全文获取类型
收费全文 | 5276篇 |
免费 | 425篇 |
国内免费 | 31篇 |
专业分类
电工技术 | 71篇 |
综合类 | 28篇 |
化学工业 | 1477篇 |
金属工艺 | 164篇 |
机械仪表 | 229篇 |
建筑科学 | 212篇 |
矿业工程 | 12篇 |
能源动力 | 328篇 |
轻工业 | 446篇 |
水利工程 | 118篇 |
石油天然气 | 73篇 |
武器工业 | 3篇 |
无线电 | 474篇 |
一般工业技术 | 905篇 |
冶金工业 | 164篇 |
原子能技术 | 41篇 |
自动化技术 | 987篇 |
出版年
2024年 | 21篇 |
2023年 | 78篇 |
2022年 | 148篇 |
2021年 | 282篇 |
2020年 | 293篇 |
2019年 | 355篇 |
2018年 | 437篇 |
2017年 | 384篇 |
2016年 | 359篇 |
2015年 | 245篇 |
2014年 | 402篇 |
2013年 | 633篇 |
2012年 | 437篇 |
2011年 | 416篇 |
2010年 | 292篇 |
2009年 | 276篇 |
2008年 | 142篇 |
2007年 | 126篇 |
2006年 | 81篇 |
2005年 | 56篇 |
2004年 | 41篇 |
2003年 | 32篇 |
2002年 | 29篇 |
2001年 | 16篇 |
2000年 | 15篇 |
1999年 | 21篇 |
1998年 | 7篇 |
1997年 | 9篇 |
1996年 | 10篇 |
1995年 | 16篇 |
1994年 | 7篇 |
1993年 | 12篇 |
1992年 | 7篇 |
1991年 | 5篇 |
1990年 | 7篇 |
1989年 | 8篇 |
1988年 | 4篇 |
1987年 | 1篇 |
1986年 | 3篇 |
1984年 | 6篇 |
1982年 | 6篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1974年 | 1篇 |
1967年 | 1篇 |
排序方式: 共有5732条查询结果,搜索用时 29 毫秒
51.
Temperature-dependent diffusion coefficient of soluble substances during ethanol extraction of clove
San Myint Wan Ramli Wan Daud Abu Bakar Mohamad Abdul Amir H. Kadhum 《Journal of the American Oil Chemists' Society》1996,73(5):603-610
The temperature dependence of the diffusion coefficient of ethanol-soluble substances from ground cloves (particle size 250
μm) during extraction was estimated by fitting batch extraction data at several temperatures (27.8, 40, 50, and 60°C) to a
previously developed mass transfer model. The model was based on spherical geometry of particles. Nonlinear regression analysis
was used to develop an equation that describes the diffusivity as a function of temperature. The temperature dependence ofD
A
was of the Arrhenius type. 相似文献
52.
With the high availability of digital video contents on the internet, users need more assistance to access digital videos. Various researches have been done about video summarization and semantic video analysis to help to satisfy these needs. These works are developing condensed versions of a full length video stream through the identification of the most important and pertinent content within the stream. Most of the existing works in these areas are mainly focused on event mining. Event mining from video streams improves the accessibility and reusability of large media collections, and it has been an active area of research with notable recent progress. Event mining includes a wide range of multimedia domains such as surveillance, meetings, broadcast, news, sports, documentary, and films, as well as personal and online media collections. Due to the variety and plenty of Event mining techniques, in this paper we suggest an analytical framework to classify event mining techniques and to evaluate them based on important functional measures. This framework could lead to empirical and technical comparison of event mining methods and development of more efficient structures at future. 相似文献
53.
Javidan Kazemi Kordestani Ali Ahmadi Mohammad Reza Meybodi 《Applied Intelligence》2014,41(4):1150-1169
A new variant of Differential Evolution (DE), called ADE-Grid, is presented in this paper which adapts the mutation strategy, crossover rate (CR) and scale factor (F) during the run. In ADE-Grid, learning automata (LA), which are powerful decision making machines, are used to determine the proper value of the parameters CR and F, and the suitable strategy for the construction of a mutant vector for each individual, adaptively. The proposed automata based DE is able to maintain the diversity among the individuals and encourage them to move toward several promising areas of the search space as well as the best found position. Numerical experiments are conducted on a set of twenty four well-known benchmark functions and one real-world engineering problem. The performance comparison between ADE-Grid and other state-of-the-art DE variants indicates that ADE-Grid is a viable approach for optimization. The results also show that the proposed ADE-Grid improves the performance of DE in terms of both convergence speed and quality of final solution. 相似文献
54.
Benyamin Norouzi Seyed Mohammad Seyedzadeh Sattar Mirzakuchaki Mohammad Reza Mosavi 《Multimedia Systems》2014,20(1):45-64
In this paper, a novel algorithm for image encryption based on hash function is proposed. In our algorithm, a 512-bit long external secret key is used as the input value of the salsa20 hash function. First of all, the hash function is modified to generate a key stream which is more suitable for image encryption. Then the final encryption key stream is produced by correlating the key stream and plaintext resulting in both key sensitivity and plaintext sensitivity. This scheme can achieve high sensitivity, high complexity, and high security through only two rounds of diffusion process. In the first round of diffusion process, an original image is partitioned horizontally to an array which consists of 1,024 sections of size 8 × 8. In the second round, the same operation is applied vertically to the transpose of the obtained array. The main idea of the algorithm is to use the average of image data for encryption. To encrypt each section, the average of other sections is employed. The algorithm uses different averages when encrypting different input images (even with the same sequence based on hash function). This, in turn, will significantly increase the resistance of the cryptosystem against known/chosen-plaintext and differential attacks. It is demonstrated that the 2D correlation coefficients (CC), peak signal-to-noise ratio (PSNR), encryption quality (EQ), entropy, mean absolute error (MAE) and decryption quality can satisfy security and performance requirements (CC <0.002177, PSNR <8.4642, EQ >204.8, entropy >7.9974 and MAE >79.35). The number of pixel change rate (NPCR) analysis has revealed that when only one pixel of the plain-image is modified, almost all of the cipher pixels will change (NPCR >99.6125 %) and the unified average changing intensity is high (UACI >33.458 %). Moreover, our proposed algorithm is very sensitive with respect to small changes (e.g., modification of only one bit) in the external secret key (NPCR >99.65 %, UACI >33.55 %). It is shown that this algorithm yields better security performance in comparison to the results obtained from other algorithms. 相似文献
55.
