全文获取类型
收费全文 | 2264篇 |
免费 | 76篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 24篇 |
综合类 | 1篇 |
化学工业 | 373篇 |
金属工艺 | 42篇 |
机械仪表 | 87篇 |
建筑科学 | 133篇 |
矿业工程 | 5篇 |
能源动力 | 38篇 |
轻工业 | 221篇 |
水利工程 | 22篇 |
石油天然气 | 11篇 |
武器工业 | 3篇 |
无线电 | 145篇 |
一般工业技术 | 364篇 |
冶金工业 | 511篇 |
原子能技术 | 9篇 |
自动化技术 | 357篇 |
出版年
2022年 | 18篇 |
2021年 | 25篇 |
2020年 | 16篇 |
2019年 | 32篇 |
2018年 | 40篇 |
2017年 | 34篇 |
2016年 | 38篇 |
2015年 | 30篇 |
2014年 | 56篇 |
2013年 | 147篇 |
2012年 | 60篇 |
2011年 | 106篇 |
2010年 | 75篇 |
2009年 | 72篇 |
2008年 | 102篇 |
2007年 | 96篇 |
2006年 | 77篇 |
2005年 | 73篇 |
2004年 | 56篇 |
2003年 | 67篇 |
2002年 | 54篇 |
2001年 | 39篇 |
2000年 | 38篇 |
1999年 | 43篇 |
1998年 | 109篇 |
1997年 | 86篇 |
1996年 | 78篇 |
1995年 | 41篇 |
1994年 | 51篇 |
1993年 | 42篇 |
1992年 | 23篇 |
1991年 | 19篇 |
1990年 | 26篇 |
1989年 | 14篇 |
1988年 | 24篇 |
1987年 | 31篇 |
1986年 | 27篇 |
1985年 | 27篇 |
1984年 | 28篇 |
1983年 | 21篇 |
1982年 | 17篇 |
1981年 | 24篇 |
1980年 | 23篇 |
1979年 | 27篇 |
1978年 | 19篇 |
1977年 | 23篇 |
1976年 | 31篇 |
1975年 | 19篇 |
1974年 | 15篇 |
1973年 | 19篇 |
排序方式: 共有2346条查询结果,搜索用时 269 毫秒
41.
C. C. Duncan D. M. Yermanos J. Kumamoto C. S. Levesque 《Journal of the American Oil Chemists' Society》1974,51(12):534-536
A rapid ethanolysis procedure for preparing jojoba wax for gas liquid chromatographic analysis is described. The wax esters
are hydrolyzed by refluxing 4 drops of jojoba wax in 5% HCl in anhydrous ethanol in a test tube. The resulting fatty acid
ethyl esters and fatty alcohols are separated and quantitated by a single gas liquid chromatographic run. Analysis of duplicate
samples by this procedure gives essentially the same results as a procedure which requires 10 times more sample and reagents
and considerably more time. 相似文献
42.
43.
Kathleen Menzies Duncan Birrell Gordon Dunsire 《New Review of Information Networking》2013,18(2):92-140
This article reports on the key findings and implications of the Joint Information Systems Committee (JISC)-funded Online Catalogue and Repository Interoperability Study (OCRIS), a 3-month project which investigated the interoperability of Online Public Access Catalogues (OPACs) and Institutional Repositories (IRs) within UK universities. A series of detailed recommendations enumerate some of the ways in which they might begin to develop and support an interoperable systems landscape to the benefit of all key stakeholders. The project combined quantitative and qualitative research methods including an online questionnaire distributed to staff within 85 universities, desk research, and two case studies conducted at the Universities of Cambridge and Glasgow. 相似文献
44.
Laminated paper-based analytical devices (LPAD): fabrication, characterization, and assays 总被引:1,自引:1,他引:0
Paper-based microfluidic devices have recently garnered an increasing interest in the literature. The majority of these devices were produced by patterning hydrophobic zones in hydrophilic paper via photoresist or wax. Others were created by cutting paper using a laser. Here, we present a fabrication method for producing devices by simple craft-cutting and lamination, in a way similar to making an identification (ID) card. The method employs a digital craft cutter and roll laminator to produce laminated paper-based analytical devices (LPAD). Lamination with a plastic backing provides the mechanical strength for a paper device. The approach of using a craft cutter and laminator makes it possible to rapid-prototype LPAD with no more difficulty than producing a typical ID card, at very low cost. Devices constructed using this method have been exploited for simultaneous detection of bovine serum albumin (BSA) and glucose in synthetic urine with colorimetric assays. Both BSA and glucose are detectable at clinically relevant concentrations, with the detection limit at 2.5 μM for BSA and 0.5 mM for glucose. 相似文献
45.
