全文获取类型
收费全文 | 895篇 |
免费 | 20篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 20篇 |
化学工业 | 186篇 |
金属工艺 | 9篇 |
机械仪表 | 17篇 |
建筑科学 | 58篇 |
矿业工程 | 14篇 |
能源动力 | 33篇 |
轻工业 | 74篇 |
水利工程 | 5篇 |
石油天然气 | 4篇 |
无线电 | 50篇 |
一般工业技术 | 64篇 |
冶金工业 | 281篇 |
原子能技术 | 8篇 |
自动化技术 | 93篇 |
出版年
2022年 | 14篇 |
2021年 | 11篇 |
2020年 | 9篇 |
2019年 | 18篇 |
2018年 | 9篇 |
2017年 | 12篇 |
2016年 | 11篇 |
2015年 | 9篇 |
2014年 | 24篇 |
2013年 | 56篇 |
2012年 | 27篇 |
2011年 | 28篇 |
2010年 | 26篇 |
2009年 | 20篇 |
2008年 | 30篇 |
2007年 | 25篇 |
2006年 | 21篇 |
2005年 | 28篇 |
2004年 | 13篇 |
2003年 | 16篇 |
2002年 | 18篇 |
2001年 | 13篇 |
2000年 | 16篇 |
1999年 | 24篇 |
1998年 | 18篇 |
1997年 | 17篇 |
1996年 | 15篇 |
1995年 | 15篇 |
1994年 | 15篇 |
1993年 | 16篇 |
1992年 | 8篇 |
1991年 | 13篇 |
1990年 | 18篇 |
1989年 | 9篇 |
1987年 | 11篇 |
1986年 | 13篇 |
1985年 | 13篇 |
1984年 | 13篇 |
1982年 | 9篇 |
1981年 | 14篇 |
1980年 | 20篇 |
1979年 | 17篇 |
1978年 | 9篇 |
1977年 | 10篇 |
1976年 | 11篇 |
1975年 | 14篇 |
1974年 | 15篇 |
1973年 | 8篇 |
1957年 | 9篇 |
1956年 | 7篇 |
排序方式: 共有916条查询结果,搜索用时 31 毫秒
11.
A kinetic study of the anionic polymerization of ethylene oxide has been made in tetrahydrofuran at 20°C, with the cryptate Cs+ + [TC] as counterion, [TC] being a spheroidal macrotricyclic ligand. Conductance measurements have been made on THF solutions of ?4BCs + [TC]. Ionic associations higher than cryptated ion pairs are negligible for living end concentrations lower than 3 × 10?4 moll?1. k± and the alkoxide ion pair dissociation constant KD were determined from both sets of kinetic data obtained with and without added salt knowing the value of k? from kinetic data performed with K+ + [222] as counterion. Free alkoxide ions are about twenty times more reactive than cryptated caesium ion pairs. 相似文献
12.
Peirui Zhang Fangqing Weng Ernest Koranteng Duyu Guo Pengfei Cao Qiangxian Wu 《应用聚合物科学杂志》2021,138(10):49963
Castor oil (CO) is an environmentally friendly renewable green resource and ideal alternative to petroleum resources. The preparation of high strength and high toughness castor oil-based polyurethane prepolymer (COPU) composites has significant applications such as supporting material and engineering plastic sheet. In this study, unmodified clam shell powder (CSP) with a unique CaCO3-proteoglycan structure was used as a filler to prepare compatible reinforced COPU composite materials. Investigation of the mechanical properties revealed that the elastic modulus of the composite COPU reinforced with 50 wt% of CSP had increased to 5859.0 ± 8.4 MPa representing 187.77% to obtain stiffer and stronger material over pure COPU (2036.6 ± 196.9 MPa). Moreover, the scanning electron microscopy, thermogravimetric analysis and contact angle results demonstrated that the reinforced COPU composites have better compatibility, thermal stability, and water resistance than pure COPU. This work will promote the application prospects of CO-based polyurethane. 相似文献
13.
Younes Seifi Suriadi Suriadi Ernest Foo Colin Boyd 《International Journal of Information Security》2015,14(3):221-247
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan. 相似文献
14.
15.
Ernest B. Cady Ann Lorek Yakito Takei John S. Wyatt Juliet M. Penrice A. David Edwards Donald Peebles Marzena Wylezinska Huw Owen-Reece Vincent Kirkbride Christopher E. Cooper Richard F. Aldridge Simon C. Roth Guy Brown David T. Delpy E. Osmund R. Reynolds 《Magma (New York, N.Y.)》1994,2(3):437-439
The aim of this study was to reproduce the delayed (secondary) cerebral energy failure previously described in birth-asphyxiated newborn infants and to investigate relationships between primary insult severity and the extent of the delayed energy failure. Phosphorus (31P) magnetic resonance spectroscopy (MRS) at 7 T was used to study the brains of 12 newborn piglets during an acute, reversible, cerebral hypoxic-ischemic episode which continued until nucleotide triphosphates (NTP) were depleted. After reperfusion and reoxygenation, spectroscopy was continued for 48 h. High-energy metabolite concentrations returned to near normal levels after the insult, but later they fell as delayed energy failure developed. The time integral of NTP depletion in the primary insult correlated strongly with the minimum [phosphocreatine (PCr)]/[inorganic orthophosphate (Pi)] observed 24–48 h after the insult. (Linear regression analysis gave slope –8.04 h–1; ordinate intercept=1.23;r=0.92;P<0.0001.) This model is currently being used to investigate the therapeutic potential of various cerebroprotective strategies including hypothermia. 相似文献
16.
17.
Shen Lang Poudel Nirakar Gibson George N. Hou Bingya Chen Jihan Shi Haotian Guignon Ernest Page William D. Pilar Arturo Cronin Stephen B. 《Nano Research》2018,11(4):2310-2314
Nano Research - We report plasmon resonant excitation of hot electrons in a photodetector based on a metal/oxide/metal (Au/Al2O3/graphene) heterostructure. In this device, hot electrons, excited... 相似文献
18.
19.
This paper investigates the fundamental difference between a simple e-tender box and a traditional physical tender box, and
highlights a series of security traps created by the functional differences. Based on our findings, we have defined the security
requirements for an e-tender submission protocol. We also discuss functional limitations of cryptographic technologies. As
a result, two secure e-tender submission protocols are proposed which enable a secure e-tender submission. Protocols are assumed
to run under the condition that all tendering parties (principal and tenderers) are dishonest players. Our informal and formal
security analysis show that these protocols meet their security goals under well known collusion scenarios. Because security
is a process not a product, our approach will have broad industry application for developing secure electronic business processes
in areas other than e-tendering.
相似文献
Colin BoydEmail: |
20.
Dolors Costal Cristina Gómez Anna Queralt Ruth Raventós Ernest Teniente 《Software and Systems Modeling》2008,7(4):469-486
An important aspect in the specification of conceptual schemas is the definition of general constraints that cannot be expressed
by the predefined constructs provided by conceptual modeling languages. This is generally achieved by using general-purpose
languages like OCL. In this paper we propose a new approach that facilitates the definition of such general constraints in
UML. More precisely, we define a profile that extends the set of predefined UML constraints by adding certain types of constraints
that are commonly used in conceptual schemas. We also show how our proposal facilitates reasoning about the constraints and
their automatic code generation, study the application of our ideas to the specification of two real-life applications, and
present a prototype tool implementation.
相似文献
Ernest TenienteEmail: |