全文获取类型
收费全文 | 6121篇 |
免费 | 558篇 |
国内免费 | 289篇 |
专业分类
电工技术 | 444篇 |
综合类 | 480篇 |
化学工业 | 741篇 |
金属工艺 | 350篇 |
机械仪表 | 330篇 |
建筑科学 | 288篇 |
矿业工程 | 245篇 |
能源动力 | 225篇 |
轻工业 | 463篇 |
水利工程 | 155篇 |
石油天然气 | 137篇 |
武器工业 | 103篇 |
无线电 | 633篇 |
一般工业技术 | 600篇 |
冶金工业 | 1038篇 |
原子能技术 | 47篇 |
自动化技术 | 689篇 |
出版年
2024年 | 37篇 |
2023年 | 97篇 |
2022年 | 207篇 |
2021年 | 300篇 |
2020年 | 184篇 |
2019年 | 127篇 |
2018年 | 160篇 |
2017年 | 171篇 |
2016年 | 141篇 |
2015年 | 201篇 |
2014年 | 250篇 |
2013年 | 359篇 |
2012年 | 389篇 |
2011年 | 452篇 |
2010年 | 386篇 |
2009年 | 399篇 |
2008年 | 369篇 |
2007年 | 355篇 |
2006年 | 330篇 |
2005年 | 224篇 |
2004年 | 182篇 |
2003年 | 122篇 |
2002年 | 113篇 |
2001年 | 85篇 |
2000年 | 77篇 |
1999年 | 63篇 |
1998年 | 250篇 |
1997年 | 155篇 |
1996年 | 106篇 |
1995年 | 72篇 |
1994年 | 65篇 |
1993年 | 66篇 |
1992年 | 21篇 |
1991年 | 18篇 |
1990年 | 18篇 |
1989年 | 23篇 |
1988年 | 34篇 |
1987年 | 18篇 |
1986年 | 18篇 |
1985年 | 36篇 |
1984年 | 14篇 |
1983年 | 14篇 |
1982年 | 17篇 |
1981年 | 23篇 |
1980年 | 18篇 |
1979年 | 12篇 |
1978年 | 15篇 |
1977年 | 37篇 |
1976年 | 79篇 |
1975年 | 12篇 |
排序方式: 共有6968条查询结果,搜索用时 359 毫秒
41.
We present a modular technique for analyzing probe-fed, multilayered microstrip phased-array antennas. Each patch layer is assumed to be infinite in extent and represented by its generalized scattering matrix (GSM) with respect to a finite number of Floquet modes. For multilayer patch analysis, the individual GSMs are combined appropriately to yield the overall GSM of the structure. The individual GSM are obtained using the Galerkin method. The probe layer is represented by its generalized impedance matrix (GIM) which is deduced using Floquet modal analysis and the variational method. The GSMs and GIM are combined appropriately to yield the input impedance seen by the probe. Numerical results computed with this technique are shown to agree favorably with available data. Results for two-layered patch arrays and capacitively coupled patches are also presented 相似文献
42.
43.
44.
45.
Ubiquitin-mediated proteolysis controls the abundance of many cell cycle regulatory proteins. Recent work in Saccharomyces cerevisiae suggests that a complex consisting of Cdc53, Skp1, and a third component known as an F-box protein (termed SCF) in combination with Cdc34 specifically targets regulatory proteins for degradation, and that substrate specificity is likely to be mediated by the F-box subunit. A screen for genetic interactions with a cdc34 mutation yielded MET30, which encodes an F-box protein. MET30 is an essential gene required for cell cycle progression and met30 mutations interact genetically with mutations in SCF components. Furthermore, physical interactions between Met30, Cdc53, Cdc34, and Skp1 in vivo provide evidence for an SCFMet30 complex. We demonstrate the involvement of Met30 in the degradation of the Cdk-inhibitory kinase Swe1. Swe1 is stabilized in met30 mutants and GST-Met30 pull-down experiments reveal that Met30 specifically binds Swe1 in vivo. Furthermore, extracts prepared from cdc34 or met30 mutants are defective in polyubiquitination of Swe1. Taken together, these data suggest that SCF-mediated proteolysis may contribute to the regulation of entry into mitosis. Our data, in combination with previously published results, also provide evidence for distinct SCF complexes in vivo and support the idea that their F-box subunits mediate SCF substrate specificity. 相似文献
46.
