首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12317篇
  免费   1137篇
  国内免费   595篇
电工技术   183篇
综合类   704篇
化学工业   2185篇
金属工艺   863篇
机械仪表   252篇
建筑科学   508篇
矿业工程   305篇
能源动力   209篇
轻工业   4202篇
水利工程   169篇
石油天然气   774篇
武器工业   185篇
无线电   381篇
一般工业技术   815篇
冶金工业   890篇
原子能技术   80篇
自动化技术   1344篇
  2024年   81篇
  2023年   214篇
  2022年   352篇
  2021年   389篇
  2020年   434篇
  2019年   420篇
  2018年   393篇
  2017年   478篇
  2016年   431篇
  2015年   448篇
  2014年   633篇
  2013年   726篇
  2012年   798篇
  2011年   910篇
  2010年   690篇
  2009年   692篇
  2008年   603篇
  2007年   789篇
  2006年   642篇
  2005年   569篇
  2004年   475篇
  2003年   384篇
  2002年   353篇
  2001年   305篇
  2000年   280篇
  1999年   248篇
  1998年   181篇
  1997年   181篇
  1996年   178篇
  1995年   148篇
  1994年   139篇
  1993年   85篇
  1992年   90篇
  1991年   67篇
  1990年   53篇
  1989年   39篇
  1988年   27篇
  1987年   26篇
  1986年   21篇
  1985年   19篇
  1984年   16篇
  1983年   8篇
  1982年   9篇
  1981年   4篇
  1980年   3篇
  1979年   4篇
  1977年   3篇
  1975年   2篇
  1961年   2篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
添加剂组成对通用内燃机油性能的影响   总被引:1,自引:0,他引:1  
赵明红 《润滑油》2002,17(5):44-47
通过相关模拟试验,分析研究了添加剂组成对通用内燃机油的抗磨性能,抗氧化性能以及清净分散性能的影响。  相似文献   
2.
Aiming at preparation of shape memory alloys (SMAs), we explored the SHS of Cu1 − x Zn1 − y Al1 − z alloys (0.29 < x < 0.30, 0.74 < y < 0.75, and 0.83 < z < 0.96). The most pronounced shape memory effect was exhibited by the alloys of the following compositions (wt %): (1) Cu(70.6)Zn(25.4)Al(4.0), (2) Cu(70.1)Zn(25.9)Al(4.0), and (3) Cu(69.9)Zn(26.1)Al(4.0). The effect of process parameters on the synthesis of CuZnAl alloys was studied by XRD, optical microscopy, and scanning electron microscopy (SEM). The grain size of CuZnAl was found to depend on the relative amount of the primary CuZn and AlZn phases. Changes in the transformation temperature and heat of transformation are discussed in terms of ignition intensity and compaction. Mechanism of the process depends on the level of the temperature attained relative to the melting point of components. At the melting point of AlZn, the process is controlled by the solid-state diffusion of AlZn into a product layer. The ignition temperature for this system depends on the temperature of the austenite-martensite transformation in CuZnAl alloys. The composition and structure of the products was found to markedly depend on process parameters. The SHS technique has been successfully used to prepare a variety of SMAs.   相似文献   
3.
Buffalo milk Cheddar cheese samples of different ages were analysed for compositional attributes (CA), ripening indices (RI) and Instron Textural Profile (ITP). All samples were compositionally alike, except for pH and salt-in-moisture (SM) contents. RI showed significant variations. CA and RI showed highly significant correlations within themselves and with each other, except for moisture with pH, SM with moisture, MNFS, Fat and FDM and Fat with MNFS. The ITPs of cheeses showed significant variations and had highly significant intercorrelations indicating their interdependence. CA (except moisture and MNFS) and RI showed a highly significant correlationship with ITPs. Moisture content showed a highly significant correlationship with all ITPs, except cohesiveness and springiness, where it was significant. MNFS content showed significant correlations only with hardness and brittleness. Stepwise regression analysis revealed that MI was the most predominant factor influencing cheese texture, followed by pH, SM, FDM and TVFA. Knowing Ca and RI, the textural properties of cheeses can be forecast through mathematical equations. Similarly the age of cheese can also be predicted if RI and/or textural properties are known.  相似文献   
4.
钨系延期药预点火反应机理研究   总被引:7,自引:3,他引:4  
通过程控升温模拟点火条件,根据DSC图谱分析,找出主要反应区的温度范围。研究结果表明,钨系延期药预点火反应是一个真正的固-固反应。  相似文献   
5.
Tomato seed oil was extracted with supercritical carbon dioxide in a semibatch-flow extractor within the temperature range 313–343 K and the pressure range 10.8–24.5MPa. The extraction rates increased with pressure, but decreased with temperature increase because of the variation in solvent density and resultant differences in oil solubility. The fatty acid composition of the extracted oil was similar to that of soybean oil.  相似文献   
6.
祝玉杰  匡奕九 《润滑油》1996,11(5):50-53
采用独特的分离方法和途径,综合使用多种质谱分析技术,如电子轰击谱(EI/MS)、场解吸谱(FD/MS)、快速原子轰击谱(FAB/MS)、色/质联用等,对高档齿轮油的主剂-含磷极压剂的结构组成进行了较为详尽的分析研究,提出了复酯胺盐的结构组成。  相似文献   
7.
8.
康山金矿地质地球化学特征及其成因   总被引:3,自引:1,他引:2  
范宏瑞  谢奕汉 《黄金》1994,15(3):1-6
康山金矿产在豫西熊耳山古隆起区的结晶基底太华群和盖层中元古界熊耳群地层接触界面附近,矿体严格受构造破碎蚀变带控制。流体包裹体,稳定同位素等研究表明,成矿物质来自太华群变质岩,成矿流体的性质与变质热液截然不同,而与花岗岩浆热液相近似。该矿床的形成与燕山期发生的同构造-花岗岩浆期热液活动有关,金沉淀成矿阶段有大气水的混入。  相似文献   
9.
高放废液化学成分分析   总被引:3,自引:0,他引:3  
概述了高放废液中25种阳离子、5种阴离子以及总蒸残物、总氧化物、密度和游离酸的分析方法。对核燃料后处理高放废液进行取样分析,其主要化学成分采用两种以上不同原理的方法作对比测定,结果相互符合情况良好,为高放废液处理处置研究设计,提供了完整、准确的基础数据。  相似文献   
10.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号