全文获取类型
收费全文 | 2994篇 |
免费 | 64篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 36篇 |
综合类 | 3篇 |
化学工业 | 633篇 |
金属工艺 | 34篇 |
机械仪表 | 34篇 |
建筑科学 | 197篇 |
矿业工程 | 21篇 |
能源动力 | 62篇 |
轻工业 | 160篇 |
水利工程 | 27篇 |
石油天然气 | 48篇 |
无线电 | 170篇 |
一般工业技术 | 384篇 |
冶金工业 | 815篇 |
原子能技术 | 19篇 |
自动化技术 | 418篇 |
出版年
2022年 | 27篇 |
2021年 | 35篇 |
2019年 | 34篇 |
2018年 | 36篇 |
2017年 | 54篇 |
2016年 | 48篇 |
2015年 | 42篇 |
2014年 | 42篇 |
2013年 | 179篇 |
2012年 | 71篇 |
2011年 | 104篇 |
2010年 | 83篇 |
2009年 | 93篇 |
2008年 | 105篇 |
2007年 | 109篇 |
2006年 | 95篇 |
2005年 | 110篇 |
2004年 | 74篇 |
2003年 | 96篇 |
2002年 | 68篇 |
2001年 | 74篇 |
2000年 | 51篇 |
1999年 | 64篇 |
1998年 | 97篇 |
1997年 | 65篇 |
1996年 | 69篇 |
1995年 | 45篇 |
1994年 | 40篇 |
1993年 | 40篇 |
1992年 | 38篇 |
1991年 | 32篇 |
1990年 | 53篇 |
1989年 | 46篇 |
1988年 | 47篇 |
1987年 | 52篇 |
1986年 | 35篇 |
1985年 | 49篇 |
1984年 | 39篇 |
1983年 | 35篇 |
1982年 | 37篇 |
1981年 | 32篇 |
1980年 | 26篇 |
1979年 | 34篇 |
1978年 | 34篇 |
1977年 | 30篇 |
1976年 | 49篇 |
1975年 | 30篇 |
1974年 | 32篇 |
1973年 | 42篇 |
1972年 | 23篇 |
排序方式: 共有3061条查询结果,搜索用时 15 毫秒
41.
Mayuresh Patole Santanu Bandyopadhyay Dominic C. Y. Foo Raymond R. Tan 《Clean Technologies and Environmental Policy》2017,19(7):1967-1975
Pinch analysis was initially developed as a methodology for optimizing energy efficiency in process plants. Applications of pinch analysis applications are based on common principles of using stream quantity and quality to determine optimal system targets. This initial targeting step identifies the pinch point, which then allows complex problems to be decomposed for the subsequent design of an optimal network using insights drawn from the targeting stage. One important class of pinch analysis problems is energy planning with footprint constraints, which began with the development of carbon emissions pinch analysis; in such problems, energy sources and demands are characterized by carbon footprint as the quality index. This methodology has been extended by using alternative quality indexes that measure different sustainability dimensions, such as water footprint, land footprint, emergy transformity, inoperability risk, energy return on investment and human fatalities. Pinch analysis variants still have the limitation of being able to use one quality index at a time, while previous attempts to develop pinch analysis methods using multiple indices have only been partially successful for special cases. In this work, a multiple-index pinch analysis method is developed by using an aggregate quality index, based on a weighted linear function of different quality indexes normally used in energy planning. The weights used to compute the aggregate index are determined via the analytic hierarchy process. A case study for Indian power sector is solved to illustrate how this approach allows multiple sustainability dimensions to be accounted for in energy planning. 相似文献
42.
Presents an editorial on the 50th Anniversary Issue of The American Psychologist by the CEO and Executive Vice President of the American Psychological Association. An overview of changes to the journal and the developments in electronic communications pare presented, and the implications for international exchange in scholarly publishing are discussed. (0 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
43.
A growing number of patients are recognised to have chronic kidney disease (CKD). However, only a minority will progress to end-stage renal disease requiring dialysis or transplantation. Currently available diagnostic and staging tools frequently fail to identify those at higher risk of progression or death. Furthermore within specific disease entities there are shortcomings in the prediction of the need for therapeutic interventions or the response to different forms of therapy. Kidney and urine proteomic biomarkers are considered as promising diagnostic tools to predict CKD progression early in diabetic nephropathy, facilitating timely and selective intervention that may reduce the related health-care expenditures. However, independent groups have not validated these findings and the technique is not currently available for routine clinical care. Furthermore, there are gaps in our understanding of predictors of progression or need for therapy in non-diabetic CKD. Presumably, a combination of tissue and urine biomarkers will be more informative than individual markers. This review identifies clinical questions in need of an answer, summarises current information on proteomic biomarkers and CKD, and describes the European Kidney and Urine Proteomics initiative that has been launched to carry out a clinical study aimed at identifying urinary proteomic biomarkers distinguishing between fast and slow progressors among patients with biopsy-proven primary glomerulopathies. 相似文献
44.
Examining knowledge contribution from the perspective of an online identity in blogging communities 总被引:1,自引:0,他引:1
Knowledge contribution is one of the essential factors behind the success of blogging communities (BCs). This research studies knowledge contribution behavior in a BC from the perspective of knowledge contributors and their characteristics using the lens of social identity theory. Social identity theory asserts that individuals are fundamentally motivated to present or communicate their identities in everyday social life through behavior. A similar line of reasoning can be used to argue that members of a BC would also be motivated to communicate their online identities through their behavior, that is, through knowledge contribution in the BC. Specifically, this study conceptualized the online identity and examined the effects of its personal (online kindness, online social skills, and online creativity) and social aspects (BC involvement) on knowledge contribution. The data was collected using an online survey from the members of Cyworld, a popular BC in South Korea and a few other countries (members from South Korea were included in this study). The results indicate that both the personal and social aspects of online identity and their interactions significantly influenced knowledge contribution. Based on the findings, this study offers suggestions to organizers of BCs to enhance the knowledge contribution from their members. 相似文献
45.
