全文获取类型
收费全文 | 1591篇 |
免费 | 57篇 |
国内免费 | 7篇 |
专业分类
电工技术 | 57篇 |
综合类 | 4篇 |
化学工业 | 431篇 |
金属工艺 | 57篇 |
机械仪表 | 33篇 |
建筑科学 | 32篇 |
矿业工程 | 1篇 |
能源动力 | 65篇 |
轻工业 | 155篇 |
水利工程 | 7篇 |
石油天然气 | 1篇 |
无线电 | 129篇 |
一般工业技术 | 301篇 |
冶金工业 | 192篇 |
原子能技术 | 31篇 |
自动化技术 | 159篇 |
出版年
2023年 | 10篇 |
2022年 | 18篇 |
2021年 | 30篇 |
2020年 | 19篇 |
2019年 | 19篇 |
2018年 | 44篇 |
2017年 | 29篇 |
2016年 | 53篇 |
2015年 | 26篇 |
2014年 | 40篇 |
2013年 | 73篇 |
2012年 | 73篇 |
2011年 | 105篇 |
2010年 | 81篇 |
2009年 | 90篇 |
2008年 | 87篇 |
2007年 | 72篇 |
2006年 | 57篇 |
2005年 | 61篇 |
2004年 | 37篇 |
2003年 | 58篇 |
2002年 | 42篇 |
2001年 | 32篇 |
2000年 | 23篇 |
1999年 | 40篇 |
1998年 | 89篇 |
1997年 | 77篇 |
1996年 | 40篇 |
1995年 | 33篇 |
1994年 | 28篇 |
1993年 | 13篇 |
1992年 | 13篇 |
1991年 | 13篇 |
1990年 | 14篇 |
1989年 | 20篇 |
1988年 | 15篇 |
1987年 | 8篇 |
1986年 | 6篇 |
1984年 | 7篇 |
1983年 | 5篇 |
1982年 | 7篇 |
1981年 | 4篇 |
1977年 | 5篇 |
1976年 | 9篇 |
1974年 | 3篇 |
1972年 | 3篇 |
1970年 | 3篇 |
1969年 | 4篇 |
1968年 | 3篇 |
1967年 | 3篇 |
排序方式: 共有1655条查询结果,搜索用时 10 毫秒
101.
Scanning-laser-beam semiconductor pH-imaging sensor 总被引:2,自引:0,他引:2
Motoi Nakao Tatsuo Yoshinobu Hiroshi Iwasaki 《Sensors and actuators. B, Chemical》1994,20(2-3):119-123
We have constructed a two-dimensional (2-D) pH-imaging sensor that enables us to observe th H+ distribution produced by living cells. The pH-sensing principle is similar to that of thelight-addressable potentiometric sensor. The electrolyte-insulator-semiconductor (EIS) structure (electrolyte---Si3N4---SiO2---Si) is illuminated by a focused (1 μm) and modulated (1–10 kHz) He—Ne laser bean from the backside of the semiconductor, and the a.c. photocurrent flowing through the EIS structure is measured. By scanning the laser beam, 2-D pH images can be obtained. By using this sensor, pH distributions of colonies of yeast (Saccharomyces cerevisiae) have been observed. The spatial resolution of this sensor could be improved by thinning the Si wafer. 相似文献
102.
Satoshi Ueki Tetsuya Mouri Takahiro Endo Haruhisa Kawasaki 《Artificial Life and Robotics》2016,21(1):31-36
This paper proposes a method for visualizing the stiffness of a soft object in a palpation-support information system by the teleoperation of a robot hand. It is important that a palpation system display a body’s shape and stiffness. In our method, the stiffness of the contact area between the soft object and the robot finger is estimated by a recursive least-squares method with forgetting factor that uses an impedance dynamics model. With the estimated stiffness and direction of contact force, we calculate the scalar parameter for visualization of stiffness. Moreover, we propose a safety control method for the palpation system, which is part of a tele-control method based on will-consensus building. The system configuration, estimated algorithm, and experimental results are presented. 相似文献
103.
Tetsuya Murai Yoshiharu Sato Germano Resconi Michinori Nakata 《Electronic Notes in Theoretical Computer Science》2003,82(4):186
The concept of granular computing is applied to Aristotle's categorical syllogism. Such kind of reasoning is called granular reasoning in this paper. For the purpose, two operations called zooming in & out are introduced to reconstruct granules of possible worlds. 相似文献
104.
Baku Katagiri Tetsuya Miyashita Takahiro Ishinabe Tatsuo Uchida 《Journal of the Society for Information Display》2003,11(3):585-590
Abstract— One problem with front‐projection displays is that the screen contrast ratio decreases in bright ambient light. In this paper, we propose a new front‐projection display system that incorporates the control of reflection of ambient light in the screen design, providing a high contrast ratio even in a brightly lit room. 相似文献
105.
