首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1887篇
  免费   80篇
  国内免费   2篇
电工技术   28篇
综合类   2篇
化学工业   513篇
金属工艺   25篇
机械仪表   40篇
建筑科学   62篇
矿业工程   4篇
能源动力   65篇
轻工业   156篇
水利工程   16篇
石油天然气   2篇
无线电   179篇
一般工业技术   319篇
冶金工业   232篇
原子能技术   19篇
自动化技术   307篇
  2024年   19篇
  2023年   48篇
  2022年   73篇
  2021年   100篇
  2020年   70篇
  2019年   66篇
  2018年   75篇
  2017年   62篇
  2016年   68篇
  2015年   53篇
  2014年   88篇
  2013年   119篇
  2012年   129篇
  2011年   104篇
  2010年   102篇
  2009年   85篇
  2008年   70篇
  2007年   67篇
  2006年   51篇
  2005年   46篇
  2004年   31篇
  2003年   34篇
  2002年   26篇
  2001年   17篇
  2000年   13篇
  1999年   22篇
  1998年   60篇
  1997年   59篇
  1996年   38篇
  1995年   28篇
  1994年   22篇
  1993年   17篇
  1992年   11篇
  1991年   11篇
  1990年   9篇
  1989年   8篇
  1988年   6篇
  1987年   6篇
  1986年   4篇
  1985年   6篇
  1984年   4篇
  1983年   3篇
  1982年   6篇
  1981年   7篇
  1980年   7篇
  1978年   2篇
  1977年   2篇
  1976年   4篇
  1974年   2篇
  1955年   2篇
排序方式: 共有1969条查询结果,搜索用时 15 毫秒
131.
In this study, Ti2AlC foams were fabricated by direct foaming and gel‐casting using agarose as gelling agent. Slurry viscosity, determined by the agarose content (at a fixed solids loading), as well as surfactant concentration and foaming time were the key parameters employed for controlling the foaming yield, and hence the foam porosity after sintering process. Fabricated foams having total porosity in the 62.5‐84.4 vol% range were systematically characterized to determine their pore size and morphology. The effect of the foam porosity on the room‐temperature compression strength and elastic modulus was also determined. Depending on the amount of porosity, the compression strength and Young's modulus were found to be in the range of 9‐91 MPa and 7‐52 GPa, respectively. Permeability to air flow at temperatures up to 700°C was investigated. Darcian (k1) and non‐Darcian (k2) permeability coefficients displayed values in the range 0.30‐93.44 × 10?11 m2 and 0.39‐345.54 × 10?7 m, respectively. The amount of porosity is therefore a very useful microstructural parameter for tuning the mechanical and fluid dynamic properties of Ti2AlC foams.  相似文献   
132.
We have investigated the transport properties, resistivity and Hall effect, in a series of underdoped GdBa 2 Cu 3 O x thin films grown by off-axis magnetron sputtering. We find a systematic correlation between the critical temperature T c and the inverse Hall constant R H -1 , related, in simple models, to the carrier concentration n. Our experimental thin film T c (n) data are in good agreement with the temperature-doping phase diagram obtained for YBa 2 Cu 3 O x single crystals. By measuring the activation energies in the liquid vortex phase, and by using a 2-dimensional model for vortex dynamics, we have extracted the penetration depth of these samples, and studied the relation between the carrier concentration and the superfluid density to probe the role of phase fluctuations on superconductivity.  相似文献   
133.
According to John Haugeland, the capacity for “authentic intentionality” depends on a commitment to constitutive standards of objectivity. One of the consequences of Haugeland’s view is that a neurocomputational explanation cannot be adequate to understand “authentic intentionality”. This paper gives grounds to resist such a consequence. It provides the beginning of an account of authentic intentionality in terms of neurocomputational enabling conditions. It argues that the standards, which constitute the domain of objects that can be represented, reflect the statistical structure of the environments where brain sensory systems evolved and develop. The objection that I equivocate on what Haugeland means by “commitment to standards” is rebutted by introducing the notion of “florid, self-conscious representing”. Were the hypothesis presented plausible, computational neuroscience would offer a promising framework for a better understanding of the conditions for meaningful representation.  相似文献   
134.
135.
ADACOR: a collaborative production automation and control architecture   总被引:1,自引:0,他引:1  
Manufacturers are under enormous pressure to comply with market changes and the continual shortening of product life cycles. An analysis of the ADACOR collaborative manufacturing control architecture from the point of view of the Collaborative Manufacturing Management paradigm shows how ADACOR (adaptive holonic control architecture for distributed manufacturing system) supports integration and extension across the manufacturing value chain.  相似文献   
136.
137.
138.
139.
We present a method for producing quad‐dominant subdivided meshes, which supports both adaptive refinement and adaptive coarsening. A hierarchical structure is stored implicitly in a standard half‐edge data structure, while allowing us to efficiently navigate through the different level of subdivision. Subdivided meshes contain a majority of quad elements and a moderate amount of triangles and pentagons in the regions of transition across different levels of detail. Topological LOD editing is controlled with local conforming operators, which support both mesh refinement and mesh coarsening. We show two possible applications of this method: we define an adaptive subdivision surface scheme that is topologically and geometrically consistent with the Catmull–Clark subdivision; and we present a remeshing method that produces semi‐regular adaptive meshes.  相似文献   
140.
Privacy preserving technologies are likely to become an essential component of adaptive services in pervasive and mobile computing. Although privacy issues have been studied for a long time in computer science as well as in other fields, most studies are focused on the release of data from large repositories. Mobile and pervasive computing pose new challenges, requiring specific formal models for attacks and new privacy preserving techniques. This paper considers a specific pervasive computing scenario, and shows that the application of state-of-the-art techniques for the anonymization of service requests is insufficient to protect the privacy of users. A specific class of attacks, called shadow attacks, is formally defined and a defense technique is proposed. This defense is formally proved to be correct, and its effectiveness is validated by extensive experiments in a simulated environment.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号