全文获取类型
收费全文 | 1887篇 |
免费 | 80篇 |
国内免费 | 2篇 |
专业分类
电工技术 | 28篇 |
综合类 | 2篇 |
化学工业 | 513篇 |
金属工艺 | 25篇 |
机械仪表 | 40篇 |
建筑科学 | 62篇 |
矿业工程 | 4篇 |
能源动力 | 65篇 |
轻工业 | 156篇 |
水利工程 | 16篇 |
石油天然气 | 2篇 |
无线电 | 179篇 |
一般工业技术 | 319篇 |
冶金工业 | 232篇 |
原子能技术 | 19篇 |
自动化技术 | 307篇 |
出版年
2024年 | 19篇 |
2023年 | 48篇 |
2022年 | 73篇 |
2021年 | 100篇 |
2020年 | 70篇 |
2019年 | 66篇 |
2018年 | 75篇 |
2017年 | 62篇 |
2016年 | 68篇 |
2015年 | 53篇 |
2014年 | 88篇 |
2013年 | 119篇 |
2012年 | 129篇 |
2011年 | 104篇 |
2010年 | 102篇 |
2009年 | 85篇 |
2008年 | 70篇 |
2007年 | 67篇 |
2006年 | 51篇 |
2005年 | 46篇 |
2004年 | 31篇 |
2003年 | 34篇 |
2002年 | 26篇 |
2001年 | 17篇 |
2000年 | 13篇 |
1999年 | 22篇 |
1998年 | 60篇 |
1997年 | 59篇 |
1996年 | 38篇 |
1995年 | 28篇 |
1994年 | 22篇 |
1993年 | 17篇 |
1992年 | 11篇 |
1991年 | 11篇 |
1990年 | 9篇 |
1989年 | 8篇 |
1988年 | 6篇 |
1987年 | 6篇 |
1986年 | 4篇 |
1985年 | 6篇 |
1984年 | 4篇 |
1983年 | 3篇 |
1982年 | 6篇 |
1981年 | 7篇 |
1980年 | 7篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 4篇 |
1974年 | 2篇 |
1955年 | 2篇 |
排序方式: 共有1969条查询结果,搜索用时 15 毫秒
131.
Porosity effect on microstructure,mechanical, and fluid dynamic properties of Ti2AlC by direct foaming and gel‐casting
下载免费PDF全文
![点击此处可从《Journal of the American Ceramic Society》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Marek Potoczek Anna Chmielarz Murilo D. de M. Innocentini Izabela C. P. da Silva Paolo Colombo Barbara Winiarska 《Journal of the American Ceramic Society》2018,101(12):5346-5357
In this study, Ti2AlC foams were fabricated by direct foaming and gel‐casting using agarose as gelling agent. Slurry viscosity, determined by the agarose content (at a fixed solids loading), as well as surfactant concentration and foaming time were the key parameters employed for controlling the foaming yield, and hence the foam porosity after sintering process. Fabricated foams having total porosity in the 62.5‐84.4 vol% range were systematically characterized to determine their pore size and morphology. The effect of the foam porosity on the room‐temperature compression strength and elastic modulus was also determined. Depending on the amount of porosity, the compression strength and Young's modulus were found to be in the range of 9‐91 MPa and 7‐52 GPa, respectively. Permeability to air flow at temperatures up to 700°C was investigated. Darcian (k1) and non‐Darcian (k2) permeability coefficients displayed values in the range 0.30‐93.44 × 10?11 m2 and 0.39‐345.54 × 10?7 m, respectively. The amount of porosity is therefore a very useful microstructural parameter for tuning the mechanical and fluid dynamic properties of Ti2AlC foams. 相似文献
132.
Daniel Matthey Daniele Marré Stefano Gariglio Jean-Marc Triscone 《Journal of Low Temperature Physics》1999,117(5-6):1169-1173
We have investigated the transport properties, resistivity and Hall effect, in a series of underdoped GdBa
2
Cu
3
O
x
thin films grown by off-axis magnetron sputtering. We find a systematic correlation between the critical temperature T
c
and the inverse Hall constant
R
H
-1
, related, in simple models, to the carrier concentration n. Our experimental thin film T
c
(n) data are in good agreement with the temperature-doping phase diagram obtained for YBa
2
Cu
3
O
x
single crystals. By measuring the activation energies in the liquid vortex phase, and by using a 2-dimensional model for vortex dynamics, we have extracted the penetration depth of these samples, and studied the relation between the carrier concentration and the superfluid density to probe the role of phase fluctuations on superconductivity. 相似文献
133.
Matteo Colombo 《Minds and Machines》2010,20(2):183-202
According to John Haugeland, the capacity for “authentic intentionality” depends on a commitment to constitutive standards of objectivity. One of the consequences of Haugeland’s view is that a neurocomputational explanation cannot be adequate to understand “authentic intentionality”. This paper gives grounds to resist such a consequence. It provides the beginning of an account of authentic intentionality in terms of neurocomputational enabling conditions. It argues that the standards, which constitute the domain of objects that can be represented, reflect the statistical structure of the environments where brain sensory systems evolved and develop. The objection that I equivocate on what Haugeland means by “commitment to standards” is rebutted by introducing the notion of “florid, self-conscious representing”. Were the hypothesis presented plausible, computational neuroscience would offer a promising framework for a better understanding of the conditions for meaningful representation. 相似文献
134.
135.
Manufacturers are under enormous pressure to comply with market changes and the continual shortening of product life cycles. An analysis of the ADACOR collaborative manufacturing control architecture from the point of view of the Collaborative Manufacturing Management paradigm shows how ADACOR (adaptive holonic control architecture for distributed manufacturing system) supports integration and extension across the manufacturing value chain. 相似文献
136.
137.
138.
139.
We present a method for producing quad‐dominant subdivided meshes, which supports both adaptive refinement and adaptive coarsening. A hierarchical structure is stored implicitly in a standard half‐edge data structure, while allowing us to efficiently navigate through the different level of subdivision. Subdivided meshes contain a majority of quad elements and a moderate amount of triangles and pentagons in the regions of transition across different levels of detail. Topological LOD editing is controlled with local conforming operators, which support both mesh refinement and mesh coarsening. We show two possible applications of this method: we define an adaptive subdivision surface scheme that is topologically and geometrically consistent with the Catmull–Clark subdivision; and we present a remeshing method that produces semi‐regular adaptive meshes. 相似文献
140.
Privacy preserving technologies are likely to become an essential component of adaptive services in pervasive and mobile computing. Although privacy issues have been studied for a long time in computer science as well as in other fields, most studies are focused on the release of data from large repositories. Mobile and pervasive computing pose new challenges, requiring specific formal models for attacks and new privacy preserving techniques. This paper considers a specific pervasive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users. A specific class of attacks, called shadow attacks, is formally defined and a defense technique is proposed. This defense is formally proved to be correct, and its effectiveness is validated by extensive experiments in a simulated environment. 相似文献