全文获取类型
收费全文 | 2987篇 |
免费 | 233篇 |
国内免费 | 11篇 |
专业分类
电工技术 | 51篇 |
综合类 | 18篇 |
化学工业 | 562篇 |
金属工艺 | 56篇 |
机械仪表 | 68篇 |
建筑科学 | 167篇 |
矿业工程 | 12篇 |
能源动力 | 85篇 |
轻工业 | 214篇 |
水利工程 | 31篇 |
石油天然气 | 30篇 |
无线电 | 343篇 |
一般工业技术 | 612篇 |
冶金工业 | 343篇 |
原子能技术 | 17篇 |
自动化技术 | 622篇 |
出版年
2023年 | 40篇 |
2022年 | 57篇 |
2021年 | 109篇 |
2020年 | 80篇 |
2019年 | 91篇 |
2018年 | 104篇 |
2017年 | 87篇 |
2016年 | 116篇 |
2015年 | 102篇 |
2014年 | 123篇 |
2013年 | 226篇 |
2012年 | 144篇 |
2011年 | 241篇 |
2010年 | 149篇 |
2009年 | 169篇 |
2008年 | 166篇 |
2007年 | 177篇 |
2006年 | 131篇 |
2005年 | 97篇 |
2004年 | 59篇 |
2003年 | 56篇 |
2002年 | 56篇 |
2001年 | 47篇 |
2000年 | 44篇 |
1999年 | 33篇 |
1998年 | 67篇 |
1997年 | 50篇 |
1996年 | 30篇 |
1995年 | 29篇 |
1994年 | 32篇 |
1993年 | 19篇 |
1992年 | 20篇 |
1991年 | 12篇 |
1990年 | 18篇 |
1989年 | 22篇 |
1988年 | 17篇 |
1987年 | 15篇 |
1986年 | 9篇 |
1985年 | 18篇 |
1984年 | 13篇 |
1983年 | 14篇 |
1982年 | 15篇 |
1981年 | 14篇 |
1980年 | 9篇 |
1979年 | 10篇 |
1978年 | 7篇 |
1977年 | 9篇 |
1976年 | 13篇 |
1975年 | 12篇 |
1974年 | 13篇 |
排序方式: 共有3231条查询结果,搜索用时 15 毫秒
31.
Using a mixed method approach of questionnaires, observations and field notes, the authors have studied a number of settings during the past two years which have focussed on the development of ICT capability through play. Some of these have involved children identified as disaffected or disadvantaged, whilst others have involved initial teacher education students. In this paper, we consider some of the results obtained from the most recent of these settings, relate these to those obtained from the other settings, and explore further a number of inter-related issues which have arisen from the analysis. We particularly focus on the effect of learners’ self-esteem and self-efficacy; the influence of gender-related characteristics; the role of interaction between learners during activity; and the value of reflection. 相似文献
32.
The Beaver Creek confluence with the main‐stem Klamath River was studied to assess salmonid use in a thermal mixing zone under various summer hydrological and meteorological conditions. Main‐stem flow releases from Iron Gate Dam ranged from 17 cms (615 cfs) to 37 cms (1320 cfs) during the study period and main‐stem water temperatures ranged from 19.5 to 26°C. A grid was constructed to define the thermal refuge as a system of cells. Temperatures were monitored using remote temperature loggers and fish counts were conducted using daytime snorkelling. Most juvenile salmonids were observed moving into the refuge when main‐stem temperatures exceeded 22–23°C. Salmonids in the thermal refuge did not necessarily seek the coolest water, but were generally located in habitats commensurate with species‐specific behavioural needs within their thermal tolerance range. Such ranges largely occurred within refuge areas. Variable meteorological conditions confounded observable biological thermal benefit to fish resulting from higher or lower main‐stem flows. Thermal regime dynamics indicated that under the hydrological and meteorological conditions observed, higher flows from Iron Gate Dam showed some ability to change the structure of the refuge area. It appeared that without the thermal refuge, main‐stem flows alone could not sustain the salmonid population because high water temperatures usually exceeded their published thermal tolerance limits. Copyright © 2007 John Wiley & Sons, Ltd. 相似文献
33.
Rodolfo Matamoros Gerald R. Graves Avinash Waikar Magd Zohdi 《Computers & Industrial Engineering》1989,16(4):515-523
The computer industry has evolved very rapidly from single-user computers to computer networks where users are able to share both local and remote files. Networks of microcomputers facilitate the integration of all information processing for distributed applications such as database processing and electronic mail. One management application of promising potential for computer networks is distributed simulation. Simulation analysis can be useful to essentially all problem-solving and decision-making on the job.
To implement a particular distributed application, computer communication between processors must be considered. Unlike expensive multiprocessor computers, networks of less-expensive microcomputers do not have pre-established communication paths between processors. This paper addresses how this obstacle may be overcome by using communication protocols based on the Open Systems Interconnection (OSI) reference model. Protocol services needed to support a distributed simulation environment will be identified, and their implementation through a prototype will then be investigated and evaluated. 相似文献
34.