Current techniques for transforming unforgeable signature schemes (the forged message has never been signed) to strongly unforgeable ones (the forged message could have been signed) require supplementary components to be added onto the original key pairs of the schemes. In addition, some of them can only be applied to a certain type of signature schemes. In this paper, we propose a new generic transformation technique which converts any unforgeable signature scheme into a strongly unforgeable one without modifying any component in the original key pair. This makes our technique especially compatible for practical use. Our technique is based on strong one-time signature schemes. We show that they can be constructed efficiently from any one-time signature scheme that is based on one-way functions. The performance of our technique also compares favorably with that of current ones. Besides, it is shown in this paper that our transformation can further be applied to schemes satisfying only a weak variant of unforgeability without any further modification. Furthermore, our technique can also be used for constructing strongly unforgeable signature schemes in other cryptographic settings which include certificateless signature, identity-based signature, and several others. To the best of our knowledge, similar extent of versatility is not known to be supported by any of those comparable techniques. Finally and of independent interest, we show that our generic transformation technique can be modified to an on-line/off-line signature scheme, which possesses a very efficient signing process. 相似文献
46.
47.
Yan Wang Kwei-Jay Lin Duncan S. Wong Vijay Varadharajan 《Service Oriented Computing and Applications》2009,3(2):129-146
In service-oriented computing (SOC) environments, service clients interact with service providers for services or transactions.
From the point view of service clients, the trust status of a service provider is a critical issue to consider, particularly
when the service provider is unknown to them. Typically, the trust evaluation is based on the feedback on the service quality
provided by service clients. In this paper, we first present a trust management framework that is event-driven and rule-based.
In this framework, trust computation is based on formulae. But rules are defined to determine which formula to use and what
arguments to use, according to the event occurred during the transaction or service. In addition, we propose some trust evaluation
metrics and a formula for trust computation. The formula is designed to be adaptable to different application domains by setting
suitable arguments. Particularly, the proposed model addresses the incremental characteristics of trust establishment process.
Furthermore, we propose a fuzzy logic based approach for determining reputation ranks that particularly differentiates new
service providers and old (long-existing) ones. This is further incentive to new service providers and penalize poor quality
services from service providers. Finally, a set of empirical studies has been conducted to study the properties of the proposed
approaches, and the method to control the trust changes in both trust increment and decrement cases. The proposed framework
is adaptable for different domains and complex trust evaluation systems.
相似文献
Vijay VaradharajanEmail: |
48.
Observed finger behaviour during computer mouse use 总被引:1,自引:0,他引:1
Two-button computer mouse users may exhibit sustained, static finger lifting behaviours to prevent inadvertent activations by avoiding finger pressure on the buttons, which leads to prolonged, static finger extensor muscle loading. One hundred graduate students were observed during normal computer work in a university computer facility to qualify and quantify the prevalence of lifted finger behaviours and extended finger postures, as well as wrist/forearm and grip behaviour, during specific mouse activities. The highest prevalences observed were 48% of the students lifted their middle finger during mouse drag activities, and 23% extended their middle finger while moving the mouse. In addition, 98% of the students rested their wrist and forearm (77%) or wrist only (21%) on the workstation surface, and 97% had an extended wrist posture (15 degrees -30 degrees ) when using the mouse. Potential applications of these findings include future computer input device designs to reduce finger lifting behaviour and exposures to risk factors of hand/forearm musculoskeletal pain. 相似文献
49.
Farrugia Russell Portelli Barnaby Grech Ivan Camilleri Duncan Casha Owen Micallef Joseph Gatt Edward 《Microsystem Technologies》2022,28(6):1451-1465
Microsystem Technologies - The maximum scan angle amplitude of resonating micro-mirrors, intended for micro-projection display applications is limited by air damping. Three-dimensional transient... 相似文献
50.
Targeted Nanoparticle Thermometry: A Method to Measure Local Temperature at the Nanoscale Point Where Water Vapor Nucleation Occurs 下载免费PDF全文
Arwa A. Alaulamie Susil Baral Samuel C. Johnson Hugh H. Richardson 《Small (Weinheim an der Bergstrasse, Germany)》2017,13(1)
An optical nanothermometer technique based on laser trapping, moving and targeted attaching an erbium oxide nanoparticle cluster is developed to measure the local temperature. The authors apply this new nanoscale temperature measuring technique (limited by the size of the nanoparticles) to measure the temperature of vapor nucleation in water. Vapor nucleation is observed after superheating water above the boiling point for degassed and nondegassed water. The average nucleation temperature for water without gas is 560 K but this temperature is lowered by 100 K when gas is introduced into the water. The authors are able to measure the temperature inside the bubble during bubble formation and find that the temperature inside the bubble spikes to over 1000 K because the heat source (optically‐heated nanorods) is no longer connected to liquid water and heat dissipation is greatly reduced. 相似文献