全文获取类型
收费全文 | 1126篇 |
免费 | 83篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 9篇 |
化学工业 | 325篇 |
金属工艺 | 38篇 |
机械仪表 | 52篇 |
建筑科学 | 38篇 |
矿业工程 | 2篇 |
能源动力 | 84篇 |
轻工业 | 197篇 |
水利工程 | 3篇 |
石油天然气 | 8篇 |
无线电 | 79篇 |
一般工业技术 | 169篇 |
冶金工业 | 32篇 |
原子能技术 | 6篇 |
自动化技术 | 169篇 |
出版年
2024年 | 9篇 |
2023年 | 22篇 |
2022年 | 27篇 |
2021年 | 53篇 |
2020年 | 46篇 |
2019年 | 32篇 |
2018年 | 63篇 |
2017年 | 57篇 |
2016年 | 65篇 |
2015年 | 55篇 |
2014年 | 73篇 |
2013年 | 213篇 |
2012年 | 55篇 |
2011年 | 59篇 |
2010年 | 74篇 |
2009年 | 73篇 |
2008年 | 45篇 |
2007年 | 35篇 |
2006年 | 29篇 |
2005年 | 10篇 |
2004年 | 17篇 |
2003年 | 2篇 |
2002年 | 15篇 |
2001年 | 11篇 |
2000年 | 12篇 |
1999年 | 9篇 |
1998年 | 13篇 |
1997年 | 1篇 |
1996年 | 8篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1992年 | 4篇 |
1991年 | 4篇 |
1990年 | 4篇 |
1985年 | 2篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1975年 | 1篇 |
1973年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有1211条查询结果,搜索用时 62 毫秒
31.
High throughput biological data need to be processed, analyzed, and interpreted to address problems in life sciences. Bioinformatics, computational biology, and systems biology deal with biological problems using computational methods. Clustering is one of the methods used to gain insight into biological processes, particularly at the genomics level. Clearly, clustering can be used in many areas of biological data analysis. However, this paper presents a review of the current clustering algorithms designed especially for analyzing gene expression data. It is also intended to introduce one of the main problems in bioinformatics – clustering gene expression data – to the operations research community. 相似文献
32.
In the design of concrete structures, estimation of the deflection of the structural members under the service loads is often
a critical factor. Strains and displacements are linked to the tension stiffening effect, which is not quantified in the standards.
The CEB-FIP model code proposes an interesting simplified method for evaluating the concrete tension stiffening effect on
reinforced concrete behavior. One of the parameters which enables the mechanical contribution of the concrete to be quantified
is the effective tensile active section of the reinforced concrete beams. In this paper, a new method for calculating the
effective tensile active section A
ct.ef is proposed. The calculation is based on an analytical model of stress distribution in the full depth of the concrete section.
An experimental study on several reinforced concrete beams is reported. The results show that the new proposed model enhances
the accuracy of the beam deflection predictions significantly. 相似文献
33.
Uğur Güdükbay Serkan Bayraktar Çetin Koca Bülent Özgüç 《Signal, Image and Video Processing》2014,8(3):415-422
We present a particle-based method to simulate and visualize the interaction of knitwear with fluids. The knitwear is modeled using spring-mass systems and the fluid is modeled using the smoothed particle hydrodynamics method. Two-way coupling is achieved by considering surface tension, capillary, and interparticle forces between the fluid and knitwear. The simulation of fluid and knitwear particles is performed on the graphics processing unit. Photorealistic rendering of knitwear and fluid is achieved by using a hardware-accelerated rasterization-based rendering technique. Our method is able to simulate and visualize the macro- and microstructure of free-form knitwear and reflective and refractive characteristics of the fluid surface. 相似文献
34.
Error-correcting codes are used to correct errors when messages are transmitted through a noisy communication channel. Bounded distance decoding (i.e. decoding up to the error-correcting capacity) is a method of correcting errors that guarantees unique decoding. Secret sharing is a cryptographic protocol that allows a secret known from a person called the dealer to be distributed to n participants. No single participant knows the secret but some special subsets of participants called coalitions can. In this paper, we present a multisecret-sharing scheme based on an error-correcting code where secret reconstruction is made by using bounded distance decoding of the code. This scheme is ideal in the sense that the size of each secret equals the size of any share. Its security improves on that of multisecret-sharing schemes. 相似文献
35.
36.
37.
38.
39.
Serkan Öztürk Ayhan Yıldırım Mehmet Çetin Mustafa Tavaslı 《Journal of surfactants and detergents》2014,17(3):471-481
New cationic surfactants were synthesized by the quaternization of a number of straight-chain amide derivatives with triethylamine or pyridine. The corrosion inhibition tests of the surface-active compounds were performed at room temperature for 24 h on carbon steel coupons in acidic media using the gravimetric method. The acidic media used were 1.5 M HCl and 1.5 M H2SO4. Almost all of the synthesized cationic surfactants showed efficient inhibition of corrosion in the test. To establish the inhibition efficiencies of the inhibitors, surface characterization studies (contact angle measurements, SEM analysis and optical profilometer images) of the metal coupons used were performed. 相似文献
40.