全文获取类型
收费全文 | 2306篇 |
免费 | 134篇 |
国内免费 | 19篇 |
专业分类
电工技术 | 34篇 |
综合类 | 3篇 |
化学工业 | 492篇 |
金属工艺 | 50篇 |
机械仪表 | 45篇 |
建筑科学 | 62篇 |
矿业工程 | 2篇 |
能源动力 | 117篇 |
轻工业 | 157篇 |
水利工程 | 17篇 |
石油天然气 | 13篇 |
无线电 | 302篇 |
一般工业技术 | 515篇 |
冶金工业 | 184篇 |
原子能技术 | 5篇 |
自动化技术 | 461篇 |
出版年
2024年 | 4篇 |
2023年 | 33篇 |
2022年 | 88篇 |
2021年 | 102篇 |
2020年 | 89篇 |
2019年 | 107篇 |
2018年 | 136篇 |
2017年 | 118篇 |
2016年 | 123篇 |
2015年 | 70篇 |
2014年 | 98篇 |
2013年 | 178篇 |
2012年 | 137篇 |
2011年 | 153篇 |
2010年 | 120篇 |
2009年 | 103篇 |
2008年 | 114篇 |
2007年 | 79篇 |
2006年 | 72篇 |
2005年 | 53篇 |
2004年 | 41篇 |
2003年 | 31篇 |
2002年 | 29篇 |
2001年 | 25篇 |
2000年 | 17篇 |
1999年 | 16篇 |
1998年 | 49篇 |
1997年 | 29篇 |
1996年 | 30篇 |
1995年 | 19篇 |
1994年 | 22篇 |
1993年 | 18篇 |
1992年 | 11篇 |
1990年 | 10篇 |
1989年 | 5篇 |
1988年 | 13篇 |
1987年 | 10篇 |
1986年 | 6篇 |
1985年 | 12篇 |
1984年 | 10篇 |
1983年 | 14篇 |
1982年 | 7篇 |
1981年 | 4篇 |
1979年 | 6篇 |
1978年 | 6篇 |
1977年 | 3篇 |
1976年 | 12篇 |
1975年 | 7篇 |
1974年 | 7篇 |
1973年 | 4篇 |
排序方式: 共有2459条查询结果,搜索用时 203 毫秒
81.
Deepam Goyal Vanraj B. S. Pabla S. S. Dhami 《Archives of Computational Methods in Engineering》2017,24(3):543-556
Condition monitoring of gearboxes which is considered as a key element of rotating machines ensures to continuously reduce and eliminate cost, unscheduled downtime and unexpected breakdowns. Although, a lot of work on condition monitoring and fault diagnosis of fixed-axis gearbox has been reported in the literature, however only a few have found their way to industrial applications. The ability of condition statistical indicators is to provide accurate and precise information about the health of various components at different levels of damage. In this paper, frequently used condition indicators are addressed domain-wise and their characteristics are stated. This paper presents the review of work to provide a wide and good reference for researchers to be utilized. The structure of a fixed-axis gearbox in addition to the unique behaviors and fault characteristics of fixed-axis gearbox has been recognized and represented. By extensively reviewing and categorizing important papers and articles, this paper is able to summarize the conditional monitoring indicators on basis of adopted methodologies. Lastly, open problems are stated and further research prospects pointed out. 相似文献
82.
Amit K. Awasthi Keerti Srivastava R.C. MittalAuthor vitae 《Computers & Electrical Engineering》2011,37(6):869-874
To protect the remote server from various malicious attacks, many authentication schemes have been proposed. Some schemes have to maintain a password verification table in the remote server for checking the legitimacy of the login users. To overcome potential risks of verification tables, researchers proposed remote user authentication schemes using smartcard, in which the remote server only keeps a secret key for computing the user’s passwords and does not need any verification table for verifying legal user. In 2003 Shen, Lin, and Hwang proposed a timestamp-based password authentication scheme using smartcards in which the remote server does not need to store the passwords or verification table for user authentication. Unfortunately, this scheme is vulnerable to some deadly attacks. In this paper, we analyze few attacks and finally propose an improved timestamp-based remote user authentication scheme. The modified scheme is more efficient and secure than original scheme. 相似文献
83.
