全文获取类型
收费全文 | 1932篇 |
免费 | 28篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 8篇 |
综合类 | 2篇 |
化学工业 | 145篇 |
金属工艺 | 9篇 |
机械仪表 | 10篇 |
建筑科学 | 34篇 |
矿业工程 | 2篇 |
能源动力 | 34篇 |
轻工业 | 112篇 |
水利工程 | 4篇 |
石油天然气 | 3篇 |
无线电 | 61篇 |
一般工业技术 | 103篇 |
冶金工业 | 1340篇 |
原子能技术 | 7篇 |
自动化技术 | 88篇 |
出版年
2022年 | 14篇 |
2021年 | 18篇 |
2020年 | 12篇 |
2019年 | 12篇 |
2018年 | 21篇 |
2017年 | 17篇 |
2016年 | 13篇 |
2015年 | 7篇 |
2014年 | 17篇 |
2013年 | 43篇 |
2012年 | 35篇 |
2011年 | 20篇 |
2010年 | 21篇 |
2009年 | 15篇 |
2008年 | 23篇 |
2007年 | 24篇 |
2006年 | 32篇 |
2005年 | 27篇 |
2004年 | 22篇 |
2003年 | 22篇 |
2002年 | 26篇 |
2001年 | 16篇 |
2000年 | 20篇 |
1999年 | 44篇 |
1998年 | 366篇 |
1997年 | 219篇 |
1996年 | 139篇 |
1995年 | 68篇 |
1994年 | 82篇 |
1993年 | 79篇 |
1992年 | 17篇 |
1991年 | 14篇 |
1990年 | 26篇 |
1989年 | 15篇 |
1988年 | 27篇 |
1987年 | 18篇 |
1986年 | 10篇 |
1985年 | 23篇 |
1984年 | 13篇 |
1983年 | 9篇 |
1982年 | 20篇 |
1981年 | 17篇 |
1980年 | 24篇 |
1979年 | 17篇 |
1978年 | 14篇 |
1977年 | 53篇 |
1976年 | 105篇 |
1975年 | 12篇 |
1968年 | 5篇 |
1960年 | 5篇 |
排序方式: 共有1962条查询结果,搜索用时 15 毫秒
91.
Monday Eze Charles Okunbor Deborah Aleburu Olubukola Adekola Ibrahim Ramon Nneka Richard-Nnabu Oghenetega Avwokuruaye Abisola Olayiwola Rume Yoro Esomu Solomon 《计算机系统科学与工程》2022,41(2):595-609
This work demonstrates in practical terms the evolutionary concepts and computational applications of Parametric Curves. Specific cases were drawn from higher order parametric Bezier curves of degrees 2 and above. Bezier curves find real life applications in diverse areas of Engineering and Computer Science, such as computer graphics, robotics, animations, virtual reality, among others. Some of the evolutionary issues explored in this work are in the areas of parametric equations derivations, proof of related theorems, first and second order calculus related computations, among others. A Practical case is demonstrated using a graphical design, physical hand sketching, and programmatic implementation of two opposite-faced handless cups, all evolved using quadratic Bezier curves. The actual drawing was realized using web graphics canvas programming based on HTML 5 and JavaScript. This work will no doubt find relevance in computational researches in the areas of graphics, web programming, automated theorem proofs, robotic motions, among others. 相似文献
92.
Solomon Russom Habtay 《Creativity & Innovation Management》2012,21(3):290-303
Using the business model concept as a theoretical framework, this paper examines the relative disruptiveness potential between technology‐driven and market‐driven innovations. The study analyses retrospectively four case studies comprising two technologically sophisticated IT innovations and two technologically less sophisticated market‐driven innovations starting from their inception to the point of disruption over a period of 5–15 years. It finds that, while the disruption process of technology‐driven innovation conforms to the patterns predicted by disruptive innovation theory, the disruption process of market‐driven disruptive business model innovation depicts a bottleneck shape, where the positive effects of initial strategic choice, model specialization and investments on disruptiveness potential reach the maximum level and start to stagnate due to the same initial strategic choice and cost factors. Implications for researchers and practitioners are discussed. 相似文献
93.
A new axiomatic system OST of operational set theory is introduced in which the usual language of set theory is expanded to allow us to talk about (possibly partial) operations applicable both to sets and to operations. OST is equivalent in strength to admissible set theory, and a natural extension of OST is equivalent in strength to ZFC. The language of OST provides a framework in which to express “small” large cardinal notions—such as those of being an inaccessible cardinal, a Mahlo cardinal, and a weakly compact cardinal—in terms of operational closure conditions that specialize to the analogue notions on admissible sets. This illustrates a wider program whose aim is to provide a common framework for analogues of large cardinal notions that have appeared in admissible set theory, admissible recursion theory, constructive set theory, constructive type theory, explicit mathematics, and systems of recursive ordinal notations that have been used in proof theory. 相似文献
94.
