全文获取类型
收费全文 | 19272篇 |
免费 | 290篇 |
国内免费 | 35篇 |
专业分类
电工技术 | 193篇 |
综合类 | 17篇 |
化学工业 | 1894篇 |
金属工艺 | 272篇 |
机械仪表 | 308篇 |
建筑科学 | 478篇 |
矿业工程 | 23篇 |
能源动力 | 242篇 |
轻工业 | 1608篇 |
水利工程 | 108篇 |
石油天然气 | 30篇 |
无线电 | 1376篇 |
一般工业技术 | 1843篇 |
冶金工业 | 9458篇 |
原子能技术 | 166篇 |
自动化技术 | 1581篇 |
出版年
2022年 | 106篇 |
2021年 | 188篇 |
2020年 | 114篇 |
2019年 | 167篇 |
2018年 | 202篇 |
2017年 | 197篇 |
2016年 | 237篇 |
2015年 | 140篇 |
2014年 | 268篇 |
2013年 | 594篇 |
2012年 | 450篇 |
2011年 | 565篇 |
2010年 | 451篇 |
2009年 | 441篇 |
2008年 | 502篇 |
2007年 | 497篇 |
2006年 | 405篇 |
2005年 | 406篇 |
2004年 | 318篇 |
2003年 | 323篇 |
2002年 | 287篇 |
2001年 | 297篇 |
2000年 | 285篇 |
1999年 | 478篇 |
1998年 | 2886篇 |
1997年 | 1733篇 |
1996年 | 1210篇 |
1995年 | 728篇 |
1994年 | 619篇 |
1993年 | 670篇 |
1992年 | 207篇 |
1991年 | 241篇 |
1990年 | 250篇 |
1989年 | 236篇 |
1988年 | 238篇 |
1987年 | 194篇 |
1986年 | 192篇 |
1985年 | 215篇 |
1984年 | 108篇 |
1983年 | 107篇 |
1982年 | 105篇 |
1981年 | 144篇 |
1980年 | 149篇 |
1979年 | 91篇 |
1978年 | 72篇 |
1977年 | 293篇 |
1976年 | 503篇 |
1975年 | 64篇 |
1974年 | 42篇 |
1973年 | 60篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
992.
Z. Li T. Schram L. Pantisano A. Stesmans T. Conard S. Shamuilia V.V. Afanasiev A. Akheyar S. Van Elshocht D.P. Brunco W. Deweerd Y. Naoki P. Lehnen S. De Gendt K. De Meyer 《Microelectronics Reliability》2007,47(4-5):518
A systematic study of the flat-band voltage (Vfb) shift of Ru gated metal-oxide-semiconductor (MOS) capacitors subjected to thermal treatment in O2 has been performed. The dependence of the Vfb shift on the thickness of Ru, anneal temperature and time is studied. The Vfb shift is ascribed to the shift of metal gates’ work function (WF), and is not significantly dependent on the type of dielectric (HfO2 or SiO2). From time-of-flight secondary ion mass spectrometry (TOF-SIMS) measurement, it was found that after thermal treatment in 18O2, 18O penetrated through Ru and was incorporated in the Ru/dielectric interface region. We believe that the formation of the thin interfacial RuOx layer is responsible for the Vfb shift. 相似文献
993.
Hiroyuki Hirakata Yoshimasa Takahashi Do Van Truong Takayuki Kitamura 《International Journal of Fracture》2007,145(4):261-271
In order to elucidate the role of plasticity on interface crack initiation from a free edge and crack propagation in a nano-component,
delamination experiments were conducted by a proposed nano-cantilever bend method using a specimen consisting of ductile Cu
and brittle Si and by a modified four-point bend method. The stress fields along the Cu/Si interface at the critical loads
of crack initiation and crack propagation were analyzed by the finite element method. The results reveal that intensified
elastic stresses in the vicinity of the interface edge and the crack tip are very different, although the Cu/Si interface
is identical in both experiments. The plasticity of Cu was then estimated on the basis of the nano-cantilever deflection measured
by in situ transmission electron microscopy. The plasticity affects the stress fields; the normal stress near the interface
edge is intensified while that near the crack tip is much reduced. Both the elasto-plastic stresses are close to each other
in the region of about 10 nm. This suggests that the local interface fracture, namely, the crack initiation at the interface
edge and the crack propagation along the interface, is governed by elasto-plastic normal stress on the order of 10 nm. 相似文献
994.
995.
Secure and trusted Information and Communication Technology (ICT) infrastructures are key enablers for the development of a trustworthy Information Society. The European Union, recognising this, has launched over the last few years a number of research initiatives aiming at designing and building secure and dependable ICT systems and networks, which respect citizens’ rights and protect their privacy and personal data. The European Commission is already funding more than 37 R&D projects in this area under the IST programme, which is part of the 6th Framework Programme (2002 to 2006). The paper first presents the main research challenges in the development of secure, dependable and trusted ICT infrastructures. It then describes a representative set of these IST projects dealing with advanced research in network and service security. The paper also presents upcoming opportunities for research funding in this area under the newly launched ICT programme, part of the 7th Framework Programme that extends from 2007 to 2013. 相似文献
996.
