全文获取类型
收费全文 | 20416篇 |
免费 | 1339篇 |
国内免费 | 41篇 |
专业分类
电工技术 | 148篇 |
综合类 | 115篇 |
化学工业 | 5744篇 |
金属工艺 | 491篇 |
机械仪表 | 388篇 |
建筑科学 | 610篇 |
矿业工程 | 62篇 |
能源动力 | 718篇 |
轻工业 | 4680篇 |
水利工程 | 160篇 |
石油天然气 | 157篇 |
武器工业 | 1篇 |
无线电 | 871篇 |
一般工业技术 | 2968篇 |
冶金工业 | 1979篇 |
原子能技术 | 106篇 |
自动化技术 | 2598篇 |
出版年
2024年 | 45篇 |
2023年 | 188篇 |
2022年 | 704篇 |
2021年 | 928篇 |
2020年 | 571篇 |
2019年 | 654篇 |
2018年 | 809篇 |
2017年 | 812篇 |
2016年 | 885篇 |
2015年 | 687篇 |
2014年 | 1005篇 |
2013年 | 1722篇 |
2012年 | 1365篇 |
2011年 | 1423篇 |
2010年 | 1101篇 |
2009年 | 1065篇 |
2008年 | 908篇 |
2007年 | 775篇 |
2006年 | 596篇 |
2005年 | 493篇 |
2004年 | 449篇 |
2003年 | 460篇 |
2002年 | 367篇 |
2001年 | 267篇 |
2000年 | 227篇 |
1999年 | 233篇 |
1998年 | 753篇 |
1997年 | 495篇 |
1996年 | 339篇 |
1995年 | 212篇 |
1994年 | 185篇 |
1993年 | 144篇 |
1992年 | 76篇 |
1991年 | 48篇 |
1990年 | 53篇 |
1989年 | 51篇 |
1988年 | 62篇 |
1987年 | 56篇 |
1986年 | 34篇 |
1985年 | 60篇 |
1984年 | 57篇 |
1983年 | 55篇 |
1982年 | 44篇 |
1981年 | 40篇 |
1980年 | 51篇 |
1979年 | 33篇 |
1978年 | 22篇 |
1977年 | 37篇 |
1976年 | 59篇 |
1973年 | 22篇 |
排序方式: 共有10000条查询结果,搜索用时 14 毫秒
81.
?erif Bahtiyar Mehmet Ufuk Ça?layan 《Journal of Network and Computer Applications》2012,35(1):480-490
The issue of trust is a research problem in emerging open environments, such as ubiquitous networks. Such environments are highly dynamic and they contain diverse number of services and autonomous entities. Entities in open environments have different security needs from services. Trust computations related to the security systems of services necessitate information that meets needs of each entity. Obtaining such information is a challenging issue for entities. In this paper, we propose a model for extracting trust information from the security system of a service based on the needs of an entity. We formally represent security policies and security systems to extract trust information according to needs of an entity. The formal representation ensures an entity to extract trust information about a security property of a service and trust information about whole security system of the service. The proposed model is applied to Dental Clinic Patient Service as a case study with two scenarios. The scenarios are analyzed experimentally with simulations. The experimental evaluation shows that the proposed model provides trust information related to the security system of a service based on the needs of an entity and it is applicable in emerging open environments. 相似文献
82.
Face recognition with lattice independent component analysis and extreme learning machines 总被引:1,自引:0,他引:1
Ion Marques Manuel Gra?a 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2012,16(9):1525-1537
We focus on two aspects of the face recognition, feature extraction and classification. We propose a two component system, introducing Lattice Independent Component Analysis (LICA) for feature extraction and Extreme Learning Machines (ELM) for classification. In previous works we have proposed LICA for a variety of image processing tasks. The first step of LICA is to identify strong lattice independent components from the data. In the second step, the set of strong lattice independent vector are used for linear unmixing of the data, obtaining a vector of abundance coefficients. The resulting abundance values are used as features for classification, specifically for face recognition. Extreme Learning Machines are accurate and fast-learning innovative classification methods based on the random generation of the input-to-hidden-units weights followed by the resolution of the linear equations to obtain the hidden-to-output weights. The LICA-ELM system has been tested against state-of-the-art feature extraction methods and classifiers, outperforming them when performing cross-validation on four large unbalanced face databases. 相似文献
83.
Sergio Herrerı´a-Alonso Miguel Rodrı´guez-Pérez Manuel Fernández-Veiga Cándido López-Garcı´a 《Computer Networks》2012,56(10):2456-2467
The IEEE 802.3az standard provides a new low power mode that Ethernet network interfaces can use to save energy when there is no traffic to transmit. Simultaneously with the final standard approval, several algorithms were proposed to govern the physical interface state transition between the normal active mode and the new low power mode. In fact, the standard leaves this sleeping algorithm unspecified to spur competition among different vendors and achieve the greatest energy savings. In this paper, we try to bring some light to the most well known sleeping algorithms, providing mathematical models for the expected energy savings and the average packet delay inflicted on outgoing traffic. We will then use the models to derive optimum configuration parameters for them under given efficiency constraints. 相似文献
84.
