全文获取类型
收费全文 | 5912篇 |
免费 | 324篇 |
国内免费 | 46篇 |
专业分类
电工技术 | 80篇 |
综合类 | 20篇 |
化学工业 | 1655篇 |
金属工艺 | 125篇 |
机械仪表 | 230篇 |
建筑科学 | 158篇 |
矿业工程 | 4篇 |
能源动力 | 380篇 |
轻工业 | 557篇 |
水利工程 | 85篇 |
石油天然气 | 36篇 |
无线电 | 576篇 |
一般工业技术 | 1088篇 |
冶金工业 | 277篇 |
原子能技术 | 83篇 |
自动化技术 | 928篇 |
出版年
2024年 | 24篇 |
2023年 | 115篇 |
2022年 | 326篇 |
2021年 | 404篇 |
2020年 | 304篇 |
2019年 | 336篇 |
2018年 | 367篇 |
2017年 | 302篇 |
2016年 | 328篇 |
2015年 | 200篇 |
2014年 | 331篇 |
2013年 | 540篇 |
2012年 | 317篇 |
2011年 | 320篇 |
2010年 | 281篇 |
2009年 | 248篇 |
2008年 | 168篇 |
2007年 | 146篇 |
2006年 | 132篇 |
2005年 | 99篇 |
2004年 | 74篇 |
2003年 | 71篇 |
2002年 | 56篇 |
2001年 | 42篇 |
2000年 | 36篇 |
1999年 | 38篇 |
1998年 | 71篇 |
1997年 | 62篇 |
1996年 | 43篇 |
1995年 | 53篇 |
1994年 | 27篇 |
1993年 | 34篇 |
1992年 | 32篇 |
1991年 | 26篇 |
1990年 | 25篇 |
1989年 | 23篇 |
1988年 | 16篇 |
1987年 | 32篇 |
1986年 | 31篇 |
1985年 | 22篇 |
1984年 | 30篇 |
1983年 | 26篇 |
1982年 | 16篇 |
1981年 | 8篇 |
1980年 | 14篇 |
1979年 | 13篇 |
1978年 | 12篇 |
1977年 | 11篇 |
1976年 | 14篇 |
1975年 | 8篇 |
排序方式: 共有6282条查询结果,搜索用时 0 毫秒
81.
Mohammed Ali Almomani Mohammed Aladeemy Abdelhakim Abdelhadi Ahmad Mumani 《Computers & Industrial Engineering》2013
Short setup time is an essential element for the effective implementation of many lean pillars, i.e., JIT, and Kanban. Most of the current setup reduction methodologies are based on Shingo’s Single Minute Exchange of Dies (SMED) that suggests the conversion of internal setup operations to external operations. However, the conventional SMED approach – as proposed by Shingo – does not possess a systematic approach to accomplish this conversion. Thus, a new approach is proposed in order to aid the process engineers in implementing SMED. The proposed approach is based on the conventional SMED, but also it incorporates Multiple Criteria Decision-Making Techniques (MCDM) to the third implementation phase. The MCDM techniques used in this work are Analytical Hierarchal Process (AHP), Preference Selection Index (PSI) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). The proposed approach provides a systematic procedure for selecting the best setup technique among the available alternatives, and takes also into consideration other factors that affect the decision-making process; including: cost, energy, facility layout, safety, life, quality and maintenance. A real example of PVC industry is used to exemplify the approach. The results demonstrate the capability of the proposed approach in setup time reduction, which in turn will improve machines’ utilization, and increase the productivity and flexibility of the whole facility. 相似文献
82.
Multi-criteria expertness based cooperative Q-learning 总被引:2,自引:2,他引:0
One of the most influential points in cooperative learning is the type of exchanging information. If the content of exchanging information among agents is rich, cooperation gives rise to better results. To extract proper knowledge of agents during the cooperation process, some expertness measures that assign expertness levels to the other agents are used. In this paper, a new method named Multi-Criteria Expertness based cooperative Q-learning (MCE) is proposed that utilizes all of the expertness measures and attempts to enrich the exchanging information more efficiently. In MCE, all expertness measures are considered simultaneously and collective knowledge is equal to the combination of learned knowledge by each of expertness measures. The experimental results confirm outstanding performance of the proposed method on a sample maze world and a hunter-prey problem. 相似文献
83.
Iqtadar Hussain Tariq Shah Muhammad Asif Gondal Waqar Ahmad Khan Hasan Mahmood 《Neural computing & applications》2013,23(1):97-104
In this paper, we present a method to construct a substitution box used in encryption applications. The proposed algorithm for the construction of substitution box relies on the linear fractional transform method. The design methodology is simple, while the confusion-creating ability of the new substitution box is complex. The strength of the proposed substitution box is evaluated, and an insight is provided to quantify the confusion-creating ability. In addition, tests are performed to assess the vulnerability of the encrypted data to algebraic and statistical attacks. The substitution box is critically analyzed by strict avalanche criterion, bit independent criterion, differential approximation probability test, linear approximation probability test, non-linearity test, and majority logic criterion. The performance of the proposed substitution box is also compared with those of some of the well-known counterparts including AES, APA, Gray, S8, Skipjack, Xyi, and prime of residue substitution boxes. It is apparent that the performance, in terms of confusion-creating ability, of the new substitution box is better than those of some of the existing non-linear components used in encryption systems. The majority logic criterion is applied to these substitution boxes to further evaluate the strength and usefulness. 相似文献
84.
