全文获取类型
收费全文 | 6912篇 |
免费 | 403篇 |
国内免费 | 6篇 |
专业分类
电工技术 | 98篇 |
综合类 | 28篇 |
化学工业 | 1946篇 |
金属工艺 | 183篇 |
机械仪表 | 152篇 |
建筑科学 | 418篇 |
矿业工程 | 39篇 |
能源动力 | 243篇 |
轻工业 | 464篇 |
水利工程 | 42篇 |
石油天然气 | 5篇 |
无线电 | 602篇 |
一般工业技术 | 1477篇 |
冶金工业 | 285篇 |
原子能技术 | 38篇 |
自动化技术 | 1301篇 |
出版年
2024年 | 14篇 |
2023年 | 101篇 |
2022年 | 152篇 |
2021年 | 268篇 |
2020年 | 187篇 |
2019年 | 191篇 |
2018年 | 190篇 |
2017年 | 186篇 |
2016年 | 282篇 |
2015年 | 299篇 |
2014年 | 349篇 |
2013年 | 505篇 |
2012年 | 472篇 |
2011年 | 627篇 |
2010年 | 411篇 |
2009年 | 417篇 |
2008年 | 402篇 |
2007年 | 354篇 |
2006年 | 275篇 |
2005年 | 246篇 |
2004年 | 189篇 |
2003年 | 149篇 |
2002年 | 149篇 |
2001年 | 73篇 |
2000年 | 100篇 |
1999年 | 94篇 |
1998年 | 83篇 |
1997年 | 83篇 |
1996年 | 88篇 |
1995年 | 55篇 |
1994年 | 46篇 |
1993年 | 49篇 |
1992年 | 46篇 |
1991年 | 33篇 |
1990年 | 20篇 |
1989年 | 12篇 |
1988年 | 16篇 |
1987年 | 16篇 |
1986年 | 12篇 |
1985年 | 13篇 |
1984年 | 8篇 |
1983年 | 7篇 |
1982年 | 4篇 |
1981年 | 7篇 |
1980年 | 9篇 |
1976年 | 3篇 |
1975年 | 4篇 |
1972年 | 4篇 |
1959年 | 2篇 |
1954年 | 3篇 |
排序方式: 共有7321条查询结果,搜索用时 0 毫秒
31.
After initial necking of tensile polymer samples the deformation front moves along the gauge length at a stress which is smaller than the yield stress. The still undeformed parts of the sample are therefore subjected to conditions which favour deformation by a creep mechanism. If the extension rate is right, secondary necking becomes possible. Boundary conditions are discussed. 相似文献
32.
In the present investigation it has been shown exemplarily for an austenite microstructure containing carbonitrides that the specific restraining force of a grain boundary due to the distribution of precipitates can be described by a modified Orowan's law, so that the grain boundary movement is considered to be analogous to the dislocation movement. This is achieved by using a modified restraining force Fr (corresponding to the cubic geometry of the particles), a detailed thermodynamic analysis of the precipitates (in this case, carbonitrides) and selected relation for the interparticle spacing La. The specific restraining force and the interparticle spacing depend on temperature within the austenite range. Each temperature is attached to a couple (Fr/La). The plot Fr against shows straight lines for each steel and from their average slope, a shear module G' of grain boundaries, which is about 64300 N·cm?2, is obtained. Hence, it is possible to describe the specific restraining force of a grain boundary with the help of Orowan's law or as it is conventionally done by using Zener's modell. At a critical temperature T*, which is different for each steel, the specific restraining force is equal to the driving force of the grain boundary. The corresponding values of La are also different for each steel and the steel which is the most resistant to grain coarsening is allowed to have the greatest value of La which still retains the capacity of impeding grain coarsening. 相似文献
33.
Andreas Guete 《电子技术应用》2014,(3)
正早在20世纪90年代,触摸板就已作为笔记本电脑的用户接口出现了。今天,触摸板已大规模替代轨迹球和操控手柄。触摸技术已经升级到了电容式触摸传感,并且其功能已囊括多点触摸。尽管在过去的20年里触摸板技术有了长足的发展,但由于安装条件有限,并且触摸板需要大约5 mm~7 mm的厚度,这些仍然限制 相似文献
34.
Andreas Lübbert 《化学,工程师,技术》1990,62(6):474-483
Trends in the use of real-time computers for research and development in industrial chemistry. Computers are integral parts of the complex equipment of chemical production plants. They are tools for computer aided process control. In production plants as well as in research and development laboratories, dedicated computer systems are used more and more. E. g., nearly all measuring devices will be controlled by their own microprocessors in the near future. In chemical engineering, however, the most significant developments are taking place in the software domain. The main trend in applications-software developments is the enhanced importance of the support of the plant operators by means of improved user interfaces. Within the research and development field, the software must be more flexibly adaptable to changes in the process equipment and due to changing control algorithms than in production plants. Moreover, efforts are being made to improve control by exploiting as much as possible a priori knowledge on the system in question. A current development in this direction, which will become stronger with time, is known under the heading ?expert systems”?, in which heuristic know-how of operators is made available and usable in process computers to improve control. 相似文献
35.
