全文获取类型
收费全文 | 1404篇 |
免费 | 103篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 33篇 |
化学工业 | 420篇 |
金属工艺 | 21篇 |
机械仪表 | 35篇 |
建筑科学 | 56篇 |
矿业工程 | 1篇 |
能源动力 | 34篇 |
轻工业 | 137篇 |
水利工程 | 7篇 |
石油天然气 | 4篇 |
武器工业 | 1篇 |
无线电 | 127篇 |
一般工业技术 | 209篇 |
冶金工业 | 120篇 |
原子能技术 | 7篇 |
自动化技术 | 297篇 |
出版年
2023年 | 12篇 |
2022年 | 54篇 |
2021年 | 58篇 |
2020年 | 43篇 |
2019年 | 40篇 |
2018年 | 47篇 |
2017年 | 25篇 |
2016年 | 56篇 |
2015年 | 46篇 |
2014年 | 46篇 |
2013年 | 86篇 |
2012年 | 71篇 |
2011年 | 98篇 |
2010年 | 67篇 |
2009年 | 70篇 |
2008年 | 62篇 |
2007年 | 60篇 |
2006年 | 52篇 |
2005年 | 43篇 |
2004年 | 35篇 |
2003年 | 41篇 |
2002年 | 35篇 |
2001年 | 21篇 |
2000年 | 14篇 |
1999年 | 17篇 |
1998年 | 31篇 |
1997年 | 20篇 |
1996年 | 18篇 |
1995年 | 25篇 |
1994年 | 22篇 |
1993年 | 11篇 |
1992年 | 9篇 |
1989年 | 7篇 |
1988年 | 7篇 |
1986年 | 6篇 |
1985年 | 8篇 |
1984年 | 10篇 |
1983年 | 7篇 |
1982年 | 7篇 |
1981年 | 8篇 |
1980年 | 6篇 |
1979年 | 6篇 |
1977年 | 10篇 |
1976年 | 14篇 |
1974年 | 8篇 |
1973年 | 10篇 |
1971年 | 6篇 |
1969年 | 8篇 |
1968年 | 8篇 |
1967年 | 6篇 |
排序方式: 共有1509条查询结果,搜索用时 15 毫秒
101.
Integrated methodology for forensic oil spill identification 总被引:3,自引:0,他引:3
Christensen JH Hansen AB Tomasi G Mortensen J Andersen O 《Environmental science & technology》2004,38(10):2912-2918
A new integrated methodology for forensic oil spill identification is presented. It consists of GC-MS analysis, chromatographic data processing, variable-outlier detection, multivariate data analysis, estimation of uncertainties, and statistical evaluation. The methodology was tested on four groups of diagnostic ratios composed of petroleum biomarkers and ratios within homologous PAH categories. Principal component analysis (PCA) was employed and enabled the simultaneous analysis of many diagnostic ratios. Weathering was taken into account by considering the sampling uncertainties estimated from replicate spill samples. Statistical evaluation ensured an objective matching of oil spill samples with suspected source oils as well as classification into positive match, probable match, and nonmatch. The data analysis is further refined if two or more source oils are classified as probable match by using weighted least squares fitting of the principal components, local PCA models, and additional information relevant to the spill case. The methodology correctly identified the source of two spill samples (i.e., crude oils from Oseberg East and Oseberg Field Centre) and distinguished them from closely related source oils. 相似文献
102.
103.
Giorgio Delzanno 《Formal Methods in System Design》2003,23(3):257-301
We propose a new method for the parameterized verification of formal specifications of cache coherence protocols. The goal of parameterized verification is to establish system properties for an arbitrary number of caches. In order to achieve this purpose we define abstractions that allow us to reduce the original parameterized verification problem to a control state reachability problem for a system with integer data variables. Specifically, the methodology we propose consists of the following steps. We first define an abstraction in which we only keep track of the number of caches in a given state during the execution of a protocol. Then, we use linear arithmetic constraints to symbolically represent infinite sets of global states of the resulting abstract protocol. For reasons of efficiency, we relax the constraint operations by interpreting constraints over real numbers. Finally, we check parameterized safety properties of abstract protocols using symbolic backward reachability, a strategy that allows us to obtain sufficient conditions for termination for an interesting class of protocols. The latter problem can be solved by using the infinite-state model checker HyTech: Henzinger, Ho, and Wong-Toi, A model checker for hybrid systems, Proc. of the 9th International Conference on Computer Aided Verification (CAV'97), Lecture Notes in Computer Science, Springer, Haifa, Israel, 1997, Vol. 1254, pp. 460–463. HyTech handles linear arithmetic constraints using the polyhedra library of Halbwachs and Proy, Verification of real-time systems using linear relation analysis, Formal Methods in System Design, Vol. 11, No. 2, pp. 157–185, 1997. By using this methodology, we have automatically validated parameterized versions of widely implemented write-invalidate and write-update cache coherence protocols like Synapse, MESI, MOESI, Berkeley, Illinois, Firefly and Dragon (Handy, The Cache Memory Book, Academic Press, 1993). With this application, we have shown that symbolic model checking tools like HyTech, originally designed for the verification of hybrid systems, can be applied successfully to new classes of infinite-state systems of practical interest. 相似文献
104.
