全文获取类型
收费全文 | 9483篇 |
免费 | 430篇 |
国内免费 | 12篇 |
专业分类
电工技术 | 126篇 |
综合类 | 38篇 |
化学工业 | 2317篇 |
金属工艺 | 230篇 |
机械仪表 | 193篇 |
建筑科学 | 631篇 |
矿业工程 | 20篇 |
能源动力 | 311篇 |
轻工业 | 927篇 |
水利工程 | 94篇 |
石油天然气 | 45篇 |
武器工业 | 1篇 |
无线电 | 720篇 |
一般工业技术 | 1522篇 |
冶金工业 | 723篇 |
原子能技术 | 62篇 |
自动化技术 | 1965篇 |
出版年
2023年 | 87篇 |
2022年 | 210篇 |
2021年 | 336篇 |
2020年 | 188篇 |
2019年 | 205篇 |
2018年 | 277篇 |
2017年 | 240篇 |
2016年 | 325篇 |
2015年 | 241篇 |
2014年 | 353篇 |
2013年 | 646篇 |
2012年 | 510篇 |
2011年 | 638篇 |
2010年 | 441篇 |
2009年 | 516篇 |
2008年 | 480篇 |
2007年 | 431篇 |
2006年 | 367篇 |
2005年 | 303篇 |
2004年 | 296篇 |
2003年 | 277篇 |
2002年 | 204篇 |
2001年 | 166篇 |
2000年 | 163篇 |
1999年 | 142篇 |
1998年 | 221篇 |
1997年 | 177篇 |
1996年 | 125篇 |
1995年 | 93篇 |
1994年 | 90篇 |
1993年 | 94篇 |
1992年 | 62篇 |
1991年 | 71篇 |
1990年 | 63篇 |
1989年 | 71篇 |
1988年 | 56篇 |
1987年 | 50篇 |
1986年 | 55篇 |
1985年 | 56篇 |
1984年 | 65篇 |
1983年 | 45篇 |
1982年 | 42篇 |
1981年 | 40篇 |
1980年 | 44篇 |
1979年 | 35篇 |
1978年 | 36篇 |
1977年 | 38篇 |
1976年 | 54篇 |
1975年 | 41篇 |
1973年 | 38篇 |
排序方式: 共有9925条查询结果,搜索用时 15 毫秒
11.
12.
Toughening mechanism for a rubber-toughened epoxy resin with rubber/matrix interfacial modification 总被引:1,自引:0,他引:1
For a rubber-toughened piperidine-DGEBA epoxy resin, the interface between the rubber particle and the epoxy resin matrix was modified by an epoxide end-capped carboxyl terminated butadiene and acrylonitrile random copolymer (CTBN). The end-capping epoxides used were a rigid diglycidyl ether of bisphenol-A (Epon 828), a short-chain flexible diglycidyl ether of propylene glycol (DER 736), and a long-chain flexible diglycidyl ether of propylene glycol (DER 732). The microstructures and the fracture behaviour of these rubber-modified epoxy resins were studied by transmission electron microscopy and scanning electron microscopy. Their thermal and mechanical properties were also investigated. In the rubber-modified epoxy resins, if the added CTBNs were end-capped by a flexible diglycidyl ether of propylene glycol (DER 732 or DER 736) before curing, the interfacial zone of the undeformed rubber particle, the degree of cavitation of the cavitated rubber particle on the fracture surface and the fracture energy of the toughened epoxy resin were all significantly increased. The toughening mechanism based on cavitation and localized shear yielding was considered and a mechanism for the interaction between cavitation and localized shear yielding that accounts for all the observed characteristics is proposed. 相似文献
13.
Ready-to-drinks (RTDs) are composed of an alcoholic component and a soft-drink base and are primarily consumed by a youth market. The authors explored whether liking and experience with an RTD soft-drink base predicts liking for the RTD. Participants (N=350) from ages 12 to 30 years sampled 3 RTDs and their respective soft-drink and alcoholic components. For milk- and fruit-based RTDs, liking for and familiarity with their soft-drink base was the best predictor of liking for and familiarity with the RTD itself. For the Coke-based RTD, familiarity with and liking for bourbon best predicted familiarity with and liking for the RTD. All of these effects were consistent across blind and nonblind testing. The authors' results suggest that where there is perceptual similarity between the RTD and its soft-drink base, these beverages may provide an easy transition into alcohol consumption for novice drinkers. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
14.