This laboratory study examined the possibility of using a car seat instrumented with a tactile display to communicate directional information to a driver. A car seat fitted with an 8 × 8 matrix of vibrators embedded in the seat pan was used to code eight different directions. Localization response time and angular accuracy were examined as a function of stimulus direction, presence of a tactile attention cue, temporal pattern, stimulus layout, age, and gender. The mean absolute angular error was 23°, and both localization accuracy and response times were superior for the back left, backward, and back right directions. Of the various temporal pattern/attention cue combinations examined, results favored the relatively fast patterns consisting of vibration bursts of 125 or 250 ms without a centrally located attention cue over 500 ms bursts that were preceded by an attention cue. Observed age and gender effects were relatively modest, suggesting that using tactile cueing to communicate direction is effective across a wide range of users. In addition, the tactile stimulus was detected by more than 90% of the participants under surprise trial conditions. Overall, these results indicate that the tactile chair provides a promising and robust method of providing directional information. 相似文献
46.
Matthew R. Graham Author Vitae Author Vitae Raymond A. de Callafon Author Vitae 《Automatica》2009,45(6):1489-1496
This paper introduces an alternative formulation of the Kalman-Yakubovich-Popov (KYP) Lemma, relating an infinite dimensional Frequency Domain Inequality (FDI) to a pair of finite dimensional Linear Matrix Inequalities (LMI). It is shown that this new formulation encompasses previous generalizations of the KYP Lemma which hold in the case the coefficient matrix of the FDI does not depend on frequency. In addition, it allows the coefficient matrix of the frequency domain inequality to vary affinely with the frequency parameter. One application of this results is illustrated in an example of computing upper bounds to the structured singular value with frequency-dependent scalings. 相似文献
47.
Abdullah Azfar Kim-Kwang Raymond Choo Lin Liu 《Multimedia Tools and Applications》2017,76(3):3313-3341
Android productivity apps have provided the facility of having a constantly accessible and productive workforce to the information and work capabilities needed by the users. With hundreds of productivity apps available in the Android app market, it is necessary to develop a taxonomy for the forensic investigators and the end users to allow them to know what personal data remnants are available from the productivity apps. In this paper, 30 popular Android productivity apps were examined. A logical extraction of the Android phone was collected by using a well-known mobile forensic tool- XRY to extract various information of forensic interest such as user email ID and list of tasks. Based on the findings, a two-dimensional taxonomy of the forensic artefacts of the productivity apps is proposed with the app categories in one dimension and the classes of artefacts in the other dimension. The artefacts identified in the study of the apps are summarised using the taxonomy. In addition, a comparison with the existing forensic taxonomies of different categories of Android apps is provided to facilitate timely collection and analysis of evidentiary materials from mobile devices. 相似文献
48.
Yu-Chen Hu Kim-Kwang Raymond Choo Wu-Lin Chen 《Multimedia Tools and Applications》2017,76(14):15435-15463
To ensure the integrity of images compressed using block truncation coding (BTC), a tamper detection and image recovery scheme is proposed in this paper. In this scheme, the size of the authentication data can be adaptively selected according to the user’s requirement. The authentication data is embedded in the value differences of the quantization levels in each BTC-compressed image block. Multiple copies of the recovery data are embedded into the bit maps of the smooth blocks. Experimental results show that the proposed scheme performs well in terms of detection precision and the embedded image quality. Meanwhile, the tampered areas can be roughly recovered by using the proposed scheme. 相似文献
49.
Spacecraft formation reconfiguration with collision avoidance 总被引:1,自引:0,他引:1
In this paper we present a behavioral control solution for reconfiguration of a spacecraft formation using the Null-Space Based (NSB) concept. The solution is task based, and aims to reconfigure and maintain a rigid formation while avoiding collisions between spacecraft. A model of relative translation is derived, together with a passivity-based sliding surface controller which globally stabilizes the equilibrium point of the closed-loop system. The NSB control method is implemented by giving each task different priorities and then calculating desired velocity and a Jacobian matrix for each spacecraft and each task. The velocity vector for each task is then projected into the null-space for higher prioritized tasks to remove conflicting velocity components. Simulation results are presented, showing that each spacecraft moves into the predefined formation without breaking any rules for the higher priority tasks, and all collisions are avoided. 相似文献
50.
Deepak Kapur Victor L. Winter Raymond S. Berg 《Electronic Notes in Theoretical Computer Science》2001,50(1)
The use of formal methods for analyzing and synthesizing a controller for a multi-train multi-track railway system is discussed. The research was motivated by a case study involving the Bay Area Rapid Transit (BART) system. The overall goal is to design a train acceleration control function that enables trains to be safely placed but also increases system throughput. The use of a modeling language for specifying safety properties and a control function is illustrated. The program transformation methodology supported in the HATS system is employed to generate an efficient implementation from a high-level specification of a controller. This implementation can then be used to simulate the controller behavior, thus further enhancing confidence in the design. Properties of optimization transformations can be verified using an rewrite-rule based induction theorem prover Rewrite Rule Laboratory (RRL). 相似文献