全文获取类型
收费全文 | 21881篇 |
免费 | 1216篇 |
国内免费 | 60篇 |
专业分类
电工技术 | 311篇 |
综合类 | 25篇 |
化学工业 | 4898篇 |
金属工艺 | 882篇 |
机械仪表 | 1301篇 |
建筑科学 | 426篇 |
矿业工程 | 7篇 |
能源动力 | 865篇 |
轻工业 | 1851篇 |
水利工程 | 91篇 |
石油天然气 | 16篇 |
无线电 | 3661篇 |
一般工业技术 | 4632篇 |
冶金工业 | 1541篇 |
原子能技术 | 292篇 |
自动化技术 | 2358篇 |
出版年
2024年 | 22篇 |
2023年 | 275篇 |
2022年 | 399篇 |
2021年 | 688篇 |
2020年 | 470篇 |
2019年 | 497篇 |
2018年 | 699篇 |
2017年 | 661篇 |
2016年 | 768篇 |
2015年 | 602篇 |
2014年 | 939篇 |
2013年 | 1390篇 |
2012年 | 1459篇 |
2011年 | 1791篇 |
2010年 | 1300篇 |
2009年 | 1332篇 |
2008年 | 1213篇 |
2007年 | 940篇 |
2006年 | 813篇 |
2005年 | 708篇 |
2004年 | 638篇 |
2003年 | 589篇 |
2002年 | 594篇 |
2001年 | 517篇 |
2000年 | 437篇 |
1999年 | 423篇 |
1998年 | 709篇 |
1997年 | 420篇 |
1996年 | 396篇 |
1995年 | 257篇 |
1994年 | 169篇 |
1993年 | 151篇 |
1992年 | 113篇 |
1991年 | 100篇 |
1990年 | 75篇 |
1989年 | 88篇 |
1988年 | 74篇 |
1987年 | 63篇 |
1986年 | 51篇 |
1985年 | 43篇 |
1984年 | 36篇 |
1983年 | 28篇 |
1982年 | 31篇 |
1981年 | 26篇 |
1980年 | 29篇 |
1979年 | 13篇 |
1977年 | 22篇 |
1976年 | 33篇 |
1975年 | 17篇 |
1974年 | 13篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
241.
Biofouling control by quorum sensing (QS) inhibition and the influence of membrane surface characteristics on biofilm formation and QS inhibition were investigated. Pseudomonas putida isolated from the bio-fouled reverse osmosis (RO) membranes in a real plant was used. Acylase was chosen as a model QS inhibitor. Bacteria on the membrane coupons were quantified with the heterotrophic plate count method. Cell distribution was imaged by a confocal laser scanning microscope. Results showed that biofilm formation on the membrane was reduced by acylase as it inhibits the activity of N-acylhomoserine lactone (AHL) which is a signal molecule of QS. It was also shown that membrane surface characteristics were influential factors affecting bacterial adhesion, biofilm formation, and QS inhibition. 相似文献
242.
We consider a problem of finding a path of an unmanned combat vehicle that patrols a given area by visiting a given set of checkpoints with the objective of minimizing possibility of enemy’s infiltration. In this study, we focus on a situation in which the possibility of enemy’s infiltration at (through) each checkpoint is increased nonlinearly as time passes and the checkpoint may be patrolled multiple times during a planning horizon. We develop two-phase heuristics in which an initial path is constructed in the first phase and then it is improved in the second phase. For evaluation of the performance of the proposed heuristics, computational experiments are performed on randomly generated problem instances, and results show that the heuristics give good solutions in a reasonably short time. 相似文献
243.
Social media services such as YouTube and Flickr have become online necessities for millions of users worldwide. Social media are online services that enable users to share contents, opinions, and perspectives that support communication with other users. Social media places an emphasis on the shared experience between users, which we call co-experience. However, the online characteristics of social media increase psychological distance between users, which, in turn, results in a decrease in the quality of co-experience. Hence, as the goal of this study, we theoretically modeled and empirically verified the antecedents and user experience-based consequences of psychological distance in a social media-enhanced real-time streaming video service. In order to reduce psychological distance, we introduced two system elements: inhabited space (the degree of being situated in context and in a meaningful place) and isomorph effects (the degree of preserving the structure of a user’s actions). We constructed a social media-enhanced real-time streaming video service prototype and conducted a field experiment with actual social media users. The prototype, which streamed a live baseball game, enabled users to simultaneously view the game from remote locations and to interact with each other through cheering tools. The results indicate that inhabited space and isomorph effects reduce psychological distance between users, and this, in turn, enhances co-experience. This paper ends with theoretical as well as practical implications of the study. 相似文献
244.
