全文获取类型
收费全文 | 3481篇 |
免费 | 418篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 49篇 |
综合类 | 5篇 |
化学工业 | 939篇 |
金属工艺 | 148篇 |
机械仪表 | 213篇 |
建筑科学 | 27篇 |
矿业工程 | 1篇 |
能源动力 | 141篇 |
轻工业 | 287篇 |
水利工程 | 10篇 |
石油天然气 | 2篇 |
无线电 | 663篇 |
一般工业技术 | 865篇 |
冶金工业 | 103篇 |
原子能技术 | 88篇 |
自动化技术 | 366篇 |
出版年
2024年 | 4篇 |
2023年 | 39篇 |
2022年 | 61篇 |
2021年 | 119篇 |
2020年 | 78篇 |
2019年 | 119篇 |
2018年 | 137篇 |
2017年 | 141篇 |
2016年 | 190篇 |
2015年 | 149篇 |
2014年 | 201篇 |
2013年 | 228篇 |
2012年 | 273篇 |
2011年 | 344篇 |
2010年 | 194篇 |
2009年 | 242篇 |
2008年 | 215篇 |
2007年 | 168篇 |
2006年 | 147篇 |
2005年 | 102篇 |
2004年 | 99篇 |
2003年 | 126篇 |
2002年 | 96篇 |
2001年 | 84篇 |
2000年 | 58篇 |
1999年 | 57篇 |
1998年 | 45篇 |
1997年 | 29篇 |
1996年 | 35篇 |
1995年 | 25篇 |
1994年 | 15篇 |
1993年 | 18篇 |
1992年 | 7篇 |
1991年 | 9篇 |
1990年 | 8篇 |
1989年 | 4篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1986年 | 2篇 |
1985年 | 7篇 |
1984年 | 3篇 |
1983年 | 4篇 |
1981年 | 2篇 |
1980年 | 4篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1975年 | 1篇 |
1974年 | 3篇 |
1973年 | 1篇 |
1967年 | 1篇 |
排序方式: 共有3907条查询结果,搜索用时 15 毫秒
81.
82.
Indicating that CBMC does not satisfy the monotonic property in terms of the number of interactions, Xu and Zhou proposed an augmented definition of CBMC by adopting cut set instead of glue methods. The augmented CBMC clearly satisfies the monotonic property. However, CBMC is designed to overcome the problem with respect to the number of interactions and, therefore, focuses on the interaction pattern, especially, member connectivity. Consequently, it does not make sense to mention the monotonic property of CBMC with respect to interaction number. Moreover, the notion of glue methods allows several interpretations on the design quality of a class. However, that meaningful interpretation is not possible for the augmented definition due to the removal of the notion of glue methods. Copyright © 2001 John Wiley & Sons, Ltd. 相似文献
83.
Seung Taek Seo Yong Hee Lee Kwang Soon Lee Bum Kyoo Choi Dae Rook Yang 《Korean Journal of Chemical Engineering》2005,22(6):822-829
A numerical process to simulate SiO2 dry etching with inductively coupled C2F6 plasmas has been constructed using a commercial CFD code as a first step to design a run-to-run control system. The simulator
was found to reasonably predict the reactive ion etching behavior of C2F6 plasmas and used to investigate the effects of plasma operating variables on the etch rate and uniformity. The relationship
between the operating variables and the etching characteristics was mathematically modeled through linear regression for future
run-to-run control system design. 相似文献
84.
Homogeneous and nano-sized BPNT [(Ba1-xPbx)Nd2Ti5O14] powders were prepared under various hydrothermal conditions. Crystallinity and homogeneity of the synthetic powders were
investigated. The microwave dielectric properties of the filters prepared with hydrothermal powders were compared with those
of the filters prepared with conventional powders. The microwave dielectric properties of the filter prepared with the hydrothermal
powders were also better than those of the filter manufactured with the conventional powders. The dielectric constant, quality
constant and temperature coefficient of resonance frequency of hydrothermally prepared filter under optimum condition and
measured at 3.5 GHz around were about 93, 6067 and 0 ppm/°C, respectively. 相似文献
85.
Failure to establish agreed-upon criteria by which to measure and identify online video game addiction has resulted in a lack of reliable evidence of the actual percentage of individuals who are pathologically dependent. Building upon prior research, the present study sought to better determine the magnitude of pathological online video game play using a distinction between core and peripheral criteria for behavioral addiction. Preferences and perceptions towards online video games and addiction were also examined to better understand players’ habits. A questionnaire was administered to 1332 South Korean students across 11 high schools and 1 middle school in an area surrounding the capital of Seoul. Using a monothetic and a polythetic classification system, findings showed rates ranging between 1.7% and 25.5%, with a 2.7% addiction rate when distinguishing core from peripheral criteria. These results may suggest that online video game addiction rates in intense gaming cultures such as South Korea are not as high as otherwise believed. The findings will be of assistance to educators, policymakers, clinicians, and researchers in understanding the challenges in deriving meaningful video game addiction prevalence rates, and thus being able to better separate reality from conjecture with regard to the notion of pathological game play. 相似文献
86.