Ahmad Mozaffari Alireza Fathi Amir Khajepour Ehsan Toyserkani 《Applied Soft Computing》2013,13(3):1505-1519
With the rapid growth of laser applications and the introduction of high efficiency lasers (e.g. fiber lasers), laser material processing has gained increasing importance in a variety of industries. Among the applications of laser technology, laser cladding has received significant attention due to its high potential for material processing such as metallic coating, high value component repair, prototyping, and even low-volume manufacturing. In this paper, two optimization methods have been applied to obtain optimal operating parameters of Laser Solid Freeform Fabrication Process (LSFF) as a real world engineering problem. First, Particle Swarm Optimization (PSO) algorithm was implemented for real-time prediction of melt pool geometry. Then, a hybrid evolutionary algorithm called Self-organizing Pareto based Evolutionary Algorithm (SOPEA) was proposed to find the optimal process parameters. For further assurance on the performance of the proposed optimization technique, it was compared to some well-known vector optimization algorithms such as Non-dominated Sorting Genetic Algorithm (NSGA-II) and Strength Pareto Evolutionary Algorithm (SPEA 2). Thereafter, it was applied for simultaneous optimization of clad height and melt pool depth in LSFF process. Since there is no exact mathematical model for the clad height (deposited layer thickness) and the melt pool depth, the authors developed two Adaptive Neuro-Fuzzy Inference Systems (ANFIS) to estimate these two process parameters. Optimization procedure being done, the archived non-dominated solutions were surveyed to find the appropriate ranges of process parameters with acceptable dilutions. Finally, the selected optimal ranges were used to find a case with the minimum rapid prototyping time. The results indicate the acceptable potential of evolutionary strategies for controlling and optimization of LSFF process as a complicated engineering problem. 相似文献
85.
Al-TiB2 master alloys have received much attention in recent years owing to their potential as efficient grain refiners for aluminum foundry alloys. In this study, the process of production of master alloys was investigated to develop a low cost method, namely, slag-metal reaction. This method can be used to fabricate Al-TiB2 master alloy in situ from the TiO2-H3BO3-Na3AlF6 and Al system. Since the price of the raw materials is low and the technology is simple, the processing technique appears to reduce the cost of the master alloy. Because of exothermic reactions, not much energy is needed to melt materials. In this process, Titanium diboride particles were formed in situ through the reactions of TiO2, H3BO3 and Na3AlF6. Results showed that when the aluminum melted, the condensed TiB2 particles that formed in situ were spherical with an average diameter of 1 μm. Furthermore, these TiB2 particles were distributed uniformly through the master alloy. 相似文献
86.
G. MurtazaIftikhar Ahmad B. AminA. Afaq M. MaqboolJ. Maqssod I. KhanM. Zahid 《Optical Materials》2011,33(3):553-557
Structural and optoelectronic properties of BaThO3 cubic perovskite are calculated using all electrons full potential linearized augmented plane wave (FP-LAPW) method. Wide and direct band gap, 5.7 eV, of the compound predicts that it can be effectively used in UV based optoelectronic devices. Different characteristic peaks in the wide UV range emerges mainly due to the transition of electrons between valance band state O-p and conduction band states Ba-d, Ba-f, Th-f and Th-d. 相似文献
87.
88.
Ahmad Ayar 《电子设计技术》2007,14(6):103-103
采用LED但缺少微控制器或其它形式控制功能的应用可以得益于一种简单的电路,该电路能对LED的光强作手动控制.适合这种目的的器件有机械式(模拟)和电子式(数字)电位器. 相似文献
89.
Taher Yousefi Reza Davarkhah Ahmad Nozad Golikand Mohammad Hossein Mashhadizadeh 《Materials Science in Semiconductor Processing》2013,16(3):868-876
One-dimensional manganese (IV) oxide (MnO2) (~20 nm in average diameter) were synthesized by cathodic electrodeposition and heat treatment. The mechanism of electrodeposition and nanowire formation were discussed. The product was characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM) and Fourier transform infrared (FT-IR). Nanowires with varying lengths and diameters were found in TEM and SEM images of the sample. The results of N2 adsorption–desorption analysis indicated that the BET surface area of the MnO2 nanowires was 157 m2 g?1 and the pore size distributions were 2.5 and 4.5 nm. The electrochemical performances of the prepared MnO2 as an electrode material for supercapacitors were evaluated by cyclic voltammetry and galvanostatic charge/discharge measurements in a solution of 0.5 M Na2SO4. The higher specific capacitance of 318 F g?1 and good capacity retention of 86% were achieved after 1000 charge–discharge cycles had been observed for the MnO2 nanowires electrode. 相似文献
90.
Mojtaba Eslamnezhad Namin Mehdi Hosseinzadeh Nasour Bagheri Ahmad Khademzadeh 《Telecommunication Systems》2018,67(4):539-552
In radio frequency identification (RFID) systems, search protocols are used to find a specific item in a large number of tagged products. These protocols should be secure against RFID attacks such as traceability, impersonation, DoS and eavesdropping. Sundaresan et al. (IEEE Trans Dependable Secure Comput, 2015) presented a server-less search protocol based on 128-bits PRNG function and claimed that their method can address all vulnerabilities of previous protocols. In this paper, we prove that Sundaresan et al.’s protocol is vulnerable to traceability attack with the high probability. In addition, we present an improved protocol to solve the proposed problem and analyze its security level informally and formally based on AVISPA tool and BAN logic. 相似文献