Maria da Graça Marcos J.A. Tenreiro MachadoT.-P. Azevedo-Perdicoúlis 《Applied Soft Computing》2012,12(2):589-599
Kinematic redundancy occurs when a manipulator possesses more degrees of freedom than those required to execute a given task. Several kinematic techniques for redundant manipulators control the gripper through the pseudo-inverse of the Jacobian, but lead to a kind of chaotic inner motion with unpredictable arm configurations. Such algorithms are not easy to adapt to optimization schemes and, moreover, often there are multiple optimization objectives that can conflict between them. Unlike single optimization, where one attempts to find the best solution, in multi-objective optimization there is no single solution that is optimum with respect to all indices. Therefore, trajectory planning of redundant robots remains an important area of research and more efficient optimization algorithms are needed. This paper presents a new technique to solve the inverse kinematics of redundant manipulators, using a multi-objective genetic algorithm. This scheme combines the closed-loop pseudo-inverse method with a multi-objective genetic algorithm to control the joint positions. Simulations for manipulators with three or four rotational joints, considering the optimization of two objectives in a workspace without and with obstacles are developed. The results reveal that it is possible to choose several solutions from the Pareto optimal front according to the importance of each individual objective. 相似文献
85.
The perovskite-type oxide PrCoO3 has been studied by means of X-ray photoelectron spectroscopy (XPS), reduction in H2 and X-ray diffraction. Two types of oxygen were detected: lattice oxygen (binding energy = 528.4 eV) and adsorbed oxygen (binding energy = 530.9 eV). The increase in relative intensity of the peak corresponding to the latter species after reduction of PrCo03 to 3e– per molecule is assigned to the formation of hydroxyl groups. Temperature-programmed reduction (TPR) results showed two reduction steps: to 1 e– per molecule (Co3.1 Co2+) at 475 to 635 K, and to 3e– per molecule (Co21 Co0) at 725 to 815 K. Reduction in the first and second steps occurs according to the contracting sphere model and the nucleation mechanism, respectively. Reduction of Co3+ to Co2+ causes minimal structural changes in the perovskite. Reduction to 3e– per molecule yielded Pr2O3 and metallic cobalt. After this reduction and reoxidation at 973 K, the perovskite structure was regained. By XPS and TPR it was shown that PrCo03 is more easily reducible than LaCo03. It is concluded that the cation in the A position of the structure plays a significant role in the bulk and surface properties of LnCo03 (Ln, lanthanide elements) oxides. 相似文献
86.
The conductivity measurements of carbon black (CB)-polyvinyl chloride (PCV) composite in a tetrachloride (CCl4), trichloromethane (chloroform, CHCl3) or methylene chloride (CH2Cl2) vapour ambient have been performed. The composite contains 20% Chezacarb K2 carbon black and was prepared as a plastic strip. Based on the =f(t) dependence, three methods to determine the vapour concentration,c, are presented. The investigations could allow one to construct a CCl4 and CHCl3 vapour detector. 相似文献
87.
K. Balcerek Cz. Marucha J. Rafałowicz R. Wawryk 《International Journal of Thermophysics》1992,13(6):1085-1096
A universal curve relating the maximum of thermal conductivity and its respective temperature with the residual electrical resistivity has been proposed for metals and dilute alloys. Based on the equation of that curve, a comparative analysis of selected literature data of thermal conductivity of metals, which have residual electrical resistivity in the range 10–11<0<10–5. cm, have been performed. Using the data for 33 metals, confirmation of the Wiedemann-Franz law for the impurity component/T of thermal conductivity was obtained, which means that th/el1, where
th and
el are the parameters of the electron-lattice defect interaction obtained from measurements of thermal and electrical conductivity, respectively. Examples of the failure of the Wiedemann-Franz law are also presented, exhibiting the values of
th/el in the range 0.16 to 25. Measurements of thermal conductivity in the range 2 to 20 K and determination of the residual electrical resistivity for the samples of Cd doped with Zn and quenched were performed, resulting in values
th/el1. 相似文献
88.
C García Barroso R Cela Torrijos J A Pérez-Bustamante 《Zeitschrift für Lebensmittel-Untersuchung und -Forschung》1987,185(4):307-314
The different groups and/or classes among phenolic acids and aldehydes identified during the elaboration process of "fino" sherry wine have been studied. The study was carried out using different processes during the elaboration of the wine and we have attempted to establish whether the different treatments of the grape affect these groupings. The study was undertaken by means of cluster and multifactorial analysis on the data obtained by the quantitative determination of phenolic acids and aldehydes during vinification and in experiments carried out on the grape under different mechanical treatments. The analysis of phenolic acids and aldehydes was done with HPLC, using a C-18 mu-Bondapak and a stepwise composite gradient. The samples were previously extracted with ethylic ether. 相似文献
89.
The conditions for current oscillations in austenitic stainless steel (AISI Type 303) in 1M H2SO4 containing Cl? ions are given. The periodic oscillations are produced in a close potential range determined at the active-passive transition region. It requires a non-homogeneous distribution of inclusions and carbides at the metal surface and a concentration range of Cl? ion where active and passive areas coexist on the metal surface. The constraints at the surface determining these two regions are related to the Cl? ion competitive adsorption and the local accumulation of corrosion products. Electrochemical data and SEM observations are correlated. 相似文献
90.
J. P. Emelianova P. V. Pakshin K. Gałkowski E. Rogers 《Automation and Remote Control》2014,75(5):845-858
This paper considers systems with two-dimensional dynamics (2D systems) described by the continuous-time nonlinear state-space Roesser model. The sufficient conditions of exponential stability in terms of vector Lyapunov functions are established. These conditions are then applied to analysis of the absolute stability of a certain class of systems comprising a linear continuous-time plant in the form of the Roesser model with a nonlinear characteristic in the feedback loop, which satisfies quadratic constraints. The absolute stability conditions are reduced to computable expressions in the form of linear matrix inequalities. The obtained results are extended to the class of continuous-time systems governed by the Roesser model with Markovian switching. The problems of absolute stability and stabilization via state- and output-feedback are solved for linear systems of the above class. The solution procedures for these problems are in the form of algorithms based on linear matrix inequalities. 相似文献