Consider the robust network design problem of finding a minimum cost network with enough capacity to route all traffic demand
matrices in a given polytope. We investigate the impact of different routing models in this robust setting: in particular,
we compare oblivious routing, where the routing between each terminal pair must be fixed in advance, to dynamic routing, where routings may depend arbitrarily on the current demand. Our main result is a construction that shows that the
optimal cost of such a network based on oblivious routing (fractional or integral) may be a factor of Ω(log n) more than the cost required when using dynamic routing. This is true even in the important special case of the asymmetric
hose model. This answers a question in (Chekuri, SIGACT News 38(3):106–128, 2007), and is tight up to constant factors. Our proof technique builds on a connection between expander graphs and robust design
for single-sink traffic patterns (Chekuri et al., Networks 50(1):50–54, 2007). 相似文献
84.
OBSERVER: An Approach for Query Processing in Global Information Systems Based on Interoperation Across Pre-Existing Ontologies 总被引:3,自引:0,他引:3
Eduardo Mena Arantza Illarramendi Vipul Kashyap Amit P. Sheth 《Distributed and Parallel Databases》2000,8(2):223-271
There has been an explosion in the types, availability and volume of data accessible in an information system, thanks to the World Wide Web (the Web) and related inter-networking technologies. In this environment, there is a critical need to replace or complement earlier database integration approaches and current browsing and keyword-based techniques with concept-based approaches. Ontologies are increasingly becoming accepted as an important part of any concept or semantics based solution, and there is increasing realization that any viable solution will need to support multiple ontologies that may be independently developed and managed. In particular, we consider the use of concepts from pre-existing real world domain ontologies for describing the content of the underlying data repositories. The most challenging issue in this approach is that of vocabulary sharing, which involves dealing with the use of different terms or concepts to describe similar information. In this paper, we describe the architecture, design and implementation of the OBSERVER system. Brokering across the domain ontologies is enabled by representing and utilizing interontology relationships such as (but not limited to) synonyms, hyponyms and hypernyms across terms in different ontologies. User queries are rewritten by using these relationships to obtain translations across ontologies. Well established metrics like precision and recall based on the extensions underlying the concepts are used to estimate the loss of information, if any. 相似文献
85.
Fructose-2,6-bisphosphatase (FBPase-2) is a switch between gluconeogenesis and glycolysis in the hepatic cells. The structural features required for inhibitory activity of FBPase-2 were unidentified; no leads are available for inhibiting this important enzyme. In this paper pharmacophore mapping, molecular docking methods were employed in a virtual screening strategy to identify leads for FBPase-2. A receptor based pharmacophore map was modeled which comprised of important interactions as observed in co-crystal of rat liver isozyme with the product inhibitor fructose-6-phosphate. The pharmacophore model was validated against two databases of best docked structural analogues of fructose-2,6-bisphosphate and fructose-6-phosphate. The query generated was submitted for flexible search of ligands in chemical databases, namely LeadQuest, Maybridge and NCI. The hits obtained were further screened by molecular docking using FlexX. 相似文献
86.
Previous high-temperature compression creep studies of NiAl have shown peculiar behaviour in the temperature range 700 to 900° C, which was perhaps due to precipitation of impurities in the matrix. To isolate the impurity effect, high-purity NiAl samples with 0.15 at% and 0.20 at% carbon (graphite) additions have been creep tested at four temperatures between 700 and 850° C. Addition of graphite has been shown to produce a significant reduction in the creep strength of the alloyS. However, alloys with higher graphite concentrations have shown better creep resistance than those with lower graphite concentrations. Transmission electron microscopy indicates the presence of competing softening and hardening mechanisms in the alloys. Softening is due to the graphite particles acting as a dislocation source. Hardening results from a grain-boundary hardening mechanism due to the graphite particles segregating at grain boundaries and a dislocation-impurity (fine graphite) interaction, developing a Cottrell-like atmosphere. 相似文献
87.
