全文获取类型
收费全文 | 82696篇 |
免费 | 5619篇 |
国内免费 | 2907篇 |
专业分类
电工技术 | 3999篇 |
技术理论 | 6篇 |
综合类 | 4417篇 |
化学工业 | 12881篇 |
金属工艺 | 4348篇 |
机械仪表 | 4848篇 |
建筑科学 | 5200篇 |
矿业工程 | 2384篇 |
能源动力 | 2260篇 |
轻工业 | 4773篇 |
水利工程 | 1006篇 |
石油天然气 | 5248篇 |
武器工业 | 460篇 |
无线电 | 7875篇 |
一般工业技术 | 9426篇 |
冶金工业 | 3843篇 |
原子能技术 | 840篇 |
自动化技术 | 17408篇 |
出版年
2024年 | 231篇 |
2023年 | 1199篇 |
2022年 | 2071篇 |
2021年 | 2865篇 |
2020年 | 2142篇 |
2019年 | 1917篇 |
2018年 | 2252篇 |
2017年 | 2472篇 |
2016年 | 2051篇 |
2015年 | 2684篇 |
2014年 | 3627篇 |
2013年 | 4363篇 |
2012年 | 5101篇 |
2011年 | 7893篇 |
2010年 | 5288篇 |
2009年 | 4942篇 |
2008年 | 4513篇 |
2007年 | 4282篇 |
2006年 | 4229篇 |
2005年 | 3994篇 |
2004年 | 2795篇 |
2003年 | 2659篇 |
2002年 | 2139篇 |
2001年 | 1644篇 |
2000年 | 1810篇 |
1999年 | 2061篇 |
1998年 | 1849篇 |
1997年 | 1445篇 |
1996年 | 1416篇 |
1995年 | 1184篇 |
1994年 | 944篇 |
1993年 | 715篇 |
1992年 | 549篇 |
1991年 | 425篇 |
1990年 | 333篇 |
1989年 | 257篇 |
1988年 | 230篇 |
1987年 | 144篇 |
1986年 | 112篇 |
1985年 | 95篇 |
1984年 | 83篇 |
1983年 | 46篇 |
1982年 | 47篇 |
1981年 | 34篇 |
1980年 | 22篇 |
1979年 | 13篇 |
1977年 | 7篇 |
1976年 | 8篇 |
1975年 | 5篇 |
1945年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 203 毫秒
991.
General and pitting corrosion of both service and laboratory aged 347 grade stainless steel superheater tubes have been investigated. SEM analysis showed the precipitate phases to have a double structure consisting of phase and carbide. EDA analysis of the precipitates indicated the [Cr]/[Fe] ratio to increase with exposure time. For both set of specimens, the general corrosion rate in 1m H2SO4 increased with aging whilst the pitting studies (in 3.5% NaCl) also indicated increased pitting susceptibility with aging. These trends are consistent with corrosion from the chromium depleted areas adjacent to the precipitates. Methoxypropylamine is effective as an inhibitor for pitting corrosion and the concentration required to prevent this form of attack increases with exposure time for both types of specimens. 相似文献
992.
