全文获取类型
收费全文 | 6309篇 |
免费 | 246篇 |
国内免费 | 13篇 |
专业分类
电工技术 | 109篇 |
综合类 | 20篇 |
化学工业 | 1426篇 |
金属工艺 | 142篇 |
机械仪表 | 79篇 |
建筑科学 | 379篇 |
矿业工程 | 23篇 |
能源动力 | 118篇 |
轻工业 | 601篇 |
水利工程 | 36篇 |
石油天然气 | 12篇 |
无线电 | 526篇 |
一般工业技术 | 1056篇 |
冶金工业 | 1068篇 |
原子能技术 | 41篇 |
自动化技术 | 932篇 |
出版年
2023年 | 61篇 |
2022年 | 51篇 |
2021年 | 168篇 |
2020年 | 103篇 |
2019年 | 111篇 |
2018年 | 115篇 |
2017年 | 108篇 |
2016年 | 162篇 |
2015年 | 136篇 |
2014年 | 217篇 |
2013年 | 339篇 |
2012年 | 306篇 |
2011年 | 378篇 |
2010年 | 240篇 |
2009年 | 261篇 |
2008年 | 291篇 |
2007年 | 274篇 |
2006年 | 250篇 |
2005年 | 232篇 |
2004年 | 187篇 |
2003年 | 157篇 |
2002年 | 148篇 |
2001年 | 86篇 |
2000年 | 110篇 |
1999年 | 106篇 |
1998年 | 141篇 |
1997年 | 124篇 |
1996年 | 110篇 |
1995年 | 88篇 |
1994年 | 89篇 |
1993年 | 81篇 |
1992年 | 64篇 |
1991年 | 52篇 |
1990年 | 48篇 |
1989年 | 64篇 |
1988年 | 49篇 |
1987年 | 42篇 |
1986年 | 36篇 |
1985年 | 56篇 |
1984年 | 63篇 |
1983年 | 63篇 |
1982年 | 50篇 |
1981年 | 48篇 |
1980年 | 47篇 |
1979年 | 43篇 |
1978年 | 54篇 |
1977年 | 43篇 |
1976年 | 63篇 |
1975年 | 39篇 |
1972年 | 35篇 |
排序方式: 共有6568条查询结果,搜索用时 187 毫秒
1.
2.
Rafaelle Spear Ludovic Boytard Renaud Blervaque Maggy Chwastyniak David Hot Jonathan Vanhoutte Bart Staels Yves Lemoine Nicolas Lamblin Fran?ois-René Pruvot Stephan Haulon Philippe Amouyel Florence Pinet 《International journal of molecular sciences》2015,16(5):11276-11293
Abdominal aortic aneurysm (AAA) is an inflammatory disease associated with marked changes in the cellular composition of the aortic wall. This study aims to identify microRNA (miRNA) expression in aneurysmal inflammatory cells isolated by laser microdissection from human tissue samples. The distribution of inflammatory cells (neutrophils, B and T lymphocytes, mast cells) was evaluated in human AAA biopsies. We observed in half of the samples that adventitial tertiary lymphoid organs (ATLOs) with a thickness from 0.5 to 2 mm were located exclusively in the adventitia. Out of the 850 miRNA that were screened by microarray in isolated ATLOs (n = 2), 164 miRNAs were detected in ATLOs. The three miRNAs (miR-15a-3p, miR-30a-5p and miR-489-3p) with the highest expression levels were chosen and their expression quantified by RT-PCR in isolated ATLOs (n = 4), M1 (n = 2) and M2 macrophages (n = 2) and entire aneurysmal biopsies (n = 3). Except for the miR-30a-5p, a similar modulation was found in ATLOs and the two subtypes of macrophages. The modulated miRNAs were then evaluated in the plasma of AAA patients for their potential as AAA biomarkers. Our data emphasize the potential of miR-15a-3p and miR-30a-5p as biomarkers of AAA but also as triggers of ATLO evolution. Further investigations will be required to evaluate their targets in order to better understand AAA pathophysiology. 相似文献
3.
4.
Christian Stephan Bernd 《AEUE-International Journal of Electronics and Communications》2006,60(1):20-24
Security for ad hoc network environments has received a lot of attention as of today. Previous work has mainly been focussing on secure routing, fairness issues, and malicious node detection. However, the issue of introducing and conserving trust relationships has received considerably less attention. In this article, we present a scalable method for the use of public key certificates and their revocation in mobile ad hoc networks (MANETs). With the LKN-ad hoc security framework (LKN-ASF) a certificate management protocol has been introduced, bringing PKI technology to MANETs. In addition a performance analysis of two different revocation approaches for MANETs will be presented. 相似文献
5.
6.
Intensive fertilizer use has led to nitrate contamination of groundwater in many areas. This article examines the possibility of removing nitrates through the construction of artificial wetlands. A pilot study conducted in Denmark has found that the method is effective and economical, at least for small waterworks, though further treatment is necessary before an acceptable microbiological water quality is attained. 相似文献
7.
8.
Hans-Jürgen Odenthal Herbert Pfeifer Ina Lemanowicz Rainer Gorissen 《Metallurgical and Materials Transactions B》2002,33(2):163-172
The present work describes quantitative digital particle image velocimetry measurements of a full-scale water model of a thin
slab mold. Different casting speeds and two submerged entry nozzles with one and two outlet ports have been investigated.
The flow pattern of the single-port nozzle shows a counterclockwise-rotating double vortex that is nearly steady-state but
leads to high stationary surface waves. The flow jets out of the two-port nozzle oscillate and produce a transient flow pattern
with low wave amplitudes. The amplitudes for the one-port nozzle show a linear variation with the volumetric flow rate. The
experimental results lead to a good interpretation of the flow phenomena and are used to validate steady-state numerical simulations
with the commercial program, CFX, on the basis of the Reynolds equations. To describe anisotropic turbulence effects, the
Reynolds stress model (RSM) is used for the flat single-port nozzle and the standard k-ɛ model for the mold flow. The calculated mean velocities and wave amplitudes, predicted from pressure distribution at the
water surface, are generally in the consensus of the experimental data.
An erratum to this article is available at . 相似文献
9.
We determine the exact power of two-prover interactive proof systems introduced by Ben-Or, Goldwasser, Kilian, and Wigderson (1988). In this system, two all-powerful noncommunicating provers convince a randomizing polynomial time verifier in polynomial time that the inputx belongs to the languageL. We show that the class of languages having tow-prover interactive proof systems is nondeterministic exponential time.We also show that to prove membership in languages inEXP, the honest provers need the power ofEXP only.The first part of the proof of the main result extends recent techniques of polynomial extrapolation used in the single prover case by Lund, Fortnow, Karloff, Nisan, and Shamir.The second part is averification scheme for multilinearity of a function in several variables held by an oracle and can be viewed as an independent result onprogram verification. Its proof rests on combinatorial techniques employing a simple isoperimetric inequality for certain graphs: 相似文献
10.