全文获取类型
收费全文 | 1255篇 |
免费 | 80篇 |
国内免费 | 5篇 |
专业分类
电工技术 | 10篇 |
化学工业 | 446篇 |
金属工艺 | 52篇 |
机械仪表 | 56篇 |
建筑科学 | 45篇 |
矿业工程 | 13篇 |
能源动力 | 44篇 |
轻工业 | 96篇 |
水利工程 | 2篇 |
石油天然气 | 9篇 |
无线电 | 81篇 |
一般工业技术 | 226篇 |
冶金工业 | 57篇 |
原子能技术 | 2篇 |
自动化技术 | 201篇 |
出版年
2024年 | 1篇 |
2023年 | 17篇 |
2022年 | 108篇 |
2021年 | 133篇 |
2020年 | 39篇 |
2019年 | 45篇 |
2018年 | 66篇 |
2017年 | 47篇 |
2016年 | 77篇 |
2015年 | 62篇 |
2014年 | 67篇 |
2013年 | 101篇 |
2012年 | 70篇 |
2011年 | 86篇 |
2010年 | 50篇 |
2009年 | 48篇 |
2008年 | 55篇 |
2007年 | 36篇 |
2006年 | 27篇 |
2005年 | 31篇 |
2004年 | 26篇 |
2003年 | 20篇 |
2002年 | 9篇 |
2001年 | 8篇 |
2000年 | 6篇 |
1999年 | 9篇 |
1998年 | 11篇 |
1997年 | 12篇 |
1996年 | 10篇 |
1995年 | 7篇 |
1994年 | 3篇 |
1993年 | 4篇 |
1992年 | 1篇 |
1991年 | 3篇 |
1990年 | 7篇 |
1989年 | 7篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1986年 | 4篇 |
1985年 | 4篇 |
1984年 | 5篇 |
1983年 | 2篇 |
1981年 | 1篇 |
1980年 | 4篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有1340条查询结果,搜索用时 0 毫秒
21.
A common way of computing all efficient (Pareto optimal) solutions for a biobjective combinatorial optimisation problem is to compute first the extreme efficient solutions and then the remaining, non-extreme solutions. The second phase, the computation of non-extreme solutions, can be based on a “k-best” algorithm for the single-objective version of the problem or on the branch-and-bound method. A k-best algorithm computes the k-best solutions in order of their objective values. We compare the performance of these two approaches applied to the biobjective minimum spanning tree problem. Our extensive computational experiments indicate the overwhelming superiority of the k-best approach. We propose heuristic enhancements to this approach which further improve its performance. 相似文献
22.
Zeyad A. Almutairi Tomasz Glawdel Carolyn L. Ren David A. Johnson 《Microfluidics and nanofluidics》2009,6(2):241-251
This study presents a new Y-channel design for measuring the zeta potential and surface conductance of a solid-liquid pairing
using the current monitoring technique. The new design improves the throughput and reliability of the testing apparatus since
the displacement between two solutions can be repeated many times without interfering with the experiments. It also increases
the accuracy of the measurement by producing sharper start and end transitions for the current–time plot of the solution displacement
process. In this design, efforts have been made to minimize the effects of electrolysis, Joule heating and undesired pressure
driven flow on the measurements. An improvement on the current–time slope analysis is also presented. The Y-channel design
was validated by comparing zeta potential measurements to published results. The zeta potential of several biological buffers
relevant to the microfluidic community in plasma treated PDMS/PDMS and PDMS/Glass microchannels are presented. Preliminary
studies of surface conductivity measurements using the Y-channel design were also conducted and are briefly discussed. 相似文献
23.
Transistors: Impact of Interfacial Microstructure on Charge Carrier Transport in Solution‐Processed Conjugated Polymer Field‐Effect Transistors (Adv. Mater. 11/2016) 下载免费PDF全文
24.
Modeling spatially distributed phenomena in terms of its controlling factors is a recurring problem in geoscience. Most efforts
concentrate on predicting the value of response variable in terms of controlling variables either through a physical model
or a regression model. However, many geospatial systems comprises complex, nonlinear, and spatially non-uniform relationships,
making it difficult to even formulate a viable model. This paper focuses on spatial partitioning of controlling variables
that are attributed to a particular range of a response variable. Thus, the presented method surveys spatially distributed
relationships between predictors and response. The method is based on association analysis technique of identifying emerging
patterns, which are extended in order to be applied more effectively to geospatial data sets. The outcome of the method is
a list of spatial footprints, each characterized by a unique “controlling pattern”—a list of specific values of predictors
that locally correlate with a specified value of response variable. Mapping the controlling footprints reveals geographic
regionalization of relationship between predictors and response. The data mining underpinnings of the method are given and
its application to a real world problem is demonstrated using an expository example focusing on determining variety of environmental
associations of high vegetation density across the continental United States. 相似文献
25.
