全文获取类型
收费全文 | 5401篇 |
免费 | 439篇 |
国内免费 | 58篇 |
专业分类
电工技术 | 61篇 |
综合类 | 21篇 |
化学工业 | 1245篇 |
金属工艺 | 73篇 |
机械仪表 | 262篇 |
建筑科学 | 103篇 |
矿业工程 | 8篇 |
能源动力 | 330篇 |
轻工业 | 706篇 |
水利工程 | 64篇 |
石油天然气 | 30篇 |
武器工业 | 1篇 |
无线电 | 692篇 |
一般工业技术 | 1229篇 |
冶金工业 | 80篇 |
原子能技术 | 51篇 |
自动化技术 | 942篇 |
出版年
2024年 | 36篇 |
2023年 | 205篇 |
2022年 | 479篇 |
2021年 | 750篇 |
2020年 | 456篇 |
2019年 | 511篇 |
2018年 | 467篇 |
2017年 | 394篇 |
2016年 | 391篇 |
2015年 | 239篇 |
2014年 | 293篇 |
2013年 | 390篇 |
2012年 | 229篇 |
2011年 | 283篇 |
2010年 | 161篇 |
2009年 | 137篇 |
2008年 | 88篇 |
2007年 | 88篇 |
2006年 | 34篇 |
2005年 | 27篇 |
2004年 | 35篇 |
2003年 | 28篇 |
2002年 | 16篇 |
2001年 | 7篇 |
2000年 | 11篇 |
1999年 | 13篇 |
1998年 | 17篇 |
1997年 | 10篇 |
1996年 | 11篇 |
1995年 | 16篇 |
1994年 | 7篇 |
1993年 | 10篇 |
1992年 | 8篇 |
1991年 | 7篇 |
1990年 | 1篇 |
1989年 | 5篇 |
1988年 | 4篇 |
1987年 | 5篇 |
1986年 | 1篇 |
1985年 | 6篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 4篇 |
1981年 | 3篇 |
1980年 | 1篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1977年 | 3篇 |
1961年 | 1篇 |
排序方式: 共有5898条查询结果,搜索用时 15 毫秒
51.
Composite Nanostructures of TiO2 and ZnO for Water Splitting Application: Atomic Layer Deposition Growth and Density Functional Theory Investigation 下载免费PDF全文
Marina Kulmas Leanne Paterson Katja Höflich Muhammad Y. Bashouti Yanlin Wu Manuela Göbelt Jürgen Ristein Julien Bachmann Bernd Meyer Silke Christiansen 《Advanced functional materials》2016,26(27):4882-4889
The commercialization of solar fuel devices requires the development of novel engineered photoelectrodes for water splitting applications which are based on redundant, cheap, and environmentally friendly materials. In the current study, a combination of titanium dioxide (TiO2) and zinc oxide (ZnO) onto nanotextured silicon is utilized for a composite electrode with the aim to overcome the individual shortcomings of the respective materials. The properties of conformal coverage of TiO2 and ZnO layers are designed on the atomic scale by the atomic layer deposition technique. The resulting photoanode shows not only promising stability but also nine times higher photocurrents than an equivalent photoanode with a pure TiO2 encapsulation onto the nanostructured silicon. Density functional theory calculations indicate that segregation of TiO2 at the ZnO surfaces is favorable and leads to the stabilization of the ZnO layers in water environments. In conclusion, the novel designed composite material constitutes a promising base for a stable and effective photoanode for the water oxidation reaction. 相似文献
52.
53.
Muhammad Taher Abuelma’atti Zainulabideen Jamal Khalifa 《Analog Integrated Circuits and Signal Processing》2012,73(3):989-992
This comment is related to the recently published article entitled “On ‘Discussion on Barkhausen and Nyquist stability criteria’, Analog Integrated circuits and signal processing, Vol. 70, pp. 443–449, 2012. In this article the authors considered one of the possible four alternatives of the Wien-bridge oscillator that was previously considered in the article entitled “Discussion on Barkhausen and Nyquist stability criteria”, Analog Integrated Circuits and Signal Processing, Vol. 62, pp. 327–332, 2010, which depicts the failure of Barkhausen criterion concerning the determination of the condition of oscillation startup of sinusoidal oscillation. In the above mentioned articles the operational amplifier used is assumed ideal. In this comment it will be shown that the Wien-bridge oscillator circuit used in the above mentioned articles can behave as a sinusoidal oscillator only at relatively high frequencies when the operational amplifier can be considered non-ideal. At relatively low frequencies; when the operational amplifier can be considered ideal, the same circuit behaves as a relaxation oscillator with a square wave output rather than a sinusoidal output. 相似文献
54.
Iftikhar Ahmad Azween Abdullah Abdullah Alghamdi Muhammad Hussain 《Telecommunication Systems》2013,52(4):2187-2195
Intrusion detection is an important technique in computer and network security. A variety of intrusion detection approaches be present to resolve this severe issue but the main problem is performance. It is important to increase the detection rates and reduce false alarm rates in the area of intrusion detection. Therefore, in this research, an optimized intrusion detection mechanism using soft computing techniques is proposed to overcome performance issues. The KDD-cup dataset is used that is a benchmark for evaluating the security detection mechanisms. The Principal Component Analysis (PCA) is applied to transform the input samples into a new feature space. The selecting of an appropriate number of principal components is a critical problem. So, Genetic Algorithm (GA) is used in the optimum selection of principal components instead of using traditional method. The Support Vector Machine (SVM) is used for classification purpose. The performance of this approach is addresses. Further, a comparative analysis is made with existing approaches. Consequently, this method provides optimal intrusion detection mechanism which is capable to minimize amount of features and maximize the detection rates. 相似文献
55.
