全文获取类型
收费全文 | 824篇 |
免费 | 30篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 8篇 |
综合类 | 2篇 |
化学工业 | 245篇 |
金属工艺 | 13篇 |
机械仪表 | 31篇 |
建筑科学 | 31篇 |
矿业工程 | 5篇 |
能源动力 | 30篇 |
轻工业 | 60篇 |
水利工程 | 11篇 |
石油天然气 | 9篇 |
无线电 | 92篇 |
一般工业技术 | 156篇 |
冶金工业 | 44篇 |
原子能技术 | 5篇 |
自动化技术 | 114篇 |
出版年
2025年 | 1篇 |
2024年 | 20篇 |
2023年 | 22篇 |
2022年 | 47篇 |
2021年 | 53篇 |
2020年 | 44篇 |
2019年 | 41篇 |
2018年 | 32篇 |
2017年 | 43篇 |
2016年 | 39篇 |
2015年 | 33篇 |
2014年 | 48篇 |
2013年 | 62篇 |
2012年 | 48篇 |
2011年 | 40篇 |
2010年 | 35篇 |
2009年 | 30篇 |
2008年 | 36篇 |
2007年 | 24篇 |
2006年 | 13篇 |
2005年 | 12篇 |
2004年 | 15篇 |
2003年 | 11篇 |
2002年 | 16篇 |
2001年 | 8篇 |
2000年 | 11篇 |
1999年 | 10篇 |
1998年 | 10篇 |
1997年 | 4篇 |
1996年 | 7篇 |
1995年 | 6篇 |
1994年 | 5篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 5篇 |
1990年 | 1篇 |
1987年 | 3篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 5篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
排序方式: 共有856条查询结果,搜索用时 140 毫秒
71.
72.
Gilani AG Moghadam M Zakerhamidi MS 《Computer methods and programs in biomedicine》2011,104(2):175-181
The purpose of this work is to introduce the reader to an Add-in implementation, Decom. This implementation provides the whole processing requirements for analysis of dimeric spectra. General linear and nonlinear decomposition algorithms were integrated as an Excel Add-in for easy installation and usage. In this work, the results of several samples investigations were compared to those obtained by Datan. 相似文献
73.
Mohammed Hawa Jamal S. Rahhal Dia I. Abu-Al-Nadi 《Peer-to-Peer Networking and Applications》2012,5(3):279-291
Peer-to-Peer (P2P) traffic has increased rapidly over the past few years, with file sharing providing the main drive behind
such traffic. In this work we perform a measurement study of the content shared over the popular BitTorrent P2P file sharing
network. We mathematically model the file size distributions of shared files after categorizing them into Audio, Video, Archive
and CD image classes. For each of these categories we look into the most popular shared file formats and investigate their
file size statistics. This provides an important milestone to building a realistic simulation framework for P2P systems, and
for future analytical modeling of P2P networks. 相似文献
74.
This qualitative study explored pre-service teachers' behavioral, normative, and control beliefs regarding their intentions to use Web 2.0 technologies in their future classrooms. The Theory of Planned Behavior (TPB) was used as the theoretical framework (Ajzen, 1991) to understand these beliefs and pre-service teachers' intentions for why they want to use Web 2.0 technologies. According to Ajzen's TPB, the behavioral beliefs are based on attitude toward outcomes or consequences of using Web 2.0, the normative beliefs depend on social support and social pressure to use Web 2.0, and the control beliefs lay the foundation of perceived behavioral control over using Web 2.0 in a classroom. Data were collected from open-ended survey questions (n = 190), semi-structured interviews (n = 12) and end of semester reflections (n = 12). Findings suggest that pre-service teachers' intentions to use Web 2.0 technologies are related to their beliefs about the value of these technologies for improving student learning and engagement, its ease of use (behavioral beliefs), its ability to meet the needs/expectations of digital age students (normative beliefs), the participants' high self-efficacy in use, and its potential for affording students anytime/anywhere access to learning and interaction (control beliefs). From these results, we recommend that teacher educators should target these beliefs within teacher development programs to prepare pre-service teachers for successful use of Web 2.0 technologies in their future K-12 classrooms. 相似文献
75.
Jamal Arkat Leila Hosseini Mehdi Hosseinabadi Farahani 《Expert systems with applications》2011,38(8):9597-9602
Cell formation problem is the main issue in designing cellular manufacturing systems. The most important objective in the cell formation problem is to minimize the number of exceptional elements which helps to reduce the number of intercellular movements. Another important but rarely used objective function is to minimize the number of voids inside of the machine cells. This objective function is considered in order to increase the utilization of the machines. We present a bi-objective mathematical model to simultaneously minimize the number of exceptional elements and the number of voids in the part machine incidence matrix. An ε-constraint method is then applied to solve the model and to generate the efficient solutions. Because of the NP-hardness of the model, the optimal algorithms can not be used in large-scale problems and therefore, we have also developed a bi-objective genetic algorithm. Some numerical examples are considered to illustrate the performance of the model and the effectiveness of the solution algorithms. The results demonstrate that in comparison with the ε-constraint method, the proposed genetic algorithm can obtain efficient solution in a reasonable run time. 相似文献
76.
