全文获取类型
收费全文 | 6089篇 |
免费 | 359篇 |
国内免费 | 47篇 |
专业分类
电工技术 | 78篇 |
综合类 | 20篇 |
化学工业 | 1677篇 |
金属工艺 | 127篇 |
机械仪表 | 228篇 |
建筑科学 | 164篇 |
矿业工程 | 5篇 |
能源动力 | 395篇 |
轻工业 | 586篇 |
水利工程 | 86篇 |
石油天然气 | 37篇 |
无线电 | 580篇 |
一般工业技术 | 1186篇 |
冶金工业 | 296篇 |
原子能技术 | 84篇 |
自动化技术 | 946篇 |
出版年
2024年 | 23篇 |
2023年 | 121篇 |
2022年 | 342篇 |
2021年 | 430篇 |
2020年 | 322篇 |
2019年 | 344篇 |
2018年 | 379篇 |
2017年 | 322篇 |
2016年 | 353篇 |
2015年 | 207篇 |
2014年 | 334篇 |
2013年 | 555篇 |
2012年 | 315篇 |
2011年 | 325篇 |
2010年 | 287篇 |
2009年 | 252篇 |
2008年 | 172篇 |
2007年 | 145篇 |
2006年 | 136篇 |
2005年 | 96篇 |
2004年 | 75篇 |
2003年 | 71篇 |
2002年 | 56篇 |
2001年 | 50篇 |
2000年 | 37篇 |
1999年 | 37篇 |
1998年 | 77篇 |
1997年 | 64篇 |
1996年 | 44篇 |
1995年 | 54篇 |
1994年 | 26篇 |
1993年 | 34篇 |
1992年 | 30篇 |
1991年 | 31篇 |
1990年 | 24篇 |
1989年 | 26篇 |
1988年 | 16篇 |
1987年 | 31篇 |
1986年 | 31篇 |
1985年 | 24篇 |
1984年 | 30篇 |
1983年 | 28篇 |
1982年 | 16篇 |
1981年 | 10篇 |
1980年 | 15篇 |
1979年 | 14篇 |
1978年 | 13篇 |
1977年 | 13篇 |
1976年 | 14篇 |
1975年 | 9篇 |
排序方式: 共有6495条查询结果,搜索用时 15 毫秒
21.
Muhammed Iraqi Avishay Edri Yariv Greenshpan Oron Goldstein Noa Ofir Priyanka Bolel Muhammad Abu Ahmad Miri Zektser Kerry S. Campbell Ory Rouvio Roi Gazit Angel Porgador 《International journal of molecular sciences》2022,23(9)
Simple SummaryMembrane-associated PCNA is expressed on the surface of human MM cell lines and primary MM cells. Mab 14-25-9 interacts with membrane-associated PCNA and blocks its binding to NK-expressed NKp44, thus activating NK function. We showed that mAb 14-25-9 can serve as an immune checkpoint blocker, enhancing the function of NK cells on target human MM cell lines and primary cells.AbstractMultiple Myeloma (MM) is a devastating malignancy that evades immune destruction using multiple mechanisms. The NKp44 receptor interacts with PCNA (Proliferating Cell Nuclear Antigen) and may inhibit NK cells’ functions. Here we studied in vitro the expression and function of PCNA on MM cells. First, we show that PCNA is present on the cell membrane of five out of six MM cell lines, using novel anti-PCNA mAb developed to recognize membrane-associated PCNA. Next, we stained primary bone marrow (BM) mononuclear cells from MM patients and showed significant staining of membrane-associated PCNA in the fraction of CD38+CD138+ BM cells that contain the MM cells. Importantly, blocking of the membrane PCNA on MM cells enhanced the activity of NK cells, including IFN-γ-secretion and degranulation. Our results highlight the possible blocking of the NKp44-PCNA immune checkpoint by the mAb 14-25-9 antibody to enhance NK cell responses against MM, providing a novel treatment option. 相似文献
22.