Jan Ramon Daan Fierens Fabián Güiza Geert Meyfroidt 《Advanced Engineering Informatics》2007,21(3):243-256
In this paper we describe the application of data mining methods for predicting the evolution of patients in an intensive care unit. We discuss the importance of such methods for health care and other application domains of engineering. We argue that this problem is an important but challenging one for the current state of the art data mining methods and explain what improvements on current methods would be useful. We present a promising study on a preliminary data set that demonstrates some of the possibilities in this area. 相似文献
15.
16.
We have studied lamp configuration design for rapid thermal processing (RTP) systems. We considered a configuration consisting of four concentric circular lamp zones, three of them above the wafer and one circumventing the wafer. We propose a method to determine the geometric parameters, the width, height and radius, of the lamp zones so that the configuration designed has the capacity to achieve a uniform temperature on the wafer. The method is based on a necessary and sufficient condition for uniform temperature tracking and analytic expressions of the view factors. A design example is given in which a least square open-loop control law yields good temperature uniformity 相似文献
17.
Batch process industries are characterized by complex precedence relationships between operations, which renders the estimation
of an acceptable workload very difficult. A detailed schedule based model can be used for this purpose, but for large problems
this may require a prohibitive large amount of computation time. We propose a regression based model to estimate the makespan
of a set of jobs. We extend earlier work based on deterministic processing times by considering Erlang-distributed processing
times in our model. This regression-based model is used to support customer order acceptance. Three order acceptance policies
are compared by means of simulation experiments: a scheduling policy, a workload policy and a regression policy. The results
indicate that the performance of the regression policy can compete with the performance of the scheduling policy in situations
with high variety in the job mix and high uncertainty in the processing times.
Correspondence to: C.V. Ivanescu 相似文献
18.
Wayne Madsen 《Network Security》1998,1998(5):8-9
“We hear about mandatory access to encryption keys by law enforcement but nothing about privacy.” With that statement, Senator John Ashcroft of Missouri, an unannounced candidate for President in 2000, opened Senate Judiciary subcommittee hearings on the Clinton administration's doddering encryption policy. Ashcroft lambasted the administration for asking American citizens to turn over crypto keys to the government after it rifled through 1000 raw FBI files seeking political dirt on opponents. 相似文献
19.
Jan Eichelberger 《Datenschutz und Datensicherheit - DuD》2006,30(8):490-496
Zusammenfassung Aus der Sicht eines informationstechnischen Laien scheinen Denial of Service-Angriffe mit Online-Demonstrationen in keinem
Zusammenhang zu stehen. Das Gegenteil ist der Fall, wenn durch derartige Angriffe der Anbieter einer Webseite buchst?blich
lahm gelegt wird. Ob die an sich lautere Intention einer kritischen Meinungs?u?erung derartige Angriffe rechtfertigen kann,
ist fraglich und besch?ftigt die Justiz. Der Verfasser dieses Beitrages bewertet den Sachverhalt eines Denial-of-Service-Angriffes
strafrechtlich.
Dr. jur. Jan Eichelberger, LL.M.oec.
Rechtsreferendar am Kammergericht Interessenschwerpunkte im Gewerblichen Rechtsschutz, im Kapitalmarktrecht und im Recht der
neuen Medien 相似文献
20.
Filip Sroubek Gabriel Cristóbal Jan Flusser 《IEEE transactions on image processing》2007,16(9):2322-2332
This paper presents a new approach to the blind deconvolution and superresolution problem of multiple degraded low-resolution frames of the original scene. We do not assume any prior information about the shape of degradation blurs. The proposed approach consists of building a regularized energy function and minimizing it with respect to the original image and blurs, where regularization is carried out in both the image and blur domains. The image regularization based on variational principles maintains stable performance under severe noise corruption. The blur regularization guarantees consistency of the solution by exploiting differences among the acquired low-resolution images. Several experiments on synthetic and real data illustrate the robustness and utilization of the proposed technique in real applications. 相似文献