全文获取类型
收费全文 | 7294篇 |
免费 | 330篇 |
国内免费 | 53篇 |
专业分类
电工技术 | 136篇 |
综合类 | 27篇 |
化学工业 | 1816篇 |
金属工艺 | 125篇 |
机械仪表 | 216篇 |
建筑科学 | 283篇 |
矿业工程 | 6篇 |
能源动力 | 467篇 |
轻工业 | 744篇 |
水利工程 | 76篇 |
石油天然气 | 117篇 |
无线电 | 682篇 |
一般工业技术 | 1188篇 |
冶金工业 | 368篇 |
原子能技术 | 83篇 |
自动化技术 | 1343篇 |
出版年
2024年 | 24篇 |
2023年 | 153篇 |
2022年 | 323篇 |
2021年 | 410篇 |
2020年 | 299篇 |
2019年 | 335篇 |
2018年 | 428篇 |
2017年 | 368篇 |
2016年 | 361篇 |
2015年 | 241篇 |
2014年 | 322篇 |
2013年 | 655篇 |
2012年 | 361篇 |
2011年 | 517篇 |
2010年 | 360篇 |
2009年 | 334篇 |
2008年 | 301篇 |
2007年 | 229篇 |
2006年 | 202篇 |
2005年 | 143篇 |
2004年 | 117篇 |
2003年 | 121篇 |
2002年 | 96篇 |
2001年 | 65篇 |
2000年 | 76篇 |
1999年 | 53篇 |
1998年 | 86篇 |
1997年 | 48篇 |
1996年 | 58篇 |
1995年 | 44篇 |
1994年 | 38篇 |
1993年 | 47篇 |
1992年 | 37篇 |
1991年 | 33篇 |
1990年 | 32篇 |
1989年 | 20篇 |
1988年 | 35篇 |
1987年 | 30篇 |
1986年 | 22篇 |
1985年 | 16篇 |
1984年 | 29篇 |
1983年 | 24篇 |
1982年 | 24篇 |
1981年 | 16篇 |
1980年 | 20篇 |
1979年 | 16篇 |
1978年 | 19篇 |
1977年 | 13篇 |
1976年 | 21篇 |
1975年 | 19篇 |
排序方式: 共有7677条查询结果,搜索用时 13 毫秒
121.
Trabelsi Ali Rezgui Mohamed Ali 《The International Journal of Advanced Manufacturing Technology》2020,106(7):2829-2841
The International Journal of Advanced Manufacturing Technology - The paper discusses a generic procedure for the parameter design of product and process development using planned and non-planned... 相似文献
122.
Habibullah Khalilullah Deepak K. Agarwal Mohamed J. Ahsan Surender S. Jadav Hamdoon A. Mohammed Masood Alam Khan Salman A. A. Mohammed Riaz Khan 《International journal of molecular sciences》2022,23(12)
Newly designed series of indole-containing pyrazole analogs, pyrazolinylindoles, were synthesized, and their structures were confirmed based on the spectral data of the 1H NMR, 13C NMR, and HR-MS analyses. Preliminary anti-cancer activity testings were carried out by the National Cancer Institute, United States of America (NCI, USA). Compounds HD02, HD05, and HD12 demonstrated remarkable cytotoxic activities against nine categories of cancer types based cell line panels which included leukemia, colon, breast, melanoma, lungs, renal, prostate, CNS, and ovarian cancer cell lines. The highest cytotoxic effects were exhibited by the compounds HD02 [1-(5-(1-H-indol-3-yl)-3-(p-tolyl)-4,5-dihydro-1H-pyrazol-1-yl)-2-phenylethanone], HD05 [1-(3-(4-chlorophenyl)-5-(1H-indol-3-yl)-4,5-dihydro-1H-pyrazol-1-yl)-2-phenoxyethanone], and HD12 [(3-(4-chlorophenyl)-5-(1H-indol-3-yl)-4,5-dihydro-1H-pyrazol-1-yl)(pyridin-4-yl)methanone] against some of the 56 types of NCI-based cell lines in different panels. Compound HD05 showed the maximum range of cancer cell growth inhibitions against all categories of the cell lines in all nine panels. On average, in comparison to the referral standard, imatinib, at a dose level of 10 µM, the HD05 showed significant activity against leukemia in the range of 78.76%, as compared to the imatinib at 9% of cancer cells’ growth inhibitions. Molecular docking simulation studies were performed in silico on the epidermal growth factor receptor (EGFR) tyrosine kinase, in order to validate the activity. 相似文献
123.
124.
Mohamed I. Ali A. Bayoumi Mostafa Adly A. Soliman 《Advanced Synthesis \u0026amp; Catalysis》1976,318(1):12-18
5-Aryl-3-carboxymethylthio-1,2,4-triazoles 2 are cyclised to 6-arylthiazolo[3,2-b]-s-triazol-3(2H)-ones 3 . This structural assignment has been based on IR and NMR spectra. 2-Arylmethylene-6-arylthiazolo[3,2-b]-s-triazol-3(2H)-ones 7 were prepared by several methods. Compounds 3 coupled with diazotised anilines to give 2,3-dihydro-6-arylthiazolo[3,2-b]-s-triazole-2,3-dione 2-arylhydrazones 8 . The action of amines on 3a opens the thiazolone ring with the formation of substituted (5-phenyltriazol-3-ylthio)-acetamides 9 . 相似文献
125.
A.-S. F. Obada H. A. Hessian A.-B. A. Mohamed M. Hashem 《Quantum Information Processing》2013,12(5):1947-1956
An analytical solution of the master equation for two qubits-field system in the dispersive reservoir are investigated, the qubits are initially in werner states. Under the influence of the damping we investigate the quantum correlation in a two-qubit based on measurement-induced disturbance (MID). We compare MID and entanglement measured by negativity and illustrate their different characteristics. We find the effect of damping on MID is weaker than negativity. Negativity will experience a sudden transition but this will not happen for MID. 相似文献
126.
127.
The paper seeks to quantify the effect of urban politics on the microclimate of the city of Nantes (France), in particular those initiated by the sanitarians in the mid-19th century to find a remedy for the insalubrity that had been developing with urban densification since the late 17th century. Intensive historical research was first carried out in order to define and date the major transformations undergone by the city, its structure (densification, then widening of the streets, filling of water courses), the lifestyle habits (heating) or the building practices (appearance of stone and paving, higher buildings, insulation). This led to the definition of 5 characteristic states of the city, in 1680, 1756, 1835, 1880 and 1945. 相似文献
128.
129.
A quick passage through five centuries of turbulence research highlights the major milestones. The more recent cornerstones include Kolmogorov??s equilibrium theory of turbulence spectrum, the universal logarithmic law of wall-bounded flows, and the proliferation of direct numerical simulations. Evidence of recent fault lines in all three major achievements is presented, but also novel remedies as well as a few contemporary accomplishments are pointed out. 相似文献
130.
Chen (Computers and Electrical Engineering, vol. 30, 2004) illustrated that Tseng et al.’s authenticated encryption schemes, with message linkages for message flows, do not achieve their claimed integrity and authenticity properties. Furthermore, Chen presented some modified schemes to repair these flaws. In this paper, we show that the modified schemes proposed by Chen are not secure. In particular, we present an attack that allows a dishonest referee, in case of a dispute, to decrypt all the future and past authenticated ciphertext between the contended parties. We also present a simple fix to prevent this attack. 相似文献