全文获取类型
收费全文 | 2624篇 |
免费 | 165篇 |
国内免费 | 24篇 |
专业分类
电工技术 | 44篇 |
综合类 | 9篇 |
化学工业 | 754篇 |
金属工艺 | 75篇 |
机械仪表 | 113篇 |
建筑科学 | 108篇 |
矿业工程 | 10篇 |
能源动力 | 160篇 |
轻工业 | 168篇 |
水利工程 | 49篇 |
石油天然气 | 22篇 |
无线电 | 247篇 |
一般工业技术 | 435篇 |
冶金工业 | 86篇 |
原子能技术 | 17篇 |
自动化技术 | 516篇 |
出版年
2024年 | 4篇 |
2023年 | 46篇 |
2022年 | 78篇 |
2021年 | 182篇 |
2020年 | 128篇 |
2019年 | 175篇 |
2018年 | 212篇 |
2017年 | 189篇 |
2016年 | 176篇 |
2015年 | 121篇 |
2014年 | 211篇 |
2013年 | 285篇 |
2012年 | 179篇 |
2011年 | 207篇 |
2010年 | 159篇 |
2009年 | 110篇 |
2008年 | 71篇 |
2007年 | 42篇 |
2006年 | 40篇 |
2005年 | 29篇 |
2004年 | 21篇 |
2003年 | 12篇 |
2002年 | 10篇 |
2001年 | 6篇 |
2000年 | 11篇 |
1999年 | 3篇 |
1998年 | 18篇 |
1997年 | 6篇 |
1996年 | 9篇 |
1995年 | 8篇 |
1994年 | 3篇 |
1993年 | 7篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 5篇 |
1989年 | 6篇 |
1988年 | 1篇 |
1987年 | 4篇 |
1986年 | 3篇 |
1985年 | 3篇 |
1984年 | 3篇 |
1983年 | 6篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1976年 | 3篇 |
1974年 | 2篇 |
1973年 | 1篇 |
排序方式: 共有2813条查询结果,搜索用时 15 毫秒
201.
Mehdi H. Khiadani Jaya Kandasamy Simon Beecham 《Canadian Metallurgical Quarterly》2007,133(7):721-735
The experimental study presented in this paper explores the distribution of the mean velocities for a channel receiving spatially varied (SV) inflow from directly above the centerline of the channel via sets of nozzles. The velocity components u, v, and w have been measured using a laser Doppler velocimeter. Initially the validity of the law of the wall in the channel receiving SV inflow was investigated. It was found that the measured velocity profile within the inertial sublayer region near the channel bed falls below the line representing the log law. Further, if the SV inflow enters at the center of the channel, the degree that the data depart from the log law increases from the sidewall toward the center of the channel. The structures of the velocity distributions are also presented in detail. The results include both near field, that is the area close to where the flow enters the channel, and far field measurements. It was found that the influence of the SV inflow on velocity profiles is largely contained within the SV inflow zone and that the influence within this zone reduces in the downstream direction. At any one section within this zone the influence reduces from the center of the channel toward the sidewall. In addition, some features of the secondary flow established by the SV inflow are described. 相似文献
202.
203.
Mehdi Javidi M. R. Nematollahi M. M. Lalehparvar A. Ghassemi 《Journal of Failure Analysis and Prevention》2016,16(2):209-215
The objective of this work was to analyze a reported pitting damage mechanism in water piping of a power plant. The investigated material was a longitudinal-seam welded pipe which was made of AISI 321 austenitic stainless steel. Pitting occurred on the internal surfaces of the pipe and adjacent to the girth welds. Optical emission spectrometry, metallography, and electrochemical testing were the techniques employed to analyze the failure. The investigation showed that the flowing water contained chloride ions in which AISI 321 austenitic stainless steel is not immune against pitting corrosion. In addition, the polarization data showed the susceptibility of the material to pitting corrosion in the service conditions. Furthermore, the result of double loop electrochemical potentiokinetic reactivation tests showed that the material was sensitized during welding. It was found that the damage was due to pitting corrosion in chloride-containing water. Thus, it was recommended to replace the pipe with material having higher pitting resistance equivalent number to be more resistant against pitting corrosion. 相似文献
204.
This paper proposes an uncertainty compensator to design a novel robust control for mobile robots with dynamic and kinematic uncertainties. A novel gradient-based adaptive fuzzy estimator is developed to compensate uncertainties with minimum required feedback signals. As a novelty, the proposed approach uses the tracking error and its first time derivative to form the estimation error of uncertainty, and guarantees that both the estimation error and tracking error converge asymmetrically to ignorable value. Advantages of the proposed robust control are simplicity in design, robustness against uncertainties, guaranteed stability, and good control performance. The control approach is verified by stability analysis. Simulation results and experimental results illustrate the effectiveness of the proposed control. Experimental evaluation of the proposed controller is expressed for two different low-cost nonholonomic wheeled mobile robots. The proposed control design is compared with an adaptive control approach to confirm the superiority of the proposed approach in terms of precision, simplicity of design, and computations. 相似文献
205.
