全文获取类型
收费全文 | 381688篇 |
免费 | 40220篇 |
国内免费 | 23287篇 |
专业分类
电工技术 | 48068篇 |
技术理论 | 24篇 |
综合类 | 39808篇 |
化学工业 | 34719篇 |
金属工艺 | 12481篇 |
机械仪