全文获取类型
收费全文 | 1435篇 |
免费 | 92篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 17篇 |
综合类 | 4篇 |
化学工业 | 432篇 |
金属工艺 | 26篇 |
机械仪表 | 42篇 |
建筑科学 | 45篇 |
矿业工程 | 9篇 |
能源动力 | 39篇 |
轻工业 | 217篇 |
水利工程 | 15篇 |
石油天然气 | 8篇 |
无线电 | 68篇 |
一般工业技术 | 233篇 |
冶金工业 | 112篇 |
原子能技术 | 3篇 |
自动化技术 | 258篇 |
出版年
2024年 | 4篇 |
2023年 | 9篇 |
2022年 | 49篇 |
2021年 | 85篇 |
2020年 | 57篇 |
2019年 | 54篇 |
2018年 | 70篇 |
2017年 | 72篇 |
2016年 | 69篇 |
2015年 | 55篇 |
2014年 | 59篇 |
2013年 | 114篇 |
2012年 | 102篇 |
2011年 | 109篇 |
2010年 | 91篇 |
2009年 | 109篇 |
2008年 | 65篇 |
2007年 | 60篇 |
2006年 | 55篇 |
2005年 | 29篇 |
2004年 | 19篇 |
2003年 | 31篇 |
2002年 | 24篇 |
2001年 | 12篇 |
2000年 | 6篇 |
1999年 | 12篇 |
1998年 | 27篇 |
1997年 | 24篇 |
1996年 | 11篇 |
1995年 | 9篇 |
1994年 | 11篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1989年 | 3篇 |
1988年 | 2篇 |
1985年 | 1篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1980年 | 4篇 |
1977年 | 1篇 |
1973年 | 1篇 |
1970年 | 2篇 |
排序方式: 共有1528条查询结果,搜索用时 31 毫秒
31.
Redox and acid–base properties of thionine immobilized in crosslinked chitosan films are analyzed. The experimental conditions for the preparation of the films are described. Results obtained with cyclic voltammetry, spectroelectrochemistry and spectrophotometry indicate that the immobilized dye retains the redox and acid–base activity of free thionine. An acid dissociation constant (Ka) for the immobilized dye of Ka = 2.7 × 10−11 was obtained.
Due to the stable and reversible pH dependent optical signal of the studied film, this membrane can be used as a building component of an optical pH sensor. 相似文献
32.
This article proposes an approach for reconstructing physical parameters of a sample in a rectangular resonator during microwave radiation, knowing a priori, its electric field distribution. The inverse problem was solved using two global optimization algorithms and the peak signal-to-noise ratio (PSNR) criterion. First, the Self-regulated Fretwidth Harmony Search algorithm (SFHS) identified suitable resonant frequencies for a given configuration. Next, the unified Particle Swarm Optimization (UPSO) optimized said configuration. Together, they became a maximization strategy of the PSNR through a dual optimization process. Results showed the ability of the approach for estimating the height of each sample block and the resonating frequency of the cavity. This process takes longer to finish as a higher PSNR is demanded (mainly due to the aforementioned dual optimization). Even so, it allows for more similar electric field distributions between both, the direct and inverse problems. 相似文献
33.
This paper presents three projects involving the design and fabrication of architectural structures through the use of different
parametric software and digital manufacturing methods. The first project is a flexible partition composed of interlocking
elements shaped using a laser-cutter. The second project is a university exhibition unit made with various wooden panels manufactured
through a computer numerical controlled (CNC) system. The third project is a system of metal sheets folded by digital machines
to create urban circulation spaces. The three works develop a parametric programming of geometry based on certain technical
factors, enabling the recognition of patterns of interaction between formal and constructive issues involved in the definition
of shapes through parametric controls. Differences in materials and processes are contrasted by similarities of function and
conditions involved, creating a system of local, global, productive and environmental parameters that produces a repertoire
of self-similar dimensions and variations as well as multiple possibilities of initial setups and final configurations. It
suggests a specific field of design exploration focusing on the development of differentiated components and variable architectural
configurations, in a kind of open parametric system. 相似文献
34.
College students (n = 140) were examined to test whether sensation seeking and perceived stress would predict abuse of the Internet. Previous studies have found that disinhibition, boredom susceptibility, and total sensation seeking scores were related to Internet abuse ( 9 and 30). Because stress has been documented to have a negative effect on students ( Pierceall & Keim, 2007), and may be linked to Internet use ( Lavoie & Pychyl, 2001), it was tested as a possible predictor of Internet abuse. This study also analyzed abuse of the Internet for sexual purposes, because sexuality is prevalent online, and college students are in an age of sexual exploration. Results of stepwise regression analyses revealed that disinhibition and total perceived stress were predictive of Internet abuse for sexual purposes, and perceived hopelessness and boredom susceptibility were predictive of Internet abuse for non-sexual purposes. Implications for students and Internet abuse are discussed. 相似文献
35.