As part of our studies on the structural and dynamic properties of hyperthermostable proteins, we have investigated the unfolding pathways of the small iron-sulfur protein rubredoxin from Pyrococcus furiosus (RdPf) at pH 2. Unfolding has been initiated by temperature jump, triggered by manual mixing of a concentrated protein solution into a thermally preequilibrated buffer. The process has been followed in real time by absorption, tryptophan fluorescence emission, and far-UV circular dichroism. Unlike the case of the mesophilic rubredoxin from Clostridium pasteurianum (RdCp), RdPf displays a complex unfolding kinetics, pointing to the formation of at least three intermediates. All of the steps, including the one involving metal ion release, are extremely slow. However, hydrophobic core relaxation--not Fe3+ loss--is rate-determining for RdPf unfolding. This clearly rules out the fact that Fe3+ is solely responsible for the kinetic stability of RdPf. Results have been discussed in terms of sequential vs parallel pathways, and the possible role of irreversible phenomena has been taken into consideration. Aggregation does not appear to play a significant role in the observed kinetic complexities. According to a proposed sequential mechanism, partial release of secondary structure elements precedes iron loss, which is then followed by further loss of beta-sheet content and, finally, by hydrophobic relaxation. Although the main features of the RdPf unfolding mechanism remain substantially unchanged over the experimentally accessible temperature range, final hydrophobic relaxation gets faster, relative to the other events, as the temperature is decreased. A qualitative assessment of the unfolding activation parameters suggests that this arises from the very low activation energies (Ea) that characterize this step. 相似文献
47.
The 1,3-specific lipase-catalyzed interesterified fats were distinguished from chemically catalyzed products by the fatty
acids in the 2-position. The fatty acid contents in the 2-position of the 1,3-lipase-catalyzed and the original triglycerides
were similar but different from that of chemically interesterified fat. Also, the saturated-to-unsaturated fatty acid ratio
in the 2-monoglycerides was lower for the 1,3-specific lipase-catalyzed interesterified fats than for the corresponding chemical
products. 相似文献
48.
49.
近年来,采用工作量证明共识机制(Proof of Work,PoW)的区块链被广泛地应用于以比特币为代表的数字加密货币中.自私挖矿攻击(Selfish mining)等挖矿攻击(Mining attack)策略威胁了采用工作量证明共识机制的区块链的安全性.在自私挖矿攻击策略被提出之后,研究者们进一步优化了单个攻击者的挖矿攻击策略.在前人工作的基础上,本文提出了新颖的两阶段挖矿攻击模型,该模型包含拥有单攻击者的传统自私挖矿系统与拥有两个攻击者的多攻击者系统.本文的模型同时提供了理论分析与仿真量化分析,并将两个攻击者区分为内部攻击者与外部攻击者.通过引入内部攻击者与外部攻击者的概念,本文指出传统自私挖矿系统转化为多攻击者系统的条件.本文进一步揭示了在多攻击者系统中两个攻击者将产生竞争并面临着“矿工困境”问题.攻击者间的竞争可被总结为“鲶鱼效应”:外部攻击者的出现导致内部攻击者的相对收益下降至多67.4%,因此内部攻击者需要优化攻击策略.本文提出了名为部分主动发布策略的全新挖矿攻击策略,相较于自私挖矿策略,该策略是半诚实的攻击策略.在特定场景下,部分主动发布策略可以提高攻击者的相对收益并破解攻击者面临的“矿工困境”问题. 相似文献
50.
文章以手机数据存储和恢复为研究目的,对目前主流的手机操作系统,即Java非智能手机操作系统、塞班非智能与智能手机操作系统,分别将其数据的删除和恢复等进行对比分析,总结数据存储结构和存储方式,归纳手机数据恢复的方法,以期有效解决日常数据丢失等相关问题。 相似文献