全文获取类型
收费全文 | 12317篇 |
免费 | 1137篇 |
国内免费 | 595篇 |
专业分类
电工技术 | 183篇 |
综合类 | 704篇 |
化学工业 | 2185篇 |
金属工艺 | 863篇 |
机械仪表 | 252篇 |
建筑科学 | 508篇 |
矿业工程 | 305篇 |
能源动力 | 209篇 |
轻工业 | 4202篇 |
水利工程 | 169篇 |
石油天然气 | 774篇 |
武器工业 | 185篇 |
无线电 | 381篇 |
一般工业技术 | 815篇 |
冶金工业 | 890篇 |
原子能技术 | 80篇 |
自动化技术 | 1344篇 |
出版年
2024年 | 81篇 |
2023年 | 214篇 |
2022年 | 352篇 |
2021年 | 389篇 |
2020年 | 434篇 |
2019年 | 420篇 |
2018年 | 393篇 |
2017年 | 478篇 |
2016年 | 431篇 |
2015年 | 448篇 |
2014年 | 633篇 |
2013年 | 726篇 |
2012年 | 798篇 |
2011年 | 910篇 |
2010年 | 690篇 |
2009年 | 692篇 |
2008年 | 603篇 |
2007年 | 789篇 |
2006年 | 642篇 |
2005年 | 569篇 |
2004年 | 475篇 |
2003年 | 384篇 |
2002年 | 353篇 |
2001年 | 305篇 |
2000年 | 280篇 |
1999年 | 248篇 |
1998年 | 181篇 |
1997年 | 181篇 |
1996年 | 178篇 |
1995年 | 148篇 |
1994年 | 139篇 |
1993年 | 85篇 |
1992年 | 90篇 |
1991年 | 67篇 |
1990年 | 53篇 |
1989年 | 39篇 |
1988年 | 27篇 |
1987年 | 26篇 |
1986年 | 21篇 |
1985年 | 19篇 |
1984年 | 16篇 |
1983年 | 8篇 |
1982年 | 9篇 |
1981年 | 4篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1977年 | 3篇 |
1975年 | 2篇 |
1961年 | 2篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
添加剂组成对通用内燃机油性能的影响 总被引:1,自引:0,他引:1
通过相关模拟试验,分析研究了添加剂组成对通用内燃机油的抗磨性能,抗氧化性能以及清净分散性能的影响。 相似文献
2.
M. Guerioune Y. Amiour W. Bounour O. Guellati A. Benaldjia A. Amara N. E. Chakri M. Ali-Rachedi D. Vrel 《International Journal of Self-Propagating High-Temperature Synthesis》2008,17(1):41-48
Aiming at preparation of shape memory alloys (SMAs), we explored the SHS of Cu1 − x
Zn1 − y
Al1 − z
alloys (0.29 < x < 0.30, 0.74 < y < 0.75, and 0.83 < z < 0.96). The most pronounced shape memory effect was exhibited by the alloys of the following compositions (wt %): (1) Cu(70.6)Zn(25.4)Al(4.0),
(2) Cu(70.1)Zn(25.9)Al(4.0), and (3) Cu(69.9)Zn(26.1)Al(4.0). The effect of process parameters on the synthesis of CuZnAl
alloys was studied by XRD, optical microscopy, and scanning electron microscopy (SEM). The grain size of CuZnAl was found
to depend on the relative amount of the primary CuZn and AlZn phases. Changes in the transformation temperature and heat of
transformation are discussed in terms of ignition intensity and compaction. Mechanism of the process depends on the level
of the temperature attained relative to the melting point of components. At the melting point of AlZn, the process is controlled
by the solid-state diffusion of AlZn into a product layer. The ignition temperature for this system depends on the temperature
of the austenite-martensite transformation in CuZnAl alloys. The composition and structure of the products was found to markedly
depend on process parameters. The SHS technique has been successfully used to prepare a variety of SMAs.
相似文献
3.
