全文获取类型
收费全文 | 2739篇 |
免费 | 20篇 |
国内免费 | 1篇 |
专业分类
电工技术 | 10篇 |
化学工业 | 72篇 |
金属工艺 | 4篇 |
机械仪表 | 9篇 |
建筑科学 | 31篇 |
能源动力 | 33篇 |
轻工业 | 92篇 |
水利工程 | 7篇 |
石油天然气 | 3篇 |
无线电 | 72篇 |
一般工业技术 | 76篇 |
冶金工业 | 2197篇 |
原子能技术 | 4篇 |
自动化技术 | 150篇 |
出版年
2023年 | 4篇 |
2022年 | 8篇 |
2021年 | 3篇 |
2020年 | 5篇 |
2019年 | 5篇 |
2018年 | 8篇 |
2017年 | 8篇 |
2016年 | 11篇 |
2015年 | 10篇 |
2014年 | 16篇 |
2013年 | 23篇 |
2012年 | 29篇 |
2011年 | 25篇 |
2010年 | 16篇 |
2009年 | 25篇 |
2008年 | 27篇 |
2007年 | 24篇 |
2006年 | 28篇 |
2005年 | 12篇 |
2004年 | 29篇 |
2003年 | 23篇 |
2002年 | 16篇 |
2001年 | 29篇 |
2000年 | 28篇 |
1999年 | 82篇 |
1998年 | 692篇 |
1997年 | 452篇 |
1996年 | 274篇 |
1995年 | 158篇 |
1994年 | 122篇 |
1993年 | 135篇 |
1992年 | 16篇 |
1991年 | 31篇 |
1990年 | 14篇 |
1989年 | 21篇 |
1988年 | 36篇 |
1987年 | 23篇 |
1986年 | 21篇 |
1985年 | 13篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 14篇 |
1981年 | 18篇 |
1980年 | 20篇 |
1979年 | 3篇 |
1978年 | 6篇 |
1977年 | 50篇 |
1976年 | 130篇 |
1975年 | 3篇 |
1973年 | 2篇 |
排序方式: 共有2760条查询结果,搜索用时 15 毫秒
71.
OBJECTIVE AND IMPORTANCE: We report a unique case of ivory osteoma of the cervical spine. CLINICAL PRESENTATION: The clinical presentation was one of polyradicular deficit without myelopathy after trauma. The imaging characteristics and histology of the lesion were those of a classic ivory osteoma. INTERVENTION: A complete surgical excision of the lesion was accomplished. CONCLUSION: We think we have recorded the only well-documented case of ivory osteoma affecting the spine. 相似文献
72.
Wayne Madsen 《Computer Fraud & Security》1996,1996(11):8-10
On 2 October 1996, IBM announced the formation of a new business alliance which will develop a different approach to law enforcement — accessible encryption that will not face government export controls or require the ‘escrowing’ of keys with either escrow ‘quote agents’ or trusted third parties. The day before, the White House announced a new government plan that would permit companies that promise to participate in a ‘key recovery’ system to receive a six-month license to export up to 56-bit DES encryption. When they fulfill their obligations and the government is satisfied that it can get access to the decryption keys, the 56-bit limit will be lifted. If, by the end of the two-year grace period, companies have not fulfilled their obligations to implement a key-recovery scheme, the 56-bit limit will be reduced to the current 40-bit export limit. 相似文献
73.
SS El-Dahr 《Canadian Metallurgical Quarterly》1998,18(6):633-640
Because many patients present themselves for treatment with both craniofacial and craniocervical pain, 2 questions arise: (1) What are the sensory and motor consequences of dysfunction in either of these areas on the other? (2) Do craniofacial and craniocervical pain have a similar cause? These questions formed the impetus for this review article. The phenomenon of concurrent pain in craniofacial and cervical structures is considered, and clinical reports and opinions are presented regarding theories of cervical-to-craniofacial and craniofacial-to-cervical pain referral. Because pain referral between these 2 areas requires anatomic and functional connectivity between trigeminally and cervically innervated structures, basic neurophysiologic and neuroanatomic literature is reviewed. The published data clearly demonstrate neurophysiologic and structural convergence of cervical sensory and muscle afferent inputs onto trigeminal subnucleus caudalis nociceptive and non-nociceptive neurons. Moreover, changes in metabolic activity and blood flow in the brainstem and cervical dorsal horn of the spinal cord in both monkeys and cats have been demonstrated after electric stimulation of the V1-innervated superior sagittal sinus. In conclusion, the animal experimental data support the findings of human empiric and experimental studies, which suggest that strong connectivity exists between trigeminal and cervical motor and sensory responses. 相似文献
74.
75.
76.
77.
JW Erdman AJ Thatcher NE Hofmann JD Lederman SS Block CM Lee S Mokady 《Canadian Metallurgical Quarterly》1998,128(11):2009-2013
The algae Dunaliella bardawil and Dunaliella salina naturally contain large concentrations of all-trans and 9-cis beta-carotene (betaC). The purpose of this study was to compare the relative serum and tissue accumulation of all-trans and 9-cis betaC in ferrets fed different ratios of all-trans/9-cis betaC derived from two commercial sources, D. bardawil or D. salina (Betatene). Male ferrets (7 wk old) were fed carotene-free, pelleted diets for 27 d. Beginning on d 18, groups of ferrets (n = 6 or 7) received daily, one of six oral supplements varying in ratios of 9-cis and all-trans betaC mixed with approximately 1.0mL of Ensure. Four supplements containing 5.2-8.3 micromol total betaC were prepared from a 20% Betatene preparation, D. bardawil, a high-cis Betatene preparation, and Betatene further enriched in 9-cis betaC with all-trans betaC/9-cis betaC ratios of 2.2, 1.5, 0.6 and 0.4, respectively. Two control supplements, high and low betaC, were prepared from commercial betaC beadlets. The high control supplement had an all-trans/9-cis ratio of 19.0, whereas 9-cis betaC was not detected in the low supplement. On d 27, serum and tissues were obtained for HPLC analysis of betaC and its isomers. Analysis of livers showed that all-trans betaC was the primary isomer present, but 9-cis and other isomers were also detected in all groups. The hepatic all-trans/9-cis ratios were 5.9, 4.9, 2.5, 1.4, 52.2 and47.5, respectively, for the groups listed above. Lower amounts of all-trans and 9-cis betaC were found in kidneys compared with the liver, but ratios of all-trans/9-cis were not different among groups. Only trace amounts of 9-cis betaC were found in serum. These results demonstrate that the algae D. bardawil and D. salina provide a bioavailable source of betaC isomers, but, as in humans, absorption of 9-cis betaC is poor and any 9-cis betaC absorbed is apparently cleared by the liver. 相似文献
78.
79.
80.
Wayne Madsen 《Information Security Journal: A Global Perspective》2013,22(1):11-16
ABSTRACT Communicating with confidential data requires special attention in a mobile agents environment, especially when the other hosts must be prevented from eavesdropping on the communication. We propose a communication model for secured communication between the agents belonging to publishers and consumers data. Confidentiality is ensured using our on-the-fly encryption-decryption sequence using ElGamal system to directly convert the message or plaintext into one that is encrypted directly with the public key of consumer. The scheme ensures that the data possessed by the agents is secured at all times when it is executing at any untrusted host. Our minimal implementation of the model with Aglets agent platform gives the first faithful picture of the happenings in the model. Finally, we also explain how the homomorphic property of ElGamal scheme can be integrated with our model for a Web-based application such as voting involving multiple agents. 相似文献