全文获取类型
收费全文 | 682篇 |
免费 | 23篇 |
国内免费 | 19篇 |
专业分类
电工技术 | 31篇 |
综合类 | 47篇 |
化学工业 | 47篇 |
金属工艺 | 20篇 |
机械仪表 | 42篇 |
建筑科学 | 47篇 |
矿业工程 | 38篇 |
能源动力 | 21篇 |
轻工业 | 17篇 |
水利工程 | 2篇 |
石油天然气 | 38篇 |
武器工业 | 1篇 |
无线电 | 95篇 |
一般工业技术 | 60篇 |
冶金工业 | 4篇 |
原子能技术 | 12篇 |
自动化技术 | 202篇 |
出版年
2024年 | 2篇 |
2023年 | 6篇 |
2022年 | 9篇 |
2021年 | 19篇 |
2020年 | 17篇 |
2019年 | 11篇 |
2018年 | 14篇 |
2017年 | 17篇 |
2016年 | 25篇 |
2015年 | 31篇 |
2014年 | 39篇 |
2013年 | 35篇 |
2012年 | 28篇 |
2011年 | 43篇 |
2010年 | 32篇 |
2009年 | 33篇 |
2008年 | 48篇 |
2007年 | 49篇 |
2006年 | 28篇 |
2005年 | 27篇 |
2004年 | 21篇 |
2003年 | 23篇 |
2002年 | 16篇 |
2001年 | 18篇 |
2000年 | 19篇 |
1999年 | 18篇 |
1998年 | 20篇 |
1997年 | 20篇 |
1996年 | 9篇 |
1995年 | 8篇 |
1994年 | 5篇 |
1993年 | 5篇 |
1992年 | 3篇 |
1991年 | 7篇 |
1990年 | 2篇 |
1989年 | 3篇 |
1988年 | 5篇 |
1986年 | 3篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 1篇 |
排序方式: 共有724条查询结果,搜索用时 0 毫秒
1.
本文引进一个定义在L~∞(0,1)上格半范数ρp与一个熟知的格半范数ρ0关系,证明了在L~∞(0,1)中的序区间上,ρ0-拓扑与ρp-拓扑等价,从而证明了(L~∞(0,1),ρp)′的闭单位球是(L~∞(0,1),ρp)′的某个子集的弱-闭包,本文还证明了(L~∞(0,1),ρp)′可看作WeakLp(0,1)对偶空间的奇异部一个理想,而且这奇异部可由(L~∞(0,1),ρp)′与一算子族生成.(f)all(l.\n,oo(j.)=hillsill)t ̄.,iff ̄*(t)respectivelyall'l,L(q,1)isthepredlslaloftyreakLI',allllh,rlloll--at(,llli('llleasllrealga(l ̄s,arepresellta'tiolltlleorenlff,relelllelltsillSac,all(lS,,.isof)taille(l.However,ill[2],itisslldwnthattilerepreselltatiolltilesf)relllof)taille(lill[.5]isill(torre(?t.Inthisnote,wede 相似文献
2.
Alberto Accumolli 《Quality and Reliability Engineering International》1993,9(5):407-410
This paper gives a review of the methodology used to tune the run-in process of a PC manufacturing line. It shows in some detail the analysis carried-out on the test data gathered on the manufacturing line and presents a clear picture of the run-in process in order to choose the best compromise between process efficiency and costs. 相似文献
3.
Treated was an anti-plane crack perpendicular to the interface of an exponential-type FGM strip bonded to another linear-type
FGM substrate with infinite thickness. Through Fourier integral transform, the problem was reduced as a Cauchy singular integral
equation, which was further solved numerically by the Lobatto–Chebyshev collocation method. Based on the numerical solution,
the effects of the geometrical and physical parameters on the stress intensity factor (SIF) were analyzed and the following
conclusions were obtained: (a) A notable discrepancy between the interface-perpendicular crack and the interfacial one is
that, to reduce the weak-discontinuity of interface or to make the interface micro-discontinuous will not necessarily decrease
the SIF of the former, but will surely decrease that of the latter. (b) When a crack tip is situated very near to the interface
(or free surface), its SIF will be high and totally dominated by the interface (or free surface). (c) To increase the stiffness
of the FGM on one side of the interface is beneficial to preventing the crack on the other side from growing toward the interface.
Besides, some practical suggestions were further given for material design in the field of composites. 相似文献
4.
