全文获取类型
收费全文 | 1671篇 |
免费 | 104篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 15篇 |
综合类 | 1篇 |
化学工业 | 550篇 |
金属工艺 | 80篇 |
机械仪表 | 75篇 |
建筑科学 | 44篇 |
矿业工程 | 2篇 |
能源动力 | 110篇 |
轻工业 | 229篇 |
水利工程 | 11篇 |
石油天然气 | 10篇 |
无线电 | 105篇 |
一般工业技术 | 271篇 |
冶金工业 | 47篇 |
原子能技术 | 9篇 |
自动化技术 | 219篇 |
出版年
2024年 | 12篇 |
2023年 | 33篇 |
2022年 | 53篇 |
2021年 | 91篇 |
2020年 | 66篇 |
2019年 | 59篇 |
2018年 | 87篇 |
2017年 | 93篇 |
2016年 | 93篇 |
2015年 | 77篇 |
2014年 | 88篇 |
2013年 | 259篇 |
2012年 | 81篇 |
2011年 | 100篇 |
2010年 | 97篇 |
2009年 | 98篇 |
2008年 | 70篇 |
2007年 | 56篇 |
2006年 | 45篇 |
2005年 | 25篇 |
2004年 | 24篇 |
2003年 | 4篇 |
2002年 | 21篇 |
2001年 | 15篇 |
2000年 | 11篇 |
1999年 | 16篇 |
1998年 | 19篇 |
1997年 | 7篇 |
1996年 | 14篇 |
1995年 | 6篇 |
1994年 | 10篇 |
1993年 | 5篇 |
1992年 | 11篇 |
1991年 | 2篇 |
1990年 | 5篇 |
1989年 | 5篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 3篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 3篇 |
1979年 | 1篇 |
1978年 | 4篇 |
1975年 | 1篇 |
1973年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有1778条查询结果,搜索用时 15 毫秒
1.
Physically based simulation of human hair is a well studied and well known problem. But the “pure” physically based representation of hair (and other animation elements) is not the only concern of the animators, who want to “control” the creation and animation phases of the content. This paper describes a sketch-based tool, with which a user can both create hair models with different styling parameters and produce animations of these created hair models using physically and key frame-based techniques. The model creation and animation production tasks are all performed with direct manipulation techniques in real-time. 相似文献
2.
MP Armon SW Yusuf K Latief SC Whitaker RH Gregson PW Wenham BR Hopkinson 《Canadian Metallurgical Quarterly》1997,84(2):178-180
BACKGROUND: Aortic aneurysm anatomy is crucial when considering patients for endovascular repair. The aim of this study was to determine the proportion of patients with aortic aneurysm suitable for endovascular repair with three different graft-stent systems. METHODS: Spiral computed tomographic angiography was used to assess the anatomy of 154 abdominal aortic aneurysms. Measurements were made of aneurysm neck length and diameter, renal artery to aortic bifurcation length, common iliac artery diameter and length, and external iliac artery diameter. Aneurysms were assessed for anatomical suitability for currently available aortoaortic, aortobi-iliac and aortouni-iliac devices. RESULTS: Six patients (4 per cent) had a distal aortic neck suitable for implantation of a straight aortic graft. Fifteen patients (10 per cent) had arterial anatomy suitable for implantation of a bifurcated graft and 85 (55 per cent) patients were suitable for endovascular repair with an aortouni-iliac graft. The primary reasons for unsuitability were: proximal neck length less than 1.5 cm (44 patients), proximal neck diameter greater than 3.0 cm (12), and angulation of the proximal neck (three). A further ten patients were considered unsuitable for an aortouni-iliac graft because of bilateral common iliac artery aneurysms (four), tortuous iliac arteries (four) and narrow external iliac arteries (two). CONCLUSION: The aortouni-iliac device has the widest applicability of the currently available endovascular systems but open repair remains the only option for a large proportion of patients. 相似文献
3.
Goni O. Hossain F. Yusuf S.U. Rahman M. Kaneko E. Takahashi H. 《Power Delivery, IEEE Transactions on》2006,21(4):1778-1786
Simulation of very fast surge phenomena in a three-dimensional (3-D) structure requires a method based on Maxwell's equations, such as the finite-difference time-domain (FDTD) method or the method of moments, because circuit-equation-based methods cannot handle the phenomena. This paper uses a method of thin-wire representation of the vertical conductor system for the FDTD method which is suitable for the 3-D surge simulation. The thin-wire representation is indispensable to simulate electromagnetic surges on wires or steel frames in which the radius is smaller than a discretized space step used in the FDTD simulation. In this paper, a general surge analysis program named the virtual surge test lab based on the Maxwell's equations formulated by the FDTD method, is used to simulate the surge phenomena of a vertical conductor, including the effects of horizontal wave incidence and vertical wave incidence. Experimental results on the reduced scale model have been presented in order to compare among the simulation results by the FDTD method and the results using numerical electromagnetic code based on the MoM. 相似文献
4.
