全文获取类型
收费全文 | 569篇 |
免费 | 10篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 6篇 |
化学工业 | 117篇 |
金属工艺 | 34篇 |
机械仪表 | 13篇 |
建筑科学 | 19篇 |
矿业工程 | 1篇 |
能源动力 | 38篇 |
轻工业 | 16篇 |
水利工程 | 5篇 |
石油天然气 | 4篇 |
无线电 | 99篇 |
一般工业技术 | 95篇 |
冶金工业 | 73篇 |
原子能技术 | 1篇 |
自动化技术 | 61篇 |
出版年
2024年 | 5篇 |
2023年 | 10篇 |
2022年 | 17篇 |
2021年 | 25篇 |
2020年 | 12篇 |
2019年 | 17篇 |
2018年 | 17篇 |
2017年 | 13篇 |
2016年 | 17篇 |
2015年 | 4篇 |
2014年 | 12篇 |
2013年 | 24篇 |
2012年 | 21篇 |
2011年 | 22篇 |
2010年 | 23篇 |
2009年 | 20篇 |
2008年 | 22篇 |
2007年 | 18篇 |
2006年 | 16篇 |
2005年 | 11篇 |
2004年 | 9篇 |
2003年 | 14篇 |
2002年 | 13篇 |
2001年 | 11篇 |
2000年 | 7篇 |
1999年 | 14篇 |
1998年 | 14篇 |
1997年 | 12篇 |
1996年 | 10篇 |
1995年 | 6篇 |
1994年 | 6篇 |
1993年 | 9篇 |
1992年 | 11篇 |
1991年 | 15篇 |
1990年 | 15篇 |
1987年 | 4篇 |
1986年 | 3篇 |
1985年 | 8篇 |
1984年 | 13篇 |
1983年 | 5篇 |
1982年 | 10篇 |
1981年 | 6篇 |
1980年 | 5篇 |
1979年 | 2篇 |
1976年 | 2篇 |
1975年 | 10篇 |
1974年 | 3篇 |
1973年 | 5篇 |
1972年 | 3篇 |
1970年 | 2篇 |
排序方式: 共有582条查询结果,搜索用时 15 毫秒
1.
A two-dimensional cross-section finite difference model is presented to simulate density dependent leachate migration in leaky aquifers. Unlike existing models, a new approach is adopted to couple the groundwater-flow equation and the hydrodynamic dispersion equation with the elimination of the intermediate step of calculating velocities. The concept of the reference density is employed, permitting increased accuracy (over pressure-based models) in the representation of the transport process. The model is then used to study the effect of several hydraulic and transport parameters on the flow pattern and plume migration which are found to be very sensitive to most of these parameters. Equiconcentration and equipotential lines are overlapped to provide a better understanding of the coupling effect. 相似文献
2.
This paper deals with feasibility studies for a solar-assisted heating system for the University of Miami's Aquatic Center using the simulation program TRNSYS. The Aquatic Center is composed of an outdoor olympic size swimming pool and locker room building. The solar heating is accomplished by employing hot water generated by heat exchange with the solar collector working fluid. Two thermal storage tanks are employed for the collector and domestic use. The performance of the system is analyzed from both thermodynamic and economic standpoints and general conclusions are reached. 相似文献
3.
Sherif Sedky 《Microelectronic Engineering》2007,84(11):2491-2500
This work gives an overview of the different developments for silicon germanium (Si1−xGex) from a MEMS post-processing perspective. First, the maximum processing temperature that does not introduce any damage or degradation into the standard characteristics of the CMOS driving electronics is specified. Then, the optimal type of silicon and germanium gas sources and deposition technique that results in an economical process are identified. Next, the selection criteria for a low thermal budget doping method and doping species are discussed. Finally, the advantage and disadvantage for the different approaches implemented for enhancing the physical properties of poly Si1−xGex at a CMOS backend compatible temperature are highlighted. It is shown that the optimal method depends on the application requirements and the CMOS technology used for realizing the driving electronics. 相似文献
4.
Cookies are the primary means for web applications to authenticate HTTP requests and to maintain client states. Many web applications (such as those for electronic commerce) demand a secure cookie scheme. Such a scheme needs to provide the following four services: authentication, confidentiality, integrity, and anti-replay. Several secure cookie schemes have been proposed in previous literature; however, none of them are completely satisfactory. In this paper, we propose a secure cookie scheme that is effective, efficient, and easy to deploy. In terms of effectiveness, our scheme provides all of the above four security services. In terms of efficiency, our scheme does not involve any database lookup or public key cryptography. In terms of deployability, our scheme can be easily deployed on existing web services, and it does not require any change to the Internet cookie specification. We implemented our secure cookie scheme using PHP and conducted experiments. The experimental results show that our scheme is very efficient on both the client side and the server side.A notable adoption of our scheme in industry is that our cookie scheme has been used by Wordpress since version 2.4. Wordpress is a widely used open source content management system. 相似文献
5.
