全文获取类型
收费全文 | 1111篇 |
免费 | 99篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 13篇 |
综合类 | 1篇 |
化学工业 | 364篇 |
金属工艺 | 33篇 |
机械仪表 | 23篇 |
建筑科学 | 16篇 |
矿业工程 | 11篇 |
能源动力 | 31篇 |
轻工业 | 24篇 |
水利工程 | 1篇 |
石油天然气 | 8篇 |
武器工业 | 1篇 |
无线电 | 92篇 |
一般工业技术 | 356篇 |
冶金工业 | 69篇 |
原子能技术 | 9篇 |
自动化技术 | 161篇 |
出版年
2024年 | 2篇 |
2023年 | 18篇 |
2022年 | 72篇 |
2021年 | 93篇 |
2020年 | 47篇 |
2019年 | 52篇 |
2018年 | 53篇 |
2017年 | 45篇 |
2016年 | 52篇 |
2015年 | 43篇 |
2014年 | 52篇 |
2013年 | 85篇 |
2012年 | 73篇 |
2011年 | 98篇 |
2010年 | 45篇 |
2009年 | 49篇 |
2008年 | 42篇 |
2007年 | 45篇 |
2006年 | 28篇 |
2005年 | 43篇 |
2004年 | 23篇 |
2003年 | 18篇 |
2002年 | 19篇 |
2001年 | 16篇 |
2000年 | 13篇 |
1999年 | 10篇 |
1998年 | 12篇 |
1997年 | 14篇 |
1996年 | 10篇 |
1995年 | 4篇 |
1994年 | 6篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 4篇 |
1986年 | 1篇 |
1985年 | 3篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有1213条查询结果,搜索用时 15 毫秒
1.
Motrenko Anastasia Simchuk Egor Khairullin Renat Inyakin Andrey Kashirin Daniil Strijov Vadim 《Multimedia Tools and Applications》2022,81(4):4877-4895
Multimedia Tools and Applications - The paper addresses the problem of human activity recognition based on the data from wearable sensors. Human activity recognition depends on a wide context of... 相似文献
2.
3.
Luca Pietrobon Lorenzo Fallarino Andreas Berger Andrey Chuvilin Flix Casanova Luis E. Hueso 《Small (Weinheim an der Bergstrasse, Germany)》2015,11(47):6295-6301
Graphene has been predicted to develop a magnetic moment by proximity effect when placed on a ferromagnetic film, a promise that could open exciting possibilities in the fields of spintronics and magnetic data recording. In this work, the interplay between the magnetoresistance of graphene and the magnetization of an underlying ferromagnetic insulating film is studied in detail. A clear correlation between both magnitudes is observed but through a careful modeling of the magnetization and the weak localization measurements, that such correspondence can be explained by the effects of the magnetic stray fields arising from the ferromagnetic insulator is found. The results emphasize the complexity arising at the interface between magnetic and 2D materials. 相似文献
4.
5.
Andrey Smyshlyaev Author Vitae Author Vitae 《Automatica》2007,43(9):1543-1556
The certainty equivalence approach to adaptive control is commonly used with two types of identifiers: passivity-based identifiers and swapping identifiers. The “passive” (also known as “observer-based”) approach is the prevalent identification technique in existing results on adaptive control for PDEs but has so far not been used in boundary control problems. The swapping approach, prevalent in finite-dimensional adaptive control is employed here for the first time in adaptive control of PDEs. For a class of unstable parabolic PDEs we prove a separation principle result for both the passive and swapping identifiers combined with the backstepping boundary controllers. The result is applicable in any dimension. For physical reasons we restrict our attention to dimensions no higher than three. The results of the paper are illustrated by simulations. 相似文献
6.
Alexey S. Matveev Andrey V. Savkin 《Mathematics of Control, Signals, and Systems (MCSS)》2002,15(2):120-144
This paper deals with qualitative analysis of the so-called switched fluid networks. Such networks are used to model communication,
computer, and flexible manufacturing systems. We prove that for any deterministic network from a specific class, there exists
a finite number of limit cycles attracting all the trajectories of the system. Furthermore, we determine this number.
Date received: March 11, 2000. Date revised: January 19, 2001. 相似文献
7.
M Korbonits PJ Trainer JA Little R Edwards PG Kopelman GM Besser F Svec AB Grossman 《Canadian Metallurgical Quarterly》1997,46(6):751-757
Modern liver surgery is based upon deep knowledge of the surgical anatomy of the liver and improvements with ultrasounds imaging techniques have provided multidimensional interpretations of the liver anatomy intraoperatively. The technical advances with real-time scanning combined with the pioneering efforts of the Japanese liver surgeons have permitted the dynamic adaptation of the functional liver anatomy to the real anatomy, thus intimately aiding in segment oriented anatomical resection. Intraoperative ultrasound afford several advantages such as viewing the internal anatomy in direct relationship to the surface landmarks under the probe, enabling higher frequencies resulting in greater image resolution. The utilization of intraoperative ultrasound can modify the tactics involved with resection of both primary and metastatic liver tumours. The routine use of intraoperative ultrasound is strongly advocated since more complex procedures can be performed safely since the surgeon proceeds with complete knowledge of the real liver anatomy when deciding the feasibility and extent of liver resection. 相似文献
8.
Six adult patients with cleft palate, ranging in age from 47 to 78 years, were treated with self-tapping titanium implants. Twenty-three implants, 7 to 15 mm in length, were placed. Of these, one (4%) was 7 mm, eight (35%) were 10 mm, nine (39%) were 13 mm, and five (22%) were 15 mm. Time between stage I and stage II implant surgeries was 5 to 14 months, averaging 8.3 months. Time from stage II surgery to the present is 1.5 to 5 years, averaging 3 years. Of the 23 implants placed, 21 (91%) achieved osseointegration. One (4%) implant was not used prosthetically. Two (9%) 10 mm implants failed to integrate in one patient. All patients were treated with a maxillary complete denture or overdenture. Five (83%) required the addition of a pharyngeal section for speech enhancement. 相似文献
9.
O. J. Svec 《国际能源研究杂志》1987,11(4):573-581
This paper presents a historical background of ground source heat pump technology, followed by a review of its current shortcomings. Based on these observations the author assesses the R&D needs and recommendations for future research. 相似文献
10.
Elena Andreeva Andrey Bogdanov Bart Mennink Bart Preneel Christian Rechberger 《International Journal of Information Security》2012,11(2):103-120
In 2007, the US National Institute for Standards and Technology (NIST) announced a call for the design of a new cryptographic
hash algorithm in response to vulnerabilities like differential attacks identified in existing hash functions, such as MD5
and SHA-1. NIST received many submissions, 51 of which got accepted to the first round. 14 candidates were left in the second
round, out of which five candidates have been recently chosen for the final round. An important criterion in the selection
process is the SHA-3 hash function security. We identify two important classes of security arguments for the new designs:
(1) the possible reductions of the hash function security to the security of its underlying building blocks and (2) arguments
against differential attack on building blocks. In this paper, we compare the state of the art provable security reductions
for the second round candidates and review arguments and bounds against classes of differential attacks. We discuss all the
SHA-3 candidates at a high functional level, analyze, and summarize the security reduction results and bounds against differential
attacks. Additionally, we generalize the well-known proof of collision resistance preservation, such that all SHA-3 candidates
with a suffix-free padding are covered. 相似文献