全文获取类型
收费全文 | 1132篇 |
免费 | 64篇 |
国内免费 | 110篇 |
专业分类
电工技术 | 34篇 |
综合类 | 84篇 |
化学工业 | 53篇 |
金属工艺 | 3篇 |
机械仪表 | 22篇 |
建筑科学 | 3篇 |
矿业工程 | 6篇 |
能源动力 | 2篇 |
轻工业 | 5篇 |
水利工程 | 3篇 |
石油天然气 | 8篇 |
武器工业 | 4篇 |
无线电 | 216篇 |
一般工业技术 | 25篇 |
冶金工业 | 1篇 |
自动化技术 | 837篇 |
出版年
2024年 | 6篇 |
2023年 | 2篇 |
2022年 | 7篇 |
2021年 | 7篇 |
2020年 | 14篇 |
2019年 | 3篇 |
2018年 | 4篇 |
2017年 | 6篇 |
2016年 | 9篇 |
2015年 | 13篇 |
2014年 | 37篇 |
2013年 | 46篇 |
2012年 | 69篇 |
2011年 | 79篇 |
2010年 | 96篇 |
2009年 | 121篇 |
2008年 | 108篇 |
2007年 | 125篇 |
2006年 | 154篇 |
2005年 | 122篇 |
2004年 | 82篇 |
2003年 | 75篇 |
2002年 | 58篇 |
2001年 | 42篇 |
2000年 | 16篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1991年 | 1篇 |
排序方式: 共有1306条查询结果,搜索用时 15 毫秒
91.
F.P. Yang Q.Y. Lin J.J. Jiang 《Fatigue & Fracture of Engineering Materials & Structures》2015,38(4):456-465
Sandwich structures consisting of aluminium skin sheets and polymethacrylimide foam core have been gradually used in the high‐speed trains. The static mechanical properties and fatigue damage of the sandwich structures with polymethacrylimide foam core were experimented in three‐point bending and were discussed. The failure mode is identified as local indentation. The static strength was obtained, and it showed good consistency with the forecasting formula. The fatigue property and damage evolution were also researched under cyclic loading. The fatigue life curve and the fitting formula were submitted. The fatigue damage evolution started from the skin sheet fracture and then the foam core indentation. The displacement at the midpoint as the damage parameter was discussed, and the evolution prediction formula was submitted, which showed great agreement with the experimental results. 相似文献
92.
随着技术的快速发展,MBD(Model Based Definition)技术逐渐应用到汽车航天等制造领域。MBD技术的核心思想是用一个集成的CAD三维模型来完整的表达产品定义信息,将三维模型作为信息传递的唯一载体。而三维标注技术就是将产品信息和三维模型关联起来的关键环节。针对目前三维标注存在的问题及缺陷,本文提出一种全新的PMI信息快速标注路线。在MBD技术的基础上,制定模型要素的PMI信息明细表,并对CAD模型中的要素进行定义;以UG11.0为开发平台、利用C/C++编程语言实现了CAD三维模型PMI信息的快速标注。 相似文献
93.
There has been enormous increase in transactions and cooperative-computing services on the internet. This is both a technical
and a social phenomenon. Transactions and services over the internet have global reach and users, known or unknown to the
service provider, might be interested in availing access or participating in the cooperative transaction in a distributed
manner. Thus, it is very important for service providers to identify and establish trustworthiness of potential collaborators,
which they do by writing contracts (e.g. access control, security policies; the words contract and policy are used interchangeably)
without violating the privacy and confidentiality laws that prevail across geographical boundaries. But as the system becomes
complex and dynamic, contractual incompleteness arises since it becomes cumbersome to mention potentially large set of outcomes
of the user's choice of action. Trust plays a crucial role in the design of optimal contracts; not all the relevant, valuable
information on the user's choice of action is incorporated in the equilibrium contract. It may also be noted in that traditional
transactions, the notion ofseeing is believing plays a vital role. However, in e-transactions, this is not the case. The challenge is to see how in such a scenario trust
can indeed be generated. Note that the presence of trust facilitates cooperative behaviour and allows for exchange to occur
in situations where its absence would preclude trade. In this paper, we shall present a comparative analysis of various approaches
of trust management in practice that integrates technology with other factors. We shall also bring out the relative deficiencies
and how these issues are tackled in our ongoing work that facilitates execution of optimal contracts. 相似文献
94.
This paper presents the results of experimental investigation and modeling the polymethacrylimide (PMI) solid foam response on slightly non-stationary compressive loads at different loading speed and temperature. The PMI represents a typical material used as a core component of composite sandwich structures. For all conditions, the strain–stress curves exhibit three definite regions, such as linearly elastic, plateau, and densification as it is known from the literature. However, it is shown in the present study that even minor fluctuations of the loading speed may lead to significant qualitative effects within the plateau segment. In particular, spike-wise load drops occur in a regular way during the loading phase when the specimen temperature is below −20 °C. Acoustic emission tests lead to the conclusion that the load drops are associated with generation of brittle fractures in the clusters of broken foam cells. Also, cyclic loading tests were conducted to evaluate the energy loss in cells permanent deformation during the loading cycle. The amount of energy dissipated for each cycle is reduced at higher temperatures. Finally, based on the experimental results, a phenomenological model of the foam load–displacement response at different loading speeds and temperatures is presented in the form of a single analytical expression. 相似文献
95.
本文论述了分体式低压电动机监控保护器在16位微控制器MSP430F149和μc/OS-Ⅱ实时操作系统上的设计和实现过程,介绍了系统的硬件架构、功能特性,探讨了在内嵌了μc/OS-Ⅱ之后系统的软件结构。对移植、使用μc/OS-Ⅱ中产生的问题提出了解决方案。 相似文献
96.
由于直接传送消息存在的种种安全隐患,公钥基础设施(Public Key Infrastructure,PKI)的出现为网络应用提供了可靠的安全服务,从技术上解决网上身份认证、消息的保密性、完整性和不可否认性等安全服务保证信息的安全,基于此,也出现一系列的客户端和服务器端的安全产品,为信息的保密性提供安全保证。 相似文献
97.
Design and Implementation of a PKI-Based End-to-End Secure Infrastructure for Mobile E-Commerce 总被引:2,自引:0,他引:2
The popularity of handheld mobile devices and deployment of the public key infrastructure in many parts of the world have led to the development of electronic commerce on mobile devices. For the current version of mobile phones, the main challenge is the limited computing capacity on these devices for PKI-based end-to-end secure transactions. This paper presents a new architecture and protocol for authentication and key exchange as well as the supporting infrastructure that is suitable for the mobile phone environment. The system requirements and our solutions in addressing these requirements in the restrictive environment are discussed. An evaluation of the system performance is also included. The system has been implemented and is supporting some real-life applications. 相似文献
98.
介绍了XKMS规范的内容,建立了一个XKMS实现框架,并分析了XKMS的核心工作原理,以研究基于XKMS的PKI系统具有不同于传统PKI系统的安全应用特点. 相似文献
99.
网络信息安全研究 总被引:4,自引:0,他引:4
肖茜 《网络安全技术与应用》2009,(4):27-28,15
本文探讨了网络信息安全的现状及问题由来以及几种主要网络信息安全技术,提出了实现网络信息安全的策略。 相似文献
100.
本系统的硬件基于ARM7,软件基于μC/OS—Ⅱ实时多任务操作系统。本文介绍了以ARM7为控制核心的超声波汽车停车泊位检测报警系统,重点分析了超声波测距的原理、超声波收发器与ARM7的连接与实现以及系统的软件流程设计。该系统在汽车电子方面有一定的实用价值。 相似文献