首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4915篇
  免费   201篇
  国内免费   3篇
电工技术   61篇
综合类   2篇
化学工业   1413篇
金属工艺   133篇
机械仪表   81篇
建筑科学   218篇
矿业工程   35篇
能源动力   82篇
轻工业   578篇
水利工程   34篇
石油天然气   13篇
无线电   329篇
一般工业技术   652篇
冶金工业   1041篇
原子能技术   40篇
自动化技术   407篇
  2023年   48篇
  2022年   178篇
  2021年   281篇
  2020年   111篇
  2019年   97篇
  2018年   104篇
  2017年   100篇
  2016年   143篇
  2015年   105篇
  2014年   138篇
  2013年   155篇
  2012年   173篇
  2011年   195篇
  2010年   148篇
  2009年   158篇
  2008年   152篇
  2007年   141篇
  2006年   126篇
  2005年   142篇
  2004年   94篇
  2003年   90篇
  2002年   92篇
  2001年   94篇
  2000年   86篇
  1999年   85篇
  1998年   306篇
  1997年   180篇
  1996年   130篇
  1995年   116篇
  1994年   87篇
  1993年   92篇
  1992年   59篇
  1991年   55篇
  1990年   54篇
  1989年   50篇
  1988年   37篇
  1987年   35篇
  1986年   35篇
  1985年   43篇
  1984年   33篇
  1983年   31篇
  1982年   39篇
  1981年   37篇
  1980年   31篇
  1979年   50篇
  1978年   21篇
  1977年   48篇
  1976年   91篇
  1975年   23篇
  1972年   18篇
排序方式: 共有5119条查询结果,搜索用时 15 毫秒
81.
82.
Owing to their high earth‐abundance, eco‐friendliness, high electrical conductivity, large surface area, structure tunability at the atomic/morphological levels, and excellent stability in harsh conditions, carbon‐based metal‐free materials have become promising advanced electrode materials for high‐performance pseudocapacitors and metal–air batteries. Furthermore, carbon‐based nanomaterials with well‐defined structures can function as green catalysts because of their efficiency in advanced oxidation processes to remove organics in air or from water, which reduces the cost for air/water purification and avoids cross‐contamination by eliminating the release of heavy metals/metal ions. Here, the research and development of carbon‐based catalysts in supercapacitors and batteries for clean energy storage as well as in air/water treatments for environmental remediation are reviewed. The related mechanistic understanding and design principles of carbon‐based metal‐free catalysts are illustrated, along with the challenges and perspectives in this emerging field.  相似文献   
83.
Indirect cytotoxicity evaluation of pseudowollastonite   总被引:1,自引:0,他引:1  
This study aimed to evaluate the cytotoxicity of substances leached by pseudowollastonite (CaSiO3). It has been previously shown that calcium (Ca2+) and silicate (SiO3 ) ions are released from pseudowollastonite into biological solutions. Both of these ions are known to influence the biological metabolism of osteoblastic cells essential in the mineralization process and bone-bonding mechanism. The indirect toxicity evaluation was performed by extraction method, according to International Standard Organization (ISO). Pseudowollastonite pellets obtained by solid-state reaction were incubated, in culture medium, during 24, 48, 72 or 168 h at different concentrations (5, 10, 15, 50, 100, 200 mg/ml). The cytotoxicity of each extract in presence of human osteoblastic cell line (SaOS-2) was quantitatively assessed by measuring the viability (succinate dehydrogenase activity, MTT), the membrane integrity (the uptake of the neutral red by viable cells, NR) as well as the cell necrosis by measuring the lactate dehydrogenase (LDH) released in the culture medium. No significant alteration of membrane integrity or cell suffering was detectable. However, increased cell metabolism was observed for cells exposed to pseudowollastonite extract with longest extraction time (168 h). In conclusion, mineral elements leached by pseudowollastonite do not significantly affect the metabolism of osteoblastic cells.  相似文献   
84.
This paper examines and classifies the computational complexity of model checking and satisfiability for hybrid logics over frames with equivalence relations. The considered languages contain all possible combinations of the downarrow binder, the existential binder, the satisfaction operator, and the global modality, ranging from the minimal hybrid language to very expressive languages. For model checking, we separate polynomial-time solvable from PSPACE-complete cases, and for satisfiability, we exhibit cases complete for NP, PSpace, NExpTime, and even N2ExpTime. Our analysis includes the versions of all these languages without atomic propositions, and also complete frames.  相似文献   
85.
86.
87.
Thin films of single-phase A15 Nb3Al were irradiated with protons and nitrogen ions. X-ray intensity analysis revealed a decrease of the Bragg-Williams long-range order parameterS and an increase of the average displacement amplitude of the atomsU in the fluence region where a decrease of the superconducting transition temperatureT c was observed. The functional dependence ofT c onS andU was found to depend on the ion species used for irradiation. After irradiation with 1016 N2+ / cm2 the A15 phase transformed into an A2 phase. Furnace annealing caused a retransformation into the A15 phase with improved superconducting properties.  相似文献   
88.
89.
This article describes the development and validation of the Self-directed Learning Scales (SLS) using data from 14,846 secondary students. Self-directed learning refers to a process whereby the learner consciously and actively directs his/her actions in the learning process. The SLS comprised a battery of subscales measuring students' goal setting, planning, academic motivation, academic self-efficacy, inquiry and information processing, strategic help-seeking, management of learning resources, and self-monitoring. Rasch analysis following factor analyses provided evidence in support of the validity of SLS for use with secondary students. Two original subscales were merged with other subscales on the basis of the analyses, resulting in 19 subscales with strong psychometric properties in the Self-directed Learning Scales.  相似文献   
90.
The trusted computing technology embodied in the Trusted Platform Module secure-coprocessor from the Trusted Computing Group is a hardware-based root of trust that makes it possible for the system designer--not the computer owner--to regulate which programs can run on a given computer. If system designers are evil, then they can use trusted computing to prevent a competitors' programs from being installed, thus creating or preserving a monopoly. When computer owners are incompetent, though, benevolent system designers can use trusted computing to prevent malware from being installed and run.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号