全文获取类型
收费全文 | 13579篇 |
免费 | 975篇 |
国内免费 | 110篇 |
专业分类
电工技术 | 206篇 |
综合类 | 61篇 |
化学工业 | 3535篇 |
金属工艺 | 346篇 |
机械仪表 | 490篇 |
建筑科学 | 515篇 |
矿业工程 | 21篇 |
能源动力 | 951篇 |
轻工业 | 1281篇 |
水利工程 | 188篇 |
石油天然气 | 224篇 |
武器工业 | 4篇 |
无线电 | 1396篇 |
一般工业技术 | 2535篇 |
冶金工业 | 497篇 |
原子能技术 | 97篇 |
自动化技术 | 2317篇 |
出版年
2024年 | 70篇 |
2023年 | 268篇 |
2022年 | 589篇 |
2021年 | 891篇 |
2020年 | 752篇 |
2019年 | 814篇 |
2018年 | 911篇 |
2017年 | 828篇 |
2016年 | 809篇 |
2015年 | 475篇 |
2014年 | 750篇 |
2013年 | 1370篇 |
2012年 | 904篇 |
2011年 | 951篇 |
2010年 | 666篇 |
2009年 | 597篇 |
2008年 | 422篇 |
2007年 | 358篇 |
2006年 | 303篇 |
2005年 | 194篇 |
2004年 | 177篇 |
2003年 | 152篇 |
2002年 | 119篇 |
2001年 | 91篇 |
2000年 | 90篇 |
1999年 | 82篇 |
1998年 | 142篇 |
1997年 | 115篇 |
1996年 | 97篇 |
1995年 | 68篇 |
1994年 | 51篇 |
1993年 | 61篇 |
1992年 | 46篇 |
1991年 | 38篇 |
1990年 | 40篇 |
1989年 | 32篇 |
1988年 | 25篇 |
1987年 | 24篇 |
1986年 | 34篇 |
1985年 | 27篇 |
1984年 | 27篇 |
1983年 | 25篇 |
1982年 | 21篇 |
1981年 | 19篇 |
1980年 | 19篇 |
1979年 | 16篇 |
1978年 | 18篇 |
1977年 | 18篇 |
1976年 | 24篇 |
1975年 | 13篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
941.
Ali R. Yildiz 《The International Journal of Advanced Manufacturing Technology》2013,66(9-12):1319-1326
This paper presents a novel hybrid optimization approach based on teaching–learning based optimization (TLBO) algorithm and Taguchi’s method. The purpose of the present research is to develop a new optimization approach to solve optimization problems in the manufacturing area. This research is the first application of the TLBO to the optimization of turning operations in the literature The proposed hybrid approach is applied to two case studies for multi-pass turning operations to show its effectiveness in machining operations. The results obtained by the proposed approach for the case studies are compared with those of particle swarm optimization algorithm, hybrid genetic algorithm, scatter search algorithm, genetic algorithm and integration of simulated annealing, and Hooke–Jeeves patter search. 相似文献
942.
In the present study, wear properties of A356 unreinforced alloy and composites with different vol.% of boron carbide particles were investigated. It is noted that composites exhibit better wear resistance compared to unreinforced alloy. According to the differences in wear rates of the composites, two separate wear rate were identified as low and high wear rate regimes. A combination of artificial neural network (ANN) and finite element technique (FEM) was implemented in order to predict the composites wear behavior. The FEM method is used for discretization and to calculate the transient temperature field of quenching. It is observed that predictions of ANN are consistent with experimental measurements for A356 composite and considerable savings in terms of cost and time could be obtained by using neural network model. 相似文献
943.
944.
945.
