全文获取类型
收费全文 | 2447篇 |
免费 | 133篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 32篇 |
综合类 | 9篇 |
化学工业 | 702篇 |
金属工艺 | 36篇 |
机械仪表 | 77篇 |
建筑科学 | 110篇 |
矿业工程 | 2篇 |
能源动力 | 96篇 |
轻工业 | 297篇 |
水利工程 | 9篇 |
石油天然气 | 5篇 |
武器工业 | 1篇 |
无线电 | 233篇 |
一般工业技术 | 445篇 |
冶金工业 | 108篇 |
原子能技术 | 21篇 |
自动化技术 | 403篇 |
出版年
2024年 | 3篇 |
2023年 | 22篇 |
2022年 | 106篇 |
2021年 | 182篇 |
2020年 | 65篇 |
2019年 | 68篇 |
2018年 | 91篇 |
2017年 | 75篇 |
2016年 | 80篇 |
2015年 | 75篇 |
2014年 | 118篇 |
2013年 | 176篇 |
2012年 | 120篇 |
2011年 | 185篇 |
2010年 | 137篇 |
2009年 | 119篇 |
2008年 | 126篇 |
2007年 | 111篇 |
2006年 | 96篇 |
2005年 | 69篇 |
2004年 | 65篇 |
2003年 | 62篇 |
2002年 | 59篇 |
2001年 | 38篇 |
2000年 | 26篇 |
1999年 | 31篇 |
1998年 | 40篇 |
1997年 | 38篇 |
1996年 | 27篇 |
1995年 | 22篇 |
1994年 | 16篇 |
1993年 | 14篇 |
1992年 | 7篇 |
1991年 | 5篇 |
1990年 | 7篇 |
1989年 | 9篇 |
1988年 | 6篇 |
1987年 | 3篇 |
1985年 | 6篇 |
1984年 | 17篇 |
1983年 | 7篇 |
1982年 | 8篇 |
1981年 | 5篇 |
1980年 | 6篇 |
1979年 | 7篇 |
1977年 | 5篇 |
1976年 | 3篇 |
1974年 | 4篇 |
1967年 | 3篇 |
1966年 | 3篇 |
排序方式: 共有2586条查询结果,搜索用时 352 毫秒
11.
Original studies on gust factor buffeting dealt with the alongwind displacement of structures. Research on this topic carried out since the nineties followed two distinct lines: the first determines the maximum effects due to the alongwind response; the second extends the original method from the alongwind response to crosswind and torsional responses. This paper represents the junction point of these research lines with reference to cantilever slender vertical structures. It derives the most relevant effects associated with the three-dimensional (3-D) wind-excited response of this structural type and shows that a suitable definition of one non-dimensional quantity, referred to as the 3-D gust effect factor, provides such effects at any level through a wide set of experimental, numerical and analytical procedures. A new definition of a 3-D equivalent static force consistent with this method is also introduced and critically compared with previous analogous statements. 相似文献
12.
The problem of the non-causal inversion of linear multivariable discrete-time systems is analyzed in the geometric approach framework and is solved through the computation of convolution profiles which guarantee perfect tracking under the assumption of infinite-length preaction and postaction time intervals. It is shown how the shape of the convolution profiles is related to both the relative degree and the invariant zeros of the plant. A computational setting for the convolution profiles is derived by means of the standard geometric approach tools. Feasibility constraints are also taken into account. A possible implementation scheme, based on a finite impulse response system acting on a stabilized control loop, is provided. 相似文献
13.
Giovanni L. Santosuosso Patrizio Tomei 《International Journal of Adaptive Control and Signal Processing》2002,16(9):619-634
In this paper, we consider a class of non‐linear systems in which a set of constant parameters is unknown and some state variables are not available for measurement. For such systems we provide a constructive procedure for the solution of the global adaptive tracking problem with dynamic partial state feedback. We illustrate an application of the control strategy to the adaptive non‐linear friction compensation of a DC motor servomechanism. We improve previous results in tow directions: we allow for a subset of the unmeasurable states to enter in a system non‐linearly; we consider systems which are linearly parametrized with respect to a set of unknown constant parameters. Copyright © 2002 John Wiley & Sons, Ltd. 相似文献
14.
