全文获取类型
收费全文 | 1321篇 |
免费 | 45篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 32篇 |
综合类 | 6篇 |
化学工业 | 293篇 |
金属工艺 | 41篇 |
机械仪表 | 74篇 |
建筑科学 | 35篇 |
矿业工程 | 1篇 |
能源动力 | 140篇 |
轻工业 | 78篇 |
水利工程 | 3篇 |
石油天然气 | 1篇 |
无线电 | 97篇 |
一般工业技术 | 260篇 |
冶金工业 | 111篇 |
原子能技术 | 7篇 |
自动化技术 | 189篇 |
出版年
2023年 | 19篇 |
2022年 | 42篇 |
2021年 | 38篇 |
2020年 | 43篇 |
2019年 | 57篇 |
2018年 | 54篇 |
2017年 | 49篇 |
2016年 | 51篇 |
2015年 | 38篇 |
2014年 | 54篇 |
2013年 | 115篇 |
2012年 | 53篇 |
2011年 | 91篇 |
2010年 | 57篇 |
2009年 | 60篇 |
2008年 | 53篇 |
2007年 | 40篇 |
2006年 | 34篇 |
2005年 | 35篇 |
2004年 | 29篇 |
2003年 | 25篇 |
2002年 | 18篇 |
2001年 | 9篇 |
2000年 | 11篇 |
1999年 | 19篇 |
1998年 | 31篇 |
1997年 | 26篇 |
1996年 | 23篇 |
1995年 | 16篇 |
1994年 | 14篇 |
1993年 | 11篇 |
1992年 | 8篇 |
1991年 | 9篇 |
1990年 | 6篇 |
1989年 | 7篇 |
1988年 | 9篇 |
1987年 | 12篇 |
1986年 | 12篇 |
1985年 | 13篇 |
1984年 | 17篇 |
1983年 | 7篇 |
1982年 | 8篇 |
1981年 | 11篇 |
1980年 | 7篇 |
1979年 | 3篇 |
1978年 | 3篇 |
1977年 | 4篇 |
1975年 | 3篇 |
1973年 | 4篇 |
1969年 | 2篇 |
排序方式: 共有1368条查询结果,搜索用时 15 毫秒
1.
Wireless Personal Communications - Now-a-days the most common pretentious disease is the lung cancer, which has become more prevalent in the world that primarily infects the pulmonary nodules of... 相似文献
2.
3.
Madhu H. C. Edachery Vimal Lijesh K. P. Perugu Chandra Shekhar Kailas Satish V. 《Metallurgical and Materials Transactions A》2020,51(8):4086-4099
Metallurgical and Materials Transactions A - Hybrid nanocomposites have potential as wear-resistant materials. However, synthesizing these nanocomposites by conventional molten state methods result... 相似文献
4.
Masood Parang Rao V. Arimilli Satish P. Ketkar 《International Communications in Heat and Mass Transfer》1985,12(2):179-189
A special boundary integral method developed for two-dimensional regions containing circular holes is used to calculate temperature and heat transfer on the boundaries of several selected regions. The geometrical configuration of the region is arbitrary and convective boundary conditions are assumed. An important feature of the method is analytic representation of temperature and its normal derivative on the interior circular holes in the form of a harmonic series. This makes the application of the boundary integral method convenient and free from conditioning problems associated with small interior boundaries. Heat transfer from circular isothermal interior holes are calculated for several illustrative examples using three terms of the harmonic series representation for heat transfer at each of the circular boundaries. The results are presented and discussed. 相似文献
5.
The design of vehicles transporting hazardous materials has important public safety and economic implications. Conventional wisdom among industry and government has held that a thicker tank on railroad tank cars and trucks reduces risk. However, a thicker tank increases vehicle weight and thus leads to an increase in the number of shipments required to transport the same amount of product and consequently greater exposure to accidents. In this research we develop a model that analyzes the tradeoff between increased damage resistance and greater exposure to accidents in which the objective function is minimization of the probability of release. The model accounts for the reduction in tank car release probability as a function of tank thickness, and the increased exposure to accidents that occurs due to the increased number of shipments needed for the heavier car. Three variables affecting this optimal thickness are considered in this paper: the volumetric capacity of the tank, the probability of release from other, non-tank sources, and the weight capacity of the car. Sensitivity analyses using the model indicate that for any particular configuration of tank car there is an optimal thickness. This optimal thickness is affected by several factors and there is no single optimum for all tank cars. 相似文献
6.