Mohammed Ali Almomani Mohammed Aladeemy Abdelhakim Abdelhadi Ahmad Mumani 《Computers & Industrial Engineering》2013
Short setup time is an essential element for the effective implementation of many lean pillars, i.e., JIT, and Kanban. Most of the current setup reduction methodologies are based on Shingo’s Single Minute Exchange of Dies (SMED) that suggests the conversion of internal setup operations to external operations. However, the conventional SMED approach – as proposed by Shingo – does not possess a systematic approach to accomplish this conversion. Thus, a new approach is proposed in order to aid the process engineers in implementing SMED. The proposed approach is based on the conventional SMED, but also it incorporates Multiple Criteria Decision-Making Techniques (MCDM) to the third implementation phase. The MCDM techniques used in this work are Analytical Hierarchal Process (AHP), Preference Selection Index (PSI) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). The proposed approach provides a systematic procedure for selecting the best setup technique among the available alternatives, and takes also into consideration other factors that affect the decision-making process; including: cost, energy, facility layout, safety, life, quality and maintenance. A real example of PVC industry is used to exemplify the approach. The results demonstrate the capability of the proposed approach in setup time reduction, which in turn will improve machines’ utilization, and increase the productivity and flexibility of the whole facility. 相似文献
23.
Al-TiB2 master alloys have received much attention in recent years owing to their potential as efficient grain refiners for aluminum foundry alloys. In this study, the process of production of master alloys was investigated to develop a low cost method, namely, slag-metal reaction. This method can be used to fabricate Al-TiB2 master alloy in situ from the TiO2-H3BO3-Na3AlF6 and Al system. Since the price of the raw materials is low and the technology is simple, the processing technique appears to reduce the cost of the master alloy. Because of exothermic reactions, not much energy is needed to melt materials. In this process, Titanium diboride particles were formed in situ through the reactions of TiO2, H3BO3 and Na3AlF6. Results showed that when the aluminum melted, the condensed TiB2 particles that formed in situ were spherical with an average diameter of 1 μm. Furthermore, these TiB2 particles were distributed uniformly through the master alloy. 相似文献
24.
G. MurtazaIftikhar Ahmad B. AminA. Afaq M. MaqboolJ. Maqssod I. KhanM. Zahid 《Optical Materials》2011,33(3):553-557
Structural and optoelectronic properties of BaThO3 cubic perovskite are calculated using all electrons full potential linearized augmented plane wave (FP-LAPW) method. Wide and direct band gap, 5.7 eV, of the compound predicts that it can be effectively used in UV based optoelectronic devices. Different characteristic peaks in the wide UV range emerges mainly due to the transition of electrons between valance band state O-p and conduction band states Ba-d, Ba-f, Th-f and Th-d. 相似文献
25.
Bouguezel S. Swamy M.N.S. Ahmad M.O. 《IEEE transactions on circuits and systems. I, Regular papers》2006,53(4):905-917
In this paper, efficient multidimensional (M-D) vector radix (VR) decimation-in-frequency and decimation-in-time fast Hartley transform (FHT) algorithms are derived for computing the discrete Hartley transform (DHT) of any dimension using an appropriate index mapping and the Kronecker product. The proposed algorithms are more effective and highly suitable for hardware and software implementations compared to all existing M-D FHT algorithms that are derived for the computation of the DHT of any dimension. The butterflies of the proposed algorithms are based on simple closed-form expressions that allow easy implementations of these algorithms for any dimension. In addition, the proposed algorithms possess properties such as high regularity, simplicity and in-place computation that are highly desirable for software and hardware implementations, especially for the M-D applications. A close relationship between the M-D VR complex-valued fast Fourier transform algorithms and the proposed M-D VR FHT algorithms is established. This type of relationship is of great significance for software and hardware implementations of the algorithms, since it is shown that because of this relationship and the fact that the DHT is an alternative to the discrete Fourier transform (DFT) for real data, a single module with a little or no modification can be used to carry out the forward and inverse M-D DFTs for real- or complex-valued data and M-D DHTs. Thus, the same module (with a little or no modification) can be used to cover all domains of applications that involve the DFTs or DHTs. 相似文献
26.
