全文获取类型
收费全文 | 4753篇 |
免费 | 270篇 |
国内免费 | 11篇 |
专业分类
电工技术 | 32篇 |
综合类 | 5篇 |
化学工业 | 1009篇 |
金属工艺 | 97篇 |
机械仪表 | 99篇 |
建筑科学 | 238篇 |
矿业工程 | 8篇 |
能源动力 | 150篇 |
轻工业 | 456篇 |
水利工程 | 47篇 |
石油天然气 | 18篇 |
武器工业 | 2篇 |
无线电 | 414篇 |
一般工业技术 | 881篇 |
冶金工业 | 814篇 |
原子能技术 | 28篇 |
自动化技术 | 736篇 |
出版年
2024年 | 6篇 |
2023年 | 42篇 |
2022年 | 82篇 |
2021年 | 135篇 |
2020年 | 94篇 |
2019年 | 110篇 |
2018年 | 141篇 |
2017年 | 126篇 |
2016年 | 157篇 |
2015年 | 119篇 |
2014年 | 159篇 |
2013年 | 274篇 |
2012年 | 274篇 |
2011年 | 338篇 |
2010年 | 239篇 |
2009年 | 263篇 |
2008年 | 297篇 |
2007年 | 282篇 |
2006年 | 229篇 |
2005年 | 238篇 |
2004年 | 170篇 |
2003年 | 148篇 |
2002年 | 151篇 |
2001年 | 75篇 |
2000年 | 64篇 |
1999年 | 57篇 |
1998年 | 58篇 |
1997年 | 58篇 |
1996年 | 66篇 |
1995年 | 48篇 |
1994年 | 47篇 |
1993年 | 50篇 |
1992年 | 37篇 |
1991年 | 26篇 |
1990年 | 38篇 |
1989年 | 38篇 |
1988年 | 31篇 |
1987年 | 41篇 |
1986年 | 38篇 |
1985年 | 32篇 |
1984年 | 25篇 |
1983年 | 27篇 |
1982年 | 25篇 |
1981年 | 13篇 |
1980年 | 12篇 |
1979年 | 9篇 |
1978年 | 13篇 |
1976年 | 6篇 |
1975年 | 6篇 |
1970年 | 4篇 |
排序方式: 共有5034条查询结果,搜索用时 15 毫秒
61.
62.
Kevin Curran Michelle Murray David Stephen Norrby Martin Christian 《New Review of Information Networking》2013,18(1-2):47-59
Libraries, as we know them today, can be defined by the term Library 1.0. This defines the way resources are kept on shelves or at a computer behind a login. These resources can be taken from a shelf, checked out by the library staff, taken home for a certain length of time and absorbed, and then returned to the library for someone else to avail of. Library 1.0 is a one-directional service that takes people to the information they require. Library 2.0 – or L2 as it is now more commonly addressed as – aims to take the information to the people by bringing the library service to the Internet and getting the users more involved by encouraging feedback participation. This paper presents an overview of Library 2.0 and introduces web 2.0 concepts. 相似文献
63.
Many real-world networks, including social and information networks, are dynamic structures that evolve over time. Such dynamic networks are typically visualized using a sequence of static graph layouts. In addition to providing a visual representation of the network structure at each time step, the sequence should preserve the mental map between layouts of consecutive time steps to allow a human to interpret the temporal evolution of the network. In this paper, we propose a framework for dynamic network visualization in the on-line setting where only present and past graph snapshots are available to create the present layout. The proposed framework creates regularized graph layouts by augmenting the cost function of a static graph layout algorithm with a grouping penalty, which discourages nodes from deviating too far from other nodes belonging to the same group, and a temporal penalty, which discourages large node movements between consecutive time steps. The penalties increase the stability of the layout sequence, thus preserving the mental map. We introduce two dynamic layout algorithms within the proposed framework, namely dynamic multidimensional scaling and dynamic graph Laplacian layout. We apply these algorithms on several data sets to illustrate the importance of both grouping and temporal regularization for producing interpretable visualizations of dynamic networks. 相似文献
64.
Jonathan A. Czuba James L. Best Kevin A. Oberg Daniel R. Parsons P. Ryan Jackson Marcelo H. Garcia Peter Ashmore 《Journal of Great Lakes research》2011,37(3):480-493
An integrated multibeam echo sounder and acoustic Doppler current profiler field survey was conducted in July 2008 to investigate the morphodynamics of the St. Clair River at the outlet of Lake Huron. The principal morphological features of the upper St. Clair River included flow-transverse bedforms that appear weakly mobile, erosive bedforms in cohesive muds, thin non-cohesive veneers of weakly mobile sediment that cover an underlying cohesive (till or glacio-lacustrine) surface, and vegetation that covers the bed. The flow was characterized by acceleration as the banks constrict from Lake Huron into the St. Clair River, an approximately 1500-m long region of flow separation downstream from the Blue Water Bridge, and secondary flow connected to: i) channel curvature; ii) forcing of the flow by local bed topography, and iii) flow wakes in the lee side of ship wrecks. Nearshore, sand-sized, sediment from Lake Huron was capable of being transported into, and principally along, the banks of the upper St. Clair River by the measured flow. A comparison of bathymetric surveys conducted in 2007 and 2008 identifies that the gravel bed does undergo slow downstream movement, but that this movement does not appear to be generated by the mean flow, and could possibly be caused by ship-propeller-induced turbulence. The study results suggest that the measured mean flow and dredging within the channel have not produced major scour of the upper St. Clair River and that the recent fall in the level of Lake Huron is unlikely to have been caused by these mechanisms. 相似文献
65.
