全文获取类型
收费全文 | 336858篇 |
免费 | 24407篇 |
国内免费 | 13234篇 |
专业分类
电工技术 | 17875篇 |
技术理论 | 14篇 |
综合类 | 19789篇 |
化学工业 | 51771篇 |
金属工艺 | 19286篇 |
机械仪表 | 19599篇 |
建筑科学 | 22371篇 |
矿业工程 | 8733篇 |
能源动力 | 8412篇 |
轻工业 | 20941篇 |
水利工程 | 6246篇 |
石油天然气 | 15031篇 |
武器工业 | 2249篇 |
无线电 | 39517篇 |
一般工业技术 | 45042篇 |
冶金工业 | 14595篇 |
原子能技术 | 3104篇 |
自动化技术 | 59924篇 |
出版年
2024年 | 1228篇 |
2023年 | 4412篇 |
2022年 | 8640篇 |
2021年 | 11596篇 |
2020年 | 8745篇 |
2019年 | 6928篇 |
2018年 | 21170篇 |
2017年 | 21304篇 |
2016年 | 17238篇 |
2015年 | 11596篇 |
2014年 | 13726篇 |
2013年 | 16425篇 |
2012年 | 20941篇 |
2011年 | 27891篇 |
2010年 | 24525篇 |
2009年 | 21248篇 |
2008年 | 21778篇 |
2007年 | 21896篇 |
2006年 | 14277篇 |
2005年 | 13265篇 |
2004年 | 9149篇 |
2003年 | 7909篇 |
2002年 | 6690篇 |
2001年 | 5607篇 |
2000年 | 5318篇 |
1999年 | 5718篇 |
1998年 | 4508篇 |
1997年 | 3875篇 |
1996年 | 3576篇 |
1995年 | 2863篇 |
1994年 | 2342篇 |
1993年 | 1703篇 |
1992年 | 1357篇 |
1991年 | 1048篇 |
1990年 | 762篇 |
1989年 | 638篇 |
1988年 | 503篇 |
1987年 | 335篇 |
1986年 | 278篇 |
1985年 | 161篇 |
1984年 | 147篇 |
1983年 | 98篇 |
1982年 | 108篇 |
1981年 | 82篇 |
1980年 | 80篇 |
1968年 | 43篇 |
1965年 | 46篇 |
1959年 | 46篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
近年来消泡剂得到大量应用,其中大多数是复合型的各种商品消泡剂。弹性涂料和高乳液用量的低PVC内,外墙涂料中的泡沫更难于消除,需要使用高效消泡剂。专家徐峰著此文介绍了乳胶漆中易产生泡沫的原因和消泡剂在乳胶漆中的应用情况,最后综述了消泡剂近年来的新发展。 相似文献
992.
采用具有水平对称轴的横向各向同性(HTI)模型研究裂缝性油气藏,P波振幅随炮检距和方位角变化(AVOA),表现出较强的方位各向异性特征。本文基于Ruger提出的HTI介质模型的P波反射系数公式,利用由基准测线和另外两条与之呈45°、90°测线的P波反射系数的相对差异估算裂缝方位;同时引入小生境遗传算法,对基准测线和与之呈90°测线的P波反射系数差进行反演,得到了较高精度的纵、横波波速比和Thomsen各向异性参数。 相似文献
993.
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer
(OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a
new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel
technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the
design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general
portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is
the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting
mobile agents not only is possible, but also can be implemented efficiently.
This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval
Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399
and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper
was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003.
Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position
at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical
Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases,
and wireless networks. On the theoretical side, he is interested in cryptography and game theory.
Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile
computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS)
at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received
his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998
and 2001). 相似文献
994.
995.
996.
Chun Lin Ma Qing Feng Wang Rufen Zhang Jikun Li 《Journal of Inorganic and Organometallic Polymers and Materials》2008,18(2):229-235
Six triorganotin(IV) complexes of the type {(R3Sn)2[C3S3(COO)2]}n (R = C6H5 1; n-Bu 2; PhCH2 4; p-F-PhCH2 5; o-F-PhCH2 6) and {(R3Sn)2[C3S3(COO)2]}n·[EtOH] (R = Me 3) have been synthesized by the reaction of bis(carboxymethyl)trithiocarbonate with triorganotin(IV) chloride
in the presence of sodium ethoxide. All complexes were characterized by elemental analysis IR, 1H, 13C and 119Sn NMR spectroscopy. Except for 4–6, all complexes were also characterized by X-ray crystallography. The X-ray date revealed
that complexes 1–3 show two-dimensional network polymeric structure in which the geometries of tin atoms are trigonal bipyramid
with the axial positions occupied by carboxylic oxygen atoms. 相似文献
997.
Veysel T. Yilmaz Evrim Senel Canan Kazak 《Journal of Inorganic and Organometallic Polymers and Materials》2008,18(3):407-413
The reaction of [Cu(sac)2(H2O)4] · 2H2O with 2-methylpyrazine (mpyz) leads two complexes, concomitant crystallization of a mononuclear complex [Cu(sac)2(mpyz)(H2O)2] (1) and a polymeric complex [Cu(sac)2(μ-mpyz)]n (2). Both complexes have been characterized by elemental analyses, magnetic measurements, FT-IR and ESR, TG-DTA and single-crystal
X-ray diffraction analyses. Single-crystal X-ray analyses show that complex 1 consists of discrete molecules in which the copper(II) ions exhibits a square-pyramidal coordination geometry. The individual
molecules of 1 are connected into a hydrogen-bonded chain structure, which is further assembled to form a three-dimensional network by π–π stacking interactions.
Complex 2 is an 1D coordination polymer in which copper(II) centers are bridged by the mpyz ligand. The chains are further assembled
to form two-dimensional frameworks by π–π and C–H···π stacking interactions. 相似文献
998.
999.
1000.
浸出油厂的厂区消防安全是保证企业正常生产的关键.本文对浸出油厂厂区总平面布置、防火间距、消防通道及消防设施等几个方面作了系统阐述. 相似文献