全文获取类型
收费全文 | 11402篇 |
免费 | 1056篇 |
国内免费 | 974篇 |
专业分类
电工技术 | 613篇 |
综合类 | 985篇 |
化学工业 | 1632篇 |
金属工艺 | 340篇 |
机械仪表 | 439篇 |
建筑科学 | 340篇 |
矿业工程 | 574篇 |
能源动力 | 153篇 |
轻工业 | 813篇 |
水利工程 | 133篇 |
石油天然气 | 677篇 |
武器工业 | 79篇 |
无线电 | 1332篇 |
一般工业技术 | 744篇 |
冶金工业 | 1014篇 |
原子能技术 | 612篇 |
自动化技术 | 2952篇 |
出版年
2025年 | 47篇 |
2024年 | 184篇 |
2023年 | 192篇 |
2022年 | 315篇 |
2021年 | 346篇 |
2020年 | 397篇 |
2019年 | 349篇 |
2018年 | 350篇 |
2017年 | 391篇 |
2016年 | 449篇 |
2015年 | 380篇 |
2014年 | 572篇 |
2013年 | 882篇 |
2012年 | 748篇 |
2011年 | 765篇 |
2010年 | 574篇 |
2009年 | 636篇 |
2008年 | 639篇 |
2007年 | 811篇 |
2006年 | 702篇 |
2005年 | 603篇 |
2004年 | 466篇 |
2003年 | 428篇 |
2002年 | 400篇 |
2001年 | 370篇 |
2000年 | 264篇 |
1999年 | 186篇 |
1998年 | 168篇 |
1997年 | 125篇 |
1996年 | 105篇 |
1995年 | 103篇 |
1994年 | 77篇 |
1993年 | 56篇 |
1992年 | 63篇 |
1991年 | 58篇 |
1990年 | 62篇 |
1989年 | 47篇 |
1988年 | 16篇 |
1987年 | 20篇 |
1986年 | 17篇 |
1985年 | 19篇 |
1984年 | 9篇 |
1983年 | 7篇 |
1982年 | 8篇 |
1981年 | 14篇 |
1980年 | 3篇 |
1977年 | 1篇 |
1975年 | 2篇 |
1959年 | 6篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
《IIE Transactions》2007,39(9):879-898
We study an inventory system that consists of two demand classes. The orders in the first class need to be satisfied immediately, whereas the orders in the second class are to be filled in a given demand lead time. The two classes are also of different criticality. For this system, we propose a policy that rations the non-critical orders. Under a one-for-one replenishment policy with backordering and for Poisson demand arrivals for both classes, we first derive expressions for the service levels of both classes. The service level for the critical class is an approximation, whereas the service level for the non-critical class is exact. We then conduct a computational study to show that our approximation works reasonably, the benefits of rationing can be substantial, and the incorporation of demand lead time provides more value when the demand class with demand lead time is the critical class. The research is motivated by the spare parts service system of a major capital equipment manufacturer that faces two types of demand. For this company, the critical down orders need to be satisfied immediately, while the less critical maintenance orders can be satisfied after a fixed demand lead time. We conduct a case study with 64 representative parts and show that significant savings (as much as 14% on inventory on hand) are possible through incorporation of demand lead times and rationing. 相似文献
2.
TAN Zuo-wen 《通讯和计算机》2007,4(5):40-46
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and integrity at a lower computational and communication cost. This paper presents a (t, n) threshold proxy signcryption scheme in which no less than t proxy agents in the proxy group can produce the signcryption cryptogram. combines the functionality of threshold proxy signing and encryption. The proposed scheme combines the functionality of both threshold proxy signing and encryption, and provides fair protection for the sender and the proxy agents. This scheme is secure against attack of public key substitution. It also satisfies security properties such as confidentiality and authenticity. 相似文献
3.
More than one hundred samples of European beers have been investigated by the new SNIF-NMR method which is based on 2H NMR at the natural abundance level and enables site-specific natural isotope fractionation factors in ethanol to be determined. The relative (R) and absolute (D/H)i, parameters are shown to be characteristic of the country where the beers are brewed and the observed variations are explained in terms of cereal composition, water resource, and manufacturing processing (fermentation, yeast, temperature cycle). These new parameters find analytical and mechanistic applications in the identification of a beer and in the investigation of a fermentation process. 相似文献
4.
