全文获取类型
收费全文 | 7781篇 |
免费 | 348篇 |
国内免费 | 49篇 |
专业分类
电工技术 | 213篇 |
综合类 | 20篇 |
化学工业 | 1659篇 |
金属工艺 | 161篇 |
机械仪表 | 189篇 |
建筑科学 | 238篇 |
矿业工程 | 8篇 |
能源动力 | 520篇 |
轻工业 | 778篇 |
水利工程 | 92篇 |
石油天然气 | 155篇 |
武器工业 | 4篇 |
无线电 | 958篇 |
一般工业技术 | 1384篇 |
冶金工业 | 451篇 |
原子能技术 | 77篇 |
自动化技术 | 1271篇 |
出版年
2024年 | 18篇 |
2023年 | 189篇 |
2022年 | 437篇 |
2021年 | 549篇 |
2020年 | 385篇 |
2019年 | 389篇 |
2018年 | 492篇 |
2017年 | 348篇 |
2016年 | 383篇 |
2015年 | 240篇 |
2014年 | 364篇 |
2013年 | 596篇 |
2012年 | 393篇 |
2011年 | 447篇 |
2010年 | 284篇 |
2009年 | 241篇 |
2008年 | 227篇 |
2007年 | 206篇 |
2006年 | 172篇 |
2005年 | 152篇 |
2004年 | 124篇 |
2003年 | 102篇 |
2002年 | 117篇 |
2001年 | 62篇 |
2000年 | 65篇 |
1999年 | 76篇 |
1998年 | 123篇 |
1997年 | 107篇 |
1996年 | 71篇 |
1995年 | 78篇 |
1994年 | 51篇 |
1993年 | 50篇 |
1992年 | 40篇 |
1991年 | 23篇 |
1990年 | 28篇 |
1989年 | 42篇 |
1988年 | 46篇 |
1987年 | 28篇 |
1986年 | 28篇 |
1985年 | 42篇 |
1984年 | 49篇 |
1983年 | 41篇 |
1982年 | 26篇 |
1981年 | 21篇 |
1980年 | 28篇 |
1979年 | 23篇 |
1978年 | 18篇 |
1977年 | 21篇 |
1976年 | 30篇 |
1974年 | 16篇 |
排序方式: 共有8178条查询结果,搜索用时 15 毫秒
31.
The grain boundary embrittlement in Cu-AI-Ni-phase alloys has been investigated. The study included both the bulk alloys and rapidly solidified ribbons. It was observed that the fracture characteristics and the phase transformations in rapidly solidified ribbons were similar to those in the bulk alloys. Various factors responsible for intergranular fracture were considered. It was found that intrinsic or extrinsic precipitates at the grain boundaries are not responsible for the embrittlement. It was further observed that the segregation of impurities does not occur at the grain boundaries and hence is not a factor contributing to the embrittlement. The intrinsic characteristics, however, appear to play an important role. These may include high elastic anisotropy, ordered structure and plastic incompatibility. Severe embrittlement in high-nickel alloys is associated with spinodal decomposition occurring in these alloys. The large grain size exhibited by these alloys is found not to be a significant factor contributing to the embrittlement. 相似文献
32.
A.c. susceptibility measurements were carried out on the disordered spinel system Co2–x
Zn
x
TiO4 (0<x<1) between 10 and 80 K. Our measurements show three peaks in the versus T curve for Co2TiO4 and CoZnTiO4 compounds. In both compounds two peaks are very close to each other, indicating that the Néel and semi-spin glass temperatures are very close. A third peak indicates the presence of the semi-spin glass to spin glass transition. In Co1.5Zn0.5TiO4 only one peak is observed which indicates spin glass ordering at 26 K. Furthermore, the A-site canting present in Co2TiO4 and CoZnTiO4 has a collinear and magnetic structure, indicating strong A-B coupling. X-ray analysis indicated that compounds of the system Co2ZnxTiO4 synthesized with cubic symmetry. From transport properties it was found that the activation energy and thermoelectric coefficient decrease with increasing concentration of Zn in the system. The mobility of the system calculated from infrared measurements is typically of the order of 10–9cm2V–1s–1. 相似文献
33.
Silicon - In this study, inorganic-organic hybrid material consisting of tetraethyl orthosilicate (TEOS) and 3-methacryloxypropyl trimethoxysilane (MAPTMS) were prepared with sol-gel process and... 相似文献
34.
A. H. Moinuddin Ahmed Lesley S. Dent Glasser 《Journal of chemical technology and biotechnology (Oxford, Oxfordshire : 1986)》1973,23(6):457-463
α-BaO.Al2O3.4H2O has been synthesised and studied by infrared, X-ray and thermal analytical techniques. The compound of approximate formula BaO.Al2O3.0.5H2O, described in Part III, forms as a dehydration product, and appears to be identical with the compound β-BAH2 described by other workers. A possible explanation for the discrepancy in water content is discussed. 相似文献
35.
