全文获取类型
收费全文 | 2016篇 |
免费 | 77篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 28篇 |
综合类 | 5篇 |
化学工业 | 479篇 |
金属工艺 | 23篇 |
机械仪表 | 52篇 |
建筑科学 | 91篇 |
矿业工程 | 13篇 |
能源动力 | 51篇 |
轻工业 | 273篇 |
水利工程 | 21篇 |
石油天然气 | 3篇 |
无线电 | 179篇 |
一般工业技术 | 347篇 |
冶金工业 | 246篇 |
原子能技术 | 15篇 |
自动化技术 | 270篇 |
出版年
2023年 | 20篇 |
2022年 | 27篇 |
2021年 | 49篇 |
2020年 | 34篇 |
2019年 | 38篇 |
2018年 | 37篇 |
2017年 | 39篇 |
2016年 | 52篇 |
2015年 | 40篇 |
2014年 | 62篇 |
2013年 | 107篇 |
2012年 | 78篇 |
2011年 | 108篇 |
2010年 | 91篇 |
2009年 | 71篇 |
2008年 | 99篇 |
2007年 | 85篇 |
2006年 | 63篇 |
2005年 | 45篇 |
2004年 | 41篇 |
2003年 | 49篇 |
2002年 | 37篇 |
2001年 | 42篇 |
2000年 | 30篇 |
1999年 | 29篇 |
1998年 | 67篇 |
1997年 | 54篇 |
1996年 | 46篇 |
1995年 | 36篇 |
1994年 | 42篇 |
1993年 | 37篇 |
1992年 | 29篇 |
1991年 | 26篇 |
1990年 | 20篇 |
1989年 | 32篇 |
1988年 | 14篇 |
1987年 | 18篇 |
1986年 | 18篇 |
1985年 | 16篇 |
1984年 | 20篇 |
1983年 | 11篇 |
1981年 | 15篇 |
1980年 | 14篇 |
1979年 | 10篇 |
1978年 | 21篇 |
1977年 | 14篇 |
1976年 | 33篇 |
1975年 | 11篇 |
1974年 | 15篇 |
1966年 | 10篇 |
排序方式: 共有2096条查询结果,搜索用时 31 毫秒
41.
Itzhak I. Maor Katharina Kruppa Adi Rozencweig Amir Sterzer Frank Steinbach Vadim Beilin Bernd Breidenstein Gennady E. Shter Meirav Mann-Lahav Armin Feldhoff Gideon S. Grader 《Advanced functional materials》2023,33(49):2304464
Calcium cobaltite Ca3Co4−xO9+δ (CCO) is a promising p-type thermoelectric (TE) material for high-temperature applications in air. The grains of the material exhibit strong anisotropic properties, making texturing and nanostructuring mostly favored to improve thermoelectric performance. On the one hand multitude of interfaces are needed within the bulk material to create reflecting surfaces that can lower the thermal conductivity. On the other hand, low residual porosity is needed to improve the contact between grains and raise the electrical conductivity. In this study, CCO fibers with 100% flat cross sections in a stacked, compact form are electrospun. Then the grains within the nanoribbons in the plane of the fibers are grown. Finally, the nanoribbons are electrospun into a textured ceramic that features simultaneously a high electrical conductivity of 177 S cm−1 and an immensely enhanced Seebeck coefficient of 200 µV K−1 at 1073 K are assembled. The power factor of 4.68 µW cm−1 K−2 at 1073 K in air surpasses all previous CCO TE performances of nanofiber ceramics by a factor of two. Given the relatively high power factor combined with low thermal conductivity, a relatively large figure-of-merit of 0.3 at 873 K in the air for the textured nanoribbon ceramic is obtained. 相似文献
42.
Yong Ryun Kim Oskar J. Sandberg Stefan Zeiske Gregory Burwell Drew B. Riley Paul Meredith Ardalan Armin 《Advanced functional materials》2023,33(16):2300147
Poly(3,4-ethylenedioxythiophene):polystyrene sulfonate (PEDOT:PSS) has been one of the most established hole transport layers (HTL) in organic solar cells (OSCs) for several decades. However, the presence of PSS− ions is known to deteriorate device performance via a number of mechanisms including diffusion to the HTL-active layer interface and unwanted local chemical reactions. In this study, it is shown that PSS− ions can also result in local p-doping in the high efficiency donor:non-fullerene acceptor blends – resulting in photocurrent loss. To address these issues, a facile and effective approach is reported to improve the OSC performance through a two-component hole transport layer (HTL) consisting of a self-assembled monolayer of 2PACz ([2-(9H-Carbazol-9-yl)ethyl]phosphonic acid) and PEDOT:PSS. The power conversion efficiency (PCE) of 17.1% using devices with PEDOT:PSS HTL improved to 17.7% when the PEDOT:PSS/2PACz two-component HTL is used. The improved performance is attributed to the overlaid 2PACz layer preventing the formation of an intermixed p-doped PSS− ion rich region (≈5–10 nm) at the bulk heterojunction-HTL contact interface, resulting in decreased recombination losses and improved stability. Moreover, the 2PACz monolayer is also found to reduce electrical shunts that ultimately yield improved performance in large area devices with PCE enhanced from 12.3% to 13.3% in 1 cm2 cells. 相似文献
43.
