全文获取类型
收费全文 | 299篇 |
免费 | 2篇 |
专业分类
电工技术 | 7篇 |
化学工业 | 50篇 |
金属工艺 | 1篇 |
机械仪表 | 3篇 |
建筑科学 | 3篇 |
能源动力 | 9篇 |
轻工业 | 12篇 |
水利工程 | 1篇 |
无线电 | 14篇 |
一般工业技术 | 77篇 |
冶金工业 | 78篇 |
原子能技术 | 12篇 |
自动化技术 | 34篇 |
出版年
2020年 | 1篇 |
2019年 | 3篇 |
2018年 | 3篇 |
2017年 | 4篇 |
2016年 | 4篇 |
2015年 | 1篇 |
2014年 | 7篇 |
2013年 | 11篇 |
2012年 | 6篇 |
2011年 | 11篇 |
2010年 | 7篇 |
2009年 | 7篇 |
2008年 | 17篇 |
2007年 | 17篇 |
2006年 | 12篇 |
2005年 | 14篇 |
2004年 | 9篇 |
2003年 | 13篇 |
2002年 | 13篇 |
2001年 | 4篇 |
2000年 | 13篇 |
1999年 | 8篇 |
1998年 | 18篇 |
1997年 | 8篇 |
1996年 | 9篇 |
1995年 | 7篇 |
1994年 | 8篇 |
1993年 | 8篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 7篇 |
1989年 | 4篇 |
1988年 | 7篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 5篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 4篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1977年 | 4篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1973年 | 1篇 |
1971年 | 1篇 |
1970年 | 1篇 |
1967年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有301条查询结果,搜索用时 0 毫秒
71.
Susan M Grimes Gary H Taylor Jeffrey Cooper 《Journal of chemical technology and biotechnology (Oxford, Oxfordshire : 1986)》1999,74(12):1125-1130
Organic waste can be recycled as compost which has traditionally been used as a soil improver. As more waste is recycled as compost, it is becoming increasingly important to find alternative uses for compost. Leachability data are used to determine the environmental availability of Cd, Cu, Pb, and Zn contained in natural compost. Batch sorption data are used to determine uptake of additional Cd, Cu, Pb, and Zn by compost and assess its potential use in remediation work, as an alternative to natural materials such as peat. The relative binding of these additional metals to compost is found to be in the order Pb > Cd ≈ Cu > Zn. The sorption of metals on compost takes place, at least in part, by exchange of calcium bound to the compost and there is evidence that the sorption occurs in both humic and non‐humic sites in the compost. The use of compost to bind metals in remediation work is discussed. © 1999 Society of Chemical Industry 相似文献
72.
Nageh K. Allam Karthik Shankar Craig A. Grimes 《Advanced materials (Deerfield Beach, Fla.)》2008,20(20):3942-3946
73.
Owen Edward L. Morack Marvin M. Herskind C. Curtis Grimes Arthur S. 《Industry Applications, IEEE Transactions on》1984,(2):298-308
Some of the early electronic power converters utilized mercury-arc rectifiers such as thyratrons and ignitrons. Their use in an-ac adjustable-speed drive began about 50 years ago. The first commercial application in the United States was made to an induced draft fan at the Logan station. This drive was in service for about 25 years. The early history of ac adjustable-speed drives which employed electronic power conversion is reviewed. 相似文献
74.
Andrea Grimes Parker 《Personal and Ubiquitous Computing》2014,18(7):1737-1752
Previous work has examined how technology can support health behavior monitoring in social contexts. These tools incentivize behavior documentation through the promise of virtual rewards, rich visualizations, and improved co-management of disease. Social influence is leveraged to motivate improved behaviors through friendly competition and the sharing of emotional and informational support. Prior work has described how by documenting and sharing behaviors in these tools, people engage in performances of the self. This performance happens as users selectively determine what information to share and hide, crafting a particular portrayal of their identity. Much of the prior work in this area has examined the implications of systems that encourage people to share their behaviors with friends, family, and geographically distributed strangers. In this paper, we report upon the performative nature of behavior sharing in a system created for a different social group: the local neighborhood. We designed Community Mosaic (CM), a system with a collectivistic focus: this tool asks users to document their behaviors using photographs and text, but not for their own benefit—for the benefit of others in their community. Through a 6-week deployment of CM, we evaluated the nature of behavior sharing in this system, including participants’ motivations for sharing, the way in which this sharing happened, and the reflexive impact of sharing. Our findings highlight the performative aspects of photograph staging and textual narration and how sharing this content led participants to become more aware and evaluative of their behaviors, and led them to try to eat more healthfully. We conclude with recommendations for behavior monitoring tools, specifically examining the implications of users’ perceived audience and automated behavioral tracking on opportunities for reflection-through-performance. 相似文献
75.
