首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6870篇
  免费   810篇
  国内免费   492篇
电工技术   528篇
技术理论   3篇
综合类   559篇
化学工业   596篇
金属工艺   291篇
机械仪表   280篇
建筑科学   452篇
矿业工程   85篇
能源动力   141篇
轻工业   178篇
水利工程   136篇
石油天然气   52篇
武器工业   17篇
无线电   981篇
一般工业技术   658篇
冶金工业   372篇
原子能技术   46篇
自动化技术   2797篇
  2024年   20篇
  2023年   98篇
  2022年   208篇
  2021年   259篇
  2020年   273篇
  2019年   191篇
  2018年   198篇
  2017年   204篇
  2016年   283篇
  2015年   291篇
  2014年   463篇
  2013年   524篇
  2012年   467篇
  2011年   654篇
  2010年   492篇
  2009年   447篇
  2008年   446篇
  2007年   490篇
  2006年   456篇
  2005年   294篇
  2004年   272篇
  2003年   198篇
  2002年   164篇
  2001年   133篇
  2000年   106篇
  1999年   82篇
  1998年   55篇
  1997年   53篇
  1996年   54篇
  1995年   25篇
  1994年   43篇
  1993年   29篇
  1992年   21篇
  1991年   20篇
  1990年   22篇
  1989年   14篇
  1988年   8篇
  1987年   13篇
  1986年   9篇
  1985年   10篇
  1984年   9篇
  1983年   6篇
  1982年   8篇
  1981年   8篇
  1978年   5篇
  1976年   8篇
  1974年   3篇
  1971年   5篇
  1965年   4篇
  1961年   4篇
排序方式: 共有8172条查询结果,搜索用时 15 毫秒
1.
Fog computing has emerged to support the requirements of IoT applications that could not be met by today’s solutions. Different initiatives have been presented to drive the development of fog, and much work has been done to improve certain aspects. However, an in-depth analysis of the different solutions, detailing how they can be integrated and applied to meet specific requirements, is still required. In this work, we present a unified architectural model and a new taxonomy, by comparing a large number of solutions. Finally, we draw some conclusions and guidelines for the development of IoT applications based on fog.  相似文献   
2.
Basins with various mineral resources coexisting and enriching often occupy an important strategic position. The exploration of various mineral resources is repetitive at present due to unshared data and imperfect management mechanism. This situation greatly increases the cost of energy exploitation in the country. Traditional data-sharing mode has several disadvantages, such as high cost, difficulty in confirming the right of data, and lack of incentive mechanism, which make achieving real data sharing difficult. In this paper, we propose a data-sharing mechanism based on blockchain and provide implementation suggestions and technical key points. Compared with traditional data-sharing methods, the proposed data-sharing mechanism can realize data sharing, ensure data quality, and protect intellectual property. Moreover, key points in the construction are stated in the case study section to verify the feasibility of the data-sharing system based on blockchain proposed in this paper.  相似文献   
3.
Context and objective: The aim of this study was to develop, characterize and evaluate a mucoadhesive caplet resulting from a polymeric blend (polymeric caplet) for intravaginal anti-HIV-1 delivery.

Materials and methods: Poly(lactic-co-glycolic) acid, ethylcellulose, poly(vinylalcohol), polyacrylic acid and modified polyamide 6, 10 polymers were blended and compressed to a caplet-shaped device, with and without two model drugs 3′-azido-3′-deoxythymidine (AZT) and polystyrene sulfonate (PSS). Thermal analysis, infrared spectroscopy and microscopic analysis were carried out on the caplets employing temperature-modulated DSC (TMDSC), Fourier transform infra-red (FTIR) spectrometer and scanning electron microscope, respectively. In vitro and in vivo drug release analyses as well as the histopathological toxicity studies were carried out on the drug-loaded caplets. Furthermore, molecular mechanics (MM) simulations were carried out on the drug-loaded caplets to corroborate the experimental findings.

Results and discussion: There was a big deviation between the Tg of the polymeric caplet from the Tg's of the constituent polymers indicating a strong interaction between constituent polymers. FTIR spectroscopy confirmed the presence of specific ionic and non-ionic interactions within the caplet. A controlled near zero-order drug release was obtained for AZT (20 d) and PSS (28 d). In vivo results, i.e. the drug concentration in plasma ranged between 0.012–0.332?mg/mL and 0.009–0.256?mg/mL for AZT and PSS over 1–28 d.