Solomon Guadie Worku Chunxiang XuAuthor VitaeJining ZhaoAuthor Vitae Xiaohu HeAuthor Vitae 《Computers & Electrical Engineering》2014
Cloud computing poses many challenges on integrity and privacy of users’ data though it brings an easy, cost-effective and reliable way of data management. Hence, secure and efficient methods are needed to ensure integrity and privacy of data stored at the cloud. Wang et al. proposed a privacy-preserving public auditing protocol in 2010 but it is seriously insecure. Their scheme is vulnerable to attacks from malicious cloud server and outside attackers regarding to storage correctness. So they proposed a scheme in 2011 with an improved security guarantee but it is not efficient. Thus, in this paper, we proposed a scheme which is secure and with better efficiency. It is a public auditing scheme with third party auditor (TPA), who performs data auditing on behalf of user(s). With detail security analysis, our scheme is proved secure in the random oracle model and our performance analysis shows the scheme is efficient. 相似文献
95.
Justin Solomon Mirela Ben‐Chen Adrian Butscher Leonidas Guibas 《Computer Graphics Forum》2011,30(5):1543-1552
Cartoon animation, image warping, and several other tasks in two‐dimensional computer graphics reduce to the formulation of a reasonable model for planar deformation. A deformation is a map from a given shape to a new one, and its quality is determined by the type of distortion it introduces. In many applications, a desirable map is as isometric as possible. Finding such deformations, however, is a nonlinear problem, and most of the existing solutions approach it by minimizing a nonlinear energy. Such methods are not guaranteed to converge to a global optimum and often suffer from robustness issues. We propose a new approach based on approximate Killing vector fields (AKVFs), first introduced in shape processing. AKVFs generate near‐isometric deformations, which can be motivated as direction fields minimizing an “as‐rigid‐as‐possible” (ARAP) energy to first order. We first solve for an AKVF on the domain given user constraints via a linear optimization problem and then use this AKVF as the initial velocity field of the deformation. In this way, we transfer the inherent nonlinearity of the deformation problem to finding trajectories for each point of the domain having the given initial velocities. We show that a specific class of trajectories — the set of logarithmic spirals — is especially suited for this task both in practice and through its relationship to linear holomorphic vector fields. We demonstrate the effectiveness of our method for planar deformation by comparing it with existing state‐of‐the‐art deformation methods. 相似文献
96.
V. M. Holovey V. I. Lyamayev A. M. Solomon N. N. Birov P. P. Puga V. T. Maslyuk 《Inorganic Materials》2008,44(7):737-741
We have studied the thermoluminescence (TL) and roentgenoluminescence (RL) of glassy and crystallized (Li2B4O7)0.999(MnO2)0.001-(Li4B10O17)0.999(MnO2)0.001 samples. The results demonstrate that annealing influences the relative TL and RL intensities in the samples owing to crystallization
processes. The TL and RL intensities of the crystalline materials are several times higher than those of the thermoluminescent
material (Li2B4O7)0.999(MnO2)0.001 and have a maximum at B2O3 excesses of 7–11 mol %.
Original Russian Text ? V.M. Holovey, V.I. Lyamayev, A.M. Solomon, N.N. Birov, P.P. Puga, V.T. Maslyuk, 2008, published in
Neorganicheskie Materialy, 2008, Vol. 44, No. 7, pp. 841–845. 相似文献
97.
98.
Greenberg Jeff; Pyszczynski Tom; Solomon Sheldon; Rosenblatt Abram; Veeder Mitchell; Kirkland Shari; Lyon Deborah 《Canadian Metallurgical Quarterly》1990,58(2):308
Three experiments were conducted to test the hypothesis, derived from terror management theory, that reminding people of their mortality increases attraction to those who consensually validate their beliefs and decreases attraction to those who threaten their beliefs. In Study 1, subjects with a Christian religious background were asked to form impressions of Christian and Jewish target persons. Before doing so, mortality was made salient to half of the subjects. In support of predictions, mortality salience led to more positive evaluations of the in-group member (the Christian) and more negative evaluations of the out-group member (the Jew). In Study 2, mortality salience led to especially negative evaluations of an attitudinally dissimilar other, but only among subjects high in authoritarianism. In Study 3, mortality salience led to especially positive reactions to someone who directly praised subjects' cultural worldviews and especially negative reactions to someone who criticized them. The implications of these findings for understanding in-group favoritism, prejudice, and intolerance of deviance are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
99.
Palevski A. Solomon P.M. Kuech T.F. Tischler M. Umbach C. 《Electron Device Letters, IEEE》1990,11(11):535-537
The authors have fabricated for the first time heterostructure field-effect transistors where the two-dimensional electron gas (2-DEG) channel is directly contacted by selectively regrown epitaxial GaAs contacts. Both modulation-doped FETs (MODFETs) and semiconductor-insulator-semiconductor FETs (SISFETs) were fabricated. Contact resistances were low, as evidenced by high transconductances and improvements to the transconductance at low temperatures. The low resistance and shallow nature of the regrown contacts should permit scaling of these structures to very small dimensions 相似文献
100.