首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4764篇
  免费   262篇
  国内免费   11篇
电工技术   32篇
综合类   5篇
化学工业   1011篇
金属工艺   96篇
机械仪表   101篇
建筑科学   237篇
矿业工程   8篇
能源动力   150篇
轻工业   456篇
水利工程   49篇
石油天然气   18篇
武器工业   2篇
无线电   415篇
一般工业技术   881篇
冶金工业   812篇
原子能技术   28篇
自动化技术   736篇
  2024年   6篇
  2023年   42篇
  2022年   83篇
  2021年   136篇
  2020年   97篇
  2019年   110篇
  2018年   141篇
  2017年   126篇
  2016年   158篇
  2015年   118篇
  2014年   158篇
  2013年   273篇
  2012年   274篇
  2011年   338篇
  2010年   240篇
  2009年   263篇
  2008年   297篇
  2007年   283篇
  2006年   228篇
  2005年   238篇
  2004年   170篇
  2003年   147篇
  2002年   151篇
  2001年   75篇
  2000年   64篇
  1999年   57篇
  1998年   61篇
  1997年   58篇
  1996年   66篇
  1995年   49篇
  1994年   48篇
  1993年   50篇
  1992年   37篇
  1991年   26篇
  1990年   38篇
  1989年   38篇
  1988年   31篇
  1987年   41篇
  1986年   38篇
  1985年   32篇
  1984年   25篇
  1983年   27篇
  1982年   26篇
  1981年   13篇
  1980年   12篇
  1979年   9篇
  1978年   13篇
  1976年   6篇
  1975年   6篇
  1974年   4篇
排序方式: 共有5037条查询结果,搜索用时 15 毫秒
51.
52.
The effects of joint design on the mechanical properties of AL7075-T6 aluminum sheet were studied on the latest automated gas-tungsten arc-welding system. Using ER5356 filler metal, full-penetration welds were made on workpieces with various included joint angles. Testing of the mechanical properties of the joints was done in the as-welded, naturally aged, and postweld heat-treated conditions. The results show that by using crack-resistant filler, and by selecting the proper joint design and postweld heat treatment, strong, dependable welds can be produced on thin AL7075 sheet material. An elasticity model of the weld joint was established to help understand the mechanical behavior of the joints. An undermatched joint design is shown to be capable of achieving a joint strength that matches the strength of the base alloy.  相似文献   
53.
54.
The mobility limiting scattering mechanisms for amorphous semiconductors and polar polycrystalline semiconductors are studied in the context of developing new high‐performance thin‐film transistor (TFT) channel layer materials for large‐area electronics. A physics‐based model for carrier transport in an amorphous semiconductor is developed to estimate the mobility limits of amorphous semiconductor TFTs. The model involves band tail state trapping of a diffusive mobility. Simulation reveals a strong dependence on the band tail density of states. This consideration makes it difficult to realize a high‐performance p‐type oxide TFT. A polar crystalline semiconductor may offer a higher mobility but is fundamentally limited by polar optical phonon scattering. Any crystalline TFT channel layer for practical large‐area applications will not be a single crystal but polycrystalline, and therefore, grain size and grain boundary‐dependent scattering will further degrade the transport properties.  相似文献   
55.
Detailed measurements of the flow instability of dilute shear-thinning viscoelastic aqueous solutions, with relatively low zero-shear viscosities, in an obstructed microchannel flow are reported. We examine the flow behaviour resulting from a 100 μm post placed in the channel centreline over a range of Reynolds numbers (\(5<Re<300\)) and Weissenberg numbers (\(20<Wi<10^3\)). Micro-particle image velocimetry measurements show the onset of an upstream instability within a Reynolds number range and at a critical elasticity number corresponding to polymer concentrations above 25 ppm of long-chain polyacrylamide. The instability results in significant local fluctuations in the flow field approaching 30 % of the mean velocity. The magnitude of the local viscosity ratio in the region upstream of the post is proposed as a driving mechanism for the instability which resembles a buckling flow. Additionally, the classical instability owing to separation and vortex formation downstream of the post in Newtonian flow is suppressed and a very long stable wake is observed extending over 10 post-diameters downstream.  相似文献   
56.
