全文获取类型
收费全文 | 2046篇 |
免费 | 112篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 23篇 |
综合类 | 4篇 |
化学工业 | 496篇 |
金属工艺 | 45篇 |
机械仪表 | 50篇 |
建筑科学 | 41篇 |
矿业工程 | 7篇 |
能源动力 | 58篇 |
轻工业 | 120篇 |
水利工程 | 9篇 |
石油天然气 | 24篇 |
武器工业 | 1篇 |
无线电 | 188篇 |
一般工业技术 | 641篇 |
冶金工业 | 59篇 |
原子能技术 | 37篇 |
自动化技术 | 360篇 |
出版年
2024年 | 7篇 |
2023年 | 16篇 |
2022年 | 53篇 |
2021年 | 102篇 |
2020年 | 72篇 |
2019年 | 64篇 |
2018年 | 78篇 |
2017年 | 70篇 |
2016年 | 76篇 |
2015年 | 49篇 |
2014年 | 109篇 |
2013年 | 149篇 |
2012年 | 151篇 |
2011年 | 200篇 |
2010年 | 90篇 |
2009年 | 102篇 |
2008年 | 96篇 |
2007年 | 115篇 |
2006年 | 87篇 |
2005年 | 71篇 |
2004年 | 75篇 |
2003年 | 51篇 |
2002年 | 69篇 |
2001年 | 24篇 |
2000年 | 21篇 |
1999年 | 23篇 |
1998年 | 28篇 |
1997年 | 23篇 |
1996年 | 8篇 |
1995年 | 12篇 |
1994年 | 13篇 |
1993年 | 10篇 |
1992年 | 9篇 |
1991年 | 6篇 |
1990年 | 5篇 |
1989年 | 3篇 |
1988年 | 2篇 |
1987年 | 4篇 |
1986年 | 1篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 2篇 |
1973年 | 2篇 |
1972年 | 1篇 |
1965年 | 1篇 |
1958年 | 2篇 |
排序方式: 共有2163条查询结果,搜索用时 31 毫秒
991.
Ivana Jurič Igor Karlović Dragoljub Novaković Ivana Tomić 《Color research and application》2016,41(5):493-499
Print mottle is a print defect that occurs more or less on prints and has a negative influence on the evenness in print. Several methods to assess print mottle have been proposed. In this article, we analyzed three methods for print mottle evaluation: Histogram Mottle Macro, Gray level co‐occurrence matrix (GLCM) and M‐score. The aim was to compare them and to determine their relation to perceived non‐uniformity obtained by visual assessment. In the experimental part, we printed four different substrates with different optical properties with digital printing machine based on electrophotographic process. The surface of papers was characterized by measuring optical paper properties. The results obtained in this study suggest that GLCM method should be used for print mottle assessment. This method has the strongest correlation with the visual experience of print mottle. © 2015 Wiley Periodicals, Inc. Col Res Appl, 41, 493–499, 2016 相似文献
992.
Ignition of preheated (400–500 K) H2–air mixtures at low pressures (80–100 torr) excited by pulsed nanosecond dielectric barrier discharges is investigated through experiments and simulations. Time resolved absolute OH concentration and temperature data are obtained using Laser Induced Fluorescence (LIF) technique. Ignition is achieved in the decaying plasma after a burst of discharge pulses (repetition rate 10–40 kHz), with the time delay inferred from sudden rise in OH* emission. One-dimensional simulations are performed to obtain information about the plasma generated radicals and heat release across the discharge gap. A plasma fluid formulation is used with ions and neutral species at gas temperature, and electrons in non-equilibrium. An accurate reduced chemistry mechanism is developed through sensitivity analysis to expedite the plasma simulations. The model predictions show excellent agreement with experimental measurements, validating the numerical framework and chemistry data. The input pulse energy and ignition characteristics are found to be highly sensitive to uncertainties in dielectric properties. Ignition delay exhibits a threshold-like dependence on input plasma energy, and increases steeply as the number of pulses in the burst is reduced. The nanosecond plasma assisted ignition is achieved through a two-step process. Firstly, the burst of discharge pulses produce a large pool of radicals and provide an average temperature rise of ∼1–2 K/pulse. In the next step, if the temperature exceeds a threshold value of ∼700 K, significant heat release from partial fuel oxidation is triggered. The process becomes self-sustaining and the temperature continues to rise even after the plasma source is switched off, accelerating the conventional H2–O2 chain branching pathways and leading to ignition. We provide conclusive evidence of large volume ignition with nanosecond plasma as opposed to thermal ignition at a hot-spot. Ignition is first observed at the center of the discharge gap, but the kernel expands rapidly to the entire volume, except near walls where heat losses keep the temperature low. It is demonstrated that the ignition occurs independently at different locations due to local plasma chemistry effects and heat transport does not play a significant role. 相似文献
993.