Spencer Graves Søren Bisgaard Murat Kulahci John Van Gilder John James Ken Marko Hal Zatorski Tom Ting Cuiping Wu 《Quality and Reliability Engineering International》2007,23(2):189-201
Modern products frequently feature monitors designed to detect actual or impending malfunctions. False alarms (Type I errors) or excessive delays in detecting real malfunctions (Type II errors) can seriously reduce monitor utility. Sound engineering practice includes physical evaluation of error rates. Type II error rates are relatively easy to evaluate empirically. However, adequate evaluation of a low Type I error rate is difficult without using accelerated testing concepts, inducing false alarms using artificially low thresholds and then selecting production thresholds by appropriate extrapolation, as outlined here. This acceleration methodology allows for informed determination of detection thresholds and confidence in monitor performance with substantial reductions over current alternatives in time and cost required for monitor development. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
997.
The model-driven architecture enables the deployment of software applications on different platforms. It is based on a pattern in which a platform-independent model is transformed into a platform-specific model, given a platform model (PM). Currently, the model transformations used for this task implicitly assume this PM, which makes it unclear whether a model transformation can be used for platforms other than the one assumed. In order to target very specific platforms and platform variants, model transformations must be reusable beyond their assumed platform. We propose an explicit PM that can be used to reason about platform dependencies of model transformations and their applicability to specific platforms. In addition, we show how PMs can be integrated in a model-driven configuration management framework. 相似文献
998.
Quantification of Protein‐Induced Membrane Remodeling Kinetics In Vitro with Lipid Multilayer Gratings 下载免费PDF全文
Troy W. Lowry Plengchart Prommapan Aubrey Kusi‐Appiah Nicholas Vafai Ewa A. Bienkiewicz David H. Van Winkle Scott M. Stagg Steven Lenhert 《Small (Weinheim an der Bergstrasse, Germany)》2016,12(4):506-515
The dynamic self‐organization of lipids in biological systems is a highly regulated process that enables the compartmentalization of living systems at micro‐ and nanoscopic scales. Consequently, quantitative methods for assaying the kinetics of supramolecular remodeling such as vesicle formation from planar lipid bilayers or multilayers are needed to understand cellular self‐organization. Here, a new nanotechnology‐based method for quantitative measurements of lipid–protein interactions is presented and its suitability for quantifying the membrane binding, inflation, and budding activity of the membrane‐remodeling protein Sar1 is demonstrated. Lipid multilayer gratings are printed onto surfaces using nanointaglio and exposed to Sar1, resulting in the inflation of lipid multilayers into unilamellar structures, which can be observed in a label‐free manner by monitoring the diffracted light. Local variations in lipid multilayer volume on the surface is used to vary substrate availability in a microarray format. A quantitative model is developed that allows quantification of binding affinity (K D) and kinetics (kon and koff). Importantly, this assay is uniquely capable of quantifying membrane remodeling. Upon Sar1‐induced inflation of single bilayers from surface supported multilayers, the semicylindrical grating lines are observed to remodel into semispherical buds when a critical radius of curvature is reached. 相似文献
999.
Van Du Nguyen 《控制论与系统》2013,44(5-6):261-279
ABSTRACTNowadays, along with the rapid development of information technologies, very often solving a common problem is entrusted to many autonomous units (people, systems). With such an approach, one can tap into the so-called collective intelligence (CI)—emerging from the collaboration and competition of many individuals. In this paper, we present recent research on CI related to the effectiveness of using the wisdom of crowds to perform a wide range of problems. For this aim, we first introduce a general framework of CI involving key characteristics of intelligent collectives. Next, we focus on the problem of how diversity and collective cardinality influence collective performance. Then, its applications, which are widely used such as prediction markets and Delphi method, will be presented. Furthermore, some research challenges on the capacity of combining CI with other research fields such as machine learning and social networks are also discussed. 相似文献
1000.
In recent years, supply chains have become increasingly globalized. As a consequence, the world's supply of all types of parts has become more susceptible to disruptions. Some of these disruptions are extreme and may have global implications. Our research is based on the supply risk management problem faced by a manufacturer. We model the problem as a dynamic program, design and implement approximate dynamic programming (ADP) algorithms to solve it, to overcome the well-known curses of dimensionality. Using numerical experiments, we compare the performance of different ADP algorithms. We then design a series of numerical experiments to study the performance of different sourcing strategies (single, dual, multiple, and contingent sourcing) under various settings, and to discover insights for supply risk management practice. The results show that, under a wide variety of settings, the addition of a third or more suppliers brings much less marginal benefits. Thus, managers can limit their options to a backup supplier (contingent sourcing) or an additional regular supplier (dual sourcing). Our results also show that, unless the backup supplier can supply with zero lead time, using dual sourcing appears to be preferable. Lastly, we demonstrate the capability of the proposed method in analyzing more complicated realistic supply chains. 相似文献