LeAnn Southward Hogan Elizabeth Marschall Carol Folt Roy A. Stein 《Journal of Great Lakes research》2007,33(1):46-61
Lake Erie's food web has been dramatically modified by exotic species. Both exotic dreissenid mussels and the round goby Neogobius melanastomus have shifted the food web from a pelagicbased to a benthic-based one, potentially creating a new pathway for contaminant transfer to top predators. Before the invasion of round gobies, few predators of dreissenids occurred in Lake Erie, allowing contaminants to be confined to these benthic organisms. The invasion of the round goby has produced a new pathway through which these contaminants can enter the food web. To characterize heavy-metal transfer through this new food web and to assess risk to humans, water, surficial sediment, dreissenid, round goby, and smallmouth bass Micropterus dolomieui samples were collected at three sites during summers, 2002 and 2003, and analyzed for total lead (Pb), total mercury (Hg), and methyl mercury (MeHg). In addition, we compared smallmouth bass Pb and Hg concentrations to those measured in 1993/1994, before round gobies were prevalent. Pb biodiminished and MeHg biomagnified through the food web to smallmouth bass; patterns were similar among our three sites. Total Pb concentrations in smallmouth bass were higher before the incorporation of round gobies into their diet. We attributed this decline to changes in food web structure, changes in contaminant burdens in prey, or declines in sediment Pb concentrations in Lake Erie. By comparison, Hg concentrations in smallmouth bass changed little, before and after the round goby invasion, possibly due to a shift in diet that increased growth. Despite a decline in sediment Hg concentrations in Lake Erie, smallmouth bass continued to accumulate Hg at historical rates possibly because of their high consumption rates of benthivorous round gobies. As smallmouth bass continue to consume round gobies during their lives, their Hg concentrations may well continue to increase, potentially increasing the risk of Hg contamination to humans. 相似文献
5.
Based on analyses of the components of crude oil hydrocarbons and carbon isotopes, the content of normal alkane de-creased from 49.00% to 20.10% when moving from the No.3 to No.5 tectonic belt of the Lenghu area of the Qaidam Basin, while cycloalkanes increased from 30.00% to 52.20% and aromatic and branch chain alkanes increased gradually as well. The maturity of sterane in crude oil is higher than that of its source-rock, which shows that the hydrocarbons were generated from a deep source-rock of high maturity around the tectonic belts of the Lenghu area. The analysis of the characteristics of carbon isotopes also shows that these isotopes of hydrocarbon compounds in the No.4 and No.5 tectonic belt are apparently heavier than those in the No.3 belt. The results of our research show that the hydrocarbons in the No.3 tectonic belt are mainly from a relatively rich sapropelic substance, while the hydrocarbons in the No.4 and No.5 tectonic belt originated mainly from organic matter of a rela-tively rich humic type substance. 相似文献
6.
本文概述了近期发生的"震网"事件.同时分析了"震网"的特点和行为特征.并根据我国的具体情况给出了安全警示和安全防范建议. 相似文献
7.
Xiaofeng Chen Qianhong Wu Haibo Tian Byoungcheon Lee Kwangjo Kim 《Information Sciences》2011,181(8):1493-1502
It is considered to be the most suitable solution for large scale elections to design an electronic voting scheme using blind signatures and anonymous channels. Based on this framework, Okamoto first proposed a receipt-free voting scheme [30] for large scale elections. However, in the following paper, Okamoto [31] proved that the scheme [30] was not receipt-free and presented two improved schemes. One scheme requires the help of the parameter registration committee and the other needs a stronger physical assumption of the voting booth. In this paper, we utilize the double-trapdoor commitment to propose a new receipt-free voting scheme based on blind signatures for large scale elections. Neither the parameter registration committee nor the voting booth is required in our scheme. We also present a more efficient zero-knowledge proof for secret permutation. Therefore, our scheme is much more efficient than Okamoto’s schemes [30] and [31] with the weaker physical assumptions. Moreover, we prove that our scheme can achieve the desired security properties. 相似文献
8.
我国推行无铅汽油情况的研究 总被引:2,自引:0,他引:2
车用含铅汽油对人体有极大的危害,本文通过对汽车排放新标准、企业技术改造及有关政策的分析,阐明了我国推行无铅汽油政策的可行性。 相似文献
9.
Flexible Photodetectors: Low‐Temperature Heteroepitaxy of 2D PbI2/Graphene for Large‐Area Flexible Photodetectors (Adv. Mater. 36/2018)
下载免费PDF全文

10.
针对耦合电容器拆高压引线传统预防性试验的不足,根据不拆高压引线测量耦合电容器介质损耗和电容量值的试验方法,通过对南雁变南仙4367线等4条线路实测,与传统试验数据进行了对比分析,证明该方法可行有效。 相似文献