全文获取类型
收费全文 | 2819篇 |
免费 | 67篇 |
国内免费 | 9篇 |
专业分类
电工技术 | 40篇 |
综合类 | 4篇 |
化学工业 | 431篇 |
金属工艺 | 37篇 |
机械仪表 | 50篇 |
建筑科学 | 175篇 |
矿业工程 | 34篇 |
能源动力 | 75篇 |
轻工业 | 130篇 |
水利工程 | 41篇 |
石油天然气 | 9篇 |
无线电 | 347篇 |
一般工业技术 | 442篇 |
冶金工业 | 614篇 |
原子能技术 | 27篇 |
自动化技术 | 439篇 |
出版年
2022年 | 26篇 |
2021年 | 36篇 |
2020年 | 13篇 |
2019年 | 24篇 |
2018年 | 36篇 |
2017年 | 31篇 |
2016年 | 35篇 |
2015年 | 38篇 |
2014年 | 44篇 |
2013年 | 147篇 |
2012年 | 85篇 |
2011年 | 108篇 |
2010年 | 76篇 |
2009年 | 90篇 |
2008年 | 111篇 |
2007年 | 119篇 |
2006年 | 120篇 |
2005年 | 101篇 |
2004年 | 112篇 |
2003年 | 103篇 |
2002年 | 73篇 |
2001年 | 73篇 |
2000年 | 84篇 |
1999年 | 77篇 |
1998年 | 167篇 |
1997年 | 111篇 |
1996年 | 102篇 |
1995年 | 73篇 |
1994年 | 49篇 |
1993年 | 47篇 |
1992年 | 20篇 |
1991年 | 29篇 |
1990年 | 30篇 |
1989年 | 28篇 |
1988年 | 18篇 |
1987年 | 26篇 |
1986年 | 32篇 |
1985年 | 31篇 |
1984年 | 32篇 |
1983年 | 26篇 |
1982年 | 17篇 |
1981年 | 21篇 |
1980年 | 25篇 |
1979年 | 23篇 |
1978年 | 20篇 |
1977年 | 25篇 |
1976年 | 46篇 |
1975年 | 16篇 |
1974年 | 13篇 |
1971年 | 13篇 |
排序方式: 共有2895条查询结果,搜索用时 15 毫秒
951.
Patterson BD Sa J Ichsanow A Hauri CP Vicario C Ruchert C Czekaj I Gehrig R Sigg HC van Bokhoven JA Pedrini B Abela R 《Chimia》2011,65(5):323-325
In preparation for picosecond pump-probe experiments at the SwissFEL X-ray laser facility, the feasibility of collectively initiating surface chemical reactions using energetic pulses of terahertz radiation is being tested. 相似文献
952.
Over the last 20 years, the privacy of most GSM phone conversations was protected by the A5/1 and A5/2 stream ciphers, which were repeatedly shown to be cryptographically weak. They are being replaced now by the new A5/3 and A5/4 algorithms, which are based on the block cipher KASUMI. In this paper we describe a new type of attack called a sandwich attack, and use it to construct a simple related-key distinguisher for 7 of the 8 rounds of KASUMI with an amazingly high probability of 2?14. By using this distinguisher and analyzing the single remaining round, we can derive the complete 128-bit key of the full KASUMI with a related-key attack which uses only 4 related keys, 226 data, 230 bytes of memory, and 232 time. These completely practical complexities were experimentally verified by performing the attack in less than two hours on a single-core of a PC. Interestingly, neither our technique nor any other published attack can break the original MISTY block cipher (on which KASUMI is based) significantly faster than exhaustive search. Our results thus indicate that the modifications made by ETSI’s SAGE group in moving from MISTY to KASUMI made it extremely weak when related-key attacks are allowed, but do not imply anything about its resistance to single-key attacks. Consequently, there is no indication that the way KASUMI is implemented in GSM and 3G networks is practically vulnerable in any realistic attack model. 相似文献
953.
Network covert channels are policy-breaking and stealthy communication channels in computer networks. These channels can be used to bypass Internet censorship, to exfiltrate data without raising attention, to allow a safe and stealthy communication for members of political oppositions and for spies, to hide the communication of military units at the battlefield from the enemy, and to provide stealthy communication for today’s malware, especially for botnets. To enhance network covert channels, researchers started to add protocol headers, so-called micro-protocols, to hidden payload in covert channels. Such protocol headers enable fundamental features such as reliability, dynamic routing, proxy capabilities, simultaneous connections, or session management for network covert channels—features which enrich future botnet communications to become more adaptive and more stealthy than nowadays. In this survey, we provide the first overview and categorization of existing micro-protocols. We compare micro-protocol features and present currently uncovered research directions for these protocols. Afterwards, we discuss the significance and the existing means for micro-protocol engineering. Based on our findings, we propose further research directions for micro-protocols. These features include to introduce multi-layer protocol stacks, peer auto-configuration, and peer group communication based on micro-protocols, as well as to develop protocol translation in order to achieve inter-connectivity for currently separated overlay networks. 相似文献
954.