A new monomer, octa(thiophenephenyl)silsesquioxane (OThiophenePS) was synthesized via click chemistry. The chemical structure of OThiophenePS was characterized by nuclear magnetic resonance (1H NMR) and Fourier transform infrared (FT-IR) spectroscopies. Electrochemical polymerization of pyrrole with OThiophenePS was performed resulting in polypyrrole-attached, polyhedral oligomeric silsesquioxane (OPS–PPy). The spectroelectrochemical studies show that the electrochromic properties of (OPS–PPy) are superior to those of polypyrrole (PPy). This great improvement can be attributed to the more accessible doping sites and the facile ion movement during the redox switching brought by the loose packing of the PPy chains. 相似文献
5.
Back pain is an important public health problem but there is a paucity of knowledge about risk factors and causal mechanisms. Previous studies have shown that tall men are more at risk of back pain, although observations in women have been less consistent. This paper presents findings from a national longitudinal study of 3262 men and women aged 43 yr. Standing height and sitting height were related to 18-month reported prevalence of 'sciatica, lumbago or severe backache' in both men and women. The paper investigates explanations for these findings using previously collected data on childhood growth and detailed lifetime occupational histories. Neither greater susceptibility of tall men to heavy lifting, nor the timing of growth, were able to account for these relationships. To assess further the association between height and back pain, information is needed on the relationship between stature and characteristics of spinal structure. 相似文献
6.
Conventional constant false alarm rate (CFAR) methods use a fixed number of cells to estimate the background variance. For homogeneous environments, it is desirable to increase the number of cells, at the cost of increased computation and memory requirements, in order to improve the estimation performance. For nonhomogeneous environments, it is desirable to use less number of cells in order to reduce the number of false alarms around the clutter edges. In this work, we present a solution with two exponential smoothers (first order IIR filters) having different time-constants to leverage the conflicting requirements of homogeneous and nonhomogeneous environments. The system is designed to use the filter having the large time-constant in homogeneous environments and to promptly switch to the filter having the small time constant once a clutter edge is encountered. The main advantages of proposed Switching IIR CFAR method are computational simplicity, small memory requirement (in comparison to windowing based methods) and its good performance in homogeneous environments (due to the large time-constant smoother) and rapid adaptation to clutter edges (due to the small time-constant smoother). 相似文献
7.
Deepthi N. Ratnayake Hassan B. Kazemian Syed A. Yusuf 《Neural computing & applications》2014,25(1):1-14
Any sniffer can see the information sent through unprotected ‘probe request messages’ and ‘probe response messages’ in wireless local area networks (WLAN). A station (STA) can send probe requests to trigger probe responses by simply spoofing a genuine media access control (MAC) address to deceive access point (AP) controlled access list. Adversaries exploit these weaknesses to flood APs with probe requests, which can generate a denial of service (DoS) to genuine STAs. The research examines traffic of a WLAN using supervised feed-forward neural network classifier to identify genuine frames from rogue frames. The novel feature of this approach is to capture the genuine user and attacker training data separately and label them prior to training without network administrator’s intervention. The model’s performance is validated using self-consistency and fivefold cross-validation tests. The simulation is comprehensive and takes into account the real-world environment. The results show that this approach detects probe request attacks extremely well. This solution also detects an attack during an early stage of the communication, so that it can prevent any other attacks when an adversary contemplates to start breaking into the network. 相似文献
8.
9.
10.
With the emergence of new media, interactive film projects have mainly struggled to resolve the contradiction between dramatic structures and interaction. Dramatic film presents identification with the main character, where the viewer is constantly oppressed by the narrative, and therefore lost in illusion. In this context, when we bring on the scene interaction, the drama apparently starts to lose its power. In this article, a new interactive film model based on Brechtian film theory is proposed. This model presents a new way of spatiotemporal construction where different audiovisual combinations can be viewed successively, and this way the viewer can actively construct his/her own story. Theoretical framework of the Brechtian interactive film model is supported by an interactive film application, named Academia. The main feature of the model is that, while interaction is very simple, the continuity of the narrative is preserved and the film requiring an intellectual level of interpretation. 相似文献