全文获取类型
收费全文 | 538篇 |
免费 | 27篇 |
专业分类
电工技术 | 9篇 |
化学工业 | 113篇 |
金属工艺 | 7篇 |
机械仪表 | 4篇 |
建筑科学 | 36篇 |
矿业工程 | 2篇 |
能源动力 | 49篇 |
轻工业 | 35篇 |
水利工程 | 1篇 |
石油天然气 | 10篇 |
无线电 | 64篇 |
一般工业技术 | 80篇 |
冶金工业 | 54篇 |
原子能技术 | 4篇 |
自动化技术 | 97篇 |
出版年
2024年 | 3篇 |
2023年 | 8篇 |
2022年 | 16篇 |
2021年 | 26篇 |
2020年 | 21篇 |
2019年 | 20篇 |
2018年 | 28篇 |
2017年 | 17篇 |
2016年 | 28篇 |
2015年 | 19篇 |
2014年 | 16篇 |
2013年 | 24篇 |
2012年 | 30篇 |
2011年 | 34篇 |
2010年 | 32篇 |
2009年 | 32篇 |
2008年 | 29篇 |
2007年 | 16篇 |
2006年 | 19篇 |
2005年 | 14篇 |
2004年 | 13篇 |
2003年 | 10篇 |
2002年 | 12篇 |
2001年 | 6篇 |
2000年 | 6篇 |
1999年 | 9篇 |
1998年 | 10篇 |
1997年 | 6篇 |
1996年 | 11篇 |
1995年 | 10篇 |
1994年 | 2篇 |
1993年 | 5篇 |
1992年 | 4篇 |
1991年 | 4篇 |
1990年 | 5篇 |
1988年 | 3篇 |
1986年 | 1篇 |
1985年 | 5篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1977年 | 3篇 |
1974年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有565条查询结果,搜索用时 468 毫秒
561.
The effect of gamma radiation on the thermal behavior and crystalline structure of low density polyethylene (LDPE) has been investigated using differential scanning calorimetry (DSC) and X‐ray diffraction techniques (XRD). Gamma irradiation was carried out in atmospheric air to a maximum dose of 883 kGy. DSC results of the heating run from room temperature up to 150 °C showed that the melting temperature (Tm), and onset temperature of LDPE film decrease linearly with increasing irradiation dose. However, upon cooling LDPE film from 150 °C to room temperature, the crystallization temperature (Tc) and onset temperature were found to decrease non‐linearly with increasing irradiation dose up to 500 kGy and then tended to level off. The change in heat of fusion (ΔHf) with irradiation dose was found to proceed with different behaviour, two stages, with a kink at irradiation dose of about 500 kGy, being observed. This suggests the occurrence of degradation and crosslinking at low and high doses, respectively. However, parameters of the X‐ray diffraction pattern such as number of diffraction patterns, peak position (2θ) and width of the diffraction pattern, support the results of DSC measurements. © 2000 Society of Chemical Industry 相似文献
562.
Residual strength tests are commonly used to characterize the high-temperature mechanical properties of concrete materials. In these tests, the specimens are heated to a target temperature in a furnace and then cooled down to room temperature, followed by mechanical testing at room temperature. This research investigates the influence of the cooling method on the residual strength of Strain Hardening Cementitious Composites (SHCC) after exposure to 400°C and 600°C. Two types of cooling methods — furnace-cooling (within a closed furnace) and water-cooling (immersed in a water tank) — were adopted. Four different SHCC previously investigated by the authors for high-temperature residual mechanical and bond behavior with steel were studied. Two different specimen sizes were tested under uniaxial compression and flexure to characterize the residual compressive strength and modulus of rupture. The effect of the cooling method was prominent for the normalized residual modulus of rupture at 400°C, but not at 600°C. The cooling method had no effect on the normalized residual compressive strength of any material at either of the two temperatures, except one of the SHCC (PVA-SC) at 400°C. Specimen size also had no effect on the normalized residual compressive strength and modulus of rupture irrespective of the cooling method. 相似文献
563.
