全文获取类型
收费全文 | 5824篇 |
免费 | 443篇 |
国内免费 | 227篇 |
专业分类
电工技术 | 222篇 |
综合类 | 277篇 |
化学工业 | 981篇 |
金属工艺 | 303篇 |
机械仪表 | 408篇 |
建筑科学 | 421篇 |
矿业工程 | 183篇 |
能源动力 | 115篇 |
轻工业 | 389篇 |
水利工程 | 93篇 |
石油天然气 | 509篇 |
武器工业 | 30篇 |
无线电 | 658篇 |
一般工业技术 | 741篇 |
冶金工业 | 418篇 |
原子能技术 | 56篇 |
自动化技术 | 690篇 |
出版年
2024年 | 19篇 |
2023年 | 89篇 |
2022年 | 164篇 |
2021年 | 263篇 |
2020年 | 191篇 |
2019年 | 149篇 |
2018年 | 170篇 |
2017年 | 164篇 |
2016年 | 160篇 |
2015年 | 238篇 |
2014年 | 254篇 |
2013年 | 353篇 |
2012年 | 328篇 |
2011年 | 385篇 |
2010年 | 320篇 |
2009年 | 285篇 |
2008年 | 363篇 |
2007年 | 316篇 |
2006年 | 306篇 |
2005年 | 266篇 |
2004年 | 149篇 |
2003年 | 125篇 |
2002年 | 128篇 |
2001年 | 117篇 |
2000年 | 144篇 |
1999年 | 176篇 |
1998年 | 180篇 |
1997年 | 127篇 |
1996年 | 107篇 |
1995年 | 93篇 |
1994年 | 87篇 |
1993年 | 74篇 |
1992年 | 51篇 |
1991年 | 32篇 |
1990年 | 22篇 |
1989年 | 23篇 |
1988年 | 11篇 |
1987年 | 10篇 |
1986年 | 10篇 |
1985年 | 6篇 |
1984年 | 4篇 |
1983年 | 6篇 |
1982年 | 3篇 |
1981年 | 6篇 |
1980年 | 5篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1975年 | 3篇 |
1971年 | 3篇 |
1969年 | 1篇 |
排序方式: 共有6494条查询结果,搜索用时 15 毫秒
61.
62.
63.
顶头形状对穿孔毛管壁厚均匀性及能耗影响的研究 总被引:4,自引:3,他引:4
针对目前穿孔顶头形状研究所存在的问题,在实验室内就提高一次穿孔毛管的壁厚均匀性及降低能耗进行了系统的试验研究,初步研制成功一种新型的平头对心顶头。 相似文献
64.
65.
An online beam dynamics simulator is being developed for use in the operation of an ion linear particle accelerator. By employing Graphics Processing Unit (GPU) technology, the performance of the simulator has been significantly increased over that of a single CPU and is therefore viable in the demanding accelerator operations environment. Once connected to the accelerator control system, it can rapidly respond to any control set point changes and predict beam properties along an ion linear accelerator in pseudo-real time. This simulator will be a virtual beam diagnostic tool which is especially useful when direct beam measurements are not available. Details about the code structure design, physics algorithms, GPU implementations, and performance are presented. 相似文献
66.
Junsheng Chang Zhengbin Pang Weixia Xu Huaimin Wang Gang Yin 《The Journal of supercomputing》2014,69(3):1382-1409
In peer-to-peer (P2P) systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. Trust management through reputation mechanism to facilitate such interactions is recognized as an important element of P2P systems. It is, however, faced by the problems of how to stimulate reputation information sharing and honest recommendation elicitation. This paper presents an incentive compatible reputation mechanism for P2P systems. It has two unique features: (1) a recommender’s trustworthiness and level of confidence about the recommendation is considered for a more accurate calculation of reputations and fair evaluation of recommendations. (2) Incentive for participation and honest recommendation is implemented through a fair differential service mechanism. It relies on peer’s level of participation and on the recommendation credibility. Theoretic analysis and simulation show that the reputation mechanism we propose can help peers effectively detect dishonest recommendations in a variety of scenarios where more complex malicious strategies are introduced. Moreover, it can also stimulate peers to send sufficiently honest recommendations. The latter is realized by ensuring that active and honest recommenders, compared to inactive or dishonest ones, can elicit the most honest (helpful) recommendations and thus suffer the least number of wrong trust decisions. 相似文献
67.
68.
The existing solutions to keyword search in the cloud can be divided into two categories: searching on exact keywords and searching on error-tolerant keywords. An error-tolerant keyword search scheme permits to make searches on encrypted data with only an approximation of some keyword. The scheme is suitable to the case where users' searching input might not exactly match those pre-set keywords. In this paper, we first present a general framework for searching on error-tolerant keywords. Then we propose a concrete scheme, based on a fuzzy extractor, which is proved secure against an adaptive adversary under well-defined security definition. The scheme is suitable for all similarity metrics including Hamming distance, edit distance, and set difference. It does not require the user to construct or store anything in advance, other than the key used to calculate the trapdoor of keywords and the key to encrypt data documents. Thus, our scheme tremendously eases the users' burden. What is more, our scheme is able to transform the servers' searching for error-tolerant keywords on ciphertexts to the searching for exact keywords on plaintexts. The server can use any existing approaches of exact keywords search to search plaintexts on an index table. 相似文献
69.
70.
本文综术了杂多化合物作为酸催化剂,催化烷基化和去烷基化反应、缩聚反应、水合和失水、酯化和醚化反应;以及作为氧化催化剂,在烯烃、芳烃、酚的氧化和环氧化反应中的应用。表面杂多化合物作为催化剂在合成精细化学中有广泛的应用价值。 相似文献