This paper presents LQ decentralized pole location for singularly perturbed systems. The poles are located in a sector included in the left-half complex plane. The singular perturbation method is used to define reduced and well-behaved problems. It is shown that the LQ control problem with pole location in a sector can be solved using the LMI tool. The associated parametrical optimization problem involves a linear cost objective under LMI constraints. The decentralized control problem is then solved in the reduced slow system by just introducing structure constraints on the matrix variables, constraints that do not destroy the linearity and then the convexity of the problem. 相似文献
77.
Porous aluminium composites are structural and functional materials that have vast potential, due to their lightweight and high energy absorption capacity, especially in automotive and aerospace applications. In this study, the effect of varying content of uncoated and titanium coated diamond particles on the compressive properties of porous aluminium composite was investigated. The composites were developed using powder metallurgy technique and porosity was attained by using polymethylmethacrylate (30 wt.%) as space holder material. The morphology of the pores was found to replicate the shape and size of polymethylmethacrylate particles, that were uniformly distributed in the composites. X-ray diffraction analysis confirmed formation of aluminium carbide in uncoated diamond-based aluminium composites while negligible amount was present in titanium coated porous composites during sintering. The porosities of composites decreased with an increase in diamond content due to the incomplete decomposition of polymethylmethacrylate particles. Moreover, the maximum plateau stress and energy absorption capacity of 9.96 MPa and 1.7 Mj/m3 were obtained for the composites with 8 wt.% of titanium coated diamond particles. Thus, coating inhibits the formation of undesirable compounds and contributes to better interfacial bonding between matrix and reinforcement. 相似文献
78.
Tariq Iqbal Nada M. Alfaer Muhammad H. Tahir Hassan M. Aljohani Farrukh Jamal Ahmed Z. Afify 《Concurrency and Computation》2023,35(1):e7417
In this article, we study a new generator of distributions called the odd JCA-G family. We determine the main mathematical properties of the new family. Some special submodels of the odd JCA-G family are presented. The special models of the JCA-G family have tractable densities shapes which possess various kinds of asymmetric, reversed-J, left-skewed, right-skewed, symmetrical shapes. Furthermore, special submodels exhibit flexible hazard rate shapes. Additionally, the parameters of the odd JCA Burr-XII model are estimated using some classical estimation approaches. The performance and efficiency of these approaches are explored via numerical simulations. The applicability of the odd JCA-G family is illustrated by fitting two real-life datasets. The data analysis shows that the odd JCA Burr-XII model outperforms some well-known distributions for the selected data. 相似文献
79.
Aqib Ali Wali Khan Mashwani Samreen Naeem Muhammad Irfan Uddin Wiyada Kumam Poom Kumam Hussam Alrabaiah Farrukh Jamal Christophe Chesneau 《计算机、材料和连续体(英文)》2021,68(1):391-407
The purpose of this research is the segmentation of lungs computed tomography (CT) scan for the diagnosis of COVID-19 by using machine learning methods. Our dataset contains data from patients who are prone to the epidemic. It contains three types of lungs CT images (Normal, Pneumonia, and COVID-19) collected from two different sources; the first one is the Radiology Department of Nishtar Hospital Multan and Civil Hospital Bahawalpur, Pakistan, and the second one is a publicly free available medical imaging database known as Radiopaedia. For the preprocessing, a novel fuzzy c-mean automated region-growing segmentation approach is deployed to take an automated region of interest (ROIs) and acquire 52 hybrid statistical features for each ROIs. Also, 12 optimized statistical features are selected via the chi-square feature reduction technique. For the classification, five machine learning classifiers named as deep learning J4, multilayer perceptron, support vector machine, random forest, and naive Bayes are deployed to optimize the hybrid statistical features dataset. It is observed that the deep learning J4 has promising results (sensitivity and specificity: 0.987; accuracy: 98.67%) among all the deployed classifiers. As a complementary study, a statistical work is devoted to the use of a new statistical model to fit the main datasets of COVID-19 collected in Pakistan. 相似文献
80.
Adil Hussain Seh Jehad F. Al-Amri Ahmad F. Subahi Md Tarique Jamal Ansari Rajeev Kumar Mohammad Ubaidullah Bokhari Raees Ahmad Khan 《计算机、材料和连续体(英文)》2022,70(1):469-489
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The cyber invaders continuously penetrate the E-Health data because of the high cost of the data on the dark web. Therefore, security assessment of healthcare web-based applications demands immediate intervention mechanisms to weed out the threats of cyber-attacks. The aim of this work is to provide efficient and effective healthcare web application security assessment. The study has worked with the hybrid computational model of Multi-Criteria Decision Making (MCDM) based on Analytical Hierarchy Process (AHP) and Technique for Order of Preference by Similarity to Ideal-Solutions (TOPSIS) under the Hesitant Fuzzy (HF) environment. Hesitant fuzzy sets provide effective solutions to address decision making problems where experts counter hesitation to make a decision. The proposed research endeavor will support designers and developers in identifying, selecting and prioritizing the best security attributes for web applications’ development. The empirical analysis concludes that Robustness got highest priority amongst the assessed security attributes set followed by Encryption, Authentication, Limit Access, Revoke Access, Data Validation, and Maintain Audit Trail. The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the web application security. The study also establishes guidelines which the developers can refer for the identification and prioritization of security attributes to build more secure and trustworthy web-based applications. 相似文献