全文获取类型
收费全文 | 129834篇 |
免费 | 3560篇 |
国内免费 | 561篇 |
专业分类
电工技术 | 1450篇 |
综合类 | 2371篇 |
化学工业 | 21207篇 |
金属工艺 | 6551篇 |
机械仪表 | 5796篇 |
建筑科学 | 3192篇 |
矿业工程 | 585篇 |
能源动力 | 3173篇 |
轻工业 | 7270篇 |
水利工程 | 1516篇 |
石油天然气 | 428篇 |
武器工业 | 2篇 |
无线电 | 16753篇 |
一般工业技术 | 26589篇 |
冶金工业 | 6355篇 |
原子能技术 | 910篇 |
自动化技术 | 29807篇 |
出版年
2024年 | 50篇 |
2023年 | 570篇 |
2022年 | 870篇 |
2021年 | 1484篇 |
2020年 | 1072篇 |
2019年 | 1179篇 |
2018年 | 15446篇 |
2017年 | 14381篇 |
2016年 | 11360篇 |
2015年 | 1869篇 |
2014年 | 2302篇 |
2013年 | 3183篇 |
2012年 | 6240篇 |
2011年 | 12854篇 |
2010年 | 10693篇 |
2009年 | 8241篇 |
2008年 | 9266篇 |
2007年 | 9662篇 |
2006年 | 2135篇 |
2005年 | 2868篇 |
2004年 | 2641篇 |
2003年 | 2622篇 |
2002年 | 1829篇 |
2001年 | 1226篇 |
2000年 | 1169篇 |
1999年 | 982篇 |
1998年 | 1606篇 |
1997年 | 1017篇 |
1996年 | 846篇 |
1995年 | 566篇 |
1994年 | 472篇 |
1993年 | 414篇 |
1992年 | 301篇 |
1991年 | 296篇 |
1990年 | 258篇 |
1989年 | 241篇 |
1988年 | 212篇 |
1987年 | 168篇 |
1986年 | 119篇 |
1985年 | 115篇 |
1984年 | 92篇 |
1983年 | 63篇 |
1981年 | 39篇 |
1977年 | 38篇 |
1976年 | 61篇 |
1968年 | 47篇 |
1966年 | 45篇 |
1965年 | 46篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
11.
12.
Mobile software applications have to cope with a particular environment that involves small size, limited resources, high autonomy requirements, competitive business models and many other challenges. To provide development guidelines that respond to these needs, several practices have been introduced; however, it is not clear how these guidelines may contribute to solve the issues present in the mobile domain. Furthermore, the rapid evolution of the mobile ecosystem challenges many of the premises upon which the proposed practices were designed. In this paper, we present a survey of the literature on software assurance practices for mobile applications, with the objective of describing them and assessing their contribution and success. We identified, organized and reviewed a body of research that spans in three levels: software development processes, software product assurance practices, and software implementation practices. By carrying out this literature survey, we reviewed the different approaches that researchers on Software Engineering have provided to address the needs that raise in the mobile software development arena. Moreover, we review the evolution of these practices, identifying how the constant changes and modernization of the mobile execution environment has impacted the methods proposed in the literature. Finally, we introduced discussion on the application of these practices in a real productive setting, opening an area for further research that may determine if practitioners have followed the proposed assurance paradigms. 相似文献
13.
A. A. Babenko V. I. Zhuchkov L. A. Smirnov A. V. Sychev A. A. Akberdin A. S. Kim M. F. Vitushchenko A. A. Dobromilov 《Steel in Translation》2015,45(11):883-886
A technology for slag formation in the ladle–furnace unit is considered; the slag is based on the CaO–SiO2–MgO–Al2O3–B2O3 system. This technology permits both microalloying of the steel with boron (reduced from the oxide phase) and desulfurization of the steel. The resulting boron content in the steel is 0.001–0.008%; the sulfur content in low-alloy steel and pipe steel is low (0.004–0.010%); and the consumption of manganese ferroalloys is reduced to 0.5 kg/t for 08кп steel and 1.4 kg/t for 09Г2C steel. In addition, the proposed technology increases the strength of the rolled steel, without loss in its plasticity; and reduces the environmental impact thanks to the replacement of fluorspar by colemanite. 相似文献
14.
15.
16.
Variations of Incomplete Open Cubes is the major project by the twentieth-century conceptual artist Sol LeWitt. In this paper we interpret the enumerative component of the project as embeddings of graphs. This formulation permits use of an algorithm to check the completeness of the list of the structures produced by the artist. Our conclusion is that the artist found the correct number of structures (that is, 122), but that his list contains a mistake in the presentation of a pair of incomplete cubes, a discovery that appears not to have been noted before. 相似文献
17.
Peer-to-Peer Networking and Applications - Recently, as the P2P service environment repeats evolution, its usage in mobile is rapidly increasing. Applications are being developed in various mobile... 相似文献
18.
19.
Bioactive compounds and antioxidant activities of the Korean lotus leaf (Nelumbo nucifera) condiment: volatile and nonvolatile metabolite profiling during fermentation 下载免费PDF全文
Recent studies have shown that lotus (Nelumbo nucifera) leaf has various pharmacological effects. However, there have been no scientific investigations into these leaves as a fermented crude liquid. This study compared the in vitro antioxidant capacity of lotus leaf‐fermented broth (LLFB) with that of 57° Brix sugar broth (SB) as a control over a period of 6 months based on 1,1‐diphenyl‐2‐picrylhydrazyl radical scavenging activity, ferric ion reducing power, superoxide dismutase‐like activity, tyrosinase inhibition and nitrite scavenging activity. The dominant species during fermentation process were Leuconostoc lactis and Saccharomyces cerevisiae for LLFB. A total of thirty‐six metabolites such as alkaloids, fatty acids, organic acids, phenolics, sugar and sugar derivatives, ethyl esters and monoterpenoids differed between SB and LLFB using gas chromatography–mass spectrometry. Meanwhile, nine volatile compounds in LLFB contributed pleasant, slightly sweetish and fruity odour of condiment and sensory evaluation score of 4.06 ± 1.52 in the proportion of 1:9 LLFB/water. 相似文献
20.
Hwansoo Lee Dongwon Lim Hyerin Kim Andrew P. Ciganek 《Behaviour & Information Technology》2015,34(1):45-56
Many e-commerce companies collect users’ personal data for marketing purposes despite privacy concerns. Information-collecting companies often offer a monetary reward to users to alleviate privacy concerns and ease the collection of personal information. This study focused on the negative effects of monetary rewards on both information privacy concerns (IPC) and information disclosure. A survey approach was used to collect data and 370 final responses were analysed using a two-way analysis of variance and a binomial logistic regression model. The results show that monetary rewards increase IPC when an information-collecting company requires sensitive information. Additional results indicate that building trust is a more effective way of collecting personal data. This study identifies how organisations can best execute information-collection activities and contributes additional insights for academia and practitioners. 相似文献