Currently, embedded systems have been widely used for ubiquitous computing environments including digital setup boxes, mobile
phones, and USN (Ubiquitous Sensor Networks). The significance of security has been growing as it must be necessarily embedded
in all these systems. Up until now, many researchers have made efforts to verify the integrity of applied binaries downloaded
in embedded systems. The research of problem solving is organized into hardware methods and software-like methods. In this
research, the basic approach to solving problems from the software perspective was employed. From the software perspective,
unlike in the existing papers (Seshadri et al., Proc. the IEEE symposium on security and privacy, 2004; Seshadri et al., Proc. the symposium on operating systems principals, 2005) based on the standardized model (TTAS.KO-11.0054.
2006) publicized in Korea, there is no extra verifier and conduct for the verification function in the target system. Contrary
to the previous schemes (Jung et al. , 2008; Lee et al., LNCS, vol. 4808, pp. 346–355, 2007), verification results are stored in 1 validation check bit, instead of storing signature value for application binary files
in the i-node structure for the purpose of reducing run-time execution overhead. Consequently, the proposed scheme is more
efficient because it dramatically reduces overhead in storage space, and when it comes to computing, it performs one hash
algorithm for initial execution and thereafter compares 1 validation check bit only, instead of signature and hash algorithms
for every application binary. Furthermore, in cases where there are frequent changes in the i-node structure or file data
depending on the scheme application, the scheme can provide far more effective verification performance compared to the previous
schemes. 相似文献
87.
Computational models of protein folding and ligand docking are large and complex. Few systematic methods have yet been developed to optimize the parameters in such models. We describe here an iterative parameter optimization strategy that is based on minimizing a structural error measure by descent in parameter space. At the start, we know the ‘correct’ native structure that we want the model to produce, and an initial set of parameters representing the relative strengths of interactions between the amino acids. The parameters are changed systematically until the model native structure converges as closely as possible to the correct native structure. As a test, we apply this parameter optimization method to the recently developed Gaussian model of protein folding: each amino acid is represented as a bead and all bonds, covalent and noncovalent, are represented by Hooke's law springs. We show that even though the Gaussian model has continuous degrees of freedom, parameters can be chosen to cause its ground state to be identical to that of Go-type lattice models, for which the global ground states are known. Parameters for a more realistic protein model can also be obtained to produce structures close to the real native structures in the protein database. 相似文献
88.
Microstructures and tensile behavior of carbon nanotube reinforced Cu matrix nanocomposites 总被引:6,自引:0,他引:6
Kyung Tae Kim Seung Il Cha Seong Hyeon Hong Soon Hyung Hong 《Materials Science and Engineering: A》2006,430(1-2):27-33
Carbon nanotubes (CNTs) have been considered as an ideal reinforcement to improve the mechanical performance of monolithic materials. However, the CNT/metal nanocomposites have shown lower strength than expected. In this study, the CNT reinforced Cu matrix nanocomposites were fabricated by spark plasma sintering (SPS) of high energy ball-milled nano-sized Cu powders with multi-wall CNTs, and followed by cold rolling process. The microstructure of CNT/Cu nanocomposites consists of two regions including CNT/Cu composite region, where most CNTs are distributed, and CNT free Cu matrix region. The stress–strain curves of CNT/Cu nanocomposites show a two-step yielding behavior, which is caused from the microstructural characteristics consisting of two regions and the load transfer between these regions. The CNT/Cu nanocomposites show a tensile strength of 281 MPa, which is approximately 1.6 times higher than that of monolithic Cu. It is confirmed that the key issue to enhance the strength of CNT/metal nanocomposite is homogeneous distribution of CNTs. 相似文献
89.
A method for evaluating fault coverage using simulated fault injection for digitalized systems in nuclear power plants 总被引:1,自引:0,他引:1
Suk Joon Kim Poong Hyun Seong Jun Seok Lee Man Cheol Kim Hyun Gook Kang Seung Cheol Jang 《Reliability Engineering & System Safety》2006,91(5):614-623
The fault coverage for digital system in nuclear power plants is evaluated using a simulated fault injection method. Digital systems have numerous advantages, such as hardware elements share and hardware replication of the needed number of independent channels. However, the application of digital systems to safety-critical systems in nuclear power plants has been limited due to reliability concerns. In the reliability issues, fault coverage is one of the most important factors. In this study, we propose an evaluation method of the fault coverage for safety-critical digital systems in nuclear power plants. The system under assessment is a local coincidence logic processor for a digital plant protection system at Ulchin nuclear power plant units 5 and 6. The assessed system is simplified and then a simulated fault injection method is applied to evaluate the fault coverage of two fault detection mechanisms. From the simulated fault injection experiment, the fault detection coverage of the watchdog timer is 44.2% and that of the read only memory (ROM) checksum is 50.5%. Our experiments show that the fault coverage of a safety-critical digital system is effectively quantified using the simulated fault injection method. 相似文献
90.
Seok Hwan Yoon 《Thin solid films》2006,515(4):1544-1547
Highly polycrystalline copper indium diselenide (CuInSe2) thin films on molybdenum substrate were successfully grown at 330 °C through two-stage metal organic chemical vapor deposition (MOCVD) method by using two precursors at relatively mild conditions. First, phase pure InSe thin film was prepared on molybdenum substrate by using a single-source precursor, di-μ-methylselenobis(dimethylindium). Second, on this InSe/Mo film, bis(ethylisobutyrylacetato) copper(II) designated as Cu(eiac)2 was treated by MOCVD to produce CuInSe2 films. The thickness and stoichiometry of the product films were found to be easily controlled in this method by adjusting the process conditions. Also, there were no appreciable amounts of carbon and oxygen impurities in the prepared copper indium diselenide films. 相似文献