Jeffrey L. Jenkins Mark Grimes Jeffrey Gainer Proudfoot 《Information Technology for Development》2014,20(2):196-213
Password reuse – using the same password for multiple accounts – is a prevalent phenomenon that can make even the most secure systems vulnerable. When passwords are reused across multiple systems, hackers may compromise accounts by stealing passwords from low-security sites to access sites with higher security. Password reuse can be particularly threatening to users in developing countries in which cybersecurity training is limited, law enforcement of cybersecurity is non-existent, or in which programs to secure cyberspace are limited. This article proposes a two-pronged solution for reducing password reuse through detection and mitigation. First, based on the theories of routine, cognitive load and motor movement, we hypothesize that password reuse can be detected by monitoring characteristics of users' typing behavior (i.e. keystroke dynamics). Second, based on protection motivation theory, we hypothesize that providing just-in-time fear appeals when a violation is detected will decrease password reuse. We tested our hypotheses in an experiment and found that users' keystroke dynamics are diagnostic of password reuse. By analyzing changes in typing patterns, we were able to detect password reuse with 81.71% accuracy. We also found that just-in-time fear appeals decrease password reuse; 88.41% of users who received a fear appeal subsequently created unique passwords, whereas only 4.45% of users who did not receive a fear appeal created unique passwords. Our results suggest that future research should continue to examine keystroke dynamics as an indicator of cybersecurity behaviors and use just-in-time fear appeals as a method for reducing non-secure behavior. The findings of our research provide a practical and cost-effective solution to bolster cybersecurity through discouraging password reuse. 相似文献
76.
Propagation of electromagnetic waves in the ultraviolet-visible range (300 to 600 nm) through a unique highly-ordered titania nanotube array structure is studied using the computational technique of Finite Difference Time Domain (FDTD). Through numerical simulation the transmittance, reflectance and absorbance of the nanotube-arrays are obtained as a function of tube length and diameter. The nanotube-arrays are found to completely absorb light having wavelengths less than approximately 330 nm. For wavelengths above 380 nm absorption increases as a function of nanotube length, while above 435 nm absorption increases with decreasing pore size. Computational simulations closely match experimental measurements, indicating the suitability of the computational technique for guiding material optimization. 相似文献
77.
Axial, low cycle fatigue properties of 25 and 44 fiber vol pct SiC/Ti(6Al-4V) composites, measured at 650 °C, were compared
with the fatigue properties of unreinforced Ti(6Al-4V) at the same temperature. A prior study of the fatigue behavior of this
composite system at room temperature indicated that the SiC fiber reinforcement did not provide the anticipated improvement
of fatigue resistance of this alloy. At 650 °C, the composite fatigue properties degraded somewhat from those at room temperature.
However, these properties degraded more for the unreinforced matrix at 650 °C with the result that the composite fatigue strength
was two to three times the fatigue strength of the matrix alloy. The reasons for this reversal are discussed in terms of crack
initiation at broken fibers and residual matrix stresses. 相似文献
78.
Hayes G.R. Shehan Poole E. Iachello G. Patel S.N. Grimes A. Adowd G.D. Truong K.N. 《Pervasive Computing, IEEE》2007,6(4):56-63
Pervasive computing designers and researchers often create services and applications to help people record their experiences. At the same time, cheap, small, and easy-to-deploy recording technologies are quickly emerging throughout public spaces. In many ways, these technologies are pervasive computing realized. Understanding how people deal with audio and video recording is therefore a good way to explore how people might adopt, adapt, and react to pervasive computing technologies in general. A long-term deployment of a system for recording experiences in informal spaces demonstrates that people use physical, social, and experiential knowledge to determine new technologies' relative utility and safety. In this paper, we aim to add significantly to the research surrounding security and privacy concerns by focusing on them rather than just noting them as a side effect of testing an application's utility and usability. 相似文献
79.
Keat G. Ong Oomman K. Varghese Gopal K. Mor Karthik Shankar Craig A. Grimes 《Solar Energy Materials & Solar Cells》2007,91(4):250-257
We examine the light absorbing behavior of dye-sensitized solar cells (DSCs) having cathodes (negative electrodes) comprised of highly ordered TiO2 nanotube arrays using the electromagnetic computational technique, finite-difference time domain (FDTD). The highly ordered nanotube arrays, grown using anodic oxidation of titanium foils or thin films, feature an open end with the other end fixed on a dense oxide layer (barrier layer). The numerical simulation model is comprised of nanotube arrays on a transparent conducting glass substrate under front-side illumination. In the FDTD analysis, a transverse electromagnetic (TEM) wave is incident onto a N719 dye-coated nanotube array initially passing through the barrier layer; light that emerges from the nanotubes is reflected by a perfectly conducting layer (perfect electric conductor—PEC) boundary that simulates the effect of the DSC platinum counter electrode. An observation plane placed between the electromagnetic source and DSC detects the intensity of both the incident wave and the wave returning back from the DSC structure. The absorbance and transmittance spectra are determined in the wavelength range 300–700 nm as a function of nanotube-array dimensions including length, pore size, barrier layer thickness, and surface roughness while keeping the wall thickness constant at 12 nm. The validity of the computational simulations is experimentally verified. A significant increase in the light absorption by the dye-coated nanotubes was observed for increasing nanotube length; smaller pore sizes, and increased surface roughness. Changes in the barrier layer thickness had a negligible effect on the absorbance spectrum. Our efforts demonstrate FDTD to be a broadly applicable technique capable of guiding design of an optimal DSC architecture. 相似文献
80.
An atomistic simulation technique has been used to predict the spatial arrangement of the dopant species sodium, lithium, and chlorine within the zinc oxide lattice. The alkaline oxides are preferentially incorporated via a self-compensating mode, forming interstitial cations which hinder the migration of zinc interstitials and hence slow the degradation of the varistor. The addition of chloride ions is shown to negate this effect by forming sodium and chloride substitutional defects rather than any species involving sodium interstitial ions. 相似文献