全文获取类型
收费全文 | 579759篇 |
免费 | 59530篇 |
国内免费 | 33990篇 |
专业分类
电工技术 | 89642篇 |
技术理论 | 36篇 |
综合类 | 57607篇 |
化学工业 | 51502篇 |
金属工艺 | 20864篇 |
机械仪表 | 42390篇 |
建筑科学 | 52448篇 |
矿业工程 | 21672篇 |
能源动力 | 24777篇 |
轻工业 | 32495篇 |
水利工程 | 20017篇 |
石油天然气 | 20527篇 |
武器工业 | 7095篇 |
无线电 | 52762篇 |
一般工业技术 | 42131篇 |
冶金工业 | 19966篇 |
原子能技术 | 7354篇 |
自动化技术 | 109994篇 |
出版年
2024年 | 1749篇 |
2023年 | 7156篇 |
2022年 | 14072篇 |
2021年 | 18264篇 |
2020年 | 17357篇 |
2019年 | 14342篇 |
2018年 | 13639篇 |
2017年 | 17682篇 |
2016年 | 21434篇 |
2015年 | 23682篇 |
2014年 | 38363篇 |
2013年 | 35608篇 |
2012年 | 43169篇 |
2011年 | 45822篇 |
2010年 | 34204篇 |
2009年 | 34539篇 |
2008年 | 33777篇 |
2007年 | 41785篇 |
2006年 | 37318篇 |
2005年 | 32151篇 |
2004年 | 26217篇 |
2003年 | 22942篇 |
2002年 | 17922篇 |
2001年 | 14759篇 |
2000年 | 12442篇 |
1999年 | 9875篇 |
1998年 | 7635篇 |
1997年 | 6297篇 |
1996年 | 5475篇 |
1995年 | 4484篇 |
1994年 | 3876篇 |
1993年 | 2751篇 |
1992年 | 2434篇 |
1991年 | 1758篇 |
1990年 | 1434篇 |
1989年 | 1267篇 |
1988年 | 938篇 |
1987年 | 626篇 |
1986年 | 477篇 |
1985年 | 465篇 |
1984年 | 512篇 |
1983年 | 439篇 |
1982年 | 387篇 |
1981年 | 224篇 |
1980年 | 221篇 |
1979年 | 156篇 |
1978年 | 117篇 |
1977年 | 100篇 |
1962年 | 83篇 |
1959年 | 93篇 |
排序方式: 共有10000条查询结果,搜索用时 281 毫秒
81.
海胆酮是一种酮式类胡萝卜素,主要从海胆及藻类等海洋生物中提取。本文研究海胆酮对乙酰胆碱酯酶(acetylcholinesterase,AChE)的抑制作用,应用酶动力学、荧光光谱、圆二色光谱和分子对接技术研究海胆酮对AChE的抑制机理,并用淀粉样β蛋白片段25~35(amyloid beta-peptide 25-35,Aβ25-35)诱导大鼠肾上腺嗜铬细胞瘤细胞(PC12细胞)建立阿尔茨海默症(Alzheimer’s disease,AD)模型,研究海胆酮对AD细胞模型氧化应激损伤的作用。结果表明,海胆酮有很强的AChE抑制活性,其半抑制质量浓度为(16.29±0.97)μg/mL,抑制常数Ki为3.82 μg/mL,表现为竞争性抑制;海胆酮可诱导AChE二级结构改变,更容易与AChE活性中心氨基酸Ser200、His440、Trp84和Tyr121结合,阻碍底物碘代硫代乙酰胆碱(acetylthiocholine iodide,ATCI)与酶结合,从而引起酶活力降低。海胆酮能有效抑制Aβ25-35诱导PC12细胞的AChE活力,降低丙二醛含量,增加超氧化物歧化酶、过氧化氢酶和谷胱甘肽过氧化物酶活力,减轻Aβ25-35诱导的PC12细胞氧化应激损伤。本研究基于AChE和氧化应激阐明了海胆酮对AD的潜在作用机制,为海胆酮在功能食品、生物医药等领域的应用提供了数据支持和理论根据。 相似文献
82.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security. 相似文献
83.
84.
华治国 《混凝土与水泥制品》2020,(6):70-72
选择了几份典型的外墙外保温系统标准,通过对这几份标准中胶粘剂和抹面胶浆的成型和检测方法的比较,分析了现有检测技术的优劣,并结合工作实践提出了建议。 相似文献
85.
86.
One specific class of non-linear evolution equations, known as the Tzitzéica-type equations, has received great attention from a group of researchers involved in non-linear science. In this article, new exact solutions of the Tzitzéica-type equations arising in non-linear optics, including the Tzitzéica, Dodd–Bullough–Mikhailov and Tzitzéica–Dodd–Bullough equations, are obtained using the expa function method. The integration technique actually suggests a useful and reliable method to extract new exact solutions of a wide range of non-linear evolution equations. 相似文献
87.
This paper proposes a method for the coordinated control of power factor by means of a multiagent approach. The proposed multiagent system consists of two types of agent: single feeder agent (F_AG) and bus agent (B_AG). In the proposed system, an F_AG plays as an important role, which decides the power factors of all distributed generators by executing the load flow calculations repeatedly. The voltage control strategies are implemented as the class definition of Java into the system. In order to verify the performance of the proposed method, it has been applied to a typical distribution model system. The simulation results show that the system is able to control very violent fluctuation of the demands and the photovoltaic (PV) generations. 相似文献
88.
89.
90.
Ting Cui Ling Xu Feng Ding Ahmed Alsaedi Tasawar Hayat 《International Journal of Adaptive Control and Signal Processing》2020,34(11):1658-1676
Parameter estimation plays an important role in the field of system control. This article is concerned with the parameter estimation methods for multivariable systems in the state-space form. For the sake of solving the identification complexity caused by a large number of parameters in multivariable systems, we decompose the original multivariable system into some subsystems containing fewer parameters and study identification algorithms to estimate the parameters of each subsystem. By taking the maximum likelihood criterion function as the fitness function of the differential evolution algorithm, we present a maximum likelihood-based differential evolution (ML-DE) algorithm for parameter estimation. To improve the parameter estimation accuracy, we introduce the adaptive mutation factor and the adaptive crossover factor into the ML-DE algorithm and propose a maximum likelihood-based adaptive differential evolution algorithm. The simulation study indicates the efficiency of the proposed algorithms. 相似文献