全文获取类型
收费全文 | 3807篇 |
免费 | 284篇 |
国内免费 | 4篇 |
专业分类
电工技术 | 45篇 |
综合类 | 5篇 |
化学工业 | 890篇 |
金属工艺 | 72篇 |
机械仪表 | 55篇 |
建筑科学 | 163篇 |
矿业工程 | 5篇 |
能源动力 | 145篇 |
轻工业 | 277篇 |
水利工程 | 33篇 |
石油天然气 | 15篇 |
无线电 | 305篇 |
一般工业技术 | 809篇 |
冶金工业 | 616篇 |
原子能技术 | 27篇 |
自动化技术 | 633篇 |
出版年
2023年 | 61篇 |
2022年 | 98篇 |
2021年 | 170篇 |
2020年 | 117篇 |
2019年 | 115篇 |
2018年 | 142篇 |
2017年 | 128篇 |
2016年 | 146篇 |
2015年 | 118篇 |
2014年 | 193篇 |
2013年 | 267篇 |
2012年 | 229篇 |
2011年 | 294篇 |
2010年 | 194篇 |
2009年 | 181篇 |
2008年 | 191篇 |
2007年 | 170篇 |
2006年 | 150篇 |
2005年 | 95篇 |
2004年 | 108篇 |
2003年 | 72篇 |
2002年 | 79篇 |
2001年 | 32篇 |
2000年 | 26篇 |
1999年 | 45篇 |
1998年 | 66篇 |
1997年 | 47篇 |
1996年 | 29篇 |
1995年 | 35篇 |
1994年 | 26篇 |
1993年 | 25篇 |
1992年 | 17篇 |
1990年 | 19篇 |
1989年 | 17篇 |
1988年 | 12篇 |
1987年 | 12篇 |
1985年 | 23篇 |
1984年 | 19篇 |
1983年 | 17篇 |
1982年 | 22篇 |
1981年 | 28篇 |
1980年 | 13篇 |
1979年 | 25篇 |
1978年 | 19篇 |
1977年 | 17篇 |
1976年 | 23篇 |
1975年 | 18篇 |
1974年 | 18篇 |
1972年 | 11篇 |
1971年 | 12篇 |
排序方式: 共有4095条查询结果,搜索用时 15 毫秒
31.
Tang Guannan Gould Benjamin J. Ngowe Abigail Rollett Anthony D. 《Metallurgical and Materials Transactions A》2022,53(4):1486-1498
Metallurgical and Materials Transactions A - Hot cracking is one of the major defects that can occur in laser-based additive manufacturing. During the terminal stage of solidification, hot cracking... 相似文献
32.
Benjamin D. Deacon A. Cecil Wamble 《Journal of the American Oil Chemists' Society》1954,31(7):284-287
Conclusions A procedure for the analysis of cottonseed and its products for Vitamin E has been developed and improved. The present procedure
generally gives good checks on duplicate analyses.
The Vitamin E content of whole cottonseed is somewhat more a function of variety than of locality. The 1952 crop of cottonseed
contained more Vitamin E than the 1951 crop. The two crops averaged 84 g. per ton and 68.5 g. per ton, respectively.
Most recent results show that there is no loss of Vitamin E in the storage of cottonseed or during the processing of the seed
for its oil and other products.
The hexane-soluble portion of a methanol extract of rolled or cooked cottonseed meats contains Vitamin E in concentrations
that have exceeded the values reported for wheat germ oil, the present commercial source.
A sample of commercial solvent extracted cottonseed meal was found to contain considerably less Vitamin E than hydraulic-
or screw-pressed meals.
The Vitamin E research described in this writing was conducted as a cooperative project of the Texas Engineering Experiment
Station and the Cotton Research Committee of Texas. 相似文献
33.
Richard Kotek Dong‐Wook Jung Joon Ho Kim Brent Smith Patricia Guzman Benjamin Schmidt 《应用聚合物科学杂志》2004,92(3):1724-1730
The surface alkaline hydrolysis of fibers made from poly(trimethylene terephthalate) (PTT) was studied after extruding the polymer at high spinning speeds from 2000 to 6000 m/min and heat setting in the range of temperatures from 100 to 180°C. Fiber weight loss increased with an increasing heat‐setting temperature but it was also dependent on the spinning speed. Some of the partially hydrolyzed fibers had a well‐developed, hydrophilic surface, and pore size in the range of 0.69 to 1.20 μm. The optimum reaction and morphological conditions for increasing porosity in PTT fibers depends on spinning speed and heat‐setting temperature. A temperature of 180°C is the upper limit for heat‐setting PTT filaments but seems to be the most effective for making porous fibers. © 2004 Wiley Periodicals, Inc. J Appl Polym Sci 92: 1724–1730, 2004 相似文献
34.