Conclusion: The obtained results, which were corroborated by MM simulations, attested that the developed system has the potential for effective delivery of anti-HIV-agents.  相似文献   
4.
Chitosan microspheres containing bromocresol green, cresol red, and phenolphthalein for corrosion detection, through pH change, are synthesized in order to be used in protective coatings for aluminium alloys. Microspheres containing corrosion detection species are characterized morphologically (SEM) and physico‐chemically (FTIR, TGA). Release studies (UV–vis) are performed in corrosion‐promoting conditions (pH, NaCl), and detection studies by immersion in media associated with corrosion activity while microspheres' sensing activity is evaluated visually. Electrochemical characterization of AA2024 substrates in the presence of chitosan spheres is performed to understand material performance, and a color change is observed as a result of local pH increase in cathodic areas when corrosion takes place. These findings can be correlated with the results from release studies and seem a promising approach for corrosion sensing purposes, not only because pH increase is possible to detect due to corrosion, but also because chitosan is considered an environmentally friendly material.  相似文献   
5.
The corrosion behavior of synthetic Cu–Sn bronze alloys with six different Sn contents was examined through an electrochemical test and a synthetic test in a simulated corrosive medium. The mechanism of corrosion and the morphology of the corroded surfaces were characterized through field emission scanning electron microscopy equipped with energy-dispersive spectroscopy. At the corrosion potential, the corrosion behavior appears to be determined by the charge transfer step and the diffusion process. It was found that the bronze-IV (Cu–26.8Sn) specimen exhibited the best corrosion resistance, as evidenced by a low corrosion current density and a high impedance. This improvement resulted from an increase in the content of the Cu–Sn solid solution in the alloy, which was conducive to forming a relatively more protective passive film on the surface of the bronze alloy. This finding would be valuable in the anticorrosion protection of archeological artefacts after their excavation.  相似文献   
6.
Berkeley [Minds Machines 10 (2000) 1] described a methodology that showed the subsymbolic nature of an artificial neural network system that had been trained on a logic problem, originally described by Bechtel and Abrahamsen [Connectionism and the mind. Blackwells, Cambridge, MA, 1991]. It was also claimed in the conclusion of this paper that the evidence was suggestive that the network might, in fact, count as a symbolic system. Dawson and Piercey [Minds Machines 11 (2001) 197] took issue with this latter claim. They described some lesioning studies that they argued showed that Berkeley’s (2000) conclusions were premature. In this paper, these lesioning studies are replicated and it is shown that the effects that Dawson and Piercey rely upon for their argument are merely an artifact of a threshold function they chose to employ. When a threshold function much closer to that deployed in the original studies is used, the significant effects disappear.  相似文献   
7.
可持续发展水文水资源信息共享探索及实践   总被引:10,自引:1,他引:9  
本文通过我国可持续发展水文水资源信息共享需求的现状分析,剖析了可持续发展水文水资源信息共享存在的问题,研究了建立我国可持续发展信息共享的法规、标准体系和信息共享技术,并提出通过水文水资源信息1∶100万空间化、标准化改造、元数据创建发布搭建可持续发展信息共享交互平台,实现可持续发展水文水资源信息的空间化集成和信息共享服务。  相似文献   
8.
开关电源的平均电流自动均流技术   总被引:1,自引:0,他引:1  
针对多个开关电源并联时易出现负载电流在各模块间分配不均的现象,介绍了常用的负载电流自动均流法——平均电流自动均流法及其工作特性。并针对其存在母线电压降低的缺陷,提出了一种改进的平均电流自动均流方法,经试验证明均流精度比较高。  相似文献   
9.
周福才  林龙  王金营  徐剑 《通信学报》2006,27(10):69-73
利用椭圆曲线离散问题对数问题的难解性,给出了基于椭圆曲线密码体制的(t,n)门限秘密共享方案。基于门限秘密共享方案一般分为需要SDC和不需要SDC两类,在分布式环境下,一个被所有成员信任的SDC并不存在,不需要SDC的门限秘密共享方案的安全性得到很大的提高,该方案中由组成员共同生成群公钥和私有密钥。并给出了当新成员加入时,无SDC下的周期密钥分片的更新方案。还给出了一个本方案数据实例,最后对本方案的安全性进行了分析。  相似文献   
10.
徐玉 《世界电信》2004,17(10):29-32
主要对各国3G许可证与使用技术标准的抽绑政策.各国对2G/3G网络漫游的管制规定。以及3G网络之间共享的种类及实施方式等方面做了详尽的讲解,并进行比较和分析。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号