Hamed Ahmadi Saman Zad Tootaghaj Mahmoud Reza Hashemi Shervin Shirmohammadi 《Multimedia Systems》2014,20(5):485-501
The widespread availability of broadband internet access and the growth in server-based processing have provided an opportunity to run games away from the player into the cloud and offer a new promising service known as cloud gaming. The concept of cloud gaming is to render a game in the cloud and stream the resulting game scenes to the player as a video sequence over a broadband connection. To meet the stringent network bandwidth requirements of cloud gaming and support more players, efficient bit rate reduction techniques are needed. In this paper, we introduce the concept of game attention model (GAM), which is basically a game context-based visual attention model, as a means for reducing the bit rate of the streaming video more efficiently. GAM estimates the importance of each macro-block in a game frame from the player’s perspective and allows encoding the less important macro-blocks with lower bit rate. We have evaluated nine game video sequences, covering a wide range of game genre and a spectrum of scene content in terms of details, motion and brightness. Our subjective assessment shows that by integrating this model into the cloud gaming framework, it is possible to decrease the required bit rate by nearly 25 % on average, while maintaining a relatively high user quality of experience. This clearly enables players with limited communication resources to benefit from cloud gaming with acceptable quality. 相似文献
56.
The solid‐state radical polymerization of sodium methacrylate was investigated. It was initiated by azobisisobutyronitrile, which was used as a radical initiator. Differential scanning calorimetry (DSC) was used to observe the endothermic and exothermic transitions during the polymerization reaction. Structural studies were performed with the DSC thermograms and Fourier transform infrared and ultraviolet–visible spectra, and all of the results confirmed the progress of the reaction. The obtained data revealed that the polymerization reaction proceeded completely with a 100% conversion. ΔH of this reaction was calculated with various amounts of the initiator, and the peak temperatures were determined at different heating rates. The activation energy (19.7 kcal mol?1) was also obtained by the Kissinger method for this type of solid polymerization reaction. © 2003 Wiley Periodicals, Inc. J Appl Polym Sci 90: 1648–1654, 2003 相似文献
57.
Nor?Azowa?IbrahimEmail author Faraj?Abu-Ilaiwi Mohamad?Zaki?Ab.?Rahman Mansor?B.?Ahmad Khairul?Zaman?M.?Dahlan Wan?Md?Zin?Wan?Yunus 《Journal of Polymer Research》2005,12(3):173-179
Grafting of acrylamide (AAm) onto oil palm empty fruits bunch fiber using hydrogen peroxide as initiator and methyl acrylate as comonomer was investigated. The amount of comonomer needed to make grafting of acrylamide possible was determined. The percentage of poly(acrylamide) and the comonomer in the final graft copolymer was estimated by elemental analysis. Results obtained indicated that methyl acrylate facilitated the incorporation of acrylamide monomer onto OPEFB. The reactivity ratios for both monomers were determined by using Fineman–Ross plot. The effects of reaction temperature and period as well as amount of the initiator, solvent, monomer and comonomer on the percentage of grafting at fixed amount of comonomer (11 mmol) were studied. Maximum percentage of grafting was achieved when the amount of initiator and solvent 3.98×10−3 mol and 50 mL respectively. The optimum reaction temperature was 50 ○C and the reaction period was 90 min. Highest percentage of grafting was 232% when 25.6 mmol of acrylamide was used under these optimum conditions. The presence of functional group in the grafted polymer is characterized by infrared spectroscopy and the surface morphology is observed by scanning electron microscopy. Thermoanalytic investigation on OPEFB and OPEFB-g-PAAM were carried out to evaluate the thermal stability and respective activation energy of the materials. 相似文献
58.
59.
Application of quantum-dot is a promising technology for implementing digital systems at nano-scale. QCA supports the new devices with nanotechnology architecture. This technique works based on electron interactions inside quantum-dots leading to emergence of quantum features and decreasing the problem of future integrated circuits in terms of size. In this paper, we will successfully design, implement and simulate a new full adder based on QCA with the minimum delay, area and complexities. Also, new XOR gates will be presented which are used in 8-bit controllable inverter in QCA. Furthermore, a new 8-bit full adder is designed based on the majority gate in the QCA, with the minimum number of cells and area which combines both designs to implement an 8-bit adder/subtractor in the QCA. This 8-bit adder/subtractor circuit has the minimum delay and complexity. Being potentially pipeline, the QCA technology calculates the maximum operating speed. 相似文献
60.
In this paper, we describe a procedure for the processing of SiC-whisker-reinforced MoSi2 composites via tape casting. Based on the characteristics of SiC whiskers and MoSi2 powder in aqueous and nonaqueous solvents, a slip formulation (solvent, dispersant, binder, etc.) has been developed. The formulation developed allows for a uniform distribution of SiC whiskers in the matrix, easy separation of the tapes from the polymeric carrier, convenient control of both tape thickness and orientation of SiC whiskers, and a low binder burnout temperature. The latter is important for the prevention of the oxidation of MoSi2 powder during the binder burnout in an oxidizing atmosphere. 相似文献