首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   785篇
  免费   43篇
电工技术   10篇
综合类   1篇
化学工业   232篇
金属工艺   15篇
机械仪表   18篇
建筑科学   12篇
能源动力   15篇
轻工业   55篇
水利工程   3篇
石油天然气   14篇
无线电   89篇
一般工业技术   141篇
冶金工业   97篇
自动化技术   126篇
  2024年   3篇
  2023年   8篇
  2022年   12篇
  2021年   18篇
  2020年   20篇
  2019年   32篇
  2018年   18篇
  2017年   22篇
  2016年   19篇
  2015年   20篇
  2014年   30篇
  2013年   28篇
  2012年   32篇
  2011年   48篇
  2010年   33篇
  2009年   22篇
  2008年   47篇
  2007年   47篇
  2006年   39篇
  2005年   24篇
  2004年   20篇
  2003年   23篇
  2002年   18篇
  2001年   10篇
  2000年   4篇
  1999年   16篇
  1998年   20篇
  1997年   24篇
  1996年   14篇
  1995年   8篇
  1994年   10篇
  1993年   14篇
  1992年   9篇
  1991年   8篇
  1990年   4篇
  1989年   7篇
  1988年   6篇
  1987年   6篇
  1986年   4篇
  1985年   6篇
  1984年   6篇
  1983年   8篇
  1982年   6篇
  1980年   3篇
  1979年   7篇
  1978年   3篇
  1977年   5篇
  1975年   4篇
  1974年   3篇
  1971年   3篇
排序方式: 共有828条查询结果,搜索用时 15 毫秒
761.
In this paper, the effects of type and amount of various secondary carbides on the microstructure and cutting performance of Ti(C0.7N0.3)–12Co system have been investigated. Nine alloys with different amounts of WC, Mo2C and Ta0.7Nb0.3C additives were studied, using scanning electron microscopy (SEM), Vickers hardness (HV), transverse rupture strength (TRS) and continuous turning tests. Alloys including Mo2C and WC presented finer carbonitride grain structure, as well as higher wear resistance resulting from their higher hardness and highly solution hardened binder phase.  相似文献   
762.
The present investigation has been conducted in order to determine the influence of both the chemical composition of the bath and current density employed, on the adhesion, hardness and wear resistance of electrolytic Sn-Ni coatings deposited on a steel substrate. The micro-scratch test method was employed to evaluate the coating adhesion. Three scratches were performed at progressive loads. The subsequent observation of the surface damage by means of optical microscopy allowed the determination of the critical load, defined as the smallest load at which coating delamination will occur. The composite hardness of the system was determined by means of Vickers indentation and represented as a function of the relative indentation depth (R.I.D.). The absolute hardness of the coatings was computed by using a model published previously in the literature by one of the authors. The evaluation of the wear resistance was carried out through an accelerated wear test, without lubricant, under a ball-on-disc configuration, using a ball of AISI 52100 steel as a static counterpart. The wear scar morphology was studied by Scanning Electronic Microscopy (SEM) techniques coupled with the energy dispersive X-ray analysis (EDS). The results indicate that the Sn-Ni coatings obtained by means of the chloride-fluoride bath (CF) have apparently a higher adhesion to the steel substrate and wear resistance, in comparison with the coatings which were obtained by using the pyrophosphate bath (PF), irrespective to the current density value employed during deposition. However, the hardness results indicate that the coatings obtained from the pyrophosphate bath have a better endurance against indentation loads. Such a behavior has been partially explained in terms of the different microstructural features that characterized both coatings. The CF deposits were observed to present an elongated columnar grain structure free of cracks, whereas the PF coatings were observed to have an equiaxial structure with a high crack density. The present study has allowed the conclusion that the CF coatings have an overall better performance than the PF coatings.  相似文献   
763.
Fischer esterifications of benzoic acid with a variety of alcohols and a variety of acids with benzyl alcohol could be promoted by four novel Brønsted acidic ionic liquids a–d that bear a benzyl on the imidazolium or pyridinium cation. The reactions were carried out smoothly without the need of added catalyst with good to excellent isolated yields (77–98.5%) under solvent-free microwave irradiation conditions in the presence of 50 mol% ionic liquids. These ionic liquids could be recovered easily and recycled three times without any significant loss in their catalytic activity.  相似文献   
764.
