全文获取类型
收费全文 | 5379篇 |
免费 | 155篇 |
国内免费 | 8篇 |
专业分类
电工技术 | 54篇 |
综合类 | 6篇 |
化学工业 | 1157篇 |
金属工艺 | 106篇 |
机械仪表 | 144篇 |
建筑科学 | 204篇 |
矿业工程 | 23篇 |
能源动力 | 94篇 |
轻工业 | 448篇 |
水利工程 | 43篇 |
石油天然气 | 35篇 |
武器工业 | 1篇 |
无线电 | 444篇 |
一般工业技术 | 848篇 |
冶金工业 | 1059篇 |
原子能技术 | 32篇 |
自动化技术 | 844篇 |
出版年
2022年 | 49篇 |
2021年 | 86篇 |
2020年 | 73篇 |
2019年 | 62篇 |
2018年 | 86篇 |
2017年 | 82篇 |
2016年 | 123篇 |
2015年 | 79篇 |
2014年 | 140篇 |
2013年 | 329篇 |
2012年 | 240篇 |
2011年 | 290篇 |
2010年 | 196篇 |
2009年 | 194篇 |
2008年 | 206篇 |
2007年 | 230篇 |
2006年 | 182篇 |
2005年 | 135篇 |
2004年 | 149篇 |
2003年 | 145篇 |
2002年 | 141篇 |
2001年 | 103篇 |
2000年 | 95篇 |
1999年 | 123篇 |
1998年 | 182篇 |
1997年 | 121篇 |
1996年 | 99篇 |
1995年 | 93篇 |
1994年 | 85篇 |
1993年 | 81篇 |
1992年 | 63篇 |
1991年 | 53篇 |
1990年 | 74篇 |
1989年 | 68篇 |
1988年 | 50篇 |
1987年 | 48篇 |
1986年 | 41篇 |
1985年 | 65篇 |
1984年 | 49篇 |
1983年 | 50篇 |
1982年 | 40篇 |
1981年 | 52篇 |
1980年 | 51篇 |
1979年 | 52篇 |
1978年 | 48篇 |
1977年 | 42篇 |
1976年 | 48篇 |
1975年 | 59篇 |
1974年 | 39篇 |
1973年 | 32篇 |
排序方式: 共有5542条查询结果,搜索用时 15 毫秒
51.
The construction of dams significantly alters flow and sediment regimes with subsequent deleterious effects on the morphological and ecological character of rivers. Effective experimental floods can ameliorate the downstream geomorphic impacts of dams. The traditional view is that large floods are required to perform effective geomorphic work, and the geomorphic outcomes of small floods are often overlooked. Many river restoration frameworks do not consider small floods. Yet, there is evidence that the hydrological characteristics that ameliorate specific geomorphic impacts in a river are unique to each river, and a customised approach to setting the right mix of floods (including small experimental floods) is needed. In this study, we modify an existing flood effectiveness model developed for large floods, for determining the geomorphic effectiveness of small floods in a highly regulated Australian river. Two flood classes were added to the model (medium peak stream power and moderate total energy expenditure), and the flood power characteristics were rescaled to reflect the relative difference in the magnitude of the small floods and the magnitude of the geomorphic work performed. Using a step‐wise approach, this customised model determined the geomorphic effectiveness of small floods. The best flood for ameliorating the geomorphic impacts of flow regulation had medium to long duration (10 to 51 days), high peak unit stream power (77 to 123 Wm?2) and moderate to large total energy expenditure (78,600 to 342,320 × 103 J). This approach to determining flood effectiveness for small floods is applicable to other geomorphically impacted river channels downstream of dams and can be used to inform experimental flood releases for geomorphic outcomes. 相似文献
52.
Wayne Madsen 《Information Security Journal: A Global Perspective》2013,22(1):11-16
ABSTRACT Communicating with confidential data requires special attention in a mobile agents environment, especially when the other hosts must be prevented from eavesdropping on the communication. We propose a communication model for secured communication between the agents belonging to publishers and consumers data. Confidentiality is ensured using our on-the-fly encryption-decryption sequence using ElGamal system to directly convert the message or plaintext into one that is encrypted directly with the public key of consumer. The scheme ensures that the data possessed by the agents is secured at all times when it is executing at any untrusted host. Our minimal implementation of the model with Aglets agent platform gives the first faithful picture of the happenings in the model. Finally, we also explain how the homomorphic property of ElGamal scheme can be integrated with our model for a Web-based application such as voting involving multiple agents. 相似文献
53.
Antonio Negretti Albert Benseny Jordi Mompart Tommaso Calarco 《Quantum Information Processing》2013,12(3):1439-1467
We numerically investigate the performance of atomic transport in optical microtraps via the so called spatial adiabatic passage technique. Our analysis is carried out by means of optimal control methods, which enable us to determine suitable transport control pulses. We investigate the ultimate limits of the optimal control in speeding up the transport process in a triple well configuration for both a single atomic wave packet and a Bose-Einstein condensate within a regime of experimental parameters achievable with current optical technology. 相似文献
54.
55.