Giovanni Giambene Enrico Zoli 《International Journal of Satellite Communications and Networking》2003,21(2):199-225
In this paper, we investigate a packet access scheme that is able to support mixed traffics in the presence of high propagation delays. Referring to a Time‐Code Division Multiple Access air interface, we propose a Medium Access Control (MAC) protocol based on a random access scheme. A successful attempt grants the use of a slot‐code resource. This protocol is named Adaptive Time Code‐Packet Reservation Multiple Access (ATC‐PRMA), since the access parameters are changed, depending on the traffic load conditions, so as to fulfil Quality of Service requirements. Numerical examples are carried out for the Low Earth Orbit (LEO)‐Mobile Satellite System (MSS) scenario, but all these considerations could be applied to High‐Altitude Platform Stations (HAPSs) as well. In both cases, high propagation delays prevent an immediate feedback to users. An analytical approach is proposed to study the stability of our MAC scheme. Accordingly, we define a criterion for optimizing system performance. The predicted ATC‐PRMA behaviour is supported by simulation results. Finally, we show the performance improvement of ATC‐PRMA with respect to a MAC protocol not employing adaptive parameters. Copyright © 2003 John Wiley & Sons, Ltd. 相似文献
15.
Giovanni Maizza Salvatore Grasso Yoshio Sakka Tetsuji Noda Osamu Ohashi 《Science and Technology of Advanced Materials》2007,8(7-8):644
A combined experimental/numerical methodology is developed to fully consolidate pure ultrafine WC powder under a current-control mode. Three applied currents, 1900, 2100 and 2700 A, and a constant pressure of 20 MPa were employed as process conditions. The developed spark plasma sintering (SPS) finite-element model includes a moving-mesh technique to account for the contact resistance change due to sintering shrinkage and punch sliding. The effects of the heating rate on the microstructure and hardness were investigated in detail along the sample radius from both experimental and modeling points of view. The maximum hardness (2700 HV10) was achieved for a current of 1900 A at the core sample, while the maximum densification was achieved for 2100 and 2700 A. A direct relationship between the compact microstructure and both the sintering temperature and the heating rate was established. 相似文献
16.
G Zaninotto M Costantini M Rossi M Anselmino S Pianalto D Oselladore D Pizzato L Norberto E Ancona 《Canadian Metallurgical Quarterly》1996,10(6):644-648
BACKGROUND: On the basis of a flowchart including prior or current jaundice or pancreatitis, abnormal liver function, ultrasound or IV cholangiography, bile duct (BD) stones were suspected in 71/593 patients referred for gallstones. METHODS: When endoscopic retrograde cholangiography detected BD stones, endoscopic sphincterotomy (ES) and endoscopic BD clearance were attempted, followed by laparoscopic cholecystectomy (LC). BD stones were found in 44/71 patients. The sensitivity values of preoperative conditions were: 92% for IV cholangiography, 88% for abnormal liver function, 50% for ultrasound, and 37% for jaundice at admission. RESULTS: Endoscopic clearance succeeded in 37 patients and LC was completed in 33 patients. Conversion to open surgery (9%) was comparable with the rate in patients without BD stones. The median hospital stay for the sequential endoscopic and laparoscopic treatments was 13 days (range 4-54) or 22 days if open surgery was used. CONCLUSIONS: In conclusion, BD stones can be endoscopically cleared preoperatively in most patients without interfering with LC. 相似文献
17.
Marco Lucamarini Alessandro Ceré Giovanni Di Giuseppe Stefano Mancini David Vitali Paolo Tombesi 《Open Systems & Information Dynamics》2007,14(2):169-178
The security of a deterministic quantum scheme for communication, namely the LM05 [1], is studied in presence of a lossy channel
under the assumption of imperfect generation and detection of single photons. It is shown that the scheme allows for a rate
of distillable secure bits higher than that pertaining to BB84 [2]. We report on a first implementation of LM05 with weak
pulses. 相似文献
18.
