首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   29984篇
  免费   1932篇
  国内免费   1020篇
电工技术   358篇
技术理论   1篇
综合类   1957篇
化学工业   11973篇
金属工艺   632篇
机械仪表   423篇
建筑科学   1968篇
矿业工程   957篇
能源动力   231篇
轻工业   4274篇
水利工程   172篇
石油天然气   3063篇
武器工业   170篇
无线电   641篇
一般工业技术   2418篇
冶金工业   740篇
原子能技术   203篇
自动化技术   2755篇
  2024年   106篇
  2023年   238篇
  2022年   521篇
  2021年   560篇
  2020年   566篇
  2019年   500篇
  2018年   499篇
  2017年   718篇
  2016年   751篇
  2015年   785篇
  2014年   1335篇
  2013年   1414篇
  2012年   1878篇
  2011年   1991篇
  2010年   1477篇
  2009年   1576篇
  2008年   1429篇
  2007年   2081篇
  2006年   2116篇
  2005年   2002篇
  2004年   1742篇
  2003年   1563篇
  2002年   1315篇
  2001年   1177篇
  2000年   970篇
  1999年   829篇
  1998年   667篇
  1997年   470篇
  1996年   351篇
  1995年   336篇
  1994年   277篇
  1993年   202篇
  1992年   152篇
  1991年   97篇
  1990年   78篇
  1989年   72篇
  1988年   22篇
  1987年   25篇
  1986年   11篇
  1985年   6篇
  1984年   6篇
  1983年   3篇
  1982年   5篇
  1981年   3篇
  1980年   7篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1957年   1篇
  1951年   2篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
Polymer/Silica nanocomposite latex particles were prepared by emulsion polymerization of methyl methacrylate (MMA) with dimethylaminoethyl methacrylate (DM). The reaction was performed using a nonionic surfactant and in the presence of silica nanoparticles as the seed. The polymer‐coated silica nanoparticles with polymer content and number average particle sizes ranged from 32 to 93 wt % and 114–310 nm, respectively, were obtained depending on reaction conditions. Influences of some synthetic conditions such as MMA, DM, surfactant concentration, and the nature of initiator on the coating of the silica nanoparticles were studied. Electrostatic attraction between anionic surface of silica beads and cationic amino groups of DM is the main driving force for the formation of the nanocomposites. It was demonstrated that the ratio of DM/MMA is important factor in stability of the system. The particle size, polymer content, efficiency of the coating reaction, and morphology of resulted nanocomposite particles showed a dependence on the amount of the surfactant. Zeta potential measurements confirmed that the DM was located at the surface of the nanocomposites particles. Thermogravimeteric analysis indicated a relationship between the composition of polymer shell and polymer content of the nanocomposites. The nanocomposites were also characterized by FTIR and differential scanning calorimetry techniques. © 2008 Wiley Periodicals, Inc. J Appl Polym Sci, 2008  相似文献   
42.
The transitions and reactions involved in the thermal treatment of several commercial azodicarbonamides (ADC) in an inert atmosphere have been studied by dynamic thermogravimetry analysis (TGA), mass spectrometry and Fourier transform infrared (FTIR) spectroscopy. A pseudo‐mechanistic model, involving several competitive and non‐competitive reactions, has been suggested and applied to the correlation of the weight loss data. The model applied is capable of accurately representing the different processes involved, and can be of great interest in the understanding and quantification of such phenomena, including the simulation of the instantaneous amount of gases evolved in a foaming process. In addition, a brief discussion on the methodology related to the mathematical modeling of TGA data is presented, taking into account the complex thermal behaviour of the ADC. © 2007 Wiley Periodicals, Inc. J Appl Polym Sci, 2008  相似文献   
43.
综述了聚丙烯酸酯防水乳液的理论研究进展,重点评述了组合功能单体、优选乳化体系和进行粒子设计三方面的改性手段。  相似文献   
44.
Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various security issues. This paper proposes a method called Private Key Consignment to solve the problem of how to protect the data carried by mobile agents. It exploits new functionalities and mechanism provided by the trusted computing technology, and adopts both public key and symmetric key cryptographic means for data and key protection. The most notable feature of this method is that it protects the private key of the agent by consigning it to a tamper proof hardware, thus, enabling convenient and secure use of the private key. It provides a new scheme of mobile agents' data protection.  相似文献   
45.