R Albrecht TC Awes C Baktash P Beckmann F Berger R Bock G Claesson G Clewing L Dragon A Eklund RL Ferguson A Franz S Garpman R Glasow HA Gustafsson HH Gutbrod J Idh P Jacobs K Kampert BW Kolb P Kristiansson IY Lee H Loehner I Lund FE Obenshain A Oskarsson I Otterlund T Peitzmann S Persson F Plasil AM Poskanzer M Purschke H Ritter S Saini R Santo HR Schmidt T Siemiarczuk SP Sorensen E Stenlund ML Tincknell GR Young 《Canadian Metallurgical Quarterly》1991,44(6):2736-2752
7.
Current desktop computers typically use fan-heat sinks for cooling the CPU, referred to as active heat sinks. This work seeks to determine the heat rejection limits for such fan-heat sinks, within specific fan and heat sink space limits. A fixed volume, 80 /spl times/ 60 /spl times/ 50 mm is chosen as the limiting dimensions, which includes the fan volume. The present work addresses plane fin heat sinks, on which a typical 60 mm fan is mounted. Both duct flow and impinging flow are considered. Analytically based models are used to predict the optimum geometry (minimum convection resistance) for plane fins with duct and impinging flow configurations. Also assessed are the effects of increased fan speed (up to 25%) and heat sink base size (33% increase) on air-cooling limits in duct and impinging flow. Tests on fan-heat sinks are done to validate the predictions. Optimization is also done for an enhanced (offset-strip) fin geometry in duct flow. The plane fin is found to outperform the enhanced geometry. 相似文献
8.
A routing framework for providing robustness to node failures in mobile ad hoc networks 总被引:2,自引:0,他引:2
Nodes in a mobile ad hoc network are often vulnerable to failures. The failures could be either due to fading effects, battery drainage, or as a result of compromised nodes that do not participate in network operations. Intermittent node failures can disrupt routing functionalities. As such, it is important to provide redundancy in terms of providing multiple node-disjoint paths from a source to a destination. In line with this objective, we first propose a modified version of the widely studied ad hoc on-demand distance vector routing protocol to facilitate the discovery of multiple node-disjoint paths from a source to a destination. We find that very few of such paths can be found. Furthermore, as distances between sources and destinations increase, bottlenecks inevitably occur and thus, the possibility of finding multiple paths is considerably reduced. We conclude that it is necessary to place what we call reliable nodes (in terms of both being robust to failure and being secure) in the network to support efficient routing operations. We propose a deployment strategy that determines the positions and the trajectories of these reliable nodes such that we can achieve a framework for reliably routing information. We define a notion of a reliable path which is made up of multiple segments, each of which either entirely consists of reliable nodes, or contains a preset number of multiple paths between the end points of the segment. We show that the probability of establishing a reliable path between a random source and destination pair increases tremendously even with a small number of reliable nodes when we use our algorithm to appropriately position these reliable nodes. 相似文献
9.
In this work, we provide the evidence of polymer transcrystallinity in the presence of carbon nanotubes (CNTs). The interfacial morphology of carbon nanotube fiber-polypropylene matrix is investigated by means of polarized optical microscopy (POM), wide-angle X-ray diffraction (WAXD), scanning electron microscopy (SEM) and transmission electron microscopy (TEM). The supramolecular microstructures of polypropylene transcrystals induced by the nanotube fiber are observed in the range of isothermal crystallization temperatures from 118 °C to 132 °C. The dynamic process of transcrystallization is analyzed by using the theory of heterogeneous nucleation. Microstructure analysis shows that the nanotubes can nucleate the growth of both α- and γ-transcrystal, and α-transcrystals dominate the overall interfacial morphology. Close to the nanotube fiber surface, a cross-hatched lamellar microstructure composed of mother lamellae and daughter lamellae is observed. 相似文献
10.
Changes in the NHS have supported the idea of targeting health services to those in greatest need. This has meant that health visitors are increasingly having to identify 'vulnerable' families in need of increased health visiting intervention. This paper reports on a qualitative study undertaken in order to explore the ways in which health visitors plan and organize their work in relation to the concept of vulnerability. Focus groups and semi-structured interviews were carried out with health visitors from two separate geographical areas, one an inner city area and the other suburban, in order to explore the criteria by which health visitors define vulnerability and decide to increase their levels of intervention to particular families. It was found that vulnerability was extremely difficult to define but that the health visitors used criteria which were appropriate to the particular localities in which they worked to identify vulnerable families and to increase their levels of intervention to those families. Health visitors were targeting their services within a framework of a basic minimum service to all and were assessing the health needs of individuals or families rather than planning their work on the basis of community or practice profiles. 相似文献