Hamid Chakeri Rohola Hasanpour Mehmet Ali Hindistan Bahtiyar Ünver 《Bulletin of Engineering Geology and the Environment》2011,70(3):439-448
Tunnels are increasingly being excavated in soft ground conditions when services are required in urban environments, and it
is now common to have tunnels crossing at various elevations. As the tunnel excavations are undertaken at different levels,
there will be an interaction which can have a significant influence on stress distributions and consequently deformations
within the tunnels and surface settlement. As multi-layer tunnelling is a three dimensional phenomenon in nature, 3D numerical
solutions must be utilized for perpendicularly crossing tunnels at various levels. This paper reports the investigations into
the changes in stress distribution, deformations and surface settlements which may be expected when the twin Tohid Tunnels
pass beneath the Line 4 metro tunnel in Tehran. 相似文献
946.
Temporal fluctuations of the speckle pattern formed upon backscattering of a laser beam from an interface between gold and nonlinear polymer film have been observed as a function of optical power. The instability can be explained by coupling of laser light to surface plasmons and other guided modes, which experience multiple scattering while propagating in the film along the interface. The speckle pattern produced in this process is extremely sensitive to fluctuations of the scattering potential near the interface. 相似文献
947.
Ayesha Binte Ashfaq Muhammad Qasim Ali Syed Ali Khayam 《Journal in Computer Virology》2011,7(1):63-81
An unprecedented growth in computer and communication systems in the last two decades has resulted in a proportional increase
in the number and sophistication of network attacks. In particular, the number of previously-unseen attacks has increased
exponentially in the last few years. Due to the rapidly evolving nature of network attacks, a considerable paradigm shift
has taken place in the intrusion detection community. The main focus is now on Network Anomaly Detection Systems (NADSs) which
model and flag deviations from normal/benign behavior of a network and can hence detect previously-unseen attacks. Contemporary
NADS borrow concepts from a variety of theoretical fields (e.g., Information theory, stochastic and machine learning, signal
processing, etc.) to model benign behavior. These NADSs, however, fall short of achieving acceptable performance levels as
therefore widespread commercial deployments. Thus, in this paper, we firstly evaluate the performance of eight prominent network-based
anomaly detectors under malicious portscan attacks to identify which NADSs perform better than others and why. These NADSs
are evaluated on three criteria: accuracy (ROC curves), scalability (with respect to varying normal and attack traffic rates,
and deployment points) and detection delay. These criteria are evaluated using two independently collected datasets with complementary
strengths. We then propose novel methods and promising guidelines to improve the accuracy and scalability of existing and
future anomaly detectors. Experimental analysis of the proposed guidelines is also presented for the proof of concept. 相似文献
948.
In this paper, an adaptive control scheme, based on fuzzy logic systems, for pH control is addressed. For implementation of the proposed scheme no composition measurement is required. Stability of the closed-loop system is established and it is shown that the solution of the closed-loop system is uniformly ultimately bounded and under a certain condition, asymptotical stability is achieved. Effectiveness of the proposed controller is tested through simulation and experimental studies. Results indicate that the proposed controller has good performances in set-point tracking and load rejection and much better than that of a tuned PI controller. 相似文献
949.
Organizations, such as federally-funded medical research centers, must share de-identified data on their consumers to publicly accessible repositories to adhere to regulatory requirements. Many repositories are managed by third-parties and it is often unknown if records received from disparate organizations correspond to the same individual. Failure to resolve this issue can lead to biased (e.g., double counting of identical records) and underpowered (e.g., unlinked records of different data types) investigations. In this paper, we present a secure multiparty computation protocol that enables record joins via consumers’ encrypted identifiers. Our solution is more practical than prior secure join models in that data holders need to interact with the third party one time per data submission. Though technically feasible, the speed of the basic protocol scales quadratically with the number of records. Thus, we introduce an extended version of our protocol in which data holders append k-anonymous features of their consumers to their encrypted submissions. These features facilitate a more efficient join computation, while providing a formal guarantee that each record is linkable to no less than k individuals in the union of all organizations’ consumers. Beyond a theoretical treatment of the problem, we provide an extensive experimental investigation with data derived from the US Census to illustrate the significant gains in efficiency such an approach can achieve. 相似文献
950.