Cappiello A Famiglini G Fiorucci C Mangani F Palma P Siviero A 《Analytical chemistry》2003,75(5):1173-1179
A new, simple device generates accurate nano- and microflow rate gradients from any conventional HPLC system. The core of the new device is represented by an electric-actuated, computer-controlled, multiposition HPLC valve. The valve hosts six reservoirs for as many different mobile-phase compositions of increasing strength. A low flow rate stream pushes the weakest solvent through the column as long as required and at the desired flow rate, until the chromatographic run is started. From this time on, the electric actuation allows one to select which reservoir will be on-line with the column and for how long, thus generating a specific solvent gradient, through a sequence of controlled segments of precise mobile-phase composition. This permits one not only to exactly reproduce the programmed slope but also to achieve different gradient shapes (i.e., linear, convex, concave) for different separation needs. The new device has proven to be reliable and reproducible even at the lowest flow rate tested (250 nL x min(-1)) and in different chromatographic conditions. 相似文献
105.
106.
A Technique for Extracting Sub-source Similarities from Information Sources Having Different Formats
In this paper we propose a semi-automatic technique for deriving the similarity degree between two portions of heterogeneous information sources (hereafter, sub-sources). The proposed technique consists in two phases: the first one selects the most promising pairs of sub-sources, whereas the second one computes the similarity degree relative to each promising pair. We show that the detection of sub-source similarities is a special case (and a very interesting one, for semi-structured information sources) of the more general problem of Scheme Match. In addition, we present a real example case to clarify the proposed technique, a set of experiments we have conducted to verify the quality of its results, a discussion about its computational complexity and its classification in the context of related literature. Finally, we discuss some possible applications which can benefit by derived similarities. 相似文献
107.
108.
The paper deals with the optimisation of a tapered tubular steel component to be used as an energy-absorbing device in the front structure of a vehicle body. Aim of the optimisation problem is the minimisation of a load uniformity parameter evaluated as the ratio between the maximum and the average crushing loads. The optimisation problem takes into account two design variables describing a tapered geometrical configuration, the diameter of the component at one of its bounds and the tapering length. Two improved geometrical configurations have been found and have been experimentally tested to verify the numerical results with impact velocities up to 10 m/s. 相似文献
109.
Raffaele Grasso Marco Cococcioni Baptiste Mourre John Osler Jacopo Chiggiato 《Expert systems with applications》2013,40(10):3886-3899
A decision support system for the optimal deployment of drifting acoustic sensor networks for cooperative track detection in underwater surveillance applications is proposed and tested on a simulated scenario. The system integrates sea water current forecasts, sensor range models and simple drifting buoy kinematic models to predict sensor positions and temporal network performance. A multi-objective genetic optimization algorithm is used for searching a set of Pareto optimal deployment solutions (i.e. the initial position of drifting sonobuoys of the network) by simultaneously optimizing two quality of service metrics: the temporal mean of the network area coverage and the tracking coverage. The solutions found after optimization, which represent different efficient tradeoffs between the two metrics, can be conveniently evaluated by the mission planner in order to choose the solution with the desired compromise between the two conflicting objectives. Sensitivity analysis through the Unscented Transform is also performed in order to test the robustness of the solutions with respect to network parameters and environmental uncertainty. Results on a simulated scenario making use of real probabilistic sea water current forecasts are provided showing the effectiveness of the proposed approach. Future work is envisioned to make the tool fully operational and ready to use in real scenarios. 相似文献
110.
In this paper, we provide a proof of almost sure exponential convergence to consensus for a general class of ergodic edge selection processes. The proof is based on the multiplicative ergodic theorem of Oseledec and also applies to continuous time gossip algorithms. An example of exponential convergence in a non ergodic case is also discussed. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献