全文获取类型
收费全文 | 6127篇 |
免费 | 292篇 |
国内免费 | 13篇 |
专业分类
电工技术 | 46篇 |
综合类 | 6篇 |
化学工业 | 1248篇 |
金属工艺 | 136篇 |
机械仪表 | 135篇 |
建筑科学 | 277篇 |
矿业工程 | 8篇 |
能源动力 | 177篇 |
轻工业 | 545篇 |
水利工程 | 63篇 |
石油天然气 | 23篇 |
武器工业 | 2篇 |
无线电 | 525篇 |
一般工业技术 | 1031篇 |
冶金工业 | 1327篇 |
原子能技术 | 39篇 |
自动化技术 | 844篇 |
出版年
2023年 | 43篇 |
2022年 | 91篇 |
2021年 | 147篇 |
2020年 | 108篇 |
2019年 | 117篇 |
2018年 | 151篇 |
2017年 | 138篇 |
2016年 | 171篇 |
2015年 | 129篇 |
2014年 | 187篇 |
2013年 | 344篇 |
2012年 | 309篇 |
2011年 | 394篇 |
2010年 | 292篇 |
2009年 | 301篇 |
2008年 | 335篇 |
2007年 | 329篇 |
2006年 | 265篇 |
2005年 | 277篇 |
2004年 | 193篇 |
2003年 | 175篇 |
2002年 | 178篇 |
2001年 | 101篇 |
2000年 | 89篇 |
1999年 | 98篇 |
1998年 | 233篇 |
1997年 | 147篇 |
1996年 | 121篇 |
1995年 | 80篇 |
1994年 | 80篇 |
1993年 | 95篇 |
1992年 | 45篇 |
1991年 | 36篇 |
1990年 | 47篇 |
1989年 | 49篇 |
1988年 | 39篇 |
1987年 | 54篇 |
1986年 | 52篇 |
1985年 | 47篇 |
1984年 | 41篇 |
1983年 | 44篇 |
1982年 | 40篇 |
1981年 | 21篇 |
1980年 | 26篇 |
1979年 | 17篇 |
1978年 | 21篇 |
1977年 | 19篇 |
1976年 | 28篇 |
1975年 | 18篇 |
1973年 | 12篇 |
排序方式: 共有6432条查询结果,搜索用时 9 毫秒
51.
Sykes EC Han P Kandel SA Kelly KF McCarty GS Weiss PS 《Accounts of chemical research》2003,36(12):945-953
Adsorbate interactions and reactions on metal surfaces have been investigated using scanning tunneling microscopy. The manners in which adsorbates perturb the surface electronic structure in their vicinity are discussed. The effects these perturbations have on other molecules are shown to be important in overlayer growth. Interactions of molecules with surface steps are addressed, and each molecule's electron affinity is shown to dictate its adsorption sites at step edges. Standing waves emanating from steps are demonstrated to effect transient molecular adsorption up to 40 A away from the step edge. Halobenzene derivatives are used to demonstrate how the surface is important in aligning reactive intermediates. 相似文献
52.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent. 相似文献
53.
The ACM Code of Ethics asserts that computing professionals have an ethical responsibility to minimize the negative consequences of information and communication technologies (ICT). Negative consequences are rarely intended, but they can often be foreseen with careful sociotechnical analysis in advance of system building. Motivated by an interest in extremely complex sociotechnical contexts (e.g., mortgage lending and automated trading) where ICT appears to be having negative consequences in addition to many benefits, this paper identifies and evaluates future-oriented problem analysis and solution design tools in three potentially relevant literatures: 1) ICT ethics, 2) environmental sustainability, and 3) technology hazards. Several promising future-oriented technology analysis techniques (e.g., anticipatory technology ethics, technology roadmapping, morphological analysis, and control structure analysis) were found and are discussed in this paper, but much work remains to be done to customize them, integrate them, and codify them for use in education and high-quality IS research on very complex sociotechnical contexts like the global financial network. 相似文献
54.
Adam Bates Benjamin Mood Joe Pletcher Hannah Pruse Masoud Valafar Kevin Butler 《International Journal of Information Security》2014,13(2):171-189
Virtualization is the cornerstone of the developing third-party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the co-resident threat—unless perfect isolation is provided by the virtual hypervisor, there exists the possibility for unauthorized access to sensitive customer information through the exploitation of covert side channels. This paper presents co-resident watermarking, a traffic analysis attack that allows a malicious co-resident VM to inject a watermark signature into the network flow of a target instance. This watermark can be used to exfiltrate and broadcast co-residency data from the physical machine, compromising isolation without reliance on internal side channels. As a result, our approach is difficult to defend against without costly underutilization of the physical machine. We evaluate co-resident watermarkingunder a large variety of conditions, system loads and hardware configurations, from a local laboratory environment to production cloud environments (Futuregrid and the University of Oregon’s ACISS). We demonstrate the ability to initiate a covert channel of 4 bits per second, and we can confirm co-residency with a target VM instance in $<$ 10 s. We also show that passive load measurement of the target and subsequent behavior profiling is possible with this attack. We go on to consider the detectability of co-resident watermarking, extending our scheme to create a subtler watermarking attack by imitating legitimate cloud customer behavior. Our investigation demonstrates the need for the careful design of hardware to be used in the cloud. 相似文献
55.