Both breathing and internal self-awareness are an integral part of any yoga practice. We describe and discuss the development of ExoPranayama, an actuated environment that physically manifests users’ breathing in yoga. Through a series of trials with yoga practitioners and expert teachers, we explore its role in the practice of yoga. Our interview results reveal that biofeedback through the environment supported teaching and improved self-awareness, but it impacted group cohesion. Two practical uses of the technology emerged for supporting breath control in yoga: (1) biofeedback can provide new information about users’ current internal states; (2) machine-driven feedback provides users with a future state or goal and leads to improved cohesiveness.  相似文献   
57.
58.
Libraries, as we know them today, can be defined by the term Library 1.0. This defines the way resources are kept on shelves or at a computer behind a login. These resources can be taken from a shelf, checked out by the library staff, taken home for a certain length of time and absorbed, and then returned to the library for someone else to avail of. Library 1.0 is a one-directional service that takes people to the information they require. Library 2.0 – or L2 as it is now more commonly addressed as – aims to take the information to the people by bringing the library service to the Internet and getting the users more involved by encouraging feedback participation. This paper presents an overview of Library 2.0 and introduces web 2.0 concepts.  相似文献   
59.
An integrated multibeam echo sounder and acoustic Doppler current profiler field survey was conducted in July 2008 to investigate the morphodynamics of the St. Clair River at the outlet of Lake Huron. The principal morphological features of the upper St. Clair River included flow-transverse bedforms that appear weakly mobile, erosive bedforms in cohesive muds, thin non-cohesive veneers of weakly mobile sediment that cover an underlying cohesive (till or glacio-lacustrine) surface, and vegetation that covers the bed. The flow was characterized by acceleration as the banks constrict from Lake Huron into the St. Clair River, an approximately 1500-m long region of flow separation downstream from the Blue Water Bridge, and secondary flow connected to: i) channel curvature; ii) forcing of the flow by local bed topography, and iii) flow wakes in the lee side of ship wrecks. Nearshore, sand-sized, sediment from Lake Huron was capable of being transported into, and principally along, the banks of the upper St. Clair River by the measured flow. A comparison of bathymetric surveys conducted in 2007 and 2008 identifies that the gravel bed does undergo slow downstream movement, but that this movement does not appear to be generated by the mean flow, and could possibly be caused by ship-propeller-induced turbulence. The study results suggest that the measured mean flow and dredging within the channel have not produced major scour of the upper St. Clair River and that the recent fall in the level of Lake Huron is unlikely to have been caused by these mechanisms.  相似文献   
60.
In cognitive radio networks, cognitive nodes operate on a common pool of spectrum where they opportunistically access and use parts of the spectrum not being used by others. Though cooperation among nodes is desirable for efficient network operations and performance, there might be some malicious nodes whose objective could be to hinder communications and disrupt network operations. The absence of a central authority or any policy enforcement mechanism makes these kinds of open-access network more vulnerable and susceptible to attacks.In this paper, we analyze a common form of denial-of-service attack, i.e., collaborative jamming. We consider a network in which a group of jammers tries to jam the channels being used by legitimate users who in turn try to evade the jammed channels. First, we compute the distribution of the jamming signal that a node experiences by considering a random deployment of jammers. Then, we propose different jamming and defending schemes that are employed by the jammers and legitimate users, respectively. In particular, we model and analyze the channel availability when the legitimate users randomly choose available channels and the jammers jam different channels randomly. We propose a multi-tier proxy-based cooperative defense strategy to exploit the temporal and spatial diversity for the legitimate secondary users in an infrastructure-based centralized cognitive radio network. Illustrative results on spectrum availability rates show how to improve resiliency in cognitive radio networks in the presence of jammers.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号