Cezary Graczykowski Tomasz Lewiński 《Structural and Multidisciplinary Optimization》2010,42(6):869-877
The paper delivers the benchmark results for the Michell cantilevers constructed within a half strip, for selected values
of the σ
T
/σ
C
ratio, σ
T
, σ
C
being the admissible stresses in tension and compression, respectively. 相似文献
26.
Tomasz Fałat Kazimierz Friedel Norman Marenco Stephan Warnat 《Microsystem Technologies》2009,15(1):181-190
The current paper focuses on several mechanical aspects of a waferlevel packaging approach using a direct face-to-face Chip-to-Wafer
(C2W) bonding of a MEMS device on an ASIC substrate wafer. Requirements of minimized inherent stress from packaging and good
decoupling from forces applied in manufacturing and application are discussed with particular attention to the presence of
through-silicon vias (TSV) in the substrate wafer. The paper deals with FEM analysis of temperature excursion, pressure during
molding, materials used and handling load influence on mechanical stress within the TSV system and on wafer level, which can
be large enough to disintegrate the system. 相似文献
27.
28.
Fatemeh Noroozi Tomasz Sapiński Dorota Kamińska Gholamreza Anbarjafari 《International Journal of Speech Technology》2017,20(2):239-246
This paper proposes a new vocal-based emotion recognition method using random forests, where pairs of the features on the whole speech signal, namely, pitch, intensity, the first four formants, the first four formants bandwidths, mean autocorrelation, mean noise-to-harmonics ratio and standard deviation, are used in order to recognize the emotional state of a speaker. The proposed technique adopts random forests to represent the speech signals, along with the decision-trees approach, in order to classify them into different categories. The emotions are broadly categorised into the six groups, which are happiness, fear, sadness, neutral, surprise, and disgust. The Surrey Audio-Visual Expressed Emotion database is used. According to the experimental results using leave-one-out cross-validation, by means of combining the most significant prosodic features, the proposed method has an average recognition rate of \(66.28\%\), and at the highest level, the recognition rate of \(78\%\) has been obtained, which belongs to the happiness voice signals. The proposed method has \(13.78\%\) higher average recognition rate and \(28.1\%\) higher best recognition rate compared to the linear discriminant analysis as well as \(6.58\%\) higher average recognition rate than the deep neural networks results, both of which have been implemented on the same database. 相似文献
29.
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev?CYao) intruders are modeled by Horn theories and security analysis boils down to solving the derivation problem for Horn theories. This approach and the tools based on this approach, including ProVerif, have been very successful in the automatic analysis of cryptographic protocols. However, dealing with the algebraic properties of operators, such as the exclusive OR (XOR), which are frequently used in cryptographic protocols has been problematic. In particular, ProVerif cannot deal with XOR. In this paper, we show how to reduce the derivation problem for Horn theories with XOR to the XOR-free case. Our reduction works for an expressive class of Horn theories. A large class of intruder capabilities and protocols that employ the XOR operator can be modeled by these theories. Our reduction allows us to carry out protocol analysis using tools, such as ProVerif, that cannot deal with XOR, but are very efficient in the XOR-free case. We implemented our reduction and, in combination with ProVerif, used it for the fully automatic analysis of several protocols that employ the XOR operator. Among others, our analysis revealed a new attack on an IBM security module. 相似文献
30.
Leftist grammars are characterized in terms of rules of the form a → ba and cd → d, without distinction between terminals and nonterminals. They were introduced by Motwani et al. [13], where the accessibility problem for some general protection system was related to these grammars. This protection system was originally proposed in [4] and [15] in the context of Java virtual worlds. The accessibility problem is formulated in the form "Can object p gain (illegal) access to object q by a series of legal moves (as prescribed by the policy)?" The membership problem for leftist grammar is decidable [13], which implies decidability of the accessibility problem for the appropriate protection system. We study relationships between language classes defined by various types of leftist grammars and classes of the Chomsky hierarchy. We show that general leftist grammars can define languages which arenot context free, answering in the negative a question from [13]. Moreover, we study some restricted variants of leftist grammars and relate them to regular, deterministic context-free, and context-free languages. 相似文献