全文获取类型
收费全文 | 135041篇 |
免费 | 6067篇 |
国内免费 | 3677篇 |
专业分类
电工技术 | 4184篇 |
技术理论 | 3篇 |
综合类 | 6636篇 |
化学工业 | 19708篇 |
金属工艺 | 7660篇 |
机械仪表 | 5897篇 |
建筑科学 | 6702篇 |
矿业工程 | 2070篇 |
能源动力 | 2721篇 |
轻工业 | 7628篇 |
水利工程 | 2306篇 |
石油天然气 | 2970篇 |
武器工业 | 372篇 |
无线电 | 15295篇 |
一般工业技术 | 21922篇 |
冶金工业 | 4799篇 |
原子能技术 | 964篇 |
自动化技术 | 32948篇 |
出版年
2024年 | 280篇 |
2023年 | 989篇 |
2022年 | 1679篇 |
2021年 | 2298篇 |
2020年 | 1778篇 |
2019年 | 1696篇 |
2018年 | 15973篇 |
2017年 | 15067篇 |
2016年 | 11418篇 |
2015年 | 2797篇 |
2014年 | 2827篇 |
2013年 | 3201篇 |
2012年 | 6279篇 |
2011年 | 12625篇 |
2010年 | 11292篇 |
2009年 | 8321篇 |
2008年 | 9509篇 |
2007年 | 10330篇 |
2006年 | 2672篇 |
2005年 | 3274篇 |
2004年 | 2964篇 |
2003年 | 3532篇 |
2002年 | 3787篇 |
2001年 | 2792篇 |
2000年 | 1628篇 |
1999年 | 1205篇 |
1998年 | 725篇 |
1997年 | 629篇 |
1996年 | 642篇 |
1995年 | 480篇 |
1994年 | 390篇 |
1993年 | 266篇 |
1992年 | 229篇 |
1991年 | 155篇 |
1990年 | 112篇 |
1989年 | 82篇 |
1988年 | 78篇 |
1987年 | 37篇 |
1986年 | 37篇 |
1985年 | 31篇 |
1968年 | 43篇 |
1967年 | 33篇 |
1966年 | 42篇 |
1965年 | 45篇 |
1959年 | 40篇 |
1958年 | 37篇 |
1957年 | 36篇 |
1956年 | 34篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Within the framework of the effective-mass approximation and the dipole approximation, considering the three-dimensional confinement of the electron and hole and the strong built-in electric field(BEF) in strained wurtzite Zn O/Mg0:25Zn0:75O quantum dots(QDs), the optical properties of ionized donor-bound excitons(D+, X)are investigated theoretically using a variational method. The computations are performed in the case of finite band offset. Numerical results indicate that the optical properties of(D+, X) complexes sensitively depend on the donor position, the QD size and the BEF. The binding energy of(D+, X) complexes is larger when the donor is located in the vicinity of the left interface of the QDs, and it decreases with increasing QD size. The oscillator strength reduces with an increase in the dot height and increases with an increase in the dot radius. Furthermore, when the QD size decreases, the absorption peak intensity shows a marked increment, and the absorption coefficient peak has a blueshift. The strong BEF causes a redshift of the absorption coefficient peak and causes the absorption peak intensity to decrease remarkably. The physical reasons for these relationships have been analyzed in depth. 相似文献
2.
3.
带关键字搜索的公钥加密(PEKS)是一种有用的加密原语,它允许用户将在加密数据上搜索的功能委托给不可信的第三方服务器,而不影响原始数据的安全性和隐私性。但是,由于缺乏对于数据的加密以及解密能力,PEKS方案不能单独进行使用,必须与标准的公钥加密方案(PKE)相结合。因此,Baek等人在2006年引入了一种新的加密原语,称为结合PKE和PEKS的加密方案(PKE+PEKS),它同时提供了PKE和PEKS的功能。目前,已有文献提出了几种PKE+PEKS方案。然而,他们都没有考虑关键字猜测攻击的问题。本文提出一个新的高效且能够抵抗关键字猜测攻击的PKE+PEKS方案,与已有方案相比,该方案在性能上有很大的提升,并且在生成关键字和数据密文时,不需要使用双线性对,极大地降低了计算和存储成本。安全性分析表明,本文中所提出的方案能够满足密文隐私安全性、陷门不可区分性和抗关键字猜测攻击的安全性。效率分析表明,本分提出的方案更加高效。 相似文献
4.
Mobile software applications have to cope with a particular environment that involves small size, limited resources, high autonomy requirements, competitive business models and many other challenges. To provide development guidelines that respond to these needs, several practices have been introduced; however, it is not clear how these guidelines may contribute to solve the issues present in the mobile domain. Furthermore, the rapid evolution of the mobile ecosystem challenges many of the premises upon which the proposed practices were designed. In this paper, we present a survey of the literature on software assurance practices for mobile applications, with the objective of describing them and assessing their contribution and success. We identified, organized and reviewed a body of research that spans in three levels: software development processes, software product assurance practices, and software implementation practices. By carrying out this literature survey, we reviewed the different approaches that researchers on Software Engineering have provided to address the needs that raise in the mobile software development arena. Moreover, we review the evolution of these practices, identifying how the constant changes and modernization of the mobile execution environment has impacted the methods proposed in the literature. Finally, we introduced discussion on the application of these practices in a real productive setting, opening an area for further research that may determine if practitioners have followed the proposed assurance paradigms. 相似文献
5.
6.
7.
8.
Variations of Incomplete Open Cubes is the major project by the twentieth-century conceptual artist Sol LeWitt. In this paper we interpret the enumerative component of the project as embeddings of graphs. This formulation permits use of an algorithm to check the completeness of the list of the structures produced by the artist. Our conclusion is that the artist found the correct number of structures (that is, 122), but that his list contains a mistake in the presentation of a pair of incomplete cubes, a discovery that appears not to have been noted before. 相似文献
9.
10.