全文获取类型
收费全文 | 24177篇 |
免费 | 1959篇 |
国内免费 | 888篇 |
专业分类
电工技术 | 1168篇 |
技术理论 | 6篇 |
综合类 | 1339篇 |
化学工业 | 4362篇 |
金属工艺 | 1615篇 |
机械仪表 | 1455篇 |
建筑科学 | 1805篇 |
矿业工程 | 687篇 |
能源动力 | 780篇 |
轻工业 | 1592篇 |
水利工程 | 370篇 |
石油天然气 | 1665篇 |
武器工业 | 151篇 |
无线电 | 2462篇 |
一般工业技术 | 3026篇 |
冶金工业 | 1379篇 |
原子能技术 | 251篇 |
自动化技术 | 2911篇 |
出版年
2024年 | 124篇 |
2023年 | 488篇 |
2022年 | 739篇 |
2021年 | 1023篇 |
2020年 | 837篇 |
2019年 | 698篇 |
2018年 | 812篇 |
2017年 | 838篇 |
2016年 | 720篇 |
2015年 | 970篇 |
2014年 | 1150篇 |
2013年 | 1558篇 |
2012年 | 1497篇 |
2011年 | 1576篇 |
2010年 | 1391篇 |
2009年 | 1317篇 |
2008年 | 1257篇 |
2007年 | 1218篇 |
2006年 | 1293篇 |
2005年 | 1116篇 |
2004年 | 684篇 |
2003年 | 633篇 |
2002年 | 582篇 |
2001年 | 466篇 |
2000年 | 537篇 |
1999年 | 648篇 |
1998年 | 552篇 |
1997年 | 411篇 |
1996年 | 399篇 |
1995年 | 333篇 |
1994年 | 273篇 |
1993年 | 190篇 |
1992年 | 156篇 |
1991年 | 108篇 |
1990年 | 90篇 |
1989年 | 50篇 |
1988年 | 67篇 |
1987年 | 41篇 |
1986年 | 29篇 |
1985年 | 32篇 |
1984年 | 28篇 |
1983年 | 16篇 |
1982年 | 12篇 |
1981年 | 9篇 |
1980年 | 13篇 |
1979年 | 9篇 |
1978年 | 4篇 |
1974年 | 3篇 |
1959年 | 2篇 |
1958年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 10 毫秒
101.
季胺萃取锌的动力学研究 总被引:1,自引:0,他引:1
以恒界面池法研究了氯化物介质中季胺萃锌的动力学。考查了搅拌转速、传质界面积和温度对萃取速率的影响,判定季爱萃锌为界面化学反应的动力学模式。进一步研究了季胺萃取剂浓度和水相Zn^2+浓度对萃取速率的影响,得到了与理论推断相吻合的速率方程。 相似文献
102.
103.
RTM工艺中气泡形成及消除研究 总被引:2,自引:0,他引:2
总结了关于RTM(树脂压铸)工艺中气泡缺陷的文献报道,对RTM中气泡缺陷的形成机理、影响因素及各研究者提出的消泡方法、理论和模型进行了概述,同时对RTM工艺中气泡缺陷的研究现状给予充分关注,并对RTM缺陷研究的未来方向进行了展望。 相似文献
104.
采用恒定pH 12±0.2,按n(Mg2+)∶n(Al3+)∶n(OH-)∶n(CO2-3)=6∶2∶16∶1配制溶液,采用一步反应液相法,制备纳米层状双金属氢氧化物(LDH)粉体.为了获得无团聚、分散均匀的纳米粉体,探讨了溶剂置换干燥、真空干燥、常压干燥对纳米LDH粉体形成团聚的影响;用X射线衍射仪、透射电镜、红外光谱仪和元素分析仪对样品的物相、形貌、粒径和组成进行了表征.结果表明,溶剂置换干燥能够有效防止纳米粉体形成硬团聚,样品分散性好,呈针状形态,长50 nm,宽5 nm. 相似文献
105.
利用导电高分子聚(3,4-二氧乙基噻吩)/聚(对苯乙烯磺酸)(PEDOT/PSS)作保护剂,制备了银纳米颗粒,用UV-Vis和TEM对其进行了表征.结果表明,选择合适量的PEDOT/PSS保护剂可以得到大小分布较窄银纳米颗粒. 相似文献
106.