Yufeng Wang Akihiro Nakao Athanasios V. VasilakosJianhua Ma 《Computer Communications》2011,34(3):241-249
This paper thoroughly investigates the evolutionary dynamics of soft security mechanism, namely, reciprocity-based incentive mechanism, in P2P systems based on Evolutionary Game Theory (EGT). By soft security mechanism, it means social control mechanisms to overcome peers’ selfish (rational) behaviors, and encourage cooperation in P2P systems. Specifically, there exist three strategies in P2P systems: always cooperative (ALLC), always defect (ALLD) and reciprocator (R). Instead of existing work which take it for granted that, like ALLC users, R users did not bear any information-seeking cost, we assume small reciprocation cost, and study generalized mutation-selection dynamics. Our contributions are threefold: firstly, we prove and illustrate that, in a well-mixed P2P structure, ALLD is the only strict Nash equilibrium; secondly, we infer the specific condition under which evolution dynamics exhibits rock-scissors-paper oscillation in a structured P2P population. That is, the population cycles from ALLD to R to ALLC and back to ALLD; finally, we theoretically illustrate that the intensity of selection plays an important role in the evolutionary dynamics of P2P incentive mechanism. That is, when the intensity of selection is relatively weak and reciprocation cost limits to zero, the time average can be mostly concentrated on reciprocator. In brief, considering the existence of reciprocation cost and the small mutation in P2P incentive mechanisms, unlike existing work, it is impossible to simply achieve the “absolute cooperative” in P2P incentive mechanisms. On the other hand, stochastic evolution in P2P incentive mechanism with finite population and network structure still favor reciprocation. 相似文献
106.
Sato Tetsuya Yamani Yusuke Liechty Molly Chancey Eric T. 《Cognition, Technology & Work》2020,22(2):399-407
Cognition, Technology & Work - Trust is a critical construct that influences human–automation interaction in multitasking workspaces involving imperfect automation. Karpinsky et al. (Appl... 相似文献
107.
108.
Yuhao Wu Yuki Manabe Tetsuya Kanda Daniel M. German Katsuro Inoue 《Empirical Software Engineering》2017,22(3):1194-1222
Free and open source software (FOSS) plays an important role in source code reuse practice. They usually come with one or more software licenses written in the header part of source files, stating the requirements and conditions which should be followed when been reused. Removing or modifying the license statement by re-distributors will result in the inconsistency of license with its ancestor, and may potentially cause license infringement. In this paper, we describe and categorize different types of license inconsistencies and propose a method to detect them. Then we applied this method to Debian 7.5 and a collection of 10,514 Java projects on GitHub and present the license inconsistency cases found in these systems. With a manual analysis, we summarized various reasons behind these license inconsistency cases, some of which imply potential license infringement and require attention from the developers. This analysis also exposes the difficulty to discover license infringements, highlighting the usefulness of finding and maintaining source code provenance. 相似文献
109.
Ryoichi Kawahara Tetsuya Takine Tatsuya Mori Noriaki Kamiyama Keisuke Ishibashi 《Computer Networks》2013,57(6):1560-1576
We consider the mean–variance relationship of the number of flows in traffic aggregation, where flows are divided into several groups randomly, based on a predefined flow aggregation index, such as source IP address. We first derive a quadratic relationship between the mean and the variance of the number of flows belonging to a randomly chosen traffic aggregation group. Note here that the result is applicable to sampled flows obtained through packet sampling. We then show that our analytically derived mean–variance relationship fits well those in actual packet trace data sets. Next, we present two applications of the mean–variance relationship to traffic management. One is an application to detecting network anomalies through monitoring a time series of traffic. Using the mean–variance relationship, we determine the traffic aggregation level in traffic monitoring so that it meets two predefined requirements on false positive and false negative ratios simultaneously. The other is an application to load balancing among network equipments that require per-flow management. We utilize the mean–variance relationship for estimating the processing capability required in each network equipment. 相似文献
110.
Iichiro Inoue Tetsuya Miyashita Tatsuo Uchida Yuichiro Yamada Yutaka Ishii 《Journal of the Society for Information Display》2003,11(3):571-576
Abstract— Quick, stable transition from splay‐to‐bend alignment in optically compensated bend (OCB) mode is crucial for practical use. This has been achieved by surface treating part of a pixel with a chiral dopant to induce a twist alignment while controlling the twist direction. The effectiveness of this new method was confirmed in a prototype TFT‐LCD panel. 相似文献