全文获取类型
收费全文 | 2647篇 |
免费 | 82篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 33篇 |
综合类 | 5篇 |
化学工业 | 585篇 |
金属工艺 | 75篇 |
机械仪表 | 40篇 |
建筑科学 | 134篇 |
矿业工程 | 29篇 |
能源动力 | 63篇 |
轻工业 | 236篇 |
水利工程 | 17篇 |
石油天然气 | 17篇 |
无线电 | 226篇 |
一般工业技术 | 408篇 |
冶金工业 | 489篇 |
原子能技术 | 25篇 |
自动化技术 | 350篇 |
出版年
2022年 | 15篇 |
2021年 | 41篇 |
2020年 | 30篇 |
2019年 | 36篇 |
2018年 | 47篇 |
2017年 | 44篇 |
2016年 | 55篇 |
2015年 | 43篇 |
2014年 | 69篇 |
2013年 | 165篇 |
2012年 | 113篇 |
2011年 | 128篇 |
2010年 | 119篇 |
2009年 | 103篇 |
2008年 | 106篇 |
2007年 | 89篇 |
2006年 | 89篇 |
2005年 | 79篇 |
2004年 | 54篇 |
2003年 | 70篇 |
2002年 | 66篇 |
2001年 | 42篇 |
2000年 | 33篇 |
1999年 | 44篇 |
1998年 | 104篇 |
1997年 | 67篇 |
1996年 | 67篇 |
1995年 | 56篇 |
1994年 | 44篇 |
1993年 | 60篇 |
1992年 | 36篇 |
1991年 | 22篇 |
1990年 | 21篇 |
1989年 | 28篇 |
1988年 | 27篇 |
1987年 | 33篇 |
1986年 | 26篇 |
1985年 | 25篇 |
1984年 | 33篇 |
1983年 | 24篇 |
1982年 | 23篇 |
1981年 | 40篇 |
1980年 | 35篇 |
1979年 | 24篇 |
1978年 | 25篇 |
1977年 | 29篇 |
1976年 | 29篇 |
1975年 | 26篇 |
1973年 | 16篇 |
1972年 | 14篇 |
排序方式: 共有2732条查询结果,搜索用时 250 毫秒
61.
In the frequency allocation problem, we are given a mobile telephone network, whose geographical coverage area is divided
into cells, wherein phone calls are serviced by assigning frequencies to them so that no two calls emanating from the same
or neighboring cells are assigned the same frequency. The problem is to use the frequencies efficiently, i.e., minimize the
span of frequencies used. The frequency allocation problem can be regarded as a multicoloring problem on a weighted hexagonal
graph. In this paper, we give a 1-local asymptotic 4/3-competitive distributed algorithm for multicoloring a triangle-free
hexagonal graph, which is a special case of hexagonal graph. Based on this result, we then propose a 1-local asymptotic13/9-competitive
algorithm for multicoloring the (general-case) hexagonal graph, thereby improving the previous 1-local 3/2-competitive algorithm.
A preliminary version of this paper appeared in the Proceedings of the 13th Annual International Computing and Combinatorics
Conference (COCOON 2007), LNCS 4598, pp. 526–536.
Y. Zhang research was supported by European Regional Development Fund (ERDF).
F.Y.L. Chin research was supported by Hong Kong RGC Grant HKU-7113/07E.
H. Zhu research was supported by National Natural Science Fund (grant #60496321). 相似文献
62.
We propose a visualization based approach for digital signature authentication. Using our method, the speed and pressure aspects of a digital signature process can be clearly and intuitively conveyed to the user for digital signature authentication. Our design takes into account both the expressiveness and aesthetics of the derived visual patterns. With the visual aid provided by our method, digital signatures can be authenticated with better accuracy than using existing methods—even novices can examine the authenticity of a digital signature in most situations using our method. To validate the effectiveness of our method, we conducted a comprehensive user study which confirms positively the advantages of our approach. Our method can be employed as a new security enhancement measure for a range of business and legal applications in reality which involve digital signature authorization and authentication. 相似文献
63.
This article deals with a local improvement of domain decomposition methods for 2-dimensional elliptic problems for which
either the geometry or the domain decomposition presents conical singularities. After explaining the main results of the theoretical
analysis carried out in Chniti et al. (Calcolo 45, 2008), the numerical experiments presented in this article confirm the optimality properties of the new interface conditions. 相似文献
64.
