全文获取类型
收费全文 | 7407篇 |
免费 | 245篇 |
国内免费 | 29篇 |
专业分类
电工技术 | 108篇 |
综合类 | 4篇 |
化学工业 | 1523篇 |
金属工艺 | 296篇 |
机械仪表 | 202篇 |
建筑科学 | 115篇 |
矿业工程 | 9篇 |
能源动力 | 355篇 |
轻工业 | 292篇 |
水利工程 | 57篇 |
石油天然气 | 17篇 |
无线电 | 1065篇 |
一般工业技术 | 1604篇 |
冶金工业 | 879篇 |
原子能技术 | 74篇 |
自动化技术 | 1081篇 |
出版年
2023年 | 85篇 |
2022年 | 194篇 |
2021年 | 212篇 |
2020年 | 198篇 |
2019年 | 174篇 |
2018年 | 276篇 |
2017年 | 233篇 |
2016年 | 231篇 |
2015年 | 128篇 |
2014年 | 232篇 |
2013年 | 442篇 |
2012年 | 255篇 |
2011年 | 326篇 |
2010年 | 257篇 |
2009年 | 290篇 |
2008年 | 270篇 |
2007年 | 212篇 |
2006年 | 218篇 |
2005年 | 160篇 |
2004年 | 137篇 |
2003年 | 129篇 |
2002年 | 129篇 |
2001年 | 127篇 |
2000年 | 129篇 |
1999年 | 112篇 |
1998年 | 264篇 |
1997年 | 182篇 |
1996年 | 131篇 |
1995年 | 130篇 |
1994年 | 104篇 |
1993年 | 133篇 |
1992年 | 108篇 |
1991年 | 97篇 |
1990年 | 84篇 |
1989年 | 75篇 |
1988年 | 72篇 |
1987年 | 75篇 |
1986年 | 88篇 |
1985年 | 106篇 |
1984年 | 99篇 |
1983年 | 95篇 |
1982年 | 78篇 |
1981年 | 63篇 |
1980年 | 49篇 |
1979年 | 46篇 |
1978年 | 49篇 |
1977年 | 62篇 |
1976年 | 82篇 |
1975年 | 43篇 |
1973年 | 42篇 |
排序方式: 共有7681条查询结果,搜索用时 0 毫秒
101.
Correlation between a dithering signal and the prediction error has been used for detecting model mismatch in univariate model based control systems. This paper extends that approach to MIMO control systems. A closed-loop cross-correlation method is presented to detect which specific input-output pairings of a model-based controller are mismatched. This method may be used in screening the complete set of models and in selecting candidate models for re-identification. The method first finds the rows and columns of the transfer function matrix that contain mismatch, and then the candidates are found by the intersection of the said rows and columns. Placing the system under partial control, whereby one or more of the manipulated variables are held constant, can be used to further reduce the set of candidate models. 相似文献
102.
Entrance pressure losses for the creeping flow of a power-law fluid are calculated for an abrupt contraction of ratio 2, 4, 8 and ∞ for both the axisymmetric and planar cases using P2P1 and PP1 finite elements. Contrary to some earlier findings in the literature, the entrance pressure loss obtained by using the two different types of finite elements, both of which satisfy the Babus?ka-Brezzi condition, are found to converge to the same results. The present results also confirm that the variational method of Duda and Vrentas gives excellent upper bounds for both the axisymmetric and planar cases with infinite contraction ratio. 相似文献
103.
A recently developed laser-induced incandescence technique is used to make novel planar measurements of soot volume fraction within turbulent diffusion flames and droplet flames. The two-dimensional imaging technique is developed and assessed by systematic experiments in a coannular laminar diffusion flame, in which the soot characteristics have been well established. With a single point calibration procedure, agreement to within 10% was found between the values of soot volume fraction measured by this technique and those determined by conventional laser scattering-extinction methods in the flame. As a demonstration of the wide range of applicability of the technique, soot volume fraction images are also obtained from both turbulent ethene diffusion flames and from a freely falling droplet flame that burns the mixture of 75% benzene and 25% methanol. For the turbulent diffusion flames, approximately an 80% reduction in soot volume fraction was found when the Reynolds number of the fuel jet increased from 4000 to 8000. In the droplet flame case, the distribution of soot field was found to be similar to that observed in coannular laminar diffusion flames. 相似文献
104.