Dr. Jonathan C. K. Quirke Dr. Girish C. Sati Prof. Dr. Amr Sonousi Marina Gysin Klara Haldimann Prof. Dr. Erik C. Böttger Prof. Dr. Andrea Vasella Dr. Sven N. Hobbie Prof. Dr. David Crich 《ChemMedChem》2022,17(13):e202200120
Modification at the 5’’-position of 4,5-disubstituted aminoglycoside antibiotics (AGAs) to circumvent inactivation by aminoglycoside modifying enzymes (AMEs) is well known. Such modifications, however, unpredictably impact activity and affect target selectivity thereby hindering drug development. A survey of 5’’-modifications of the 4,5-AGAs and the related 5-O-furanosyl apramycin derivatives is presented. In the neomycin and the apralog series, all modifications were well-tolerated, but other 4,5-AGAs require a hydrogen bonding group at the 5’’-position for maintenance of antibacterial activity. The 5’’-amino modification resulted in parent-like activity, but reduced selectivity against the human cytosolic decoding A site rendering this modification unfavorable in paromomycin, propylamycin, and ribostamycin. Installation of a 5’’-formamido group and, to a lesser degree, a 5’’-ureido group resulted in parent-like activity without loss of selectivity. These lessons will aid the design of next-generation AGAs capable of circumventing AME action while maintaining high antibacterial activity and target selectivity. 相似文献
564.
Marzia Dulal Md Rashedul Islam Saptarshi Maiti Mohammad Hamidul Islam Iftikhar Ali Amr M. Abdelkader Kostya S. Novoselov Shaila Afroj Nazmul Karim 《Advanced functional materials》2023,33(40):2305901
Smart and multifunctional fiber reinforced polymer (FRP) composites with energy storage, sensing, and heating capabilities have gained significant interest for automotive, civil, and aerospace applications. However, achieving smart and multifunctional capabilities in an FRP composite while maintaining desired mechanical properties remains challenging. Here, a novel approach for layer-by-layer (LBL) deposition of 2D material (graphene and molybdenum disulfide, MoS2)-based heterostructure onto glass fiber fabric using a highly scalable manufacturing technique at a remarkable speed of ≈150 m min−1 is reported. This process enables the creation of smart textiles with integrated energy storage, sensing, and heating functionalities. This methodology combines gel-based electrolyte with a vacuum resin infusion technique, resulting in an efficient and stable smart FRP composite with an areal capacitance of up to ≈182 µF cm−2 at 10 mV s−1. The composite exhibits exceptional cyclic stability, maintaining ≈90% capacitance after 1000 cycles. Moreover, the smart composite demonstrates joule heating, reaching from ≈24 to ≈27 °C within 120 s at 25 V. Additionally, the smart composite displays strain sensitivity by altering electrical resistance with longitudinal strain, enabling structural health monitoring. These findings highlight the potential of smart composites for multifunctional applications and provide an important step toward realizing their actual real-world applications. 相似文献
565.
Ali Arshad Muhammad Nadeem Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi 《计算机、材料和连续体(英文)》2023,75(2):3065-3089
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data, but these techniques and algorithms cannot be used to protect data from an attacker. Cloud cryptography is the best way to transmit data in a secure and reliable format. Various researchers have developed various mechanisms to transfer data securely, which can convert data from readable to unreadable, but these algorithms are not sufficient to provide complete data security. Each algorithm has some data security issues. If some effective data protection techniques are used, the attacker will not be able to decipher the encrypted data, and even if the attacker tries to tamper with the data, the attacker will not have access to the original data. In this paper, various data security techniques are developed, which can be used to protect the data from attackers completely. First, a customized American Standard Code for Information Interchange (ASCII) table is developed. The value of each Index is defined in a customized ASCII table. When an attacker tries to decrypt the data, the attacker always tries to apply the predefined ASCII table on the Ciphertext, which in a way, can be helpful for the attacker to decrypt the data. After that, a radix 64-bit encryption mechanism is used, with the help of which the number of cipher data is doubled from the original data. When the number of cipher values is double the original data, the attacker tries to decrypt each value. Instead of getting the original data, the attacker gets such data that has no relation to the original data. After that, a Hill Matrix algorithm is created, with the help of which a key is generated that is used in the exact plain text for which it is created, and this Key cannot be used in any other plain text. The boundaries of each Hill text work up to that text. The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms. Then, the Kasiski test is used to verify the validity of the proposed algorithm and found that, if the proposed algorithm is used for data encryption, so an attacker cannot break the proposed algorithm security using any technique or algorithm. 相似文献