We present the language CRStL (Control Rule Strategy Language, pronounce “crystal”) to formulate mathematical reasoning techniques as proof strategies in the context of the proof assistant Ωmega. The language is arranged in two levels, a query language to access mathematical knowledge maintained in development graphs, and a strategy language to annotate the results of these queries with further control information. The two-leveled structure of the language allows the specification of proof techniques in a declarative way. We present the syntax and semantics of CRStL and illustrate its use by examples. 相似文献
44.
45.
We continue our study of the complexity of MSO-definable local temporal logics over concurrent systems that can be described by Mazurkiewicz traces. In previous papers, we showed that the satisfiability problem for any such logic is in PSPACE (provided the dependence alphabet is fixed, Gastin and Kuske (2003) [10]) and remains in PSPACE for all classical local temporal logics even if the dependence alphabet is part of the input, Gastin and Kuske (2007) [8]. In this paper, we consider the uniform satisfiability problem for arbitrary MSO-definable local temporal logics. For this problem, we prove multi-exponential lower and upper bounds that depend on the number of alternations of set quantifiers present in the chosen MSO-modalities. 相似文献
46.
Outsourcing der Informationsverarbeitung im Mittelstand: Test eines multitheoretischen Kausalmodells
In this paper determinants of information systems (IS) outsourcing are deduced from transaction cost economic theory, resource-based theory and power theory. They are summarized in a theoretical framework which is tested using a sample of small and medium sized enterprises (SMEs) in Germany. The results show that internal performance and know-how deficits vis-à-vis external service providers are key determinants that explain why different IS functions are outsourced to varying degrees in SMEs. Moreover, the determinants of IS functions were found to partially differ between IS functions. Revised reprint of an article from WIRTSCHAFTSINFORMATIK 43(4)2001:339–350. 相似文献
47.
Vasileios Belagiannis Xinchao Wang Horesh Beny Ben Shitrit Kiyoshi Hashimoto Ralf Stauder Yoshimitsu Aoki Michael Kranzfelder Armin Schneider Pascal Fua Slobodan Ilic Hubertus Feussner Nassir Navab 《Machine Vision and Applications》2016,27(7):1035-1046
Multiple human pose estimation is an important yet challenging problem. In an operating room (OR) environment, the 3D body poses of surgeons and medical staff can provide important clues for surgical workflow analysis. For that purpose, we propose an algorithm for localizing and recovering body poses of multiple human in an OR environment under a multi-camera setup. Our model builds on 3D Pictorial Structures and 2D body part localization across all camera views, using convolutional neural networks (ConvNets). To evaluate our algorithm, we introduce a dataset captured in a real OR environment. Our dataset is unique, challenging and publicly available with annotated ground truths. Our proposed algorithm yields to promising pose estimation results on this dataset. 相似文献
48.
Patrick Duessel Christian Gehl Ulrich Flegel Sven Dietrich Michael Meier 《International Journal of Information Security》2017,16(5):475-490
Anomaly detection allows for the identification of unknown and novel attacks in network traffic. However, current approaches for anomaly detection of network packet payloads are limited to the analysis of plain byte sequences. Experiments have shown that application-layer attacks become difficult to detect in the presence of attack obfuscation using payload customization. The ability to incorporate syntactic context into anomaly detection provides valuable information and increases detection accuracy. In this contribution, we address the issue of incorporating protocol context into payload-based anomaly detection. We present a new data representation, called \({c}_n\)-grams, that allows to integrate syntactic and sequential features of payloads in an unified feature space and provides the basis for context-aware detection of network intrusions. We conduct experiments on both text-based and binary application-layer protocols which demonstrate superior accuracy on the detection of various types of attacks over regular anomaly detection methods. Furthermore, we show how \({c}_n\)-grams can be used to interpret detected anomalies and thus, provide explainable decisions in practice. 相似文献
49.
50.
Armin Pobitzer Ronald Peikert Raphael Fuchs Benjamin Schindler Alexander Kuhn Holger Theisel Krešimir Matković Helwig Hauser 《Computer Graphics Forum》2011,30(6):1789-1811
Vector fields are a common concept for the representation of many different kinds of flow phenomena in science and engineering. Methods based on vector field topology are known for their convenience for visualizing and analysing steady flows, but a counterpart for unsteady flows is still missing. However, a lot of good and relevant work aiming at such a solution is available. We give an overview of previous research leading towards topology‐based and topology‐inspired visualization of unsteady flow, pointing out the different approaches and methodologies involved as well as their relation to each other, taking classical (i.e. steady) vector field topology as our starting point. Particularly, we focus on Lagrangian methods, space–time domain approaches, local methods and stochastic and multifield approaches. Furthermore, we illustrate our review with practical examples for the different approaches. 相似文献