全文获取类型
收费全文 | 6483篇 |
免费 | 151篇 |
国内免费 | 47篇 |
专业分类
电工技术 | 81篇 |
综合类 | 30篇 |
化学工业 | 1369篇 |
金属工艺 | 84篇 |
机械仪表 | 285篇 |
建筑科学 | 119篇 |
矿业工程 | 9篇 |
能源动力 | 389篇 |
轻工业 | 882篇 |
水利工程 | 68篇 |
石油天然气 | 34篇 |
武器工业 | 1篇 |
无线电 | 802篇 |
一般工业技术 | 1360篇 |
冶金工业 | 85篇 |
原子能技术 | 56篇 |
自动化技术 | 1027篇 |
出版年
2024年 | 271篇 |
2023年 | 268篇 |
2022年 | 505篇 |
2021年 | 839篇 |
2020年 | 553篇 |
2019年 | 600篇 |
2018年 | 488篇 |
2017年 | 409篇 |
2016年 | 417篇 |
2015年 | 255篇 |
2014年 | 303篇 |
2013年 | 407篇 |
2012年 | 238篇 |
2011年 | 300篇 |
2010年 | 175篇 |
2009年 | 146篇 |
2008年 | 89篇 |
2007年 | 98篇 |
2006年 | 35篇 |
2005年 | 26篇 |
2004年 | 37篇 |
2003年 | 26篇 |
2002年 | 17篇 |
2001年 | 8篇 |
2000年 | 10篇 |
1999年 | 13篇 |
1998年 | 18篇 |
1997年 | 12篇 |
1996年 | 12篇 |
1995年 | 16篇 |
1994年 | 10篇 |
1993年 | 12篇 |
1992年 | 8篇 |
1991年 | 8篇 |
1990年 | 2篇 |
1989年 | 5篇 |
1988年 | 4篇 |
1987年 | 5篇 |
1986年 | 2篇 |
1985年 | 7篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 4篇 |
1981年 | 4篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1977年 | 4篇 |
1969年 | 1篇 |
1961年 | 1篇 |
1953年 | 1篇 |
排序方式: 共有6681条查询结果,搜索用时 15 毫秒
981.
Saru Kumari Muhammad Khurram Khan 《International Journal of Communication Systems》2014,27(12):3939-3955
With the use of smart card in user authentication mechanisms, the concept of two‐factor authentication came into existence. This was a forward move towards more secure and reliable user authentication systems. It elevated the security level by requiring a user to possess something in addition to know something. In 2010, Sood et al. and Song independently examined a smart‐card‐based authentication scheme proposed by Xu et al. They showed that in the scheme of Xu et al., an internal user of the system can turn hostile to impersonate other users of the system. Both of them also proposed schemes to improve the scheme of Xu et al. Recently, Chen et al. identified some security problems in the improved schemes proposed by Sood et al. and Song. To fix these problems, Chen et al. presented another scheme, which they claimed to provide mutual authentication and withstand lost smart card attack. Undoubtedly, in their scheme, a user can also verify the legitimacy of server, but we find that the scheme fails to resist impersonation attacks and privileged insider attack. We also show that the scheme does not provide important features such as user anonymity, confidentiality to air messages, and revocation of lost/stolen smart card. Besides, the scheme defies the very purpose of two‐factor security. Furthermore, an attacker can guess a user's password from his or her lost/stolen smart card. To meet these challenges, we propose a user authentication method with user anonymity. We show through analysis and comparison that the proposed scheme exhibits enhanced efficiency in contrast to related schemes, including the scheme of Chen et al. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
982.
Muhammad Hanafiah Nurmawati Parayil Kumaran Ajikumar Ravindranath Renu Suresh Valiyaveettil 《Advanced functional materials》2008,18(20):3213-3218
Fabrication of two and three‐dimensional nanostructures requires the development of new methodologies for the assembly of molecular/macromolecular objects on substrates in predetermined arrangements. Templated self‐assembly approach is a powerful strategy for the creation of materials from assembly of molecular components or nanoparticles. The present study describes the development of a facile, template directed self‐assembly of (metal/organic) nanomaterials into periodic micro‐ and nanostructures. The positioning and the organization of nanomaterials into spatially well‐defined arrays were achieved using an amphiphilic conjugated polymer‐aided, self‐organization process. Arrays of honeycomb patterns formed from conjugated C12PPPOH film with homogenous distribution of metal/organic nanomaterials. Our approach offers a straightforward and inexpensive method of preparation for hybrid thin films without environmentally controlled chambers or sophisticated instruments as compared to multistep micro‐fabrication techniques. 相似文献
983.