Tiina Komulainen Francis J. Doyle III Ari Rantala Sirkka-Liisa Jämsä-Jounela 《Journal of Process Control》2009,19(1):2-15
A two level control strategy that stabilizes and optimizes the production of an industrial copper solvent extraction process is presented. The stabilizing layer consists of a multi-input–multi-output controller or two single-input–single-output controllers with additional four feedforward compensators that regulate the flow rates in the copper solvent extraction process. The optimization layer consists of an optimizer that maximizes the production of the copper solvent extraction process and gives setpoints to the controllers at the stabilizing level. The mechanistic plant models, verified with industrial data, are linearized by identifying first and higher order transfer function models from simulated PRBS data. On the basis of the linear models, the interactions of the controlled variables, and the pairing of the controlled and manipulated variables are studied and the optimizer and the controllers designed. The control strategy employing two PI-control loops or a model predictive controller and additionally four feedforward control loops is successfully tested against simulated disturbances and setpoint changes. The control strategy is also compared to the data collected from the industrial plant under manual control. With this two level control strategy the production of the copper solvent extraction process is increased by 3–5% and the process variation is decreased by 70–90% compared to the manual operation of the case industrial plant. The results gained in simulation environment are successful and encouraging for further testing in an industrial plant. 相似文献
65.
This paper addresses the one-machine scheduling problem with earliness-tardiness penalties. We propose a new branch-and-bound
algorithm that can solve instances with up to 50 jobs and that can solve problems with even more general non-convex cost functions.
The algorithm is based on the combination of a Lagrangean relaxation of resource constraints and new dominance rules. 相似文献
66.
The volatiles released from several aphid and host plant species, alone or associated, were studied for their infochemical role in prey location. Using a four-arm olfactometer, the attraction of several combinations of three aphid (Myzus persicae, Acyrthosiphon pisum, and Brevicoryne brassicae) and three plant (Vicia faba, Brassica napus, and Sinapis alba) species toward Adalia bipunctata larvae and adults was observed. Both predatory larvae and adults were attracted only by A. pisum and M. persicae when they were crushed, whatever the host plant. (E)-beta-farnesene, the aphid alarm pheromone, was the effective kairomone for the ladybird. Plant leaves alone (V. faba, B. napus, and S. alba) or in association with nonstressed whole aphids (the three species) did not have any attraction for the predator. The B. brassicae specialist aphid is the only prey that was not attracted to A. bipunctata larvae and adults, even if they were crushed. Release of B. brassicae molecules similar to the host plant allelochemicals was demonstrated by GC-MS analysis. The lack of behavioral response of the ladybird at short distance toward the cruciferous specialist aphid was related only to the absence of (E)-beta-farnesene in the aphid prey volatile pattern. 相似文献
67.
The field of systems biology has attracted the attention of biologists, engineers, mathematicians, physicists, chemists and others in an endeavour to create systems-level understanding of complex biological networks. In particular, systems engineering methods are finding unique opportunities in characterizing the rich behaviour exhibited by biological systems. In the same manner, these new classes of biological problems are motivating novel developments in theoretical systems approaches. Hence, the interface between systems and biology is of mutual benefit to both disciplines. 相似文献
68.
This study examined whether mothers' preoccupation with their own weight and eating was linked to daughters' restrained eating behavior. Participants included 173 non-Hispanic, White mother-daughter dyads, measured longitudinally when daughters were ages 5, 7, 9, and 11. Mothers who were preoccupied with their own weight and eating reported higher levels of restricting daughters' intake and encouraging daughters to lose weight over time. Mothers' encouragement of daughters' weight loss was linked to daughters' restrained eating behavior; this relationship was partially mediated by daughters' perception of maternal pressure to lose weight. These findings suggest that mothers' preoccupation with weight and eating, via attempts to influence daughters' weight and eating, may place daughters at risk for developing problematic eating behaviors. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
69.
For nearly 10 years now, the Internet Architecture Board (IAB) and Internet Engineering Task Force (IETF) have been telling us that the pool of available IP addresses will soon be exhausted, and that Internet growth will come to a grinding halt. They have heavily promoted their solution, IPv6, which the commercial world has all but ignored. It is now becoming clear that IP address exhaustion is years off, at best. The primary reason for this is network address translation (NAT), the rogue technology that allows almost unlimited address reuse. Despite NAT's nagging technical problems that limit IP connectivity and make peer-to-peer (P2P) applications difficult to deploy, the commercial world has universally embraced the technology even as the IAB and IETF actively discourage its use. 相似文献
70.
Local control strategies for groups of mobile autonomous agents 总被引:7,自引:0,他引:7
The problem of achieving a specified formation among a group of mobile autonomous agents by distributed control is studied. If convergence to a point is feasible, then more general formations are achievable too, so the focus is on convergence to a point (the agreement problem). Three formation strategies are studied and convergence is proved under certain conditions. Also, motivated by the question of whether collisions occur, formation evolution is studied. 相似文献