全文获取类型
收费全文 | 4473篇 |
免费 | 2篇 |
专业分类
电工技术 | 8篇 |
综合类 | 2篇 |
化学工业 | 98篇 |
金属工艺 | 6篇 |
机械仪表 | 21篇 |
建筑科学 | 45篇 |
矿业工程 | 5篇 |
能源动力 | 29篇 |
轻工业 | 90篇 |
水利工程 | 9篇 |
石油天然气 | 4篇 |
无线电 | 156篇 |
一般工业技术 | 162篇 |
冶金工业 | 3725篇 |
原子能技术 | 8篇 |
自动化技术 | 107篇 |
出版年
2021年 | 8篇 |
2020年 | 7篇 |
2019年 | 12篇 |
2018年 | 9篇 |
2017年 | 12篇 |
2016年 | 11篇 |
2015年 | 12篇 |
2014年 | 13篇 |
2013年 | 64篇 |
2012年 | 23篇 |
2011年 | 30篇 |
2010年 | 20篇 |
2009年 | 24篇 |
2008年 | 30篇 |
2007年 | 33篇 |
2006年 | 35篇 |
2005年 | 33篇 |
2004年 | 30篇 |
2003年 | 26篇 |
2002年 | 17篇 |
2001年 | 19篇 |
2000年 | 24篇 |
1999年 | 125篇 |
1998年 | 1019篇 |
1997年 | 615篇 |
1996年 | 388篇 |
1995年 | 225篇 |
1994年 | 217篇 |
1993年 | 232篇 |
1992年 | 54篇 |
1991年 | 65篇 |
1990年 | 66篇 |
1989年 | 75篇 |
1988年 | 73篇 |
1987年 | 75篇 |
1986年 | 68篇 |
1985年 | 66篇 |
1984年 | 15篇 |
1983年 | 21篇 |
1982年 | 33篇 |
1981年 | 31篇 |
1980年 | 45篇 |
1979年 | 9篇 |
1978年 | 23篇 |
1977年 | 111篇 |
1976年 | 248篇 |
1975年 | 14篇 |
1973年 | 8篇 |
1972年 | 10篇 |
1971年 | 7篇 |
排序方式: 共有4475条查询结果,搜索用时 0 毫秒
101.
102.
This study documents the characteristics of bainite transformations in deformed austenite during continuous cooling of a low-carbon microalloyed steel. In particular, it describes the distinguishing features of the two types of bainite observed: conventional bainite (CB) and acicular ferrite (AF). CB nucleates at prior austenite grain boundaries and grows as packets of parallel ferrite laths. Growth of CB packets is limited by either the deformation substructure (“mechanical stabilization”) or austenite grain boundaries. AF nucleates at intragranular sites and grows as individual ferrite laths or groups of parallel laths. In an AF group of parallel laths, some neighboring laths have the same orientation, but a significant number have dissimilar orientations. Neighboring laths having dissimilar orientation are two variants of either Kurdjumov–Sachs (KS) or Nishiyama–Wasserman (NW). It is proposed that the AF nucleation sites are dislocation boundaries having a relatively high misorientation (i.e., microbands (MBs) and minimized by the variant selection mechanism). 相似文献
103.
A bistable electromagnetically actuated microvalve was designed, processed, and tested. The valve was designed to control a water flow of 0.05-0.5 μs from a reservoir at a pressure of 1-2000 Pa. The two valve components were fabricated in silicon, the upper piece comprises an electroplated gold coil, and the lower piece is an Ni/Fe alloy beam. The bistable capability was achieved by balancing the elastic forces on the beam with the magnetic forces due to a 46-μm-thick rolled magnetic foil. The design includes the flow through the orifice, squeeze film damping due to beam motion, beam elasticity, and electromagnetics. The microvalve was tested for power consumption, flow rate, time response, Ni/Fe alloy composition, and magnetic foil properties. The valve operates at 1-2 V in both air and water 相似文献
104.
Stanczyk T. Ilic B. Hesketh P.J. Boyd J.G. IV 《Journal of microelectromechanical systems》2000,9(3):314-320
A large-displacement electrochemical actuator was designed, fabricated, and tested. The large displacement is obtained by using a corrugated membrane made by physical vapor deposition of Parylene sandwiched with an intermediate layer of sputtered platinum. The layered structure is approximately 8-μm thick, with 26 grooves approximately 120-μm deep, and with a radial period of 350 μm. The electrochemical cell consists of platinum electrodes with a 1 M H2 SO4 solution. Hydrogen and oxygen gas is generated to displace the membrane. Although the actuator can operate at a voltage as low as 1.23 V, the experimentally determined efficiency of converting electrical energy to mechanical work is only 0.37%. The governing equations for the conservation of mass, momentum (equilibrium), energy, and the entropy generation rate were formulated assuming that the gas bubbles either nucleate without growth or grow without nucleation. For the nucleation case, simulations were performed for constant pressure isothermal actuation, and the average experimental efficiency was bounded by simulations with gas bubble radii between 1×10-6 m and 1×10-6 m. The predicted ratio of the power dissipated to the electrical power supplied is 1.37 for isothermal actuation 相似文献
105.