Hasnain Ahmed Muhammad Junaid Arshad Shah Muhammad Sarfraz Ahmad Amjad Hussain Zahid 《International Journal of Communication Systems》2020,33(14)
Traffic load balancing in data centers is an important requirement. Traffic dynamics and possibilities of changes in the topology (e.g., failures and asymmetries) make load balancing a challenging task. Existing end‐host–based schemes either employ the predominantly used ECN or combine it with RTT to get congestion information of paths. Both congestion signals, ECN and RTT, have limitations; ECN only tells whether the queue length is above or below a threshold value but does not inform about the extent of congestion; similarly, RTT in data center networks is on the scale of up to few hundreds of microseconds, and current data center operating systems lack fine‐grained microsecond‐level timers. Therefore, there is a need of a new congestion signal which should give accurate information of congestion along the path. Furthermore, in end‐host–based schemes, detecting asymmetries in the topology is challenging due to the inability to accurately measure RTT on the scale of microseconds. This paper presents QLLB, an end‐host–based, queue length–based load balancing scheme. QLLB employs a new queue length–based congestion signal that gives an exact measure of congestion along the paths. Furthermore, QLLB uses relative‐RTT to detect asymmetries in the topology. QLLB is implemented in ns‐3 and compared with ECMP, CONGA, and Hermes. The results show that QLLB significantly improves performance of short flows over the other schemes and performs within acceptable level, of CONGA and Hermes, for long flows. In addition, QLLB effectively detects asymmetric paths and performs better than Hermes under high loads. 相似文献
27.
Salabat Khan Zijian Zhang Liehuang Zhu Mussadiq Abdul Rahim Sadique Ahmad Ruoyu Chen 《International Journal of Communication Systems》2020,33(15)
In classical public‐key infrastructure (PKI), the certificate authorities (CAs) are fully trusted, and the security of the PKI relies on the trustworthiness of the CAs. However, recent failures and compromises of CAs showed that if a CA is corrupted, fake certificates may be issued, and the security of clients will be at risk. As emerging solutions, blockchain‐ and log‐based PKI proposals potentially solved the shortcomings of the PKI, in particular, eliminating the weakest link security and providing a rapid remedy to CAs' problems. Nevertheless, log‐based PKIs are still exposed to split‐world attacks if the attacker is capable of presenting two distinct signed versions of the log to the targeted victim(s), while the blockchain‐based PKIs have scaling and high‐cost issues to be overcome. To address these problems, this paper presents a secure and accountable transport layer security (TLS) certificate management (SCM), which is a next‐generation PKI framework. It combines the two emerging architectures, introducing novel mechanisms, and makes CAs and log servers accountable to domain owners. In SCM, CA‐signed domain certificates are stored in log servers, while the management of CAs and log servers is handed over to a group of domain owners, which is conducted on the blockchain platform. Different from existing blockchain‐based PKI proposals, SCM decreases the storage cost of blockchain from several hundreds of GB to only hundreds of megabytes. Finally, we analyze the security and performance of SCM and compare SCM with previous blockchain‐ and log‐based PKI schemes. 相似文献
28.
29.
Chinipardaz Maryam Noorhosseini Seyed Majid Sarlak Ahmad 《Telecommunication Systems》2022,81(1):67-81
Telecommunication Systems - Interference is the main source of capacity limitation in wireless networks. In some medium access technologies in cellular networks, such as OFDMA, the allocation of... 相似文献
30.
Modeling and Simulation for Transient Thermal Analyses Using a Voltage-in-Current Latency Insertion Method 下载免费PDF全文
This article presents a modeling and simulation method for transient thermal analyses of integrated circuits(ICs) using the original and voltage-in-current(VinC) latency insertion method(LIM). LIM-based algorithms are a set of fast transient simulation methods that solve electrical circuits in a leapfrog updating manner without relying on large matrix operations used in conventional Simulation Program with Integrated Circuit Emphasis(SPICE)-based methods which can significantly slow down the sol... 相似文献