全文获取类型
收费全文 | 79242篇 |
免费 | 7877篇 |
国内免费 | 4239篇 |
专业分类
电工技术 | 4775篇 |
技术理论 | 2篇 |
综合类 | 7333篇 |
化学工业 | 12515篇 |
金属工艺 | 4392篇 |
机械仪表 | 4973篇 |
建筑科学 | 5495篇 |
矿业工程 | 1912篇 |
能源动力 | 2200篇 |
轻工业 | 7145篇 |
水利工程 | 1638篇 |
石油天然气 | 3089篇 |
武器工业 | 611篇 |
无线电 | 9928篇 |
一般工业技术 | 8780篇 |
冶金工业 | 3453篇 |
原子能技术 | 1090篇 |
自动化技术 | 12027篇 |
出版年
2024年 | 604篇 |
2023年 | 968篇 |
2022年 | 1758篇 |
2021年 | 2454篇 |
2020年 | 1952篇 |
2019年 | 1740篇 |
2018年 | 1877篇 |
2017年 | 2129篇 |
2016年 | 2158篇 |
2015年 | 2878篇 |
2014年 | 3812篇 |
2013年 | 4714篇 |
2012年 | 5355篇 |
2011年 | 5770篇 |
2010年 | 5406篇 |
2009年 | 5332篇 |
2008年 | 5290篇 |
2007年 | 5054篇 |
2006年 | 4972篇 |
2005年 | 4202篇 |
2004年 | 3403篇 |
2003年 | 3071篇 |
2002年 | 3606篇 |
2001年 | 3123篇 |
2000年 | 2176篇 |
1999年 | 1602篇 |
1998年 | 1082篇 |
1997年 | 905篇 |
1996年 | 799篇 |
1995年 | 707篇 |
1994年 | 522篇 |
1993年 | 401篇 |
1992年 | 296篇 |
1991年 | 250篇 |
1990年 | 199篇 |
1989年 | 133篇 |
1988年 | 132篇 |
1987年 | 93篇 |
1986年 | 42篇 |
1985年 | 64篇 |
1984年 | 57篇 |
1983年 | 38篇 |
1982年 | 32篇 |
1981年 | 31篇 |
1980年 | 29篇 |
1979年 | 20篇 |
1978年 | 14篇 |
1977年 | 19篇 |
1976年 | 16篇 |
1974年 | 10篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
Wenyu Qu Masaru Kitsuregawa Hong Shen Zhiguang Shan 《Journal of Network and Computer Applications》2009,32(2):423-432
The exponential expansion of the Internet and the widespread popularity of the World Wide Web give a challenge to experts on reliable and secure system design, e.g., e-economy applications. New paradigms are on demand and mobile agent technology is one of the features. In this paper, we propose a fault-tolerance execution model by using of mobile agents, for the purpose of consistent and correct performance with a required function under stated conditions for a specified period of time. Failures are classified into two classes based on their intrinsic different effects on mobile agents. For each kind of failure, a specified handling method is adopted. The introduction of exceptional handling method allows performance improvements during mobile agents’ execution. The behaviors of mobile agents are statistically analyzed through several key parameters, including the migration time from node to node, the life expectancy of mobile agents, and the population distribution of mobile agents, to evaluate the performance of our model. The analytical results give new theoretical insights to the fault-tolerant execution of mobile agents and show that our model outperforms the existing fault-tolerant models. Our model provides an effective way to improve the reliability of computer systems. 相似文献
62.
The information resources on the Web are diversified, the amount of which is increasing rapidly. Demands for selecting useful
information from the Internet, managing personal contents, and sharing contents under control have risen. In this study, we
propose the Ubiquitous Personal Study, a framework of personalized virtual study to support accessing, managing, organizing,
sharing and recommending information. In this paper, we focus on discussing the framework, and design and implementation issues
on how to implement it with Web 2.0 mash-up technology and Open Source Software. 相似文献
63.
压缩应力下(Tb,Dy)Fe2磁致伸缩的研究 总被引:5,自引:0,他引:5
本文利用自制的磁致伸缩测量仪和“jump”效应测量仪研究了在一定压强了多晶(Tb、Dy)Fe2棒的磁致伸缩,发现加压时,在一定工艺条件下制作的(Tb、Dy)Fe2棒会有磁致伸缩的变化。卸载后经过热处理,磁致伸缩值在不加压时也会维持一个高值。 相似文献
64.
Changmin Lee Youngjae Hong Dongho Kim Younghwan Lim Jang Wook Choi Sung-Yoon Chung 《Advanced functional materials》2023,33(44):2303763
Protons in aqueous electrolytes can perform as an additional type of charge carrier for insertion/extraction in addition to the primary carrier cations in aqueous rechargeable batteries. Despite many diverse claims regarding the effect of protons, mutually conflicting experimental results and their interpretations without direct evidence have been reported over the last decade. Systematic examinations and analyses are thus imperative to clarify the conditions of proton insertion in aqueous rechargeable batteries. Utilizing V2O5 as a model cathode and beaker-type cells with a sufficient amount of ZnSO4 aqueous electrolytes in this work, it is demonstrated that protons are inserted into the cathode prior to Zn-ions in low-pH conditions (pH ≤ 3.0). In stark contrast, the influence of protons on the discharge voltage and capacity is insignificant, when either the pH becomes higher (pH ≥ 4.0) or the electrolyte volume is considerably low in coin-type cells. Similar behavior of pH-dependent proton insertion is also verified in Na–, Mg–, and Al-ion electrolytes. Providing a resolution to the controversy regarding proton insertion, the present study emphasizes that the influence of protons substantially varies depending on the pH and relative volume of electrolytes in aqueous batteries. 相似文献
65.
The Journal of Supercomputing - We argue the agent’s low generalization problem for searching target object in challenging visual navigation could be solved by "how" and... 相似文献
66.
Sun Kaili Li Yuan Zhang Huyin Guo Chi Yuan Linfei Hu Quan 《The Journal of supercomputing》2022,78(14):16529-16552
The Journal of Supercomputing - In the literature, most previous studies on English implicit inter-sentence relation recognition only focused on semantic interactions, which could not exploit the... 相似文献
67.
在分析了数字版权研究现状和功能框架的基础上,设计了基于多重数字水印和密码的版权管理模型;该模型采用数字内容和许可证各自单独封装、独立分发的方式,使得只有购买了许可证的特定用户才能使用数字内容,实现了水印作品的许可交易;另外,内容服务器采用的对数字作品加载两次水印,对数字内容部分签名加密,未加密部分签名的方案,在有效保证数字内容安全传输的基础上又减少了计算量和存储量;分析表明该模型有显著的优点和很好的安全性。 相似文献
68.
Sangmun Shin Nguyen Khoa Viet Truong Byung Rae Cho Sung Hoon Hong 《Computers & Industrial Engineering》2011
Robust design (RD) and tolerance design (TD) have received much attention from researchers and practitioners for more than two decades, and a number of methodologies for modeling and optimizing the RD and TD processes have been studied. However, there is ample room for improvement. Because most existing research considers RD and TD as separate research fields, the primary objective of this paper is to develop a sequential robust–tolerance design method to jointly determine the best factor settings and the closed-form solutions for the optimal specification limits. We then apply the proposed method to a destructive quality characteristic. Finally, a case study and sensitivity analyses are performed for verification purposes, and further studies are discussed. 相似文献
69.
Information Seeking Can Be Social 总被引:3,自引:0,他引:3
For reasons ranging from obligation to curiosity, users have a strong inclination to seek information from others during the search process. Search systems using statistical analytics over traces left behind by others can help support the search experience. 相似文献
70.