LAMR: learning automata based multicast routing protocol for multi-channel multi-radio wireless mesh networks 总被引:1,自引:0,他引:1
Multicast routing is a crucial issue in wireless networks in which the same content should be delivered to a group of recipients simultaneously. Multicast is also considered as a key service for audio and video applications as well as data dissemination protocols over the last-mile backhaul Internet connectivity provided by multi-channel multi-radio wireless mesh networks (MCMR WMNs). The multicast problem is essentially related to a channel assignment strategy which determines the most suitable channel-radio associations. However, channel assignment brings about its own complications and hence, solving the multicast problem in MCMR WMNs will be more complicated than that of traditional networks. This problem has been proved to be NP-hard. In the major prior art multicast protocols developed for these networks, channel assignment and multicast routing are considered as two separate sub-problems to be solved sequentially. The work in this article is targeted at promoting the adoption of learning automata for joint channel assignment and multicast routing problem in MCMR WMNs. In the proposed scheme named LAMR, contrary to the existing methods, these two sub-problems will be solved conjointly. Experimental results demonstrate that LAMR outperforms the LCA and MCM proposed by Zeng et al. (IEEE Trans. Parallel. Distrib. Syst. 21(1):86–99, 2010) as well as the genetic algorithm-, tabu search-, and simulated annealing-based methods by Cheng and Yang (Int. J. Appl. Soft Comput. 11(2):1953–1964, 2011) in terms of achieved throughput, end-to-end delay, average packet delivery ratio, and multicast tree total cost. 相似文献
206.
This paper presents an exposition of a new method of swarm intelligence–based algorithm for optimization. Modeling swallow swarm movement and their other behavior, this optimization method represents a new optimization method. There are three kinds of particles in this method: explorer particles, aimless particles, and leader particles. Each particle has a personal feature but all of them have a central colony of flying. Each particle exhibits an intelligent behavior and, perpetually, explores its surroundings with an adaptive radius. The situations of neighbor particles, local leader, and public leader are considered, and a move is made then. Swallow swarm optimization algorithm has proved high efficiency, such as fast move in flat areas (areas that there is no hope to find food and, derivation is equal to zero), not getting stuck in local extremum points, high convergence speed, and intelligent participation in the different groups of particles. SSO algorithm has been tested by 19 benchmark functions. It achieved good results in multimodal, rotated and shifted functions. Results of this method have been compared to standard PSO, FSO algorithm, and ten different kinds of PSO. 相似文献
207.
Reza Jafari Djemel Ziou Mohammad Mehdi Rashidi 《Expert systems with applications》2013,40(17):6918-6927
The goal of image compression is to remove the redundancies for minimizing the number of bits required to represent an image while steganography works by embedding the secret data in redundancies of the image in invisibility manner. Our focus in this paper is the improvement of image compression through steganography. Even if the purposes of digital steganography and data compression are by definition contradictory, we use these techniques jointly to compress an image. Hence, two schemes exploring this idea are suggested. The first scheme combines a steganographic algorithm with the baseline DCT-based JPEG, while the second one uses this steganographic algorithm with the DWT-based JPEG. In this study data compression is performed twice. First, we take advantage of energy compaction using JPEG to reduce redundant data. Second, we embed some bit blocks within its subsequent blocks of the same image with steganography. The embedded bits not only increase file size of the compressed image, but also decrease the file size further more. Experimental results show for this promising technique to have wide potential in image coding. 相似文献
208.
209.
Mostafa Hadizadeh Mehdi Rahnama Behnam Hesari 《International journal of remote sensing》2013,34(23):8899-8913
ABSTRACTMost cold channels of Meteosat Second Generation (MSG) satellites can distinguish between the sea and ice cloud tops, except for the IR3.9 channel because of the close reflectance and radiance values of the IR3.9 channel for maritime, low-level cloud and ice cloud tops. In this article, we introduce and evaluate two machine learning methods for cloud masking of Spinning Enhanced Visible and Infrared Imager (SEVIRI) images in the day and night that use the reflectance value of the IR3.9 channel. We reached a good correlation by comparing the results of the modelled cloud masking of Meteosat satellite images with MODIS (Moderate Resolution Imaging Spectroradiometer) and CLM (Cloud Mask product of EUMETSAT) images in a way that the coefficient of determination (R2) value was 92.34%, 89.91% and 83.69%, 78.23% in the cold season and 90.17%, 87.09% and 80.37%, 76.48% in the warm season, respectively, using the CHAID (chi-squared automatic interaction detection) decision tree and RBF (radial basis function) neural network approaches. 相似文献
210.
An uncertainty estimation and compensation can improve the performance of control systems due to structured and unstructured uncertainty. This paper presents a robust task-space control approach using an adaptive Taylor series uncertainty estimator for electrically driven robot manipulators. It is worth noting that not only the lumped uncertainty is estimated and employed in the indirect form of robust controller, but also the upper bound of approximation error is estimated to form a robustifying term and the asymptotic convergence of tracking error and its time derivative are proven based on stability analysis. Finally, the effectiveness of the proposed controller is shown through simulation and comparison with two valuable control schemes applied on the Selective Compliance Assembly Robot Arm (SCARA) robot manipulator. 相似文献