The role of Al in C-S-H: NMR, XRD, and compositional results for precipitated samples 总被引:2,自引:0,他引:2
X-ray diffraction, compositional analysis, and 29Si and 27Al MAS NMR spectroscopy of Al-substituted tobermorite-type C-S-H made by precipitation from solution provide significant new insight into the structural mechanisms of Al-substitution in this important and complicated phase. Al occurs in 4-, 5-, and 6-coordination (Al[4], Al[5], and Al[6]) and plays multiple structural roles. Al[4] occurs on the bridging tetrahedra of the drierkette Al-silicate chains, and Al[5] and Al[6] occur in the interlayer and perhaps on particle surfaces. Al does not enter either the central Ca-O sheet or the pairing tetrahedra of the tobermorite-type layers. Al[4] occurs on three types of bridging sites, Q3 sites that bridge across the interlayer; Q2 sites that are charge balanced by interlayer Ca+2, Na+, or H+; and Q2 sites that are most likely charge balanced by interlayer or surface Al[5] and Al[6] through Al[4]-O-Al[5,6] linkages. Although the data presented here are for relatively well-crystallized tobermorite-type C-S-H with C/S ratios ≤ 1.2, comparable spectral features for hydrated white cement pastes in previously published papers[30], [31] and [32] [M.D. Andersen, H.J. Jakobsen, J. Skibsted, Incorporation of aluminum in the calcium silicate hydrate (C-S-H) of hydrated Portland cements: a high-field 27Al and 29Si MAS NMR investigation Inorg. Chem. 42 (2003) 2280-2287; M.D. Andersen, H.J. Jakobsen, J. Skibsted, Characterization of white Portland cement hydration and the C-S-H structure in the presence of sodium aliminate by 27Al and 29Si MAS NMR spectroscopy, Cem. Concr. Res. 43 (2004) 857-868; M.D. Andersen, H. J. Jakobsen, J. Skibsted, A new aluminum-hydrate phase in hydrated Portland cements characterized by 27Al and 29Si MAS NMR spectroscopy, Cem. Concr. Res., submitted for publication.] indicate the presence of similar structural environments in the C-S-H of such pastes, and by implication OPC pastes. 相似文献
993.
In this paper, two multi-party quantum private comparison (MQPC) protocols are proposed in distributed mode and traveling mode, respectively. Compared with the first MQPC protocol, which pays attention to compare between arbitrary two participants, our protocols focus on the comparison of equality for \(n\) participants with a more reasonable assumption of the third party. Through executing our protocols once, it is easy to get if \(n\) participants’ secrets are same or not. In addition, our protocols are proved to be secure against the attacks from both outside attackers and dishonest participants. 相似文献
994.
Graft copolymerization of acrylic acid (AA) onto polyphenylene sulfide (PPS) nonwoven initiated by low temperature plasma was studied. The effects of various conditions on graft reaction and the grafting rate were investigated. SEM images showed that PPS nonwoven was grafted, and the graft copolymerization only occurred on the surface of PPS. It may be due to the chain transference going with the graft copolymerization. It was found that with the increasing of plasma power, treatment time, space between electrodes, monomer concentration, and temperature of graft polymerization, the grafting rate increased at first, went to the top, and then decreased. The PPS nonwoven surface graft reaction could be optimized by the following processing conditions: 120 s of plasma treatment time, 50 W of plasma power, 1.5 cm of space between electrodes, 30% (w/w) of monomer concentration, and 50°C of temperature of graft polymerization. Measurement of XPS showed that the peak of C1s of graft polyacrylic acid was existed, and the peak area increased with the increase of the grafting rate. © 2006 Wiley Periodicals, Inc. J Appl Polym Sci 102: 5884–5889, 2006 相似文献
995.
α—呋喃丙酸酯香料的合成研究 总被引:2,自引:0,他引:2
以糠醛为原料 ,通过三步反应合成了α-呋喃丙酸甲酯、乙酯、正丙酯、异丙酯、正丁酯、正戊酯等六种呋喃丙酸酯香料。此外 ,通过正交实验对呋喃丙酸甲酯的合成条件进行了优化。 相似文献
996.
Deutsch–Jozsa algorithm has been implemented via quantum adiabatic evolutions by Das et al. (Phys Rev A 65:062310, 2002) and Wei et al. (Phys Lett A 354:271, 2006). In the latter literature, the authors have shown a modified version of the adiabatic evolution which can improve the performance of the algorithm of S. Das et al’s to constant time. In this paper, we also improve the algorithm of S. Das et al’s in a constant time but by using a different construction of adiabatic evolution, i.e., adding ancillary qubits. The algorithm in this paper provides an alternative option to potential users. 相似文献
997.