Ricardo V. de Oliveira Rodrigo A. Ramos Newton G. Bretas 《Control Engineering Practice》2010,18(1):45-54
The main objective of this paper is to relieve the power system engineers from the burden of the complex and time-consuming process of power system stabilizer (PSS) tuning. To achieve this goal, the paper proposes an automatic process for computerized tuning of PSSs, which is based on an iterative process that uses a linear matrix inequality (LMI) solver to find the PSS parameters. It is shown in the paper that PSS tuning can be written as a search problem over a non-convex feasible set. The proposed algorithm solves this feasibility problem using an iterative LMI approach and a suitable initial condition, corresponding to a PSS designed for nominal operating conditions only (which is a quite simple task, since the required phase compensation is uniquely defined). Some knowledge about the PSS tuning is also incorporated in the algorithm through the specification of bounds defining the allowable PSS parameters. The application of the proposed algorithm to a benchmark test system and the nonlinear simulation of the resulting closed-loop models demonstrate the efficiency of this algorithm. 相似文献
36.
37.
Rodrigo S. Jamisola Petar S. Kormushev Rodney G. Roberts Darwin G. Caldwell 《Journal of Intelligent and Robotic Systems》2016,83(2):205-218
This paper presents modular dynamics for dual-arms, expressed in terms of the kinematics and dynamics of each of the stand-alone manipulators. The two arms are controlled as a single manipulator in the task space that is relative to the two end-effectors of the dual-arm robot. A modular relative Jacobian, derived from a previous work, is used which is expressed in terms of the stand-alone manipulator Jacobians. The task space inertia is expressed in terms of the Jacobians and dynamics of each of the stand-alone manipulators. When manipulators are combined and controlled as a single manipulator, as in the case of dual-arms, our proposed approach will not require an entirely new dynamics model for the resulting combined manipulator. But one will use the existing Jacobians and dynamics model for each of the stand-alone manipulators to come up with the dynamics model of the combined manipulator. A dual-arm KUKA is used in the experimental implementation. 相似文献
38.
Rodrigo Costa Mateus Thiago Luís Lopes Siqueira Valéria Cesário Times Ricardo Rodrigues Ciferri Cristina Dutra de Aguiar Ciferri 《Distributed and Parallel Databases》2016,34(3):425-461
Cloud computing systems handle large volumes of data by using almost unlimited computational resources, while spatial data warehouses (SDWs) are multidimensional databases that store huge volumes of both spatial data and conventional data. Cloud computing environments have been considered adequate to host voluminous databases, process analytical workloads and deliver database as a service, while spatial online analytical processing (spatial OLAP) queries issued over SDWs are intrinsically analytical. However, hosting a SDW in the cloud and processing spatial OLAP queries over such database impose novel obstacles. In this article, we introduce novel concepts as cloud SDW and spatial OLAP as a service, and afterwards detail the design of novel schemas for cloud SDW and spatial OLAP query processing over cloud SDW. Furthermore, we evaluate the performance to process spatial OLAP queries in cloud SDWs using our own query processor aided by a cloud spatial index. Moreover, we describe the cloud spatial bitmap index to improve the performance to process spatial OLAP queries in cloud SDWs, and assess it through an experimental evaluation. Results derived from our experiments revealed that such index was capable to reduce the query response time from 58.20 up to 98.89 %. 相似文献
39.
Sylvio BarbonJr Rodrigo Augusto Igawa Bruno Bogaz Zarpelão 《Multimedia Tools and Applications》2017,76(3):3213-3233
Compromising legitimate accounts has been the most used strategy to spread malicious content on OSN (Online Social Network). To address this problem, we propose a pure text mining approach to check if an account has been compromised based on its posts content. In the first step, the proposed approach extracts the writing style from the user account. The second step comprehends the k-Nearest Neighbors algorithm (k-NN) to evaluate the post content and identify the user. Finally, Baseline Updating (third step) consists of a continuous updating of the user baseline to support the current trends and seasonality issues of user’s posts. Experiments were carried out using a dataset from Twitter composed by tweets of 1000 users. All the three steps were individually evaluated, and the results show that the developed method is stable and can detect the compromised accounts. An important observation is the Baseline Updating contribution, which leads to an enhancement of accuracy superior of 60 %. Regarding average accuracy, the developed method achieved results over 93 %. 相似文献
40.
Rodrigo Queiroz Leonardo Passos Marco Tulio Valente Claus Hunsen Sven Apel Krzysztof Czarnecki 《Software and Systems Modeling》2017,16(1):77-96
Feature annotations (e.g., code fragments guarded by #ifdef C-preprocessor directives) control code extensions related to features. Feature annotations have long been said to be undesirable. When maintaining features that control many annotations, there is a high risk of ripple effects. Also, excessive use of feature annotations leads to code clutter, hinder program comprehension and harden maintenance. To prevent such problems, developers should monitor the use of feature annotations, for example, by setting acceptable thresholds. Interestingly, little is known about how to extract thresholds in practice, and which values are representative for feature-related metrics. To address this issue, we analyze the statistical distribution of three feature-related metrics collected from a corpus of 20 well-known and long-lived C-preprocessor-based systems from different domains. We consider three metrics: scattering degree of feature constants, tangling degree of feature expressions, and nesting depth of preprocessor annotations. Our findings show that feature scattering is highly skewed; in 14 systems (70 %), the scattering distributions match a power law, making averages and standard deviations unreliable limits. Regarding tangling and nesting, the values tend to follow a uniform distribution; although outliers exist, they have little impact on the mean, suggesting that central statistics measures are reliable thresholds for tangling and nesting. Following our findings, we then propose thresholds from our benchmark data, as a basis for further investigations. 相似文献