The viewing of video increasingly occurs in a wide range of public and private environments via a range of static and mobile devices. The proliferation of content on demand and the diversity of the viewing situations means that delivery systems can play a key role in introducing audiences to contextually relevant content of interest whilst maximising the viewing experience for individual viewers. However, for video delivery systems to do this, they need to take into account the diversity of the situations where video is consumed, and the differing viewing experiences that users desire to create within them. This requires an ability to identify different contextual viewing situations as perceived by users. This paper presents the results from a detailed, multi-method, user-centred field study with 11 UK-based users of video-based content. Following a review of the literature (to identify viewing situations of interest on which to focus), data collection was conducted comprising observation, diaries, interviews and self-captured video. Insights were gained into whether and how users choose to engage with content in different public and private spaces. The results identified and validated a set of contextual cues that characterise distinctive viewing situations. Four archetypical viewing situations were identified: ‘quality time’, ‘opportunistic planning’, ‘sharing space but not content’ and ‘opportunistic self-indulgence’. These can be differentiated in terms of key contextual factors: solitary/shared experiences, public/private spaces and temporal characteristics. The presence of clear contextual cues provides the opportunity for video delivery systems to better tailor content and format to the viewing situation or additionally augment video services through social media in order to provide specific experiences sensitive to both temporal and physical contexts. 相似文献
56.
Lynnette S. Walsh Hentges Donald C. Beitz Norman L. Jacobson A. Dare McGilliard Jeffrey J. Veenhuizen 《Lipids》1985,20(11):735-742
In a 2×2 factorial arrangement, miniature pigs were fed four diets containing vegetable protein/fat (soybean) and animal protein
(egg white)/fat (beef tallow) to demonstrate the effects of protein and fat source on total plasma cholesterol, lipoprotein
distribution, low density lipoprotein (LDL) composition, and plasma clearance of LDL-cholesterol and protein. Beef tallow
consumption resulted in greater plasma cholesterol concentration, decreased LDL-cholesterol concentration, and a lower LDL-cholesterol
to LDL-protein ratio than did consumption of soybean oil. High density lipoprotein (HDL)-cholesterol concentration was increased
by beef tallow consumption. Cholesterol percentage by weight in LDL was significantly greater in pigs consuming soybean oil
than those consuming beef tallow. Percentages by weight of protein, triglyceride and phospholipid in LDL were not significantly
different in any group. Dietary protein source had no significant effect on total plasma cholesterol concentration, lipoprotein
concentration or LDL composition. Egg white consumption decreased fractional catabolic rate and irreversible loss of LDL-cholesterol
and LDL-protein when compared with consumption of soy protein. Dietary fat source had no consistent effect on LDL clearance
from plasma. Dietary fat and protein seemed to influence lipoprotein metabolism by different mechanisms. Fat source altered
lipoprotein concentration and LDL composition, whereas protein source affected the removal rate of LDL from plasma.
Data taken from a dissertation submitted to Iowa State University by L. S. Walsh Hentges as partial fulfillment of the requirements
for the Ph.D. degree. A preliminary paper, was presented at the meeting of the American Oil Chemists' Society in Dallas, Texas,
May, 1984. 相似文献
57.
Small-angle X-ray and small-angle neutron scattering studies have been carried out on poly(vinyl chloride) (PVC), and blends of PVC with solution-chlorinated polyethylene (SCPE) and poly(butyl acrylate) (PBA). The PVC used was commercial (suspension-polymerized) or bulk-polymerized. The blends of PVC with PBA were prepared by solvent-casting and those with SCPE by in situ polymerization. PVC samples show shoulders in the scattering spectra, presumably due to crystallites, which persist even in samples which have been solvent cast. Blends of PVC with PBA also show a peak but at a higher ‘d’ spacing. The blends with SCPE which were prepared by in situ polymerization show no such peak. This suggests that the method of preparation prevents the formation of crystallites. An increase in scattering of the PBA blends was observed when the samples were heated to the temperature of phase separation. Neutron scattering studies were also carried out using 2% deuterium labelled PVC in PVC and in the blends. In the PVC this showed chain dimensions in good agreement with predicted values. In the blends, dimensions of the same order were obtained, confirming a molecular dispersion of chains in the single phase, but there was an apparent reduction in the chain dimensions. This could be explained by a true reduction in dimensions or a non-zero A2 value in the blends. 相似文献
58.
Belletier Clément Charkhabi Morteza Pires de Andrade Silva Gustavo Ametepe Kevin Lutz Mathieu Izaute Marie 《Cognition, Technology & Work》2021,23(1):103-116
Cognition, Technology & Work - Rapid technological innovations are constantly influencing the complexification and automatization of the work lines pushing human operators to use diverse... 相似文献
59.
60.