全文获取类型
收费全文 | 15196篇 |
免费 | 938篇 |
国内免费 | 502篇 |
专业分类
系统科学 | 1420篇 |
丛书文集 | 245篇 |
教育与普及 | 194篇 |
理论与方法论 | 304篇 |
现状及发展 | 910篇 |
研究方法 | 46篇 |
综合类 | 13515篇 |
自然研究 | 2篇 |
出版年
2024年 | 77篇 |
2023年 | 134篇 |
2022年 | 176篇 |
2021年 | 221篇 |
2020年 | 141篇 |
2019年 | 73篇 |
2018年 | 805篇 |
2017年 | 833篇 |
2016年 | 543篇 |
2015年 | 276篇 |
2014年 | 319篇 |
2013年 | 286篇 |
2012年 | 567篇 |
2011年 | 1293篇 |
2010年 | 1153篇 |
2009年 | 842篇 |
2008年 | 932篇 |
2007年 | 1260篇 |
2006年 | 392篇 |
2005年 | 524篇 |
2004年 | 413篇 |
2003年 | 374篇 |
2002年 | 327篇 |
2001年 | 299篇 |
2000年 | 303篇 |
1999年 | 489篇 |
1998年 | 459篇 |
1997年 | 498篇 |
1996年 | 437篇 |
1995年 | 348篇 |
1994年 | 320篇 |
1993年 | 275篇 |
1992年 | 283篇 |
1991年 | 227篇 |
1990年 | 224篇 |
1989年 | 185篇 |
1988年 | 142篇 |
1987年 | 112篇 |
1986年 | 59篇 |
1985年 | 9篇 |
1984年 | 1篇 |
1978年 | 2篇 |
1968年 | 1篇 |
1967年 | 1篇 |
1957年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
以Pb(OOCCH3)2·3H2O,Sc(OOCCH3)3·xH2O和Ta(OC2H5)5为原材料,用SolGel方法在Pt/Ti/SO2/Si(100)基片上成功地制备出厚度达1.5μm,无裂纹的PbSc0.5Ta0.5O3(PST)铁电薄膜.对(220)主晶向生长的PST薄膜分别在10~20min、650~800℃范围内进行热处理,结果表明:热处理温度在750℃时,PST薄膜转变为较为完整的ABO3型钙钛矿晶相结构,更高的温度将提高晶粒在(220)方向的取向度.实验发现,最佳热处理条件应为750℃×15min,该条件下制备的PST铁电薄膜呈蓝黑色,表面光亮. 相似文献
992.
地铁屏蔽门样机的性能测试 总被引:3,自引:0,他引:3
根据相关的研究成果、工程经验、文献及标准,确定了地铁屏蔽门性能测试的样机模型组成、测试项目及测试标准.测试项目包括活动门运动性能测试、系统测试、寿命试验、电磁兼容性能和绝缘试验.其中活动门运动性能测试包括动能、运动速度曲线、关门力、手动开门力、关/开门时间几方面,系统测试包括模拟信号控制门动作、系统功能、障碍物检测及重开门几方面.该测试方法对国产化地铁车站屏蔽门的检验和测试,特别是设备的电磁兼容性能测试,有实用价值. 相似文献
993.
胡传安 《武汉科技大学学报(自然科学版)》1994,(3)
振动消除焊接件和铸件中残余应力的方法不仅以可完成热处理除应力的工作,而且做得更快、更省费用和更便当,它已被成功地用于发达国家的多数工业领域。本文阐述了这一先进方法的优点,并在用焊接试件作大量实验的基础上探索各主要振动参数与处理效果的关系,旨在促进这一有效技术在我国的广泛应用。 相似文献
994.
A number of recently evolved animals possess poison glands for feeding and/or defense.However,examples of such animals are rare in the fossil record.We report a fossil arthropod Isoxys curvirostratus from the Early Cambrian Chengjiang biota of China.This species is regarded as the oldest known venomous arthropod based on the presence of venomous glands in its head region.The adult animal is 2-5 cm long and the body is covered entirely with a carapace.The presence of large stalk eyes and a pair of stout grasping appendages with a terminal spine suggest it was raptorial.Interestingly,the two pear-shaped,three-dimensionally preserved objects that are present in the head region and at the base of the grasping appendages closely resemble the venom glands of some living arthropods in size,shape,and position.These features indicate that the presence of venomous predators could date back 520 million years.Furthermore,our observations suggest that the feeding strategies and organs adapted for this purpose had already reached a high level of diversity and anatomical sophistication in the Early Cambrian ecosystems. 相似文献
995.
In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold
decryption scheme (IDTDS) is proposed, which is provably secure against adaptive chosen ciphertext attack under the computational
bilinear Diffie-Hellman (CBDH) problem assumption in the random oracle. The pubic checkability of ciphertext in the IDTDS
is given by simply creating a signed ElGamal encryption instead of a noninteractive zero-knowledge proof. Furthermore, we
introduce a modified verifiable pairing to ensure all decryption shares are consistent. Our scheme is more efficient in verification
than the schemes considered previously. 相似文献
996.
Bi2Se3 thin films were electrochemically deposited on Ti and indium tin oxide-coated glass substrates, respectively, at room temperature, using Bi(NO3)3·5H2O and SeO2 as starting materials in diluted HNO3 solution. A conventional three-electrode cell was used with a platinum sheet as a counter electrode, and a saturated calomel electrode was used as a reference electrode. The films were annealed in argon atmosphere. The influence of cold isostatic pressing before annealing on the microstructure and thermoelectric properties of the films was investigated. X-ray diffraction analysis indicates that the film grown on the indium tin oxide-coated glass substrate is pure rhombohedral Bi2Se3, and the film grown on the Ti substrate consists of both rhombohedral and orthorhombic Bi2Se3. 相似文献
997.
An approach of three-dimensional seismic ray tracing is presented, which is derived from adopting two-dimensional linear traveltime interpolation (LTI). By adjusting the forward process using the partition of grid interface, and backward step by considering more directions, the new approach is suitable for the application of three-dimensional models. The calculation results show that, with the same accuracy, the improved 3-D method is much faster than the method of traditional LTI directly applied in the three-dimensional case. 相似文献
998.
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources required for computation are relatively few. However, we find that the leakage of values A V and B V in the CLC protocol will make a man-in-the-middle attack feasible in practice, where A V and B V are the authentication information chosen by the server for the participants A and B. In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial CLC protocol. Meanwhile, we allow that the participants choose their own passwords by themselves, thus avoiding the danger that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that of the CLC protocol. 相似文献
999.
胡光华 《国外科技新书评介》2007,(8):12-13
第17届广义相对论与万有引力国际会议(GR17)于2004年7月18日至23日在爱尔兰共和国首都都柏林举行。如同GR系列以前的历次会议那样,它是在广义相对论与万有引力国际协会(ISGRG)的赞助下举办的。这本权威性的会议录提供了万有引力物理学及相关数学领域最新进展的概述,以及对当前成:就的综述和对未来工作的展望。由于本书的撰稿人都是各自领域的领军人物,这本会议录加入GR系列会议录丛书是当之无愧的。该系列会议构成了广义相对论与万有引力领域中最重要的会议。 相似文献
1000.
广西计划系统纵向网安全体系的建设必须遵循整体性,实用性,动态化,长远安全预期,经济性和技术与管理相结合等原则,通过完成物理安全、网络安全,病毒防范以及安全管理等部分工作,初步形成了系统的安全体系结构。在此基础上,数字证书认证中心和网络安全检测和监控系统的建立,使网络安全体系更加完善。 相似文献