In this paper, we first uncover a fact that a partial adiabatic quantum search with \(O(\sqrt{N/M})\) time complexity is in fact optimal, in which \(N\) is the total number of elements in an unstructured database, and \(M\) ( \(M\ge 1\) ) of them are the marked ones(one) \((N\gg M)\) . We then discuss how to implement a partial adiabatic search algorithm on the quantum circuit model. From the implementing procedure on the circuit model, we can find out that the approximating steps needed are always in the same order of the time complexity of the adiabatic algorithm. 相似文献
998.
Jakobi et al. for the first time proposed a novel and practical quantum private query (QPQ) protocol based on SARG04 (Scarani et al. in Phys Rev Lett 92:057901, 2004) quantum key distribution protocol (Jakobi et al. in Phys Rev A 83:022301, 2011). Gao et al. generalized Jakobi et al’s protocol and proposed a flexible QPQ protocol (Gao et al. in Opt Exp 20(16):17411–17420, 2012). When $\theta <\pi /4$ , Gao et al’s protocol exhibits better database security than Jakobi et al’s protocol, but has a higher probability with which Bob can correctly guess the address of Alice’s query. In this paper, we propose a flexible B92-based QPQ protocol. Although SARG04 protocol is a modification of B92 protocol and can be seen as a generalization of B92 protocol, our protocol shows different advantages from Gao et al’s protocol. It can simultaneously obtain better database security and a lower probability with which Bob can correctly guess the address of Alice’s query when $\theta <\pi /4$ . By introducing entanglement, the proposed QPQ protocol is robust against channel-loss attack, which also implies lower classical communication complexity. Similar to Gao et al’s protocol, it is flexible, practical, and robust against quantum memory attack. 相似文献
999.
Guangyong Sun Xueguan Song Seokheum Baek Qing Li 《Structural and Multidisciplinary Optimization》2014,49(6):897-913
Deterministic optimization has been successfully applied to a range of design problems involving foam-filled thin-walled structures, and to some extent gained significant confidence for the applications of such structures in automotive, aerospace, transportation and defense industries. However, the conventional deterministic design could become less meaningful or even unacceptable when considering the perturbations of design variables and noises of system parameters. To overcome this drawback, a robust design methodology is presented in this paper to address the effects of parametric uncertainties of foam-filled thin-walled structure on design optimization, in which different sigma criteria are adopted to measure the variations. The Kriging modeling technique is used to construct the corresponding surrogate models of mean and standard deviation for different crashworthiness criteria. A sequential sampling approach is introduced to improve the fitness accuracy of these surrogate models. Finally, a gradient-based sequential quadratic program (SQP) method is employed from 20 different initial points to obtain a quasi-global robust optimum solution. The optimal solutions were verified by using the Monte Carlo simulation. The results show that the presented robust optimization method is fairly effective and efficient, the crashworthiness and robustness of the foam-filled thin-walled structure can be improved significantly. 相似文献
1000.
Current research still cannot effectively prevent an inference attacker from inferring privacy information for k-anonymous data sets. To solve the issue, we must first study all kinds of aggressive reasoning behaviors and process for the attacker thoroughly. Our work focuses on describing comprehensively the inference attack and analyzing their privacy disclosures for k-anonymous data sets. In this paper, we build up a privacy inference graph based on attack graph theory, which is an extension of attack graph. The privacy inference graph describes comprehensively the inference attack in k-anonymous databases by considering attacker background knowledge and external factors. In the privacy inference graph, we introduce a concept of valid inference path to analyze the privacy disclosures in face of inference attack. According to both above, we design an algorithm to compute the n-valid inference paths. These paths can deduce some privacy information resulting in privacy disclosure. Moreover, we study the optimal privacy strategies to resist inference attack by key attribute sets and valid inference paths in the attack graph. An approximate algorithm is designed to obtain the approximate optimal privacy strategy set. At last, we prove the correctness in theory and analyze the performance of the approximate algorithm and their time complexity. 相似文献