Wayne O’Brien Author Vitae 《Journal of Systems and Software》2008,81(11):1997-2013
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them. 相似文献
56.
In this paper we consider the p-ary transitive reduction (TR
p
) problem where p>0 is an integer; for p=2 this problem arises in inferring a sparsest possible (biological) signal transduction network consistent with a set of
experimental observations with a goal to minimize false positive inferences even if risking false negatives. Special cases
of TR
p
have been investigated before in different contexts; the best previous results are as follows:
In this paper, our contributions are as follows:
R. Albert’s research was partly supported by a Sloan Research Fellowship in Science and Technology.
B. DasGupta’s research was partly supported by NSF grants DBI-0543365, IIS-0612044 and IIS-0346973.
E. Sontag’s research was partly supported by NSF grants EIA 0205116 and DMS-0504557. 相似文献
(1) | The minimum equivalent digraph problem, that correspond to a special case of TR1 with no critical edges, is known to be MAX-SNP-hard, admits a polynomial time algorithm with an approximation ratio of 1.617+ε for any constant ε>0 (Chiu and Liu in Sci. Sin. 4:1396–1400, 1965) and can be solved in linear time for directed acyclic graphs (Aho et al. in SIAM J. Comput. 1(2):131–137, 1972). |
(2) | A 2-approximation algorithm exists for TR1 (Frederickson and JàJà in SIAM J. Comput. 10(2):270–283, 1981; Khuller et al. in 19th Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 937–938, 1999). |
• | We observe that TR p , for any integer p>0, can be solved in linear time for directed acyclic graphs using the ideas in Aho et al. (SIAM J. Comput. 1(2):131–137, 1972). |
• | We provide a 1.78-approximation for TR1 that improves the 2-approximation mentioned in (2) above. |
• | We provide a 2+o(1)-approximation for TR p on general graphs for any fixed prime p>1. |
57.
This paper describes a method for temporally calibrating video sequences from unsynchronized cameras by image processing operations, and presents two search algorithms to match and align trajectories across different camera views. Existing multi-camera systems assume that input video sequences are synchronized either by genlock or by time stamp information and a centralized server. Yet, hardware-based synchronization increases installation cost. Hence, using image information is necessary to align frames from the cameras whose clocks are not synchronized. The system built for temporal calibration is composed of three modules: object tracking module, calibration data extraction module, and the search module. A robust and efficient search algorithm is introduced that recovers the frame offset by matching the trajectories in different views, and finding the most reliable match. Thanks to information obtained from multiple trajectories, this algorithm is robust to possible errors in background subtraction and location extraction. Moreover, the algorithm can handle very large frame offsets. A RANdom SAmple Consensus (RANSAC) based version of this search algorithm is also introduced. Results obtained with different video sequences are presented, which show the robustness of the algorithms in recovering various range of frame offsets for video sequences with varying levels of object activity. 相似文献
58.
Meixner Albert Sorin Daniel J. 《Dependable and Secure Computing, IEEE Transactions on》2009,6(1):18-31
Multithreaded servers with cache-coherent shared memory are the dominant type of machines used to run critical network services and database management systems. To achieve the high availability required for these tasks, it is necessary to incorporate mechanisms for error detection and recovery. Correct operation of the memory system is defined by the memory consistency model. Errors can therefore be detected by checking if the observed memory system behavior deviates from the specified consistency model. Based on recent work, we design a framework for dynamic verification of memory consistency (DVMC). The framework consists of mechanisms to verify three invariants that are proven to guarantee that a specified memory consistency model is obeyed. We describe an implementation of the framework for the SPARCv9 architecture, and we experimentally evaluate its performance using full-system simulation of commercial workloads. 相似文献
59.
This paper presents a large anisotropic damage theory of continuum damage mechanics. It is developed via a new hypothesis of incremental complementary elastic energy equivalence. This hypothesis is more versatile and accurate if compared to the original hypothesis of total complementary energy equivalence. To model the large damage, we assumed that it occurs as a series of incremental small damage. An expression for the damage effect tensor M(D) for large damage is derived. It is shown that when the damage is small, that is, D
i1, the proposed large damage theory reduces to the small damage model of Chow and Wang [1]. To demonstrate this large damage theory, it is applied to model the following cases: (a) uniaxial tension, (b) pure torsion and (c) elastic perfectly-plastic material behavior. In all three cases, the results clearly show that when the damage is small, Chow and Wang's model is recovered. However, for large damage, there are significant differences in predictions. Since this large damage theory is formulated on the basis of the incremental complementary energy, it is applicable to a wider range of problems. 相似文献
60.
Summary The nature of the excited state interactions in poly(ethylene terephthalate) is still subject to debate. We study a new series of model compounds composed of a central terephthaloyl group condensed with -hydroxy--phenyl-n-alkanes. Although the molecular architecture prevents these molecules from achieving symmetric ring-ring overlap, the steady-state fluorescence spectra are remarkably similar to those of other models studied earlier, where such overlap was expected. The solvent polarity dependence suggests that the excited state complex is an exciplex and not an excimer. 相似文献