Massive computation power and storage capacity of cloud computing systems allow scientists to deploy data-intensive applications without the infrastructure investment, where large application datasets can be stored in the cloud. Based on the pay-as-you-go model, data placement strategies have been developed to cost-effectively store large volumes of generated datasets in the scientific cloud workflows. As promising as it is, this paradigm also introduces many new challenges for data security when the users outsource sensitive data for sharing on the cloud servers, which are not within the same trusted domain as the data owners. This challenge is further complicated by the security constraints on the potential sensitive data for the scientific workflows in the cloud. To effectively address this problem, we propose a security-aware intermediate data placement strategy. First, we build a security overhead model to reasonably measure the security overheads incurred by the sensitive data. Second, we develop a data placement strategy to dynamically place the intermediate data for the scientific workflows. Finally, our experimental results show that our strategy can effectively improve the intermediate data security while ensuring the data transfer time during the execution of scientific workflows. 相似文献
107.
绿色水处理剂氢氧化镁应用的研究进展 总被引:1,自引:0,他引:1
氢氧化镁(氧化镁)被称为绿色安全的废水处理剂,本文评述了氢氧化镁在环境保护方面的研究与应用进展,包括工业废水中铅、铬、镍等重金属离子的去除和酸性废水的中和处理,并列举了氢氧化镁对一些实际废水的良好处理效果,包括其对一些特殊废水如含硼废水和放射性废水的处理效果,最后展望了其在生产和应用方面的发展前景。 相似文献
108.
Huabin Wang Derek O. Northwood Jiecai Han Shanyi Du 《Journal of the American Ceramic Society》2006,89(2):501-508
AlN–SiC solid solution particles with a variety of morphologies including faceted polyhedrons with or without ledges; hexagonal platelets; hexagonal columns with a hexagonal plate or a pyramidal cap; and interpenetrating cones, have been found in the combustion products of a mixture of Al, Si, and carbon black under a nitrogen pressure of 10 MPa. Combustion temperature (the growth temperature of crystals) is the most important factor controlling the morphology of crystals formed in the combustion product. When temperatures are close to the melting point of the solid solutions, a small driving force for nucleation and long distances of surface migration make nucleation on the basal plane difficult, and thus the solid solution particles tend to grow as platelets. Supersaturation is the second key factor influencing crystal growth. At relatively low temperatures, a low supersaturation at the large pores renders nucleation difficult and the solid solution particles tend to grow as platelets. At relatively low temperatures and high supersaturation, a relatively high driving force for nucleation and short mean distances of surface migration promote the growth of AlN–SiC solid solutions as polyhedrons. The formation of the ledges on the polyhedral particles is attributed to the differences in the evaporation rates and the deposition rates between Al and Si. At relatively low temperatures and an intermediate supersaturation, the solid solution particles grow as prismatic columns. The formation of the prismatic columns with a hexagonal plate, or a pyramidal cap, is attributed to a sudden change of temperature during combustion. A possible growth mechanism for the AlN–SiC solid solution cones is proposed. 相似文献
109.
The existing solutions to keyword search in the cloud can be divided into two categories: searching on exact keywords and searching on error-tolerant keywords. An error-tolerant keyword search scheme permits to make searches on encrypted data with only an approximation of some keyword. The scheme is suitable to the case where users' searching input might not exactly match those pre-set keywords. In this paper, we first present a general framework for searching on error-tolerant keywords. Then we propose a concrete scheme, based on a fuzzy extractor, which is proved secure against an adaptive adversary under well-defined security definition. The scheme is suitable for all similarity metrics including Hamming distance, edit distance, and set difference. It does not require the user to construct or store anything in advance, other than the key used to calculate the trapdoor of keywords and the key to encrypt data documents. Thus, our scheme tremendously eases the users' burden. What is more, our scheme is able to transform the servers' searching for error-tolerant keywords on ciphertexts to the searching for exact keywords on plaintexts. The server can use any existing approaches of exact keywords search to search plaintexts on an index table. 相似文献
110.