全文获取类型
收费全文 | 3004篇 |
免费 | 71篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 30篇 |
综合类 | 1篇 |
化学工业 | 387篇 |
金属工艺 | 42篇 |
机械仪表 | 49篇 |
建筑科学 | 158篇 |
矿业工程 | 114篇 |
能源动力 | 70篇 |
轻工业 | 240篇 |
水利工程 | 30篇 |
石油天然气 | 9篇 |
无线电 | 232篇 |
一般工业技术 | 456篇 |
冶金工业 | 929篇 |
原子能技术 | 27篇 |
自动化技术 | 302篇 |
出版年
2022年 | 15篇 |
2021年 | 41篇 |
2020年 | 35篇 |
2019年 | 48篇 |
2018年 | 54篇 |
2017年 | 44篇 |
2016年 | 45篇 |
2015年 | 41篇 |
2014年 | 73篇 |
2013年 | 182篇 |
2012年 | 84篇 |
2011年 | 141篇 |
2010年 | 93篇 |
2009年 | 100篇 |
2008年 | 103篇 |
2007年 | 102篇 |
2006年 | 104篇 |
2005年 | 90篇 |
2004年 | 87篇 |
2003年 | 65篇 |
2002年 | 86篇 |
2001年 | 59篇 |
2000年 | 47篇 |
1999年 | 58篇 |
1998年 | 208篇 |
1997年 | 140篇 |
1996年 | 97篇 |
1995年 | 70篇 |
1994年 | 64篇 |
1993年 | 64篇 |
1992年 | 39篇 |
1991年 | 30篇 |
1990年 | 30篇 |
1989年 | 31篇 |
1988年 | 32篇 |
1987年 | 34篇 |
1986年 | 31篇 |
1985年 | 34篇 |
1984年 | 27篇 |
1983年 | 19篇 |
1982年 | 36篇 |
1981年 | 31篇 |
1980年 | 29篇 |
1979年 | 20篇 |
1978年 | 20篇 |
1977年 | 30篇 |
1976年 | 48篇 |
1975年 | 9篇 |
1974年 | 13篇 |
1972年 | 15篇 |
排序方式: 共有3076条查询结果,搜索用时 15 毫秒
31.
Fatty acid and cholesterol synthesis in isolated rat hepatocytes were strongly inhibited by 5-(tetradecyloxy)-2-furoic acid.
With either3H2O or [2-14C]acetate as the labeled precursor, the concentrations of inhibitor causing 50% decrease in fatty acid and cholesterol synthesis
were, respectively, <0.005 mM and 0.020 mM. At 0.1 mM inhibitor, citrate concentration in cells from fed rats was increased
by 75%; lactate and pyruvate concentrations were decreased by 30%; ethanol oxidation was decreased by 20%; with cells from
starved rats, the mitochondrial [NAD+]/[NADH] was decreased. Other parameters were unaffected. Both its potency and its specificity indicate that 5-(tetradecyloxy)-2-furoic
acid will be useful in studies on the regulation of lipid biosynthesis. 相似文献
32.
We describe Social Reader, a feed-reader-plus-social-network aggregator that mines comments from social media in order to display a user’s relational neighborhood as a navigable social network. Social Reader’s network visualization enhances mutual awareness of blogger communities, facilitates their exploration and growth with a fully dragn- drop interface, and provides novel ways to filter and summarize people, groups, blogs and comments. We discuss the architecture behind the reader, highlight tasks it adds to the workflow of a typical reader, and assess their cost. We also explore the potential of mood-based features in social media applications. Mood is particularly relevant to social media, reflecting the personal nature of the medium. We explore two prototype mood-based features: colour coding the mood of recent posts according to a valence/arousal map, and a mood-based abstract of recent activity using image media. A six week study of the software involving 20 users confirmed the usefulness of the novel visual display, via a quantitative analysis of use logs, and an exit survey. 相似文献
33.