A catalyst for the selective oxidation of hydrocarbons to unsaturated aldehydes, acids, acid anhydrides, divinyls, or styrenes has to perform several functions. First, it must supply a limited amount of oxygen to the reactant, sufficient to allow the formation of the desired product but not enough to allow complete oxidation. Further, it must provide appropriate sites for the adsorption of the hydrocarbons in deformed, reactive states. Last, the catalyst should be capable of transferring electrons from and to the reactants. These three demanding characteristics of an active catalyst impose severe limitations on the systems that can effectively perform selective oxidation reactions. Therefore catalyst selectivity, normally measured by the rate of formation of the specific product relative to that of undesired products, is sensitive to reaction conditions (temperature, feed rate, feed composition, and reactor design) and is very dependent on the details of the structure of the catalyst itself, its carriers, and promoters.  相似文献   
765.
以2,3-吡啶二羧酸、1-溴丁烷、苄基氯、相应的有机或无机酸为原料,经两步反应,在2,3-吡啶二羧酸阳离子基础上合成了8种结构新颖的室温功能化离子液体,这些功能化离子液体在室温下呈液相,同时表现出较强的Brnsted酸性.  相似文献   
766.
767.
A field study on the effects of current grazing practices on plants in central Norway found no increase in either phenolic compounds or proteinase inhibitors in plants subjected to grazing by sheep. This could either reflect insufficient damage to the plants due to low grazing intensity or a lack of a long-term response of the plants to grazing. In this study, we tested the hypothesis that damage to forage plants used by sheep and rodents in Norwegian alpine rangelands can stimulate a long-term (at least 2-week) increase in levels of defensive compounds. We used clipping experiments to manipulate the severity and timing of damage to eight species of common plants used by herbivores in Norway. Under greenhouse conditions (i.e., climate-controlled), we subjected mature plants to one of four clipping treatments: control (0% leaf tissue removed), low (10–15% leaf tissue removed), high (70–75% leaf tissue removed), or sustained (15% of leaf tissue removed every other day up to a total removal of 75%, i.e., five clippings over 9 days). Samples were collected 2 weeks after final clipping and analyzed for concentrations of total phenolics, proteinase inhibitors, ratio of total phenolics to soluble proteins, and ratio of proteinase inhibitors to soluble plant proteins. As expected, the different species of plants responded differently to simulated herbivory, but most plants either showed no response to mechanical wounding and tissue loss or had reduced defensive compounds. Thus, our results do not support the hypothesis that herbivory induces a long-term increase in defensive compounds in alpine rangelands of Norway, a result consistent with those from field studies.  相似文献   
768.
769.
Vector phase correlation   总被引:5,自引:0,他引:5  
Phase correlation has been applied for over 25 years to applications such as registration of images, but there has never been a simple generalisation to vector images. Here, for the first time, a vector approach to phase correlation, based on hypercomplex Fourier transforms, is proposed and demonstrated  相似文献   
770.
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication   总被引:1,自引:0,他引:1  
In this paper we present a very practical ciphertext-only cryptanalysis of GSM (Global System for Mobile communications) encrypted communication, and various active attacks on the GSM protocols. These attacks can even break into GSM networks that use “unbreakable” ciphers. We first describe a ciphertext-only attack on A5/2 that requires a few dozen milliseconds of encrypted off-the-air cellular conversation and finds the correct key in less than a second on a personal computer. We extend this attack to a (more complex) ciphertext-only attack on A5/1. We then describe new (active) attacks on the protocols of networks that use A5/1, A5/3, or even GPRS (General Packet Radio Service). These attacks exploit flaws in the GSM protocols, and they work whenever the mobile phone supports a weak cipher such as A5/2. We emphasize that these attacks are on the protocols, and are thus applicable whenever the cellular phone supports a weak cipher, for example, they are also applicable for attacking A5/3 networks using the cryptanalysis of A5/1. Unlike previous attacks on GSM that require unrealistic information, like long known-plaintext periods, our attacks are very practical and do not require any knowledge of the content of the conversation. Furthermore, we describe how to fortify the attacks to withstand reception errors. As a result, our attacks allow attackers to tap conversations and decrypt them either in real-time, or at any later time. We present several attack scenarios such as call hijacking, altering of data messages and call theft. An earlier version of this paper appears in Barkan et al. (Advances in Cryptology, Proceedings of Crypto 2003, Lecture Notes in Computer Science, vol. 2729, pp. 600–616, 2003).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号