Hee-Yong Kim Bill X. Huang Arthur A. Spector 《International journal of molecular sciences》2022,23(9)
The neurodevelopmental and neuroprotective actions of docosahexaenoic acid (DHA) are mediated by mechanisms involving membrane- and metabolite-related signal transduction. A key characteristic in the membrane-mediated action of DHA results from the stimulated synthesis of neuronal phosphatidylserine (PS). The resulting DHA-PS-rich membrane domains facilitate the translocation and activation of kinases such as Raf-1, protein kinase C (PKC), and Akt. The activation of these signaling pathways promotes neuronal development and survival. DHA is also metabolized in neural tissues to bioactive mediators. Neuroprotectin D1, a docosatriene synthesized by the lipoxygenase activity, has an anti-inflammatory property, and elovanoids formed from DHA elongation products exhibit antioxidant effects in the retina. Synaptamide, an endocannabinoid-like lipid mediator synthesized from DHA in the brain, promotes neurogenesis and synaptogenesis and exerts anti-inflammatory effects. It binds to the GAIN domain of the GPR110 (ADGRF1) receptor, triggers the cAMP/protein kinase A (PKA) signaling pathway, and activates the cAMP-response element binding protein (CREB). The DHA status in the brain influences not only the PS-dependent signal transduction but also the metabolite formation and expression of pre- and post-synaptic proteins that are downstream of the CREB and affect neurotransmission. The combined actions of these processes contribute to the neurodevelopmental and neuroprotective effects of DHA. 相似文献
955.
Norbert Niebert Ibtissam El Khayat Stephan Baucke Ralf Keller René Rembarz Joachim Sachs 《Wireless Personal Communications》2008,45(4):511-520
New technologies as well as new ways of using network services are rapidly changing the Internet’s landscape. These developments
will have far-reaching implications for the architecture of the networks of the future. However, the current Internet design
is plagued with a number of fundamental limitations, which makes its use as the sole basis for the networking applications
of the future questionable. We believe that the Future Internet must allow the co-existence of diverse network designs and
paradigms, both new and old, to remain open to innovation and meet the challenges of the future. In this paper, we propose
to use network virtualization, embedded in an architectural framework, to achieve this goal and to lay the foundation for
the deployment of novel concepts such as content-centric networking.
相似文献
Norbert NiebertEmail: |
956.
对4种调整糖度方法对葡萄酒质量的影响进行了比较,采用的葡萄品种为灰比诺,可溶性固形物为19.5°Brix,通过不同的调整糖度措施使可溶性目形物提高2.5°Brix,达到22°Brix.4种调整糖度方法分别为:直接往葡萄汁中加入蔗糖;往葡萄汁中加入68°Brix浓缩葡萄汁;冷冻除冰使葡萄汁浓缩和借助反渗透机器浓缩葡萄汁.结果表明,在调整糖度幅度为2.5°Brix的情况下,不同调整糖度方法对葡萄酒的质量影响不大. 相似文献
957.
R. S. Bradley F. W. Schroeder W. D. Keller 《Journal of the American Ceramic Society》1940,23(9):265-270
The effect of heat treatments on the chemical, physical, and mineralogical properties of topaz is described. The samples were obtained from a deposit of potential commercial importance. Brick made from calcined and uncalcined topaz were tested according to standard A.S.T.M. test methods, and the results are presented. 相似文献
958.
Polymorphic systems with arrays (PSAs) is a general class of nondeterministic reactive systems. A PSA is polymorphic in the sense that it depends on a signature, which consists of a number of type variables, and a number of symbols whose types can be built from the type variables. Some of the state variables of a PSA can be arrays, which are functions from one type to another. We present several new decidability and undecidability results for parameterised control-state reacha- bility problems on subclasses of PSAs. 相似文献
959.
Mary Kalantzis's plenary address at the 2005 International Conference on the Humanities (Cambridge, U.K.) argues that globalization and diversity ground the world of our times. The article expands on this notion as Kalantzis and co-author Bill Cope describe three instantiations of globalization since the evolutionary processes of human beings began. The third globalization of which we are a part today, they argue, is characterized by layers upon layers of difference. These layers, moreover, are supported through new media and the Internet—and may indeed return us to “multilingualism, divergence, and enduringly deep diversity.” 相似文献
960.
Reactions of methylcyclopentane on tungsten carbides show that in presence of oxygen the extensive hydrogenolysis is inhibited in favour of ring enlargement and ring opening via a bifunctional mechanism due to the coexistence of surface acid-rearrangement and hydrogenation-dehydrogenation sites. The oxycarbidic materials are very active and selective in skeletal rearrangement of hydrocarbons. 相似文献