these effects on phase velocities of SH-type waves and is plotted in various graphs. The parametric study divulges that the magnitude of wave velocities increases with the increase of nonhomogeneity parameter and prestress parameter. 相似文献
78.
79.
Both unit and integration testing are incredibly crucial for almost any software application because each of them operates a distinct process to examine the product. Due to resource constraints, when software is subjected to modifications, the drastic increase in the count of test cases forces the testers to opt for a test optimization strategy. One such strategy is test case prioritization (TCP). Existing works have propounded various methodologies that re-order the system-level test cases intending to boost either the fault detection capabilities or the coverage efficacy at the earliest. Nonetheless, singularity in objective functions and the lack of dissimilitude among the re-ordered test sequences have degraded the cogency of their approaches. Considering such gaps and scenarios when the meteoric and continuous updations in the software make the intensive unit and integration testing process more fragile, this study has introduced a memetics-inspired methodology for TCP. The proposed structure is first embedded with diverse parameters, and then traditional steps of the shuffled-frog-leaping approach (SFLA) are followed to prioritize the test cases at unit and integration levels. On 5 standard test functions, a comparative analysis is conducted between the established algorithms and the proposed approach, where the latter enhances the coverage rate and fault detection of re-ordered test sets. Investigation results related to the mean average percentage of fault detection (APFD) confirmed that the proposed approach exceeds the memetic, basic multi-walk, PSO, and optimized multi-walk by 21.7%, 13.99%, 12.24%, and 11.51%, respectively. 相似文献
80.
PVC-Based 2,2,2-Cryptand Sensor for Zinc Ions 总被引:1,自引:0,他引:1
A PVC-based membrane of 2,2,2-cryptand exhibits a very good response for Zn(2+) in a wide concentration range (from 2.06 ppm to 6.54 × 10(3) ppm) with a slope of 22.0 mV/decade of Zn(2+) concentration. The response time of the sensor is <10 s, and the membrane can be used for more than 3 months without any observed divergence in potentials. The proposed sensor exhibits very good selectivity for Zn(2+) over other cations and can be used in a wide pH range (2.8-7.0). It has also been possible to use this assembly as an indicator electrode in potentiometric titrations involving zinc ions. 相似文献