Alex H. Barbat Miguel Cervera Alex Hanganu Cruz Cirauqui Eugenio Oñate 《Nuclear Engineering and Design》1998,180(3):251-270
The evaluation of the failure pressure of the containment building of a large dry PWR-W three loops nuclear power plant, based on computer numerical simulation, is described in this paper. The proposed method considers fully three-dimensional finite element models in order to take into account the effect of the most significant structural characteristics (presence of three buttresses, penetrations, additional reinforcement around the penetrations, etc.), the lack of symmetry of the forces generated by the prestressing system, as well as the nonlinear behaviour of the materials and the sensitivity of the results to uncertainties associated with several parameters. The computational model is completely described, including the constitutive equations for the concrete, the reinforcing steel and prestressing tendons, the spatial discretization—isoparametric elements including the reinforcement are used. The structural models and the analyses performed for their calibration are also described. The influence on the failure pressure of incorporating the foundation slab in the structural model, and the influence of the thermal effects, are discussed. One of the conclusions of the numerical study is that the failure process can be appropriately simulated by means of a structural model which does not include either the foundation slab or the thermal effects. Finally, results of a probabilistic simulation of the failure pressure are given. 相似文献
35.
A model for predicting film thickness profiles around topographical features during spin coating is presented. This model is applicable to features of arbitrary geometry in the two lateral dimensions. This generally permits study of the planarization of real device structures, including both isolated and neighboring features, with any orientation with respect to the wafer center. Predictions from this model agree qualitatively with measured thin-film profiles from interferograms taken during spinning. Phenomena such as pile-up and wakes result from interactions between surface tension and other driving forces in the flow 相似文献
36.
To clarify some of the solid-state aspects of cold fusion in deuterated transition metal electrodes, we have carried out first-principles self-consistent total energy calculations for various configurations of atomic and diatomic deuterium inside fcc palladium. We find that the stability of the Pd+D system is controlled by the relative position of the deuterium-inducedantibonding level with respect to the Fermi energy. The equilibrium D-D distance in dense PdD
up to =3 is found to be much larger than the free space value. The calculated Born-Oppenheimer energy surface of diatomic D2 in crystalline palladiuim is shown to have but metastable local minima whose internuclear separation is at least 0.2 Ålarger than that of the isolated D2 molecule. We conclude that D2 incrystalline Pd will have a substantially lower tunneling probability than hitherto thought and that explanation for fusion mechanisms should be sought elsewhere. 相似文献
37.
Phan Alex Truong Phuong Schade Christoph Vasan Aditya Friend James Talke Frank E. 《Microsystem Technologies》2021,27(6):2473-2479
Microsystem Technologies - “Zero drift” behavior of an optical intraocular pressure sensor is studied using an analytical model based on the deflection of a circular membrane. Results... 相似文献
38.
39.
Long Tran-Thanh Alex Rogers Nicholas R. Jennings 《Autonomous Agents and Multi-Agent Systems》2012,25(2):352-394
This paper reports on the development of a multi-agent approach to long-term information collection in networks of energy harvesting wireless sensors. In particular, we focus on developing energy management and data routing policies that adapt their behaviour according to the energy that is harvested, in order to maximise the amount of information collected given the available energy budget. In so doing, we introduce a new energy management technique, based on multi-armed bandit learning, that allows each agent to adaptively allocate its energy budget across the tasks of data sampling, receiving and transmitting. By using this approach, each agent can learn the optimal energy budget settings that give it efficient information collection in the long run. Then, we propose two novel decentralised multi-hop algorithms for data routing. The first proveably maximises the information throughput in the network, but can sometimes involve high communication cost. The second algorithm provides near-optimal performance, but with reduced computational and communication costs. Finally, we demonstrate that, by using our approaches for energy management and routing, we can achieve a 120% improvement in long-term information collection against state-of-the-art benchmarks. 相似文献
40.
Cookies are the primary means for web applications to authenticate HTTP requests and to maintain client states. Many web applications (such as those for electronic commerce) demand a secure cookie scheme. Such a scheme needs to provide the following four services: authentication, confidentiality, integrity, and anti-replay. Several secure cookie schemes have been proposed in previous literature; however, none of them are completely satisfactory. In this paper, we propose a secure cookie scheme that is effective, efficient, and easy to deploy. In terms of effectiveness, our scheme provides all of the above four security services. In terms of efficiency, our scheme does not involve any database lookup or public key cryptography. In terms of deployability, our scheme can be easily deployed on existing web services, and it does not require any change to the Internet cookie specification. We implemented our secure cookie scheme using PHP and conducted experiments. The experimental results show that our scheme is very efficient on both the client side and the server side.A notable adoption of our scheme in industry is that our cookie scheme has been used by Wordpress since version 2.4. Wordpress is a widely used open source content management system. 相似文献