Kumar et al. (Appl. Math. Model. 35:817?C823, 2011) pointed out that there is no method in literature to find the exact fuzzy optimal solution of fully fuzzy linear programming (FFLP) problems and proposed a new method to find the fuzzy optimal solution of FFLP problems with equality constraints having non-negative fuzzy variables and unrestricted fuzzy coefficients. There may exist several FFLP problems with equality constraints in which no restriction can be applied on all or some of the fuzzy variables but due to the limitation of the existing method these types of problems can not be solved by using the existing method. In this paper a new method is proposed to find the exact fuzzy optimal solution of FFLP problems with equality constraints having non-negative fuzzy coefficients and unrestricted fuzzy variables. The proposed method can also be used to solve the FFLP problems with equality constraints having non-negative fuzzy variables and unrestricted fuzzy coefficients. To show the advantage of the proposed method over existing method the results of some FFLP problems with equality constraints, obtained by using the existing and proposed method, are compared. Also, to show the application of proposed method a real life problem is solved by using the proposed method. 相似文献
88.
Manish Goyal Sundar Murugappan Cecil Piya William Benjamin Yi Fang Min Liu Karthik Ramani 《Computer aided design》2012,44(6):537-553
The process of re-creating CAD models from actual physical parts, formally known as digital shape reconstruction (DSR) is an integral part of product development, especially in re-design. While, the majority of current methods used in DSR are surface-based, our overarching goal is to obtain direct parameterization of 3D meshes, by avoiding the actual segmentation of the mesh into different surfaces. As a first step towards reverse modeling physical parts, we extract (1) locally prominent cross-sections (PCS) from triangular meshes, and (2) organize and cluster them into sweep components, which form the basic building blocks of the re-created CAD model. In this paper, we introduce two new algorithms derived from Locally Linear Embedding (LLE) (Roweis and Sauk, 2000 [3]) and Affinity Propagation (AP) (Frey and Dueck, 2007 [4]) for organizing and clustering PCS. The LLE algorithm analyzes the cross-sections (PCS) using their geometric properties to build a global manifold in an embedded space. The AP algorithm, then clusters the local cross sections by propagating affinities among them in the embedded space to form different sweep components. We demonstrate the robustness and efficiency of the algorithms through many examples including actual laser-scanned (point cloud) mechanical parts. 相似文献
89.
Amit Ma jumdar 《中国钢铁业》2006,(10):33-37
一、印度钢铁工业发展历史和现状从远古时代开始,铁在人类的生活中就非常重要。无论是战争还是和平年代,钢铁对现代文明的发展是必不可少的。为了了解印度的钢铁工业,首先有必要简要地回顾一下印度的钢铁制造史。印度是一个古老的国度,文化遗产丰富。印度是一片不同地域间存在惊人差异的土地,而两百多年的殖民统治更造就了多样化的印度。除了几家糖厂和纺 相似文献
90.
Imad H. Elhajj Amit Goradia Ning Xi Chow Man Kit Yun Hui Liu Toshio Fukuda 《Autonomous Robots》2003,15(3):237-254
The coordination of multi-robots is required in many scenarios for efficiency and task completion. Combined with teleoperation capabilities, coordinating robots provide a powerful tool. Add to this the Internet and now it is possible for multi-experts at multi-remote sites to control multi-robots in a coordinated fashion. For this to be feasible there are several hurdles to be crossed including Internet type delays, uncertainties in the environment and uncertainties in the object manipulated. In addition, there is a need to measure and control the quality of tele-coordination. To this end, the measure of force sensed by each robot is suggested and justified as a coordination index. It was proven that if n robots are event-transparent and event-synchronous then they can be teleoperated under random delay conditions to coordinate to any index value, which is feasible under no delay conditions. The design procedure that ensures a system can satisfy a small coordination index was presented and analyzed.In addition, the design and analysis of event-synchronous systems using Petri Nets is detailed. The Petri Net design methodology is presented for both event-synchronous single operator single robot teleoperation systems and event-synchronous multi-operator multi-robot teleoperation systems.The theory developed was tested by bilaterally tele-coordinating two mobile manipulators via the Internet. The experimental results confirmed the theoretical results presented. 相似文献