Wenjing Wang Shameek Bhattacharjee Mainak Chatterjee Kevin Kwiat 《Pervasive and Mobile Computing》2013,9(4):572-587
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportunistically access and use parts of the spectrum not being used by others. Though cooperation among nodes is desirable for efficient network operations and performance, there might be some malicious nodes whose objective could be to hinder communications and disrupt network operations. The absence of a central authority or any policy enforcement mechanism makes these kinds of open-access network more vulnerable and susceptible to attacks.In this paper, we analyze a common form of denial-of-service attack, i.e., collaborative jamming. We consider a network in which a group of jammers tries to jam the channels being used by legitimate users who in turn try to evade the jammed channels. First, we compute the distribution of the jamming signal that a node experiences by considering a random deployment of jammers. Then, we propose different jamming and defending schemes that are employed by the jammers and legitimate users, respectively. In particular, we model and analyze the channel availability when the legitimate users randomly choose available channels and the jammers jam different channels randomly. We propose a multi-tier proxy-based cooperative defense strategy to exploit the temporal and spatial diversity for the legitimate secondary users in an infrastructure-based centralized cognitive radio network. Illustrative results on spectrum availability rates show how to improve resiliency in cognitive radio networks in the presence of jammers. 相似文献
66.
最近,一家厂商的自动润滑系统在人为地进行了一次未知的定时改动之后,损失了超过100,000美元与停工相关的费用。一个定时器之前是每20分钟注入一次润滑油,后来被设定为每8小时注入一次润滑油,导致机械轴承需要进行一次提前到来的改装。 相似文献
67.
Michael M. Li Brijesh Verma Xiaolong Fan Kevin Tickle 《Neural computing & applications》2008,17(4):391-397
This paper investigates a new method to solve the inverse problem of Rutherford backscattering (RBS) data. The inverse problem
is to determine the sample structure information from measured spectra, which can be defined as a function approximation problem.
We propose using radial basis function (RBF) neural networks to approximate an inverse function. Each RBS spectrum, which
may contain up to 128 data points, is compressed by the principal component analysis, so that the dimensionality of input
data and complexity of the network are reduced significantly. Our theoretical consideration is tested by numerical experiments
with the example of the SiGe thin film sample and corresponding backscattering spectra. A comparison of the RBF method with
multilayer perceptrons reveals that the former has better performance in extracting structural information from spectra. Furthermore,
the proposed method can handle redundancies properly, which are caused by the constraint of output variables. This study is
the first method based on RBF to deal with the inverse RBS data analysis problem. 相似文献
68.
BM5320是华硕新近推出的商用台式电脑,采用塔式机箱,外观设计简单朴实。
这款产品配备了Pentium E2220处理器、2GB DDR2 800内存、Radeon HD 3450独立显卡、DVD刻录机等主流硬件配置,机箱还采用了全免工具设计,拆卸检修十分方便。同时.其性能不仅能够胜任日常办公应用.还具备一定的图形处理能力,适合预算有限却又对产品性能有一定要求的企业用户。 相似文献
69.
英国电信是第一个吹响转型号角的传统电信公司,也是第一家提出做“综合信息服务提供商”的运营商。目前它已经牢固确立了其作为网络IT解决方案提供商的核心定位。在全球经济危机蔓延,金融风暴影响实体经济的当下,作为经济结构中承担基础性架构角色的电信行业面临前所未有的挑战与机遇。英国电信(BT)清醒的认识到了这一点,借助IT与网络、数据与通讯融合的趋势浪潮,英国电信正在开启亚太市场的大门。 相似文献
70.
Jenkins RE Meng X Elliott VL Kitteringham NR Pirmohamed M Park BK 《Proteomics. Clinical applications》2009,3(6):720-729
Flucloxacillin is a synthetic penicillin used in the treatment of Staphylococcal infections. Adverse reactions to the drug are believed to arise through covalent modification of proteins, with tissue damage occurring secondary to an immune reaction. Serum proteins have been shown by adduct-specific antibodies to be modified by flucloxacillin, but the nature and sites of modification have not been characterised. Here, in vitro studies on HSA have shown by MS that the modification of protein lysine residues occurs in a dose-, time- and site-dependent manner. Affinity, cation exchange and reversed phase chromatography prior to MS revealed in vivo modification of HSA with flucloxacillin in tolerant patients, with up to nine modified lysine residues being detected in each patient, and with modification of Lys190 and Lys212 being detected in 8/8 patients. It was also revealed for the first time that plasma proteins could be modified with the 5-hydroxymethyl metabolite of flucloxacillin, and that essentially the same Lys residues were targeted by both the parent drug and its metabolite. This study provides a detailed characterisation of sites of chemical modification of an endogenous target and reveals candidate peptides for T-cell and antibody assays of flucloxacillin hypersensitivity. 相似文献