Pick a binary string of length n and remove its first bit b. Now insert b after the first remaining 10, or insert $\overline{b}$ at the end if there is no remaining 10. Do it again. And again. Keep going! Eventually, you will cycle through all 2 n of the binary strings of length n. For example, are the binary strings of length n=4, where and . And if you only want strings with weight (number of 1s) between ? and u? Just insert b instead of $\overline{b}$ when the result would have too many 1s or too few 1s. For example, are the strings with n=4, ?=0 and u=2. This generalizes ‘cool-lex’ order by Ruskey and Williams (The coolest way to generate combinations, Discrete Mathematics) and we present two applications of our ‘cooler’ order. First, we give a loopless algorithm for generating binary strings with any weight range in which successive strings have Levenshtein distance two. Second, we construct de Bruijn sequences for (i) ?=0 and any u (maximum specified weight), (ii) any ? and u=n (minimum specified weight), and (iii) odd u?? (even size weight range). For example, all binary strings with n=6, ?=1, and u=4 appear once (cyclically) in . We also investigate the recursive structure of our order and show that it shares certain sublist properties with lexicographic order. 相似文献
34.
The construction of dams significantly alters flow and sediment regimes with subsequent deleterious effects on the morphological and ecological character of rivers. Effective experimental floods can ameliorate the downstream geomorphic impacts of dams. The traditional view is that large floods are required to perform effective geomorphic work, and the geomorphic outcomes of small floods are often overlooked. Many river restoration frameworks do not consider small floods. Yet, there is evidence that the hydrological characteristics that ameliorate specific geomorphic impacts in a river are unique to each river, and a customised approach to setting the right mix of floods (including small experimental floods) is needed. In this study, we modify an existing flood effectiveness model developed for large floods, for determining the geomorphic effectiveness of small floods in a highly regulated Australian river. Two flood classes were added to the model (medium peak stream power and moderate total energy expenditure), and the flood power characteristics were rescaled to reflect the relative difference in the magnitude of the small floods and the magnitude of the geomorphic work performed. Using a step‐wise approach, this customised model determined the geomorphic effectiveness of small floods. The best flood for ameliorating the geomorphic impacts of flow regulation had medium to long duration (10 to 51 days), high peak unit stream power (77 to 123 Wm?2) and moderate to large total energy expenditure (78,600 to 342,320 × 103 J). This approach to determining flood effectiveness for small floods is applicable to other geomorphically impacted river channels downstream of dams and can be used to inform experimental flood releases for geomorphic outcomes. 相似文献
35.
Dinh Phung Brett Adams Svetha Venkatesh Mohan Kumar 《Pervasive and Mobile Computing》2009,5(6):714-733
The sensing context plays an important role in many pervasive and mobile computing applications. Continuing from previous work [D. Phung, B. Adams, S. Venkatesh, Computable social patterns from sparse sensor data, in: Proceedings of First International Workshop on Location Web, World Wide Web Conference (WWW), New York, NY, USA, 2008, ACM 69–72.], we present an unsupervised framework for extracting user context in indoor environments with existing wireless infrastructures. Our novel approach casts context detection into an incremental, unsupervised clustering setting. Using WiFi observations consisting of access point identification and signal strengths freely available in office or public spaces, we adapt a density-based clustering technique to recover basic forms of user contexts that include user motion state and significant places the user visits from time to time. High-level user context, termed rhythms, comprising sequences of significant places are derived from the above low-level context by employing probabilistic clustering techniques, latent Dirichlet allocation and its n-gram temporal extension. These user contexts can enable a wide range of context-ware application services. Experimental results with real data in comparison with existing methods are presented to validate the proposed approach. Our motion classification algorithm operates in real-time, and achieves a 10% improvement over an existing method; significant locations are detected with over 90% accuracy and near perfect cluster purity. Richer indoor context and meaningful rhythms, such as typical daily routines or meeting patterns, are also inferred automatically from collected raw WiFi signals. 相似文献
36.