Kuo-Ming Chao Muhammad Younas Nick Godwin Pen-Choug Sun 《International Journal of Wireless Information Networks》2006,13(2):141-150
The popularity of grid services has widened their application to numerous domains and increased the utilization of computational resources. In order to create more incentives for the resources owners to lease their resources and prevent users from wasting the resources, the introduction of a market-oriented grid is inevitable. However, the issues for the negotiation between service provider and consumer over the supply and demand of resources can be complex, with highly interdependent issues. In this research, a simulated automated negotiation mechanism including a co-evolutionary mechanism and a modified game theory approach is proposed, to assist them in reaching an agreement over the conflicting issues. In the proposed architecture, the co-evolution process is able to reduce the multiple dimensional search space into a two-dimension search space and identify the appropriate negotiation strategies for the negotiating agents to form a payoff matrix which can be used for the game theory related stage of their interaction. The multiple stage negotiation process is introduced to improve the negotiation result. In this paper, an application which requires a large amount of computational resources to process the data generated from mobile devises is used to demonstrate that the proposed system is able to resolve the conflicts and obtain a valid solution. 相似文献
56.
Muhammad Taher Abuelma’atti Sagar Kumar Dhar Zainulabideen Jamal Khalifa 《Analog Integrated Circuits and Signal Processing》2017,91(3):479-489
This paper presents new topologies for emulating floating immittance functions using three to five passive elements and only two current-feedback operational-amplifiers (CFOAs). The feasibility of using only two CFOAs and two passive components is explored. The proposed topologies can emulate lossy positive and negative inductances and capacitance-, inductance-, resistance-multipliers, and frequency dependent negative and positive conductances. The functionality of the proposed circuits was experimentally verified using the commercially available AD844 CFOA. The experimental results are in excellent agreement with theoretical calculations. 相似文献
57.
Muhammad Waseem Anwar Muhammad Rashid Farooque Azam Muhammad Kashif 《Design Automation for Embedded Systems》2017,21(1):1-36
Model Based System Engineering (MBSE) is a renowned approach in the context of embedded systems development. It is frequently used to deal with the structural and behavioral aspects of system design. However, the verification of system design is generally performed in isolation. It is particularly true in the context of assertion based verification. Consequently, there is a huge gap between system design and its verification that seriously effects the productivity and time-to market objectives. Therefore, in this research, we target to reduce this gap by exploiting the features of MBSE and SystemVerilog assertions (SVA’s). This article introduces a novel MBSE approach to model the design verification aspects of embedded systems, along with the system design (structural and behavioral aspects). We propose SystemVerilog in Object Constraint Language (SVOCL), an OCL temporal extension for SystemVerilog, to represent the design verification requirements by means of SVA’s. As a part of research, SVOCL transformation engine has been developed to generate SVA’s code in order to automate the design verification of embedded systems. The application of SVOCL has been validated through four case studies. 相似文献
58.
Muhammad Abdul Hadi Muhammad Naveed Tabassum Saleh Alshebeili 《Signal, Image and Video Processing》2017,11(4):635-642
Passive bistatic radar (PBR) systems using different communication signals can only offer low-resolution target detection due to their inherent low bandwidth. In this paper, compressive sensing (CS) is applied to multichannel FM and GSM PBR to achieve improved range-Doppler resolutions and avoid some limitations of classical multiband PBR processing. In CS context, block-structured time-domain dictionary which is formed from multichannel signals suffers from coherence when fine range resolution is employed. To overcome such a pitfall, this work first transforms the dictionary to spectral domain where only the most important spectral components are retained. Principle component analysis followed by a whitening method are then applied to this spectrally transformed data in order to reduce the dimensionality of problem, thereby reducing the dictionary size and most importantly fulfilling the required condition of dictionary incoherence for better CS-based recovery. Two different block-structured dictionary formations are tested. The performance of the recovery of spatially close targets, in both FM and GSM PBR setups, are reported. 相似文献
59.
Iftikhar Ahmed Khan Syed Sajid Hussain Syed Zafar Ali Shah Tassawar Iqbal Muhammad Shafi 《Telematics and Informatics》2017,34(2):481-489
Illiteracy is a major hurdle in socio-economic development of Pakistan. Research in the Information and Communication Technology (ICT) can help in tackling this issue by developing solutions tailored for illiterate population. The work presented within this paper proposes a job search website for illiterate population of KPK province of Pakistan. The designed website does not require any human assistance while searching a job. Moreover, the website uses culturally relevant graphical and audio content. The usability of the website is tested according to the ISO-9241-11 specification. Furthermore, we have studied the effect of the participants’ characteristics, i.e., their age, computer and mobile usage experience on the usability of the website. The results show that the participants found the website usable. Specifically, they could search suitable jobs with a minimal number of clicks and in less time as compared to the usual task completion rates reported throughout the literature. None of the participants’ characteristics were found to be affecting the usability of the website. These results suggest a promising potential of ICT solutions for providing services to illiterate population of Pakistan. 相似文献
60.
Ariffuddin Joret Mohammad Faiz Liew Abdullah Muhammad Suhaimi Sulong Asmarashid Ponniran Siti Zuraidah Zainudin 《电子科技学刊:英文版》2014,12(1):90-94
Moments have been used in all sorts of object classification systems based on image. There are lots of moments studied by many researchers in the area of object classification and one of the most preference moments is the Zernike moment. In this paper, the performance of object classification using the Zernike moment has been explored. The classifier based on neural networks has been used in this study. The results indicate the best performance in identifying the aggregate is at 91.4% with a ten orders of the Zernike moment. This encouraging result has shown that the Zernike moment is a suitable moment to be used as a feature of object classification systems. 相似文献