Younes Seifi Suriadi Suriadi Ernest Foo Colin Boyd 《International Journal of Information Security》2015,14(3):221-247
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan. 相似文献
106.
This paper investigates the fundamental difference between a simple e-tender box and a traditional physical tender box, and
highlights a series of security traps created by the functional differences. Based on our findings, we have defined the security
requirements for an e-tender submission protocol. We also discuss functional limitations of cryptographic technologies. As
a result, two secure e-tender submission protocols are proposed which enable a secure e-tender submission. Protocols are assumed
to run under the condition that all tendering parties (principal and tenderers) are dishonest players. Our informal and formal
security analysis show that these protocols meet their security goals under well known collusion scenarios. Because security
is a process not a product, our approach will have broad industry application for developing secure electronic business processes
in areas other than e-tendering.
相似文献
Colin BoydEmail: |
107.
D. S. Boyd 《International journal of remote sensing》2013,34(5):1017-1023
The use of middle infrared (MIR) radiation (3.0-5.0 mu m) at the regional scale may be unreliable for biophysical estimation, should be corrected for thermal emission and MIR reflectance used in its place. This study considered the potential use of MIR reflectance for studying tropical forests, with the relationship between MIR reflectance and estimated total biomass of the tropical forests of Cameroon derived. Comparisons were drawn with relationships between estimated total biomass and visible reflectance, near infrared reflectance, MIR radiation and surface temperature. Relationships between two vegetation indices, the NDVI and VI3, and estimated total biomass were also explored. It was found that correcting MIR radiation for thermal emission increased the strength of the relationship between radiation acquired in MIR wavelengths and estimated total biomass. The use of MIR reflectance, either alone or within the vegetation index VI3, provided the strongest relationship with estimated total biomass. This suggests that MIR reflectance may be more sensitive to changes in forest properties than the reflectance in visible and NIR wavelengths. It is recommended that MIR reflectance should be adopted more widely for the remote sensing of tropical forests. 相似文献
108.
D. S. Boyd P. C. Phipps G. M. Foody R. P. D. Walsh 《International journal of remote sensing》2013,34(23):5141-5147
The ever-wet tropics are under threat from ENSO events and there is a need for a monitoring system to analyse and describe their responses to such events. This letter explores the relative value of using NOAA AVHRR middle infrared (MIR) reflectance data and NDVI data for the monitoring of ENSO-related drought stress of a tropical forest ecosystem in Sabah, Malaysia. Relationships between rainfall and MIR reflectance were examined. Correlation coefficients are generally large and significant (at 0.1 level) while those between rainfall and NDVI were small and insignificant. This letter concludes that there is potential in using MIR reflectance for monitoring the effects of ENSO-induced drought stress on these forests and this has a bearing on how NOAA AVHRR data may be used to further our knowledge on the impacts of ENSO events on tropical forest environments. 相似文献
109.
Control applications of nonlinear convex programming 总被引:2,自引:0,他引:2
Since 1984 there has been a concentrated effort to develop efficient interior-point methods for linear programming (LP). In the last few years researchers have begun to appreciate a very important property of these interior-point methods (beyond their efficiency for LP): they extend gracefully to nonlinear convex optimization problems. New interior-point algorithms for problem classes such as semidefinite programming (SDP) or second-order cone programming (SOCP) are now approaching the extreme efficiency of modern linear programming codes. In this paper we discuss three examples of areas of control where our ability to efficiently solve nonlinear convex optimization problems opens up new applications. In the first example we show how SOCP can be used to solve robust open-loop optimal control problems. In the second example, we show how SOCP can be used to simultaneously design the set-point and feedback gains for a controller, and compare this method with the more standard approach. Our final application concerns analysis and synthesis via linear matrix inequalities and SDP. 相似文献
110.
Lin Xiao Johansson M. Hindi H. Boyd S. Goldsmith A. 《Automatic Control, IEEE Transactions on》2003,48(1):148-153
We consider a linear control system in which several signals are transmitted over communication channels with bit rate limitations. With the coding and medium access schemes of the communication system fixed, the achievable bit rates are determined by the allocation of communications resources such as transmit powers and bandwidths, to different communication channels. We model the effect of bit rate limited communication channels by uniform quantization and the quantization errors are modeled by additive white noises whose variances depend on the achievable bit rates. We optimize the stationary performance of the linear system by jointly allocating resources in the communication system and tuning parameters of the controller. 相似文献