Currently, embedded systems have been widely used for ubiquitous computing environments including digital setup boxes, mobile
phones, and USN (Ubiquitous Sensor Networks). The significance of security has been growing as it must be necessarily embedded
in all these systems. Up until now, many researchers have made efforts to verify the integrity of applied binaries downloaded
in embedded systems. The research of problem solving is organized into hardware methods and software-like methods. In this
research, the basic approach to solving problems from the software perspective was employed. From the software perspective,
unlike in the existing papers (Seshadri et al., Proc. the IEEE symposium on security and privacy, 2004; Seshadri et al., Proc. the symposium on operating systems principals, 2005) based on the standardized model (TTAS.KO-11.0054.
2006) publicized in Korea, there is no extra verifier and conduct for the verification function in the target system. Contrary
to the previous schemes (Jung et al. , 2008; Lee et al., LNCS, vol. 4808, pp. 346–355, 2007), verification results are stored in 1 validation check bit, instead of storing signature value for application binary files
in the i-node structure for the purpose of reducing run-time execution overhead. Consequently, the proposed scheme is more
efficient because it dramatically reduces overhead in storage space, and when it comes to computing, it performs one hash
algorithm for initial execution and thereafter compares 1 validation check bit only, instead of signature and hash algorithms
for every application binary. Furthermore, in cases where there are frequent changes in the i-node structure or file data
depending on the scheme application, the scheme can provide far more effective verification performance compared to the previous
schemes. 相似文献
245.
Sangseok Yun Bongjin Jun Daijin Kim Jaewoong Kim Sukhan Lee Mun-Taek Choi Munsang Kim Joong-Tae Park Jae-Bok Song 《Journal of Intelligent and Robotic Systems》2012,67(2):79-99
This paper describes a scheme for proactive human search for a designated person in an undiscovered indoor environment without human operation or intervention. In designing and developing human identification with prior information a new approach that is robust to illumination and distance variations in the indoor environment is proposed. In addition, a substantial exploration method with an octree structure, suitable for path planning in an office configuration, is employed. All these functionalities are integrated in a message- and component-based architecture for the efficient integration and control of the system. This approach is demonstrated by succeeding human search in the challenging robot mission of the 2009 Robot Grand Challenge Contest. 相似文献
246.
Seok-Ho Yoon Jung-Hwan Shin Sang-Wook Kim Sunju Park Jae Bum Lee 《Information Sciences》2012,184(1):215-229
In the blogosphere, there exist posts relevant to a particular subject and blogs that show interest in the subject. In this paper, we define a set of such posts and blogs as a blog community and propose a method for extracting the blog community associated with a particular subject. The proposed method is based on the idea that the blogs who have performed actions (e.g., read, comment, trackback, scrap) to the posts of a particular subject are the ones with interest in the subject, and that the posts that have received actions from such blogs are the ones that contain the subject. The proposed method starts with a small number of manually-selected seed posts containing the subject. Then, the method selects the blogs that have performed actions to the seed posts over some threshold and the posts that have received actions over some threshold. Repeating these two steps gradually expands the blog community. This paper presents various techniques to improve the accuracy of the proposed method. The experimental results show that the proposed method exhibits a higher level of accuracy than the methods proposed in prior research. This paper also discusses business applications of the extracted community, such as target marketing, market monitoring, improving search results, finding power bloggers, and revitalization of the blogosphere. 相似文献
247.
Object tracking is crucial to surveillance systems, which provide target information including position, size, and velocity. This paper presents a data association process combining two primary components of visual features and spatiotemporal prediction. In addition, the change perception and the visual distinguishability are utilized to adaptively combine the two primary components. The proposed spatiotemporal prediction is performed on several consecutive frames in order to cover the irregular motion of targets. The prediction is then filtered with a change perception mask to determine whether the candidate observations have motion or not. In addition, the level of contribution of a visual feature is adjusted by the proposed distinguishability to maintain a reward-penalty balance. The proposed method is applied to various video sequences having small targets and abrupt motions, and the experimental results show consistent tracking performance. 相似文献
248.
