全文获取类型
收费全文 | 8998篇 |
免费 | 317篇 |
国内免费 | 39篇 |
专业分类
电工技术 | 121篇 |
综合类 | 22篇 |
化学工业 | 2102篇 |
金属工艺 | 167篇 |
机械仪表 | 230篇 |
建筑科学 | 573篇 |
矿业工程 | 31篇 |
能源动力 | 171篇 |
轻工业 | 772篇 |
水利工程 | 54篇 |
石油天然气 | 11篇 |
武器工业 | 1篇 |
无线电 | 591篇 |
一般工业技术 | 1442篇 |
冶金工业 | 1520篇 |
原子能技术 | 70篇 |
自动化技术 | 1476篇 |
出版年
2023年 | 58篇 |
2022年 | 120篇 |
2021年 | 143篇 |
2020年 | 105篇 |
2019年 | 119篇 |
2018年 | 168篇 |
2017年 | 110篇 |
2016年 | 191篇 |
2015年 | 191篇 |
2014年 | 249篇 |
2013年 | 563篇 |
2012年 | 397篇 |
2011年 | 544篇 |
2010年 | 410篇 |
2009年 | 389篇 |
2008年 | 432篇 |
2007年 | 420篇 |
2006年 | 363篇 |
2005年 | 312篇 |
2004年 | 291篇 |
2003年 | 221篇 |
2002年 | 227篇 |
2001年 | 173篇 |
2000年 | 165篇 |
1999年 | 157篇 |
1998年 | 258篇 |
1997年 | 194篇 |
1996年 | 159篇 |
1995年 | 140篇 |
1994年 | 122篇 |
1993年 | 136篇 |
1992年 | 130篇 |
1991年 | 75篇 |
1990年 | 92篇 |
1989年 | 79篇 |
1988年 | 94篇 |
1987年 | 67篇 |
1986年 | 55篇 |
1985年 | 79篇 |
1984年 | 94篇 |
1983年 | 60篇 |
1982年 | 66篇 |
1981年 | 83篇 |
1980年 | 68篇 |
1979年 | 85篇 |
1978年 | 68篇 |
1977年 | 67篇 |
1976年 | 56篇 |
1975年 | 58篇 |
1973年 | 47篇 |
排序方式: 共有9354条查询结果,搜索用时 15 毫秒
41.
Athanasios Eftaxias Josep Font Agusti Fortuny Azael Fabregat Frank Stüber 《Journal of chemical technology and biotechnology (Oxford, Oxfordshire : 1986)》2005,80(6):677-687
The wet air oxidation of phenol over a commercial active carbon catalyst was studied in a trickle bed reactor (TBR) in the temperature and oxygen partial pressure ranges of 120–160 °C and 0.1–0.2 MPa, respectively. The performance of the active carbon was compared in terms of phenol and COD destruction. The weight change of active carbon due to reaction was also measured. Finally, oxic phenol adsorption isotherms were assessed in batch conditions at 25, 125 and 160 °C. In order to use the conversion data obtained from the TBR for a kinetic study, special care was taken to check the kinetic control in the TBR experiments. Several kinetic models including power law or Langmuir–Hinshelwood expressions were considered to describe the catalytic oxidation of phenol over active carbon. The simple power law model with first order dependence on both phenol and oxygen concentration predicted satisfactorily the experimental data not only over the entire range of operating conditions studied, but also outside its validity range. Copyright © 2005 Society of Chemical Industry 相似文献
42.
Witt Ellen; Frank Rainer; Hengstenberg Wolfgang 《Protein engineering, design & selection : PEDS》1993,6(8):913-920
The 6-phospho-ß-galactosidase of Staphylococcus aureus,Lactococcus lactis and Lactobacillus casei and 6-phospho-ßglucosidaseB of Escherichia coli build a subfamily inside a greater enzymefamily, named the glycosal hydrolase family 1, which, hi addition,contains nine ß-glycosidases of different origins.Kinetic and immunological evidence is provided in this reportwhich strengthens the relationship of the four 6-phospho-ß-glycosidases.It is shown that the 6-phospho-ß-galactosidases and6-phospho-ß-glucosidase B are able to split aromaticß-galactoside phosphates and ß-glucosidephosphates. The turnover numbers of hydrolysis of substrateswith different epimerization at C-4 of the glycon vary up to15-fold only. Two polydonal antisera, one derived against thenative 6-phospho-ß-galactosidase from S.aureus andthe other derived against the 6-phospho-ß-glucosidaseB, cross-reacted with both enzymes. Peptides of the proteinswere separated by reverse phase HPLC. The cross-reacting peptideswere sequenced and shown to be localized at almost the sameposition in the aligned primary structures of both enzymes.An insertion of nine amino adds near these antigenic domainsis unique for the 6-phospho-ß-glycosidases and missingwithin the sequences of the ß-glycoside-specific membersof the family. The lacG gene of a 6-phospho-ß-galactosidasenegative S.aureus mutant was doned into E.coli and sequenced.In the totally inactive mutant protein only the glycine at position332 was changed to an arginine. This amino acid is part of thesequence insertion near the antigenic domain reacting with bothantisera. These data support the assumption that the regionis of great importance for the function of the enzymes and thatit is possible it determines the specificity of the phosphorylatedform of the substrates. In addition, the 6-phospho-ß-galactosidaseof S.aureus was modified by sitedirected mutagenesis of thecorresponding lacG gene hi order to replace residues Glul60and Glu375, which were suspected of being involved hi the generalacid catalysis of substrate hydrolysis, with glutamine residues.The mutant protein 160EQ retained some catalytic activity whilethe protein 375EQ was totally inactive. Glu375 is the activesite nudeophile of the 6-phospho-ß-galactosidase ofS.aureus. It is located in the sequence motif ENG where Glu358was identified as the catalytkally active nudeophile hi theß-glucosidase of Agrobacterium. 相似文献
43.