The popularity of grid services has widened their application to numerous domains and increased the utilization of computational resources. In order to create more incentives for the resources owners to lease their resources and prevent users from wasting the resources, the introduction of a market-oriented grid is inevitable. However, the issues for the negotiation between service provider and consumer over the supply and demand of resources can be complex, with highly interdependent issues. In this research, a simulated automated negotiation mechanism including a co-evolutionary mechanism and a modified game theory approach is proposed, to assist them in reaching an agreement over the conflicting issues. In the proposed architecture, the co-evolution process is able to reduce the multiple dimensional search space into a two-dimension search space and identify the appropriate negotiation strategies for the negotiating agents to form a payoff matrix which can be used for the game theory related stage of their interaction. The multiple stage negotiation process is introduced to improve the negotiation result. In this paper, an application which requires a large amount of computational resources to process the data generated from mobile devises is used to demonstrate that the proposed system is able to resolve the conflicts and obtain a valid solution.  相似文献   
46.
Verifiable Distributed Oblivious Transfer and Mobile Agent Security   总被引:1,自引:0,他引:1  
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting mobile agents not only is possible, but also can be implemented efficiently. This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399 and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003. Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases, and wireless networks. On the theoretical side, he is interested in cryptography and game theory. Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS) at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998 and 2001).  相似文献   
47.
Tributyltin (TBT) released into seawater from ship hulls is a stable marine pollutant and obviously remains in marine environments. We isolated a TBT resistant marine Pseudoalteromonas sp. TBT1 from sediment of a ship’s ballast water. The isolate (109.3 ± 0.2 colony-forming units mL−1) adsorbed TBT in proportion to the concentrations of TBTCl externally added up to 3 mM, where the number of TBT adsorbed by a single cell was estimated to be 108.2. The value was reduced to about one-fifth when the lysozyme-treated cells were used. The surface of ethanol treated cells became rough, but the capacity of TBT adsorption was the same as that for native cells. These results indicate that the function of the cell surface, rather than that structure, plays an important role to the adsorption of TBT. The adsorption state of TBT seems to be multi-layer when the number of more than 106.8 TBT molecules is adsorbed by a single cell.  相似文献   
48.
A new type of polysiloxane modified polyurethane–acrylic hybrid emulsion was synthesized by solvent-free method and the polysiloxane was introduced into the soft segment of polyurethane chains using dihydroxybutyl-terminated polydimethylsiloxane (PDMS). The formed film from the hybrid emulsion could provide obviously higher water-resistance property. The preparation technologies such as the content of carboxy group and acrylic monomer, the rate and the time of emulsification were discussed systematically. The chain structure and the particle size were confirmed by the analysis of Fourier transform infrared spectroscopy and transmission electron microscopy, respectively. The effect of PDMS content on the water resistance and the mechanical property were investigated by absorbed water ratio, water contact angle and dynamic mechanical measurement.  相似文献   
49.
Intelligent multisensor surveillance systems consist of several types of sensors, which are installed on fixed and mobile devices. These components provide a huge quantity of information that has to be contrasted, correlated and integrated in order to recognize and react on special situations. These systems work in highly dynamic environments, with severe security and robustness requirements. All these characteristics imply the need for distributed solutions. In these solutions, scattered components can decide and act with some degree of autonomy (for instance, if they become isolated), or cooperate and coordinate for a complete tracking of special situations. In order to cope with these requirements and to better structure the solution, we have decided to design surveillance system control as a multiagent system. This is done by applying an agent-orientated methodology, which is assessed with concrete scenarios.  相似文献   
50.
钢水化学热法升温技术的研究   总被引:1,自引:0,他引:1  
喻淑仁  于学斌 《炼钢》1994,10(6):36-42,59
依据热力学原理,用计算机计算了某些元素与合金的氧化热效应。综述了各种上化学热法升温技术的应用效果。分析讨论了发热剂的类型,升温速度和热效率问题等。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号