首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   782篇
  免费   38篇
  国内免费   2篇
电工技术   19篇
综合类   3篇
化学工业   174篇
金属工艺   16篇
机械仪表   51篇
建筑科学   14篇
矿业工程   1篇
能源动力   34篇
轻工业   65篇
水利工程   4篇
石油天然气   5篇
无线电   70篇
一般工业技术   183篇
冶金工业   54篇
原子能技术   5篇
自动化技术   124篇
  2024年   1篇
  2023年   18篇
  2022年   31篇
  2021年   29篇
  2020年   28篇
  2019年   20篇
  2018年   37篇
  2017年   44篇
  2016年   50篇
  2015年   35篇
  2014年   45篇
  2013年   67篇
  2012年   41篇
  2011年   51篇
  2010年   22篇
  2009年   31篇
  2008年   29篇
  2007年   22篇
  2006年   13篇
  2005年   11篇
  2004年   9篇
  2003年   17篇
  2002年   9篇
  2001年   11篇
  2000年   12篇
  1999年   7篇
  1998年   19篇
  1997年   15篇
  1996年   8篇
  1995年   7篇
  1994年   10篇
  1993年   9篇
  1992年   9篇
  1991年   11篇
  1990年   4篇
  1989年   4篇
  1988年   4篇
  1987年   6篇
  1986年   3篇
  1985年   3篇
  1984年   2篇
  1983年   1篇
  1982年   6篇
  1981年   3篇
  1980年   3篇
  1979年   2篇
  1977年   1篇
  1975年   1篇
  1970年   1篇
排序方式: 共有822条查询结果,搜索用时 0 毫秒
61.
Palladium nanoparticles (Pd‐BNP) stabilized by a binaphthyl‐backbone can be efficiently used for the chemoselective reduction of aldehydes in the presence of hydrogen at room temperature in water. The Pd‐BNP catalyst is easily recovered and reused for five catalytic cycles.

  相似文献   

62.
Pepper (Piper nigrum L) volatile oil was extracted with supercritical fluid carbon dioxide at pressures of 8 and 10 MPa and at two different temperatures, 40°C and 60°C. The mass transfer rates are presented at different supercritical conditions of extraction, together with the fractionation effect that was observed. The volatile oil obtained was analysed for its physical constants: specific gravity, refractive index and optical rotation. The samples were fractionated by column chromatography, and both the samples and fractions were subjected to TLC, gas chromatography and sensory analysis. It was observed that pepper oil obtained with supercritical fluid carbon dioxide at 10 MPa and 60°C was superior to steam-distilled oil.  相似文献   
63.
64.
A three dimensional model of the BTA deep-hole machining system is presented by modelling each of the components separately and later combining to represent the total system. A model for the interaction between the workpiece and the cutting tool is also included. Such a model can determine the response of any component of the machine tool as well as the individual influence on the system performance. Based on this, physical models representing the three working methods in the BTA process can be studied, from which stochastic differential equations are derived to represent the resultant force system on the machine tool

A physical model for the stationary workpiece and rotating cutting tool working method is developed. The assumed modes method along with the Lagrange' equation is used to obtain the stochastic differential equation to represent the influence of axial force and torque, in order to obtain the response of the system under the action of the axial force and torque to predict the stability behaviour.  相似文献   
65.
An ad-hoc sensor network (ASN) is a group of sensing nodes that transmit data over a wireless link to a target node, direct or indirect, through a series of nodes. ASN becomes a high-risk group for several security exploits due to the sensor node’s limited resources. Internal threats are more challenging to protect against than external attacks. The nodes are grouped, and calculate each node’s trust level. The trust level is the result of combining internal and external trust degrees. Cluster heads (CH) are chosen based on the anticipated trust levels. The communications are then digitally signed by the source, encoded using a key pair given by a trustworthy CH, decoded by the recipient, and supervised by verifications. It authenticates the technique by identifying the presence of both the transmitter and the recipient. Our approach looks for a trustworthy neighboring node that meets the trust threshold condition to authenticate the key produced. The companion node reaffirms the node’s reliability by getting the public-key certification. The seeking sensor node and the certification issuer node must have a close and trusting relationship. The results of the proposed hybrid authentication using a node trustworthy (HANT) system are modeled and tested, and the suggested approach outperforms conventional trust-based approaches in throughput, latency, lifetime, and vulnerability methods.  相似文献   
66.
Based onin-situ Mössbauer and X-ray diffraction studies, it is shown that in the Fe/TiO2 catalyst, the anatase-rutile transformation of the TiO2 support is facilitated by the Fe2+ ions formed during the reduction. The transformation occurs at lower temperatures in Th/TiO2 and Cu/TiO2 compared to pure TiO2. In general, the transformation of anatase to rutile seems to occur at or below the temperature (770 K) at which strong-metal-support-interaction manifests itself.Contribution No. 718 from the Solid State and Structural Chemistry Unit.  相似文献   
67.
A computer program to generate automatically the stiffness and mass matrices in finite element analysis is introduced. By using programs like this, researchers only need to derive the expressions for the energies (strain or kinetic) and the expressions for the displacements or stresses and their derivatives in terms of nodal variables. Tedious calculations to obtain the matrices are avoided. Such programs would facilitate checking of existing matrices and would encourage researchers to try out new finite element models.  相似文献   
68.
Detonation gun sprayed Cr3C2–NiCr coating was deposited on nickel-based superalloy Inconel-718. Hot corrosion studies were conducted on uncoated as well as Cr3C2–NiCr coated superalloy in 75 wt% Na2SO4 + 25 wt% NaCl salt environment at 900 °C for 50 cycles. The thermo-gravimetric technique was used to establish kinetics of corrosion. X-ray diffraction and scanning electron microscopy/energy-dispersive X-ray analysis techniques were used to analyze the corrosion products. The uncoated superalloy suffered intense spalling, while the Cr3C2–NiCr coating provided good protection against hot corrosion in the given salt environment.  相似文献   
69.
In this paper, the problem of evaluation of reliability (probability of success) of a network consisting of several inputs and outputs is studied. Edges are assumed to be perfect and vertices are assigned the probabilities of success. A new concept called “vertex connected subgraph” is introduced for this purpose. This concept is useful even for dense graphs because they are of the order of 2(v-k-1) which is independent of e, where ν(e) is the number of vertices (edges) and k is the number of outputs of a graph.  相似文献   
70.
Sugar amino acid (SAA)‐based foldamers with well‐defined secondary structures were appended with N‐acetylgalactosamine (GalNAc) sugars to access sequence‐defined, multidentate glycoconjugates with full control over number, spacing and position. Conformation analysis of these glycopeptides by extensive NMR spectroscopic studies revealed that the appended GalNAc units had a profound influence on the native conformational behaviour of the SAA foldamers. Whereas the 2,5‐cis glycoconjugate showed a helical structure in water, comprising of two consecutive 16‐membered hydrogen bonds, its 2,5‐trans congener displayed an unprecedented 16/10‐mixed turn structure not seen before in any glycopeptide foldamer.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号