994.
995.
996.
997.
Sebastian Balos Vencislav Grabulov Leposava Sidjanin Mladen Pantic Igor Radisavljevic 《Materials & Design》2010
In this paper, the ballistic resistance of perforated plates made of different types of steel, mounting and geometry was investigated. Different types of steel in various heat treatment conditions were tested. Target mounting was also varied: rigid, oblique and hanging. Furthermore, four different perforated plate geometries were tested: two plate thicknesses and two hole diameters. Their behaviour was tested using impact from firing 12.7 mm M-8 API ammunition at eleven perforated plate samples. These samples were placed by means of a steel frame over a 13 mm RHA plate, at two distances. Damaged area on targets was correlated to ballistic resistance of the whole armour to find the optimal perforated plate. It was found that perforated plates, in optimized case offer a frequent fracture of the penetrating core in up to five parts. This debris is unable to penetrate the basic plate, offering mass effectiveness of the whole armour model of 1.76 and the mass effectiveness of the perforated plate of 5.91. 相似文献
998.
Igor Segota Surin Mong Eitan Neidich Archana Rachakonda Catherine J. Lussenhop Carl Franck 《Journal of the Royal Society Interface》2013,10(88)
Living cells depend upon the detection of chemical signals for their existence. Eukaryotic cells can sense a concentration difference as low as a few per cent across their bodies. This process was previously suggested to be limited by the receptor–ligand binding fluctuations. Here, we first determine the chemotaxis response of Dictyostelium cells to static folic acid gradients and show that they can significantly exceed this sensitivity, responding to gradients as shallow as 0.2% across the cell body. Second, using a previously developed information theory framework, we compare the total information gained about the gradient (based on the cell response) to its upper limit: the information gained at the receptor–ligand binding step. We find that the model originally applied to cAMP sensing fails as demonstrated by the violation of the data processing inequality, i.e. the total information exceeds the information at the receptor–ligand binding step. We propose an extended model with multiple known receptor types and with cells allowed to perform several independent measurements of receptor occupancy. This does not violate the data processing inequality and implies the receptor–ligand binding noise dominates both for low- and high-chemoattractant concentrations. We also speculate that the interplay between exploration and exploitation is used as a strategy for accurate sensing of otherwise unmeasurable levels of a chemoattractant. 相似文献
999.
Reinaldo B. Braga Igor A. Chaves Carina T. de Oliveira Rossana M.C. Andrade José Neuman de Souza Hervé Martin Bruno Schulze 《Journal of Network and Computer Applications》2013,36(1):274-283
In ad hoc grid environments, resources are not always available since nodes can spontaneously connect and disconnect at any time. Thus, these environments demand the correct execution of tasks to guarantee good performance. However, there are malicious users that affect the normal operation of these grids. These users modify tasks results and even cheat security mechanisms. Therefore, to assure high performance in these grid computing scenarios, it is essential to use punishment procedures based on trust models. These solutions have been used in wireless ad hoc networks, but not in the context of ad hoc grid computing. Thus, in this paper, we first present an analysis of mathematical trust models in ad hoc grid scenarios, using different ways to treat detection information passed on by other nodes. Then, we provide a comparison and a performance evaluation of these models using a grid simulator platform. Besides that, we choose the most accurate trust model among the evaluated ones to propose RETENTION: a reactive trust-based mechanism to detect and punish malicious nodes in ad hoc grid environments. Simulation results demonstrate the effectiveness of the proposed approach in detecting and punishing up to 100% of malicious nodes without generating false-positives. The results can be a valuable tool for network designers in planning trust models in ad hoc grid network deployments. 相似文献
1000.