Members of health social networks may be susceptible to privacy leaks by the amount of information they leave behind. The threat to privacy increases when members of these networks reuse their pseudonyms in other social networks. The risk of re‐identifying users from such networks requires quantitative estimates to evaluate its magnitude. The estimates will enable managers and members of health social communities to take corrective measures. We introduce a new re‐identification attack, the social network attack, that takes advantage of the fact that users reuse their pseudonyms. To demonstrate the attack, we establish links between MedHelp and Twitter (two popular social networks) based on matching pseudonyms. We used Bayesian networks to model the re‐identification risk and used stylometric techniques to identify the strength of the links. On the basis of our model 7‐11. 8% of the MedHelp members in the sample population who reused their pseudonyms in Twitter were re‐identifiable compared with 1% who did not. The risk estimates were measured at the 5% risk threshold. Our model was able to re‐identify users with a sensitivity of 41% and specificity of 96%. The potential for re‐identification increases as more data is accumulated from these profiles, which makes the threat of re‐identification more serious. 相似文献
36.
Xu Zhou YanTao Zhou KenLi Li Ahmed Sallam Keqin Li 《The Journal of supercomputing》2014,69(2):976-1005
The tile assembly model is a novel biological computing model where information is encoded in DNA tiles. It is an efficient way to solve NP-complete problems due to its scalability and parallelism. In this paper, we apply the tile assembly model to solve the minimum and exact set cover problems, which are well-known NP-complete problems. To solve the minimum set cover problem, we design a MinSetCover system composed of three parts, i.e., the seed configuration subsystem, the nondeterministic choice subsystem, and the detection subsystem. Moreover, we improve the MinSetCover system and propose a MinExactSetCover system for solving the problem of exact cover by 3-sets. Finally we analyze the computation complexity and perform a simulation experiment to verify the effectiveness and correctness of the proposed systems. 相似文献
37.
Ugur Ozdemir Yucel Orkut Aktas Aslihan Vuruskan Yasin Dereli Ahmed Farabi Tarhan Karaca Demirbag Ahmet Erdem Ganime Duygu Kalaycioglu Ibrahim Ozkol Gokhan Inalhan 《Journal of Intelligent and Robotic Systems》2014,74(1-2):371-393
For the last four decades Unmanned Air Vehicles (UAVs) have been extensively used for military operations that include tracking, surveillance, active engagement with weapons and airborne data acquisition. UAVs are also in demand commercially due to their advantages in comparison to manned vehicles. These advantages include lower manufacturing and operating costs, flexibility in configuration depending on customer request and not risking the pilot on demanding missions. Even though civilian UAVs currently constitute 3 % of the UAV market, it is estimated that their numbers will reach up to 10 % of the UAV market within the next 5 years. Most of the civilian UAV applications require UAVs that are capable of doing a wide range of different and complementary operations within a composite mission. These operations include taking off and landing from limited runway space, while traversing the operation region in considerable cruise speed for mobile tracking applications. This is in addition to being able traverse in low cruise speeds or being able to hover for stationary measurement and tracking. All of these complementary and but different operational capabilities point to a hybrid unmanned vehicle concept, namely the Vertical Take-Off and Landing (VTOL) UAVs. In addition, the desired UAV system needs to be cost-efficient while providing easy payload conversion for different civilian applications. In this paper, we review the preliminary design process of such a capable civilian UAV system, namely the TURAC VTOL UAV. TURAC UAV is aimed to have both vertical take-off and landing and Conventional Take-off and Landing (CTOL) capability. TURAC interchangeable payload pod and detachable wing (with potential different size variants) provides capability to perform different mission types, including long endurance and high cruise speed operations. In addition, the TURAC concept is to have two different variants. The TURAC A variant is an eco-friendly and low-noise fully electrical platform which includes 2 tilt electric motors in the front, and a fixed electric motor and ducted fan in the rear, where as the TURAC B variant is envisioned to use high energy density fuel cells for extended hovering time. In this paper, we provide the TURAC UAV’s iterative design and trade-off studies which also include detailed aerodynamic and structural configuration analysis. For the aerodynamic analysis, an in-house software including graphical user interface has been developed to calculate the aerodynamic forces and moments by using the Vortex Lattice Method (VLM). Computational Fluid Dynamics (CFD) studies are performed to determine the aerodynamic effects for various configurations For structural analysis, a Finite Element Model (FEM) of the TURAC has been prepared and its modal analysis is carried out. Maximum displacements and maximal principal stresses are calculated and used for streamlining a weight efficient fuselage design. Prototypes have been built to show success of the design at both hover and forward flight regime. In this paper, we also provide the flight management and autopilot architecture of the TURAC. The testing of the controller performance has been initiated with the prototype of TURAC. Current work focuses on the building of the full fight test prototype of the TURAC UAV and aerodynamic modeling of the transition flight. 相似文献
38.
39.
In this paper, a novel watermarking scheme for quantum images based on Hadamard transform is proposed. In the new scheme, a unitary transform controlled by a classical binary key is implemented on quantum image. Then, we utilize a dynamic vector, instead of a fixed parameter as in other previous schemes, to control the embedding process. The dynamic embedding vector is decided by both the carrier quantum image and the watermark image, which is only known by the authorized owner. The proposed scheme is analyzed from visual quality, computational complexity, and payload capacity. Analysis and results show that the proposed scheme has better visual quality under a higher embedding capacity and lower complexity compared with other schemes proposed recently. 相似文献
40.