弱磁应力检测技术支持非接触在线应力损伤检测,在长输油气管道应力内检测技术领域具有巨大的应用潜力。但弱磁信号微弱,易受外界环境干扰,检测结果易出现偏差。为加强弱磁信号的检测能力,基于铁磁材料的微观特性,建立了外磁场弱磁应力检测模型,获得了弱磁信号强度随外磁场强度与施加应力的变化规律,描述了外磁场对弱磁应力检测信号的激励特性,并进行了系统的实验研究。结果表明,弱磁信号的切向峰值与法向零点均位于应力集中区的中心位置,且不随应力与外磁场的变化而发生波动;弱磁信号切向峰值与法向峰峰值随外磁场与应力的增加而增大;外磁场对弱磁应力检测信号的激励作用随外磁场的增加先增大后减小。 相似文献
5.
Users are inclined to share sensitive data in a remote server if no strong security mechanism is in place. Searchable encryption satisfies the need of users to execute a search encrypted data. Previous searchable encryption methods such as “public key encryption with keyword search (PEKS)” restricted the data access to certain users, because only the assigned users were able to search the encrypted data. In this paper we will discuss the relation between Attribute Based Encryption (ABE) and searchable encryption and define a weak anonymity of the ABE scheme, named “attribute privacy”. With this weak anonymity, we propose a general transformation from ABE to Attribute Based Encryption with Keyword Search (ABEKS) and a concrete attribute private key-policy ABE (KP-ABE) scheme. We present an ABEKS scheme based on this KP-ABE scheme and permit multi-users to execute a flexible search on the remote encrypted data. 相似文献
6.
7.
采用流变、常规量筒法、扫描电镜及显微镜,研究了优选出的3种弱凝胶与SD发泡剂的复配体系的起泡性能、黏度、稳定性以及微观结构。结果表明,起泡剂与弱凝胶复配之后,体系的各项性能得到明显改善。复配体系半衰期增大,泡沫黏度增大,稳定性增强,明显优于单一体系。在弱凝胶与泡沫复合调驱体系中,凝胶易在气泡表面形成吸附膜,将泡沫包裹在内部,增强了气液界面的黏度,使得泡沫不容易发生聚并破裂,从而增强了泡沫的稳定性以及黏度,使得其半衰期也增大。 相似文献
8.
Tetsuro Kobayashi Jeffrey Boase Tsutomu Suzuki Takahisa Suzuki 《Journal of Computer-Mediated Communication》2015,20(3):330-345
The tele‐cocooning hypothesis posits that mobile communication increases interaction with communication rich ties, while simultaneously weakening interaction with communication weak ties. In this study, we demonstrate how smartphones can be used to mitigate tele‐cocooning behavior by stimulating interaction with communication weak ties. Using a smartphone application to collect non‐identifying mobile communication log data, we conducted a field experiment with 193 Japanese participants. The treatment consisted of onscreen reminders designed to stimulate interaction with communication weak ties. The results indicate that the treatment promoted the activation of communication weak ties and the acquisition of information through those ties, suggesting that smartphones can be utilized to promote access to social capital. 相似文献
9.
阿布里米提·肉孜 《计算机光盘软件与应用》2011,(12)
本文先简要阐述无线网络的定义、安全隐患及一般安全技术。为了确保无线网络的安全,详细介绍了无线网络的802.11系列安全机制,并介绍了增强的安全机制802.1X。在对数据传输的研究中,对WEP加密解密算法进行深入研究,并在对RC4算法的分析中,发现弱密钥的安全隐患,同时提出了改进策略。 相似文献
10.
Recently, Aceto, Fokkink and Ingólfsdóttir proposed an algorithm to turn any sound and ground-complete axiomatisation of any preorder listed in the linear time-branching time spectrum at least as coarse as the ready simulation preorder, into a sound and ground-complete axiomatisation of the corresponding equivalence—its kernel. Moreover, if the former axiomatisation is ω-complete, so is the latter. Subsequently, de Frutos Escrig, Gregorio Rodríguez and Palomino generalised this result, so that the algorithm is applicable to any preorder at least as coarse as the ready simulation preorder, provided it is initials preserving. The current paper shows that the same algorithm applies equally well to weak semantics: the proviso of initials preserving can be replaced by other conditions, such as weak initials preserving and satisfying the second τ-law. This makes it applicable to all 87 preorders surveyed in “the linear time-branching time spectrum II” that are at least as coarse as the ready simulation preorder. We also extend the scope of the algorithm to infinite processes, by adding recursion constants. As an application of both extensions, we provide a ground-complete axiomatisation of the CSP failures equivalence for BCCS processes with divergence. 相似文献