Jet bundle formulation of infinite-dimensional port-Hamiltonian systems using differential operators
We consider infinite-dimensional port-Hamiltonian systems described on jet bundles. Based on a power balance relation we introduce the port-Hamiltonian system representation using differential operators regarding the structural mapping, the dissipation mapping and the input mapping. In contrast to the well-known representation on the basis of the underlying Stokes–Dirac structure our approach is not necessarily based on using energy-variables which leads to a different port-Hamiltonian representation of the analyzed partial differential equations. The presented constructions will be specialized to mechanical systems to which class also the presented examples belong. 相似文献
36.
Kenton O’Hara Gerardo Gonzalez Graeme Penney Abigail Sellen Robert Corish Helena Mentis Andreas Varnavas Antonio Criminisi Mark Rouncefield Neville Dastur Tom Carrell 《Computer Supported Cooperative Work (CSCW)》2014,23(3):299-337
While surgical practices are increasingly reliant on a range of digital imaging technologies, the ability for clinicians to interact and manipulate these digital representations in the operating theatre using traditional touch based interaction devices is constrained by the need to maintain sterility. To overcome these concerns with sterility, a number of researchers are have been developing ways of enabling interaction in the operating theatre using touchless interaction techniques such as gesture and voice to allow clinicians control of the systems. While there have been important technical strides in the area, there has been little in the way of understanding the use of these touchless systems in practice. With this in mind we present a touchless system developed for use during vascular surgery. We deployed the system in the endovascular suite of a large hospital for use in the context of real procedures. We present findings from a study of the system in use focusing on how, with touchless interaction, the visual resources were embedded and made meaningful in the collaborative practices of surgery. In particular we discuss the importance of direct and dynamic control of the images by the clinicians in the context of talk and in the context of other artefact use as well as the work performed by members of the clinical team to make themselves sensable by the system. We discuss the broader implications of these findings for how we think about the design, evaluation and use of these systems. 相似文献
37.
38.
Jens Cornelis Markus Ihmsen Andreas Peer Matthias Teschner 《Computer Graphics Forum》2014,33(2):255-262
We propose to use Implicit Incompressible Smoothed Particle Hydrodynamics (IISPH) for pressure projection and boundary handling in Fluid‐Implicit‐Particle (FLIP) solvers for the simulation of incompressible fluids. This novel combination addresses two issues of existing SPH and FLIP solvers, namely mass preservation in FLIP and efficiency and memory consumption in SPH. First, the SPH component enables the simulation of incompressible fluids with perfect mass preservation. Second, the FLIP component efficiently enriches the SPH component with detail that is comparable to a standard SPH simulation with the same number of particles, while improving the performance by a factor of 7 and significantly reducing the memory consumption. We demonstrate that the proposed IISPH‐FLIP solver can simulate incompressible fluids with a quantifiable, imperceptible density deviation below 0.1%. We show large‐scale scenarios with up to 160 million particles that have been processed on a single desktop PC using only 15GB of memory. One‐ and two‐way coupled solids are illustrated. 相似文献
39.
Wolfgang Knoll Mieko Matsuzawa Andreas Offenhäusser Jürgen Rühe 《Israel journal of chemistry》1996,36(4):357-369
Various strategies are described for the bio-functionalization of solid substrates by design of interfacial architectures. The first approach is based on the self-assembly process of long-chain thiol molecules from solution to a (noble) metal surface. If some of these building blocks carry a binding site (ligand) for proteins (receptors, antibodies, etc.) the metal surface can be tailored for maximum specific binding while simultaneously minimizing nonspecific adsorption. The second concept is based on polymers that are covalently attached to (oxide) surfaces. The preparation of these (end-) grafted functional polymers involves either the binding of preformed macromolecules to corresponding sites at the surface of the support or the recently introduced “grafting-from” method, by which an initiator molecule is first covalently bound to the surface and then activated — either by heat or light — in the presence of suitable monomer units such that a polymer chain grows from the solid/solution interface. Finally, the functionalization of patterned surfaces by peptide chains that mimic the binding domains of cell adhesion proteins is summarized. It is demonstrated that not only the selective adhesion of neuronal cells can then be controlled, but also their development with the outgrowth of dendrites and axons. 相似文献
40.
Nikos Mavrogiannopoulos Andreas Pashalidis Bart Preneel 《International Journal of Information Security》2014,13(3):217-228
Public key Kerberos (PKINIT) is a standard authentication and key establishment protocol. Unfortunately, it suffers from a security flaw when combined with smart cards. In particular, temporary access to a user’s card enables an adversary to impersonate that user for an indefinite period of time, even after the adversary’s access to the card is revoked. In this paper, we extend Shoup’s key exchange security model to the smart card setting and examine PKINIT in this model. Using this formalization, we show that PKINIT is indeed flawed, propose a fix, and provide a proof that this fix leads to a secure protocol. 相似文献