Elbasuney Sherif Hamed Abdelaziz Yehia M. Ramzy Hesham Abdelgawad Ahmed Gobara Mohamed Mokhtar Mohamed 《Journal of Inorganic and Organometallic Polymers and Materials》2021,31(9):3665-3676
Journal of Inorganic and Organometallic Polymers and Materials - Surface oxygen of oxide catalyst has low coordination number; they are negatively charged. Surface oxygen can act active site for... 相似文献
6.
Amorphous Al50Ta60 alloy powders have been synthesized by mechanical alloying (MA) from elemental powders of aluminium and tantalum, and mechanical disordering (MD) from crystalline intermetallic compound powders of AlTa respectively using the rod milling technique. The mechanically alloyed and the mechanically disordered alloy powders were characterized by X-ray diffraction, scanning electron microscopy, electron probe microanalysis, transmission electron microscopy, differential thermal analysis, differential scanning calorimetry and chemical analysis. The results have shown that the crystal-to amorphous transformation in the MD process occurs through one stage, while the crystallineto-amorphous formation in the MA process occurs through three stages. At the early and intermediate stages of the MA time, heating the alloy powders to 700 K leads to the formation of an amorphous phase by a solid-state amorphizing reaction. At the final stage of the MA time, the amorphous phase is crystallized through a single sharp exothermic peak. Contrary to this, amorphous alloy powders produced by MD are crystallized through two broad exothermic peaks. 相似文献
7.
Ibrahim Abdelaziz Sherif Abdou Hassanin Al-Barhamtoshy 《Pattern Analysis & Applications》2016,19(4):1129-1141
The success of using Hidden Markov Models (HMMs) for speech recognition application has motivated the adoption of these models for handwriting recognition especially the online handwriting that has large similarity with the speech signal as a sequential process. Some languages such as Arabic, Farsi and Urdo include large number of delayed strokes that are written above or below most letters and usually written delayed in time. These delayed strokes represent a modeling challenge for the conventional left-right HMM that is commonly used for Automatic Speech Recognition (ASR) systems. In this paper, we introduce a new approach for handling delayed strokes in Arabic online handwriting recognition using HMMs. We also show that several modeling approaches such as context based tri-grapheme models, speaker adaptive training and discriminative training that are currently used in most state-of-the-art ASR systems can provide similar performance improvement for Hand Writing Recognition (HWR) systems. Finally, we show that using a multi-pass decoder that use the computationally less expensive models in the early passes can provide an Arabic large vocabulary HWR system with practical decoding time. We evaluated the performance of our proposed Arabic HWR system using two databases of small and large lexicons. For the small lexicon data set, our system achieved competing results compared to the best reported state-of-the-art Arabic HWR systems. For the large lexicon, our system achieved promising results (accuracy and time) for a vocabulary size of 64k words with the possibility of adapting the models for specific writers to get even better results. 相似文献
8.
From the perspective of data security, which has always been an important aspect of quality of service, cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. The proposed data security model provides a single default gateway as a platform. It used to secure sensitive user data across multiple public and private cloud applications, including Salesforce, Chatter, Gmail, and Amazon Web Services, without influencing functionality or performance. Default gateway platform encrypts sensitive data automatically in a real time before sending to the cloud storage without breaking cloud application. It did not effect on user functionality and visibility. If an unauthorized person gets data from cloud storage, he only sees encrypted data. If authorized person accesses successfully in his cloud, the data is decrypted in real time for your use. The default gateway platform must contain strong and fast encryption algorithm, file integrity, malware detection, firewall, tokenization and more. This paper interested about authentication, stronger and faster encryption algorithm, and file integrity. 相似文献
9.
El-Moursy Ali A. Sibai Fadi N. Rehman Jahanzeb Gouda Omar M. Gaber Abdelrahman T. Khedr Ahmed M. 《Wireless Personal Communications》2022,124(2):1525-1555
Wireless Personal Communications - The development of Smart Home Controllers has seen rapid growth in recent years, especially for smart devices, that can utilize the Internet of Things (IoT).... 相似文献
10.