Debra L. Cook Moti Yung Angelos D. Keromytis 《International Journal of Information Security》2009,8(3):211-231
We introduce the concept of an elastic block cipher which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while
incurring a computational workload that is proportional to the block size. Our method uses the round function of an existing
block cipher as a black box and inserts it into a substitution- permutation network. Our method is designed to enable us to
form a reduction between the elastic and the original versions of the cipher. Using this reduction, we prove that the elastic
version of a cipher is secure against key-recovery attacks if the original cipher is secure against such attacks. We note
that while reduction-based proofs of security are a cornerstone of cryptographic analysis, they are typical when complete
components are used as sub-components in a larger design. We are not aware of the use of such techniques in the case of concrete
block cipher designs. We demonstrate the general applicability of the elastic block cipher method by constructing examples
from existing block ciphers: AES, Camellia, MISTY1, and RC6. We compare the performance of the elastic versions to that of
the original versions and evaluate the elastic versions using statistical tests measuring the randomness of the ciphertext.
We also use our examples to demonstrate the concept of a generic key schedule for block ciphers.
相似文献
Angelos D. KeromytisEmail: |
37.
The paper discusses a series of driving trials that were conducted to investigate postural stability of disabled drivers and to assess the effectiveness of a representative sample of support aids. Twenty-three disabled drivers with varying levels of physical disability and seven non disabled drivers participated in the study. The test car was equipped with transducers to measure vehicle velocity and acceleration (longitudinal and lateral), steering wheel movement and torque, and the bracing forces exerted by the driver on the steering wheel. Video cameras were installed to record postural support strategies and displacement of the driver and to record deviation of the car from the specified path. Subjective data regarding driver attitudes and acceptance were also collected through the administration of questionnaires. Findings from the study showed that support aids significantly improved driving performance and reduced physical exertion to maintain an upright driving position for disabled drivers. However, ergonomics design aspects regarding the ease of use and acceptance of the support aids by the end users were identified as obstacles to their sustained use in everyday driving. 相似文献
38.
39.
L. P. Cook W. Wong-Ng P. Paranthaman 《Journal of research of the National Institute of Standards and Technology》1996,101(5):675-689
The melting and vaporization of the 1223 [(Tl,Pb):(Ba,Sr):Ca:Cu] oxide phase in the system (Tl-Pb-Ba-Sr-Ca-Cu-O) have been investigated using a combination of dynamic methods (differential thermal analysis, thermogravimetry, effusion) and post-quenching characterization techniques (powder x-ray diffraction, scanning electron microscopy, energy dispersive x-ray spectrometry). Vaporization rates, thermal events, and melt compositions were followed as a function of thallia loss from a 1223 stoichiometry. Melting and vaporization equilibria of the 1223 phase are complex, with as many as seven phases participating simultaneously. At a total pressure of 0.1 MPa the 1223 phase was found to melt completely at (980 ± 5) °C in oxygen, at a thallia partial pressure (pTl2O) of (4.6 ± 0.5) kPa, where the quoted uncertainties are standard uncertainties, i.e., 1 estimated standard deviation. The melting reaction involves five other solids and a liquid, nominally as follows:
Stoichiometries of the participating phases have been determined from microchemical analysis, and substantial elemental substitution on the 1212 and 1223 crystallographic sites is indicated. The 1223 phase occurs in equilibrium with liquids from its melting point down to at least 935 °C. The composition of the lowest melting liquid detected for the bulk compositions of this study has been measured using microchemical analysis. Applications to the processing of superconducting wires and tapes are discussed. 相似文献
40.
Erik Hollnagel’s body of work in the past three decades has molded much of the current research approach to system safety,
particularly notions of “error”. Hollnagel regards “error” as a dead-end and avoids using the term. This position is consistent
with Rasmussen’s claim that there is no scientifically stable category of human performance that can be described as “error”.
While this systems view is undoubtedly correct, “error” persists. Organizations, especially formal business, political, and
regulatory structures, use “error” as if it were a stable category of human performance. They apply the term to performances
associated with undesired outcomes, tabulate occurrences of “error”, and justify control and sanctions through “error”. Although
a compelling argument can be made for Hollnagel’s view, it is clear that notions of “error” are socially and organizationally
productive. The persistence of “error” in management and regulatory circles reflects its value as a means for social control. 相似文献