Exploiting timed automata based fuzzy controllers for designing adaptive intrusion detection systems
Giovanni Acampora 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2012,16(7):1183-1196
Network intrusion detection systems (NIDSs) are pattern recognition problems that classify network traffic patterns as either ‘normal’ or ‘abnormal’. Precisely, the main aim of intrusion detection is to identify unauthorized use, misuse, and abuse of computers by detecting malicious network activities such as port scans, denial of service or other attempts to crack computer network environments. Even though the incorporation of conventional Soft Computing techniques in NIDSs has yielded to good solutions, the strong dynamism characterizing network intrusion patterns tend to invalidate the usability of existing framework. To tackle this issue, our proposal performs an adaptive supervised learning on a collection of time series that characterizes the network behavior to create a so-called timed automata-based fuzzy controller (TAFC), i.e. an evolvable fuzzy controller whose dynamic features allow to design an advanced network intrusion detection system able to directly deal with computer network dynamism and support networks’ administrators to prevent eventual damages coming from unauthorized network intrusion. As will be shown in experiments, where our approach has been compared with a conventional Mamdani fuzzy controller, the proposed system reduces the detection error and, as consequence, improves the computer network robustness. 相似文献
19.
The publish/subscribe model offers a loosely-coupled communication paradigm where applications interact indirectly and asynchronously. Publishers generate events that are sent to interested applications through a network of brokers. Subscribers express their interest by specifying filters that brokers can use for routing the events. Supporting confidentiality of messages being exchanged is still challenging. First of all, it is desirable that any scheme used for protecting the confidentiality of both the events and filters should not require publishers and subscribers to share secret keys. In fact, such a restriction is against the loose-coupling of the model. Moreover, such a scheme should not restrict the expressiveness of filters and should allow the broker to perform event filtering to route the events to the interested parties. Existing solutions do not fully address these issues. In this paper, we provide a novel scheme that supports (i) confidentiality for events and filters; (ii) allows publishers to express further constraints about who can access their events; (iii) filters that can express very complex constraints on events even if brokers are not able to access any information in clear on both events and filters; (iv) and, finally, it does not require publishers and subscribers to share keys. Furthermore, we show how we applied our scheme to a real-world e-health scenario, developed together with a hospital. We also describe the implementation of our solution in Java and the integration with an existing publish/subscribe system. 相似文献
20.
Francesca Truzzi Camilla Tibaldi Anne Whittaker Silvia Dilloo Enzo Spisni Giovanni Dinelli 《International journal of molecular sciences》2021,22(1)
There is a need to assess the relationship between improved rheological properties and the immunogenic potential of wheat proteins. The present study aimed to investigate the in vitro effects of total protein extracts from three modern and two landrace Triticum aestivum commercial flour mixes, with significant differences in gluten strength (GS), on cell lines. Cytotoxicity and innate immune responses induced by wheat proteins were investigated using Caco-2 monocultures, two dimensional (2D) Caco-2/U937 co-cultures, and three dimensional (3D) co-cultures simulating the intestinal mucosa with Caco-2 epithelial cells situated above an extra-cellular matrix containing U937 monocytes and L929 fibroblasts. Modern wheat proteins, with increased GS, significantly reduced Caco-2 cell proliferation and vitality in monoculture and 2D co-cultures than landrace proteins. Modern wheat proteins also augmented Caco-2 monolayer disruption and tight junction protein, occludin, redistribution in 3D co-cultures. Release of interleukin-8 into the cell medium and increased U937 monocyte migration in both 2D and 3D co-cultures were similarly apparent. Immuno-activation of migrating U937 cells was evidenced from cluster of differentiation 14 (CD14) staining and CD11b-related differentiation into macrophages. The modern wheat proteins, with gluten polymorphism relatedness and increased GS, were shown to be more cytotoxic and immunogenic than the landrace wheat proteins. 相似文献