When individuals encounter new information (data), that information is incorporated with their existing beliefs (prior) to form a new belief (posterior) in a process referred to as belief updating. While most studies on rational belief updating in visual data analysis elicit beliefs immediately after data is shown, we posit that there may be critical movement in an individual's beliefs when elicited immediately after data is shown v. after a temporal delay (e.g., due to forgetfulness or weak incorporation of the data). Our paper investigates the hypothesis that posterior beliefs elicited after a time interval will “decay” back towards the prior beliefs compared to the posterior beliefs elicited immediately after new data is presented. In this study, we recruit 101 participants to complete three tasks where beliefs are elicited immediately after seeing new data and again after a brief distractor task. We conduct (1) a quantitative analysis of the results to understand if there are any systematic differences in beliefs elicited immediately after seeing new data or after a distractor task and (2) a qualitative analysis of participants' reflections on the reasons for their belief update. While we find no statistically significant global trends across the participants beliefs elicited immediately v. after the delay, the qualitative analysis provides rich insight into the reasons for an individual's belief movement across 9 prototypical scenarios, which includes (i) decay of beliefs as a result of either forgetting the information shown or strongly held prior beliefs, (ii) strengthening of confidence in updated beliefs by positively integrating the new data and (iii) maintaining a consistently updated belief over time, among others. These results can guide subsequent experiments to disambiguate when and by what mechanism new data is truly incorporated into one's belief system. 相似文献
105.
Dharminder Dharminder Pradeep Kumar Dadsena Pratik Gupta Sathya Sankaran 《International Journal of Satellite Communications and Networking》2023,41(1):14-28
Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable. Since all the data are exchanged over a public channel, so the security of the data is an essential component for the communicating parties. Both key exchange and authentication are two cryptographic tools to establish a secure communication between two parties. Currently, various kinds of authentication protocols are available to establish a secure network, but all of them depend on number–theoretical (discrete logarithm problem/factorization assumption) hard assumptions. Due to Shor's and Grover's computing algorithm number theoretic assumptions are breakable by quantum computers. Although Kumar and Garg have proposed a quantum attack-resistant protocol for satellite communication, it cannot resist stolen smart card attack. We have analyzed that how Kumar and Garg is vulnerable to the stolen smart card attack using differential power analysis attack described in He et al and Chen and Chen. We have also analyzed the modified version of signal leakage attack and sometimes called improved signal leakage attack on Kumar and Garg's protocol. We have tried to construct a secure and efficient authentication protocol for satellites communication that is secure against quantum computing. This is more efficient as it requires only three messages of exchange. This paper includes security proof and performance of the proposed authentication and key agreement protocol. 相似文献
106.
Kaur Amanpreet Gupta Govind P. Mittal Sangeeta 《Wireless Personal Communications》2022,123(2):1625-1667
Wireless Personal Communications - Node localization is one of the essential services where sensor nodes in the wireless sensor network collaborate to provide location information of sensor nodes... 相似文献
107.
Ajay Kumar K. Abhishek M.R. Ghalib A. Shankar X. Cheng 《Digital Communications & Networks》2022,8(4):540-551
Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With the goal of shielding network systems from illegal access in cloud servers and IoT systems, Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) are proposed in this study. An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances. The NBIPS is usually located specifically behind a firewall, and it provides a reciprocal layer of investigation that adversely chooses unsafe substances. Network-based IPS sensors can be installed either in an inline or a passive model. An inline sensor is installed to monitor the traffic passing through it. The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol. 相似文献
108.
This article deals with the propagation of SH-wave in a vertically heterogeneous viscoelastic layer lying over a micropolar elastic half-space. Dispersion and damping equations are obtained analytically in closed form. Phase and damped velocities are computed numerically and depicted by means of a graph to exhibit the substantial effect of heterogeneity, viscoelasticity (internal friction), and micropolar parameter. As a special case of the problem, it is found that deduced dispersion relation is well in agreement to the classical-Love wave equation and damping equation vanishes identically for the isotropic case. Influence of micropolarity present in the medium of half-space is highlighted through comparative study. 相似文献
109.
This article delves to study the effect of corrugated boundary surfaces on the propagation of horizontally-polarized shear waves (SH-waves) in a magnetoelastic transversely isotropic layer under a hydrostatic state of stress lying over an elastic half-space under gravity. A dispersion equation has been derived in closed-form and is found to be in good agreement to the classical Love-wave equation. The effect of magnetoelasticity, hydrostatic state of stress, gravity, corrugation, position parameter, and undulation on the phase velocity of the SH-wave has been identified. Numerical computation along with graphical demonstration has been carried out for cadmium, magnesium, and zinc materials of hexagonal symmetry to highlight some significant facts. 相似文献
110.
Shishir Gupta 《先进材料力学与结构力学》2017,24(1):64-72
The present work is concerned with a detailed illustration on the study of horizontally polarized shear waves (SH-type) propagation in a prestressed fluid saturated anisotropic porous layer sandwiched by prestressed orthotropic medium and nonhomogeneous mantles. The frequency equation for the assumed model is derived and their medium characteristics, such as porosity, prestress, anisotropy, and nonhomogeneity, are discussed. Numerical treatment is given to analyze these effects on phase velocities of SH-type waves and is plotted in various graphs. The parametric study divulges that the magnitude of wave velocities increases with the increase of nonhomogeneity parameter and prestress parameter. 相似文献