Sajid Bashir Muhammad Naeem Adnan Ahmed Khan Syed Ismail Shah 《International Journal of Communication Systems》2010,23(1):109-124
The paper discusses a sequence detector based on univariate marginal distribution algorithm (UMDA) that jointly estimates the symbols transmitted in a multiple input multiple output (MIMO) communication system. While an optimal maximum likelihood detection using an exhaustive search method is prohibitively complex, it has been shown that sphere decoder (SD) achieves the optimal bit error rate (BER) performance with polynomial time complexity for smaller array sizes. However, the worst‐case complexity of SD is exponential in the problem dimensions, this brings in question its practical implementation for larger number of spatial layers and for higher‐order signal constellation. The proposed detector shows promising results for this overly difficult and complicated operating environment, confirmed through simulation results. A performance comparison of the UMDA detector with SD is presented for higher‐order complex MIMO architectures with limited average transmit power. The proposed detector achieves substantial performance gain for higher‐order systems attaining a near optimal BER performance with reduced computational complexity as compared with SD. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
984.
Kuo-Ming Chao Muhammad Younas Nick Godwin Pen-Choug Sun 《International Journal of Wireless Information Networks》2006,13(2):141-150
The popularity of grid services has widened their application to numerous domains and increased the utilization of computational resources. In order to create more incentives for the resources owners to lease their resources and prevent users from wasting the resources, the introduction of a market-oriented grid is inevitable. However, the issues for the negotiation between service provider and consumer over the supply and demand of resources can be complex, with highly interdependent issues. In this research, a simulated automated negotiation mechanism including a co-evolutionary mechanism and a modified game theory approach is proposed, to assist them in reaching an agreement over the conflicting issues. In the proposed architecture, the co-evolution process is able to reduce the multiple dimensional search space into a two-dimension search space and identify the appropriate negotiation strategies for the negotiating agents to form a payoff matrix which can be used for the game theory related stage of their interaction. The multiple stage negotiation process is introduced to improve the negotiation result. In this paper, an application which requires a large amount of computational resources to process the data generated from mobile devises is used to demonstrate that the proposed system is able to resolve the conflicts and obtain a valid solution. 相似文献
985.
A physical system can be studied as either continuous time or discrete-time system depending upon the control objectives. Discrete-time control systems can be further classified into two categories based on the sampling: (1) time-triggered control systems and (2) event-triggered control systems. Time-triggered systems sample states and calculate controls at every sampling instant in a periodic fashion, even in cases when states and calculated control do not change much. This indicates unnecessary and useless data transmission and computation efforts of a time-triggered system, thus inefficiency. For networked systems, the transmission of measurement and control signals, thus, cause unnecessary network traffic. Event-triggered systems, on the other hand, have potential to reduce the communication burden in addition to reducing the computation of control signals. This paper provides an up-to-date survey on the event-triggered methods for control systems and highlights the potential research directions. 相似文献
986.
The interpretation of way-finding symbols for healthcare facilities in a multicultural community was assessed in a cross-sectional study. One hundred participants recruited from Al Ain city in the United Arab Emirates were asked to interpret 28 healthcare symbols developed at Hablamos Juntos (such as vaccinations and laboratory) as well as 18 general-purpose symbols (such as elevators and restrooms). The mean age was 27.6 years (16–55 years) of whom 84 (84%) were females. Healthcare symbols were more difficult to comprehend than general-purpose signs. Symbols referring to abstract concepts were the most misinterpreted including oncology, diabetes education, outpatient clinic, interpretive services, pharmacy, internal medicine, registration, social services, obstetrics and gynecology, pediatrics and infectious diseases. Interpretation rates varied across cultural backgrounds and increased with higher education and younger age. Signage within healthcare facilities should be tested among older persons, those with limited literacy and across a wide range of cultures. 相似文献
987.