Tristan Allard Benjamin Nguyen Philippe Pucheral 《Distributed and Parallel Databases》2014,32(2):191-244
The goal of Privacy-Preserving Data Publishing (PPDP) is to generate a sanitized (i.e. harmless) view of sensitive personal data (e.g. a health survey), to be released to some agencies or simply the public. However, traditional PPDP practices all make the assumption that the process is run on a trusted central server. In this article, we argue that the trust assumption on the central server is far too strong. We propose Met ??P, a generic fully distributed protocol, to execute various forms of PPDP algorithms on an asymmetric architecture composed of low power secure devices and a powerful but untrusted infrastructure. We show that this protocol is both correct and secure against honest-but-curious or malicious adversaries. Finally, we provide an experimental validation showing that this protocol can support PPDP processes scaling up to nation-wide surveys. 相似文献
35.
Abstract. We study an iterative filtering method to estimate frequencies of random Gaussian sinusoids in white noise. The method uses higher order crossings and takes advantage of a fixed point to guide the use of bandpass filtering in an attempt effectively to increase the signal-to-noise ratio. At each iteration the expected zero-crossing rate is estimated from independent time series. Convergence occurs with any prespecified probability less than one. 相似文献
36.
Benjamin F. Myers 《Journal of the American Ceramic Society》1992,75(3):686-693
The hydrolysis of uranium oxycarbide (UCO) was studied by injecting water vapor into a fuel element containing a known number of high-temperature, gas-cooled reactor (HTGR) coated particles with exposed fuel kernels. The experiments were conducted in the High Flux Isotope Reactor (HFIR) at temperatures between 700° and 1000°C, a system pressure of 200 kPa, and partial pressures of water vapor between 21 and 199 Pa. The general sequential response of the exposed fuel kernels to water vapor addition consisted of (1) a rapid release of stored fission gas with a concomitant increase in the steady-state release and (2) a period of constant steady-state release. Upon cessation of the addition of water vapor, a decline in the release to prehydrolysis values generally occurred. The release of stored fission gas was dependent on the square of the partial pressure of water vapor. The ratio of the constant steady-state release to the prehydrolysis value was independent of the partial pressure of water vapor. The time constant for the decline in the release was the same in all of the hydrolysis tests. 相似文献
37.
We analyze the classic board game of Mastermind with n holes and a constant number of colors. The classic result of Chvátal (Combinatorica 3:325–329, 1983) states that the codebreaker can find the secret code with Θ(n/logn) questions. We show that this bound remains valid if the codebreaker may only store a constant number of guesses and answers. In addition to an intrinsic interest in this question, our result also disproves a conjecture of Droste, Jansen, and Wegener (Theory Comput. Syst. 39:525–544, 2006) on the memory-restricted black-box complexity of the OneMax function class. 相似文献
38.
Benjamin Zeiss Andras Kovacs Nikolay Pakulin Bogdan Stanca-Kaposta 《International Journal on Software Tools for Technology Transfer (STTT)》2014,16(3):285-294
With more than 10 years of maturing through industrial use and standardization, the Testing and Test Control Notation (TTCN-3) has become a widely used technology that many businesses depend upon for ensuring their product quality. With the rising number of supporters and tools, the demand for a means to assess the standards compliance of TTCN-3 tools has increased. In this article, we describe the motivation, approach, methodology, and results of the still ongoing project to develop a standardized conformance test suite for TTCN-3 tools. We discuss the challenges involved in creating such a test suite, the way to deal with imposed resource limitations of the project, and where we think the effort is heading. 相似文献
39.
Adam Bates Benjamin Mood Joe Pletcher Hannah Pruse Masoud Valafar Kevin Butler 《International Journal of Information Security》2014,13(2):171-189
Virtualization is the cornerstone of the developing third-party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the co-resident threat—unless perfect isolation is provided by the virtual hypervisor, there exists the possibility for unauthorized access to sensitive customer information through the exploitation of covert side channels. This paper presents co-resident watermarking, a traffic analysis attack that allows a malicious co-resident VM to inject a watermark signature into the network flow of a target instance. This watermark can be used to exfiltrate and broadcast co-residency data from the physical machine, compromising isolation without reliance on internal side channels. As a result, our approach is difficult to defend against without costly underutilization of the physical machine. We evaluate co-resident watermarkingunder a large variety of conditions, system loads and hardware configurations, from a local laboratory environment to production cloud environments (Futuregrid and the University of Oregon’s ACISS). We demonstrate the ability to initiate a covert channel of 4 bits per second, and we can confirm co-residency with a target VM instance in $<$ 10 s. We also show that passive load measurement of the target and subsequent behavior profiling is possible with this attack. We go on to consider the detectability of co-resident watermarking, extending our scheme to create a subtler watermarking attack by imitating legitimate cloud customer behavior. Our investigation demonstrates the need for the careful design of hardware to be used in the cloud. 相似文献
40.
Vapor-liquid equilibrium compositions have been measured for the argon-methane system at 115.2°, 123.4° and 137.1°K, by means of a forced-recirculation apparatus. A modified Redlich-Kwong equation of state with the incorporation of a binary interaction constant has been successfully employed to represent the data. Liquid activity coefficients have been evaluated and correlated. 相似文献