Buffalo milk Cheddar cheese samples of different ages were analysed for compositional attributes (CA), ripening indices (RI) and Instron Textural Profile (ITP). All samples were compositionally alike, except for pH and salt-in-moisture (SM) contents. RI showed significant variations. CA and RI showed highly significant correlations within themselves and with each other, except for moisture with pH, SM with moisture, MNFS, Fat and FDM and Fat with MNFS. The ITPs of cheeses showed significant variations and had highly significant intercorrelations indicating their interdependence. CA (except moisture and MNFS) and RI showed a highly significant correlationship with ITPs. Moisture content showed a highly significant correlationship with all ITPs, except cohesiveness and springiness, where it was significant. MNFS content showed significant correlations only with hardness and brittleness. Stepwise regression analysis revealed that MI was the most predominant factor influencing cheese texture, followed by pH, SM, FDM and TVFA. Knowing Ca and RI, the textural properties of cheeses can be forecast through mathematical equations. Similarly the age of cheese can also be predicted if RI and/or textural properties are known. 相似文献
4.
钨系延期药预点火反应机理研究 总被引:7,自引:3,他引:4
通过程控升温模拟点火条件,根据DSC图谱分析,找出主要反应区的温度范围。研究结果表明,钨系延期药预点火反应是一个真正的固-固反应。 相似文献
5.
Bhupesh C. Roy Motonobu Goto & Tsutomu Hirose 《International Journal of Food Science & Technology》1996,31(2):137-141
Tomato seed oil was extracted with supercritical carbon dioxide in a semibatch-flow extractor within the temperature range 313–343 K and the pressure range 10.8–24.5MPa. The extraction rates increased with pressure, but decreased with temperature increase because of the variation in solvent density and resultant differences in oil solubility. The fatty acid composition of the extracted oil was similar to that of soybean oil. 相似文献
6.
采用独特的分离方法和途径,综合使用多种质谱分析技术,如电子轰击谱(EI/MS)、场解吸谱(FD/MS)、快速原子轰击谱(FAB/MS)、色/质联用等,对高档齿轮油的主剂-含磷极压剂的结构组成进行了较为详尽的分析研究,提出了复酯胺盐的结构组成。 相似文献
7.
8.
康山金矿地质地球化学特征及其成因 总被引:3,自引:1,他引:2
康山金矿产在豫西熊耳山古隆起区的结晶基底太华群和盖层中元古界熊耳群地层接触界面附近,矿体严格受构造破碎蚀变带控制。流体包裹体,稳定同位素等研究表明,成矿物质来自太华群变质岩,成矿流体的性质与变质热液截然不同,而与花岗岩浆热液相近似。该矿床的形成与燕山期发生的同构造-花岗岩浆期热液活动有关,金沉淀成矿阶段有大气水的混入。 相似文献
9.
高放废液化学成分分析 总被引:3,自引:0,他引:3
概述了高放废液中25种阳离子、5种阴离子以及总蒸残物、总氧化物、密度和游离酸的分析方法。对核燃料后处理高放废液进行取样分析,其主要化学成分采用两种以上不同原理的方法作对比测定,结果相互符合情况良好,为高放废液处理处置研究设计,提供了完整、准确的基础数据。 相似文献
10.
It has recently been shown that authenticated Byzantine agreement,
in which more than a third of the parties are corrupted, cannot be
securely realized under concurrent or parallel (stateless)
composition. This result puts into question any usage of
authenticated Byzantine agreement in a setting where many
executions take place. In particular, this is true for the whole
body of work of secure multi-party protocols in the case that a
third or more of the parties are corrupted. This is because these
protocols strongly rely on the extensive use of a broadcast
channel, which is in turn realized using authenticated Byzantine
agreement. We remark that it was accepted folklore that the use of
a broadcast channel (or authenticated Byzantine agreement) is
actually essential for achieving meaningful secure multi-party
computation whenever a third or more of the parties are corrupted.
In this paper we show that this folklore is false. We present a
mild relaxation of the definition of secure computation allowing
abort. Our new definition captures all the central security issues
of secure computation, including privacy, correctness and
independence of inputs. However, the novelty of the definition is
in decoupling the issue of agreement from these issues. We
then show that this relaxation suffices for achieving secure
computation in a point-to-point network. That is, we show that
secure multi-party computation for this definition can be achieved
for any number of corrupted parties and without a
broadcast channel (or trusted pre-processing phase as required for
running authenticated Byzantine agreement). Furthermore, this is
achieved by just replacing the broadcast channel in known
protocols with a very simple and efficient echo-broadcast
protocol. An important corollary of our result is the ability to
obtain multi-party protocols that remain secure under composition,
without assuming a broadcast channel. 相似文献