Muhammad Jaffar‐ur Rehman Fakhra Jabeen Antonia Bertolino Andrea Polini 《Software Testing, Verification and Reliability》2007,17(2):95-133
Component‐based development has emerged as a system engineering approach that promises rapid software development with fewer resources. Yet, improved reuse and reduced cost benefits from software components can only be achieved in practice if the components provide reliable services, thereby rendering component analysis and testing a key activity. This paper discusses various issues that can arise in component testing by the component user at the stage of its integration within the target system. The crucial problem is the lack of information for analysis and testing of externally developed components. Several testing techniques for component integration have recently been proposed. These techniques are surveyed here and classified according to a proposed set of relevant attributes. The paper thus provides a comprehensive overview which can be useful as introductory reading for newcomers in this research field, as well as to stimulate further investigation. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
988.
Intizar Hussain Muhammad Mudasser Munir A. Hanjra Upali Amrasinghe David Molden 《国际水》2013,38(2):189-200
Abstract Increasing water scarcity, degradation of land and water resources, continuing low agricultural productivity, and increasing populations are posing the largest ever challenges for development of agricultural economies in many developing countries including Pakistan. Using panel data from irrigated settings in Chaj sub-basin of the Indus basin in Pakistani Punjab, we attempt to: (a) analyze the causes of low productivity; (b) disentangle factors (both land, water and other factors) contributing to productivity variations; and (c) identify limits and opportunities for narrowing productivity gaps and increasing overall wheat production, with a view to enhance food security for the poor. The results of the study indicate that locational inequities in distribution of canal water, use of groundwater of varying quality, differences in use of seed varieties, and other inputs lead to significant variations in wheat productivity. Key implications are that large gains in wheat productivity are possible by (a) improving the production environment at the tail-end through integrated water management practices; (b) adjusting the mix of canal and groundwater use; and (c) using technological interventions to improve the adoption of modern wheat varieties and dissemination of knowledge on planting dates and timings and application rates of inputs, especially water and fertilizer. Not only such interventions are economically, financially, and environmentally desirable, they are also pro-poor. What is needed is a strong political will and commitment. 相似文献
989.
Muhammad A Sadi 《International Journal of Dairy Technology》2014,67(4):459-466
This paper reviews the challenges facing the Saudi Arabian dairy industry dominated by a few companies engaged in aggressive price war strategies. The key players and the main drivers for milk production and consumption are discussed in detail. The latest developments in the ‘Saudisation’ policy and ‘Nitaqat’ scheme have also affected the quality of the labour force in the industry. The paper concludes that although the future prospects are promising, smaller milk‐producing companies might not survive unless they adopt alternate strategies. The latest push for job replacement with the domestic labour will also create difficulties for dairy firms to produce high quality products at a sustaining labour cost. 相似文献
990.
Bin Li Yu Shi Changlin Shan Qing Zhou Muhammad Ibrahim Yanli Wang Guoxing Wu Hongye Li Guanlin Xie Guochang Sun 《Journal of the science of food and agriculture》2013,93(5):1010-1015
BACKGROUND: The production of watermelon in China has been seriously hampered by fruit blotch disease and limited control measures are now applied. Chitosan has been employed to control a variety of plant diseases and is considered to be the most promising biochemical to control this disease. RESULTS: The in vitro antibacterial effect of chitosan and its ability in protection of watermelon seedlings from bacterial fruit blotch were evaluated. Results showed that three types of chitosan, in particular, chitosan A at 0.40 mg mL?1 significantly inhibited the growth of Acidovorax citrulli. The antibacterial activity of chitosan A was affected by chitosan concentration and incubation time. The direct antibacterial activity of chitosan may be attributed to membrane lysis evidenced by transmission electron microscopic observation. The disease index of watermelon seedlings planted in soil and the death rate of seedlings planted in perlite were significantly reduced by chitosan A at 0.40 mg mL?1 compared to the pathogen control. Fresh and dry weight of watermelon seedlings planted in soil was increased by chitosan seed treatment, but not by chitosan leaf spraying. CONCLUSION: The results indicated that chitosan solution may have a potential in controlling bacterial fruit blotch of watermelon. © 2013 Society of Chemical Industry 相似文献