Comprehensive meta-analysis of integrity test validities: Findings and implications for personnel selection and theories of job performance. 总被引:1,自引:0,他引:1
Ones Deniz S.; Viswesvaran Chockalingam; Schmidt Frank L. 《Canadian Metallurgical Quarterly》1993,78(4):679
Conducted a comprehensive meta-analysis based on 665 validity coefficients across 576,460 data points to investigate whether integrity test validities are generalizable and to estimate differences in validity due to potential moderating influences. Results indicate that integrity test validities are substantial for predicting job performance and counterproductive behaviors on the job, such as theft, disciplinary problems, and absenteeism. The estimated mean operational predictive validity of integrity test for predicting supervisory ratings of job performance is .41. Results from predictive validity studies conducted on applicants and using external criterion measures (i.e., excluding self-reports) indicate that integrity tests predict the broad criterion of organizationally disruptive behaviors better than they predict employee theft alone. Despite the influence of moderators, integrity test validities are positive across situations and settings. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
44.
From dust till drawn 总被引:1,自引:0,他引:1
William Van Haevre Tom Van Laerhoven Fabian Di Fiore Frank Van Reeth 《The Visual computer》2007,23(9-11):925-934
We present a system for drawing pastel media in real-time as an effective alternative to most existing digital solutions that basically allow for drawing arbitrary strokes in a particular style. Our approach is focused on the simulation of the natural material itself and on its interaction with the drawing surface and the drawing tool. Upon free-form drawing, a bidirectional transfer of pigment takes place. In one direction, the paper surface is dusted with new pigment particles broken off the tip (i.e., the end of the drawing tool). A large part of these particles will be deposited or blended together with previously deposited ones whereas the remainder does not contribute to the drawing and is blown off. On the other hand, a certain amount of previously deposited pigment is scraped off and picked up again soiling the tip. This is noticeable in the next strokes to be drawn. Furthermore, both the tip and the paper surface are subject to weathering depending on the exerted pressure and friction of the drawing tool, and the bumpiness of the paper. As a result, the paper surface becomes slightly damaged, limiting the deposition of new pigment. The tip, on the other hand, becomes blunt making new strokes wider. From a stylistic point of view, similarly to traditional drawings our results convey the artists’ characteristics (e.g., the way of wielding the brush, skillfulness, feeling for the medium). Therefore, we believe that our system allows an artist to create realistically looking pastel images without losing his/her personal touch. 相似文献
45.
In Deutschland geh?rt der Einsatz von NEDAP-Wahlcomputern in immer mehr Gemeinden zum Alltag. Durch Untersuchungen zur Sicherheit
und Manipulierbarkeit konnten Erkenntnisse gewonnen werden, mit welchen Methoden manipulierte Software in den Wahlcomputer
eingebracht und Hardwarekomponenten ausgetauscht werden k?nnen. Dadurch ist erstmals eine Beurteilung der Eignung der NEDAP-Wahlcomputer
hinsichtlich der Anforderungen an manipulationsfeste, nachvollziehbare und transparente Wahlen m?glich. 相似文献
46.
CMOS scaling into the nanometer regime 总被引:11,自引:0,他引:11
Yuan Taur Buchanan D.A. Wei Chen Frank D.J. Ismail K.E. Shih-Hsien Lo Sai-Halasz G.A. Viswanathan R.G. Wann H.-J.C. Wind S.J. Hon-Sum Wong 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》1997,85(4):486-504
Starting with a brief review on 0.1-μm (100 nm) CMOS status, this paper addresses the key challenges in further scaling of CMOS technology into the nanometer (sub-100 nm) regime in light of fundamental physical effects and practical considerations. Among the issues discussed are: lithography, power supply and threshold voltage, short-channel effect, gate oxide, high-field effects, dopant number fluctuations and interconnect delays. The last part of the paper discusses several alternative or unconventional device structures, including silicon-on-insulator (SOI), SiGe MOSFET's, low-temperature CMOS, and double-gate MOSFET's, which may lead to the outermost limits of silicon scaling 相似文献
47.
In general, the performance of a KE penetrator against most targets increases with velocity regardless of the particular penetrator-target interaction mode. It is possible to show that there exists an optimum velocity which maximizes the performance of an impacting penetrator for a given expenditure of kinetic energy. Simple graphical methods are described that determine the optimum velocity from general performance-velocity plots. These graphical methods may also be applied to experimental data alone. In addition, simple analytic models which describe the velocity dependent penetration/perforation performance of KE penetrators are examined and extended. These models may be used to explicitly assess the influence of parameters such as target strength and density and penetrator mass, strength and density. For some of the models in this analysis, the explicit relations between the optimum striking velocity for a specific kinetic energy value and the penetrator-target parameters are described. 相似文献
48.
Frank Rees 《Computer Fraud & Security》1998,1998(3):11
Much of what has been written in Australia about the protection of computer programs has been inspired by high profile cases concerning the boundaries of copyright protection. The Australian law firm Clayton Utz says that there has been little discussion about other types of legal protection for computer programs, and as a consequence, other intellectual property laws should not be overlooked. 相似文献
49.
50.
A robustness analysis and synthesis for incomplete nonlinear decoupling for a class of nonlinear systems is discussed. Rigid and elastic-joint robot models belong to this class. For the elastic case, a transformation facilitates the robustness analysis under a weak assumption. Charts with H
1- and H
- norms of closed-loop disturbance transfer functions of the nonlinear-decoupled system are presented for a robust pole assignment. 相似文献