全文获取类型
收费全文 | 48047篇 |
免费 | 6159篇 |
国内免费 | 3783篇 |
专业分类
电工技术 | 2384篇 |
技术理论 | 6篇 |
综合类 | 3914篇 |
化学工业 | 12287篇 |
金属工艺 | 1436篇 |
机械仪表 | 3601篇 |
建筑科学 | 4802篇 |
矿业工程 | 1146篇 |
能源动力 | 5105篇 |
轻工业 | 5205篇 |
水利工程 | 1314篇 |
石油天然气 | 1527篇 |
武器工业 | 346篇 |
无线电 | 2900篇 |
一般工业技术 | 5499篇 |
冶金工业 | 1934篇 |
原子能技术 | 1150篇 |
自动化技术 | 3433篇 |
出版年
2024年 | 260篇 |
2023年 | 902篇 |
2022年 | 1682篇 |
2021年 | 2112篇 |
2020年 | 1988篇 |
2019年 | 1945篇 |
2018年 | 1754篇 |
2017年 | 1754篇 |
2016年 | 1923篇 |
2015年 | 1865篇 |
2014年 | 2749篇 |
2013年 | 3356篇 |
2012年 | 3042篇 |
2011年 | 3508篇 |
2010年 | 2574篇 |
2009年 | 2558篇 |
2008年 | 2440篇 |
2007年 | 2953篇 |
2006年 | 2678篇 |
2005年 | 2502篇 |
2004年 | 2012篇 |
2003年 | 1891篇 |
2002年 | 1522篇 |
2001年 | 1222篇 |
2000年 | 1011篇 |
1999年 | 839篇 |
1998年 | 795篇 |
1997年 | 687篇 |
1996年 | 578篇 |
1995年 | 512篇 |
1994年 | 402篇 |
1993年 | 343篇 |
1992年 | 305篇 |
1991年 | 214篇 |
1990年 | 201篇 |
1989年 | 172篇 |
1988年 | 125篇 |
1987年 | 96篇 |
1986年 | 88篇 |
1985年 | 64篇 |
1984年 | 85篇 |
1983年 | 52篇 |
1982年 | 37篇 |
1981年 | 60篇 |
1980年 | 27篇 |
1979年 | 11篇 |
1975年 | 4篇 |
1966年 | 7篇 |
1959年 | 16篇 |
1951年 | 31篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
151.
Branched polyacrylonitrile (PAN) was prepared through a self‐condensing vinyl copolymerization of acrylonitrile and 2‐(2‐bromopropionyloxy)ethyl acrylate (BPEA). The branched architecture of the product was confirmed by NMR spectra and the average degree of branching (DB ) was estimated. Through a comparison of the intrinsic viscosity of the product with that of its linear analogue, the contraction factor g′ was calculated. It was found that the viscosity of the branched PAN was obviously lower that that of linear PAN. © 2008 Wiley Periodicals, Inc. J Appl Polym Sci, 2008 相似文献
152.
O. L. Perevozchikova V. G. Tul'chinskii A. V. Kharchenko 《Cybernetics and Systems Analysis》2003,39(4):501-508
A statistical learning model is considered within the framework of the theory of uniform convergence of frequencies of errors in the case where the convergence is violated as a result of increasing the informativeness of training examples. Drawbacks of nonconstructive refinements of Vapnik-Chervonenkis estimates based on an assumption on the distribution law of violations are shown. A new approach to obtaining constructive estimates for mass data sets is proposed. 相似文献
153.
154.
155.
基于USB数据同步采集设计方案 总被引:6,自引:0,他引:6
介绍了USB在数据同步传输方面的可行性及其在同步传输方面的优点,合理解决了数据采集的同步性问题,和以往的采集方法相比,具有高速、高精度、多路同步采集及实时处理等特点,可广泛地应用于工业等各方面的数据测试系统中。 相似文献
156.
Gerda C. Glaeser 《Thin solid films》2007,515(15):5964-5967
Fluorescent photon down conversion for the improvement of the blue response of ZnO/CdS/Cu(In,Ga)Se2 heterojunction solar cells and modules is investigated. Fluorescent dyes of the series Lumogen® F are analyzed by optical transmission and reflection as well as by photoluminescence measurements. A spectral transfer matrix formalism is introduced that allows to predict the suitability of a luminescent dye as a down-converter for a given solar cell from its absorption/emission properties. We find that Lumogen® F Violet 570 and Lumogen® F Yellow 083 as well as a combination of both yields improvements for Cu(In,Ga)Se2 solar modules. Particularly, we find that the short circuit current density of a Cu(In,Ga)Se2 mini-module is improved by 1.5 mA cm− 2 when applying a varnish with a combination of Lumogen® F Violet and Yellow. About 0.5 mA cm− 2 of this improvement is due to a reduced overall reflectance and an improvement of 1 mA cm− 2 results from the frequency conversion by the dyes. 相似文献
157.
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer
(OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a
new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel
technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the
design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general
portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is
the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting
mobile agents not only is possible, but also can be implemented efficiently.
This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval
Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399
and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper
was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003.
Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position
at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical
Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases,
and wireless networks. On the theoretical side, he is interested in cryptography and game theory.
Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile
computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS)
at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received
his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998
and 2001). 相似文献
158.
大体积承台混凝土施工 总被引:3,自引:3,他引:0
阐述了东莞水道特大桥主桥承台大体积混凝土浇筑施工工艺 ,及施工中的注意事项 ,从分层的厚度、表面处理等方面 ,提出了采用泵送混凝土浇筑施工中质量弊病的预防措施 相似文献
159.
This article presents results from a numerical study of pulsating jet impingement heat transfer. The motivation is to seek conditions offering a significant enhancement compared to steady flow impingement drying. The CFD software package FLUENT was used for simulating slot-type pulsating jet impingement flows with confinement. The parameter study included velocity amplitude ratio, mean jet velocity, and pulsation frequency. The distance from nozzle exit to surface was three times the hydraulic diameter of the nozzle. The Reynolds number based on the nozzle hydraulic diameter and jet temperature was 2,460 with a mean jet velocity of 30 m/s, which is the base case of the numerical experiments. Results showed that time-averaged surface heat transfer increased with increasing velocity amplitude for the same mean jet velocity. Large velocity amplitudes helped enhance heat transfer by two mechanisms: high jet velocity during the positive cycle and strong recirculating flows during the negative cycle. For the cases with different mean jet velocities but the same maximum velocity, time-averaged surface heat flux decreased with decreasing mean jet velocity. As for the effects of pulsation frequency, with high-velocity amplitude ratio, time-averaged surface heat fluxes were at the same level regardless of frequency. However, at low-velocity amplitude ratio, high frequency caused stronger recirculating flows resulting in greater heat transfer compared to the cases with a lower frequency. 相似文献
160.
Two experiments examined the disruption of feature-based selection in triple-conjunction search at multiple target transfers. In Experiment 1, after 10 training sessions, a new target possessing previous distractor features was introduced. This produced disruption in RT and fixation number, but no disruption in feature-based selection. Specifically, there was a tendency to fixate objects sharing the target's contrast polarity and shape and this did not change even upon transfer to the new target. In Experiment 2, 30 training sessions were provided with three target transfers. At the first transfer, the results replicated Experiment 1. Subsequent transfers did not produce disruption on any measure. These findings are discussed in terms of strength theory, Guided Search, rule-based approaches to perceptual learning, and the area activation model. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献