Intelligent service robots provide various services to users by understanding the context and goals of a user task. In order to provide more reliable services, intelligent service robots need to consider various factors, such as their surrounding environments, users' changing needs, and constrained resources. To handle these factors, most of the intelligent service robots are controlled by a task‐based control system, which generates a task plan that represents a sequence of actions, and executes those actions by invoking the corresponding functions. However, the traditional task‐based control systems lack the consideration of resource factors even though intelligent service robots have limited resources (limited computational power, memory space, and network bandwidth). Moreover, system‐specific concerns such as the relationships among functional modules are not considered during the task generation phase. Without considering both the resource conditions and interdependencies among software modules as a whole, it will be difficult to efficiently manage the functionalities that are essential to provide core services to users. In this paper, we propose a mechanism for intelligent service robots to efficiently use their resources on‐demand by separating system‐specific information from task generation. We have defined a sub‐architecture that corresponds to each action of a task plan, and provides a way of using the limited resources by minimizing redundant software components and maintaining essential components for the current action. To support the optimization of resource consumption, we have developed a two‐phase optimization process, which is composed of the topological and temporal optimization steps. We have conducted an experiment with these mechanisms for an infotainment robot, and simulated the optimization process. Results show that our approach contributed to increase the utilization rate by 20% of the robot resources. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
249.
Kyoung-Su Park Geonyup Lim Young-Pil Park Eo-Jin Hong No-Cheol Park 《Microsystem Technologies》2012,18(9-10):1389-1399
Currently, almost all hard disk drives (HDDs) have adopted a loading/unloading mechanism that increases their recording capacity and improves their reliability. However, these mechanisms still create a few scratches or defects in the loading/unloading zone. Slipping at the dimple–flexure interface was recently reported as one of the causes. In this research, we first analyzed the relative behavior of dimple–flexure based on fretting wear marks. We determined that the dimple–flexure behavior included both slipping and rotating motion simultaneously. We then verified the distinct slipping and rolling phenomenon at the moment of ramp contact using finite-element method (FEM) analysis. An experimental setup was constructed, and an unloading experiment was carried out to obtain the ramp contact characteristics corresponding to various unloading velocities. Based on the verified FEM, the characteristics of dimple–flexure relative behavior were investigated for various suspension design parameters, ramp contact characteristics, and unloading velocities. A higher ramp contact force and shorter contact duration resulted in larger slip displacements and roll angles between the dimple and the flexure. Finally, we analyzed the unloading performance of an HDD for various design parameters using quasi-static approximation while considering the relative behavior between the dimple and flexure. The quasi-static analysis indicated a change of approximately 15?% in the flying height at an unloading velocity of 40?in. per second when the relative motion between the dimple and flexure was considered during the unloading process. Even, slider–disk contact occurred at an unloading velocity of 50 ISP. 相似文献
250.
Sangjin Sung Gunhee Jang Kyungjin Kang Jiyeon Kim Dohyun Park Donghun Choi 《Microsystem Technologies》2012,18(9-10):1359-1364
A conventional hard disk drive (HDD) spindle motor has a pulling plate to generate the axial magnetic force. However, the pulling plate consumes significant amount of iron loss due to the alternating magnetic field on the pulling plate. We propose the new design of a HDD spindle motor with pulling magnet to generate the pre-load as well as to eliminate the iron loss of the pulling plate. We also develop an optimal design methodology to minimize iron and copper losses from the spindle motor of a computer HDD while maintaining the same level of torque ripple and pulling force. The new design is optimized by the developed optimal design methodology. A metamodel is constructed from the three-dimensional finite element analysis of the magnetic field and the meta-modeling techniques, and the accuracies of the metamodels are discussed. The proposed optimal design problem is solved by the progressive quadratic approximation method. The proposed design reduces the electrical loss of the HDD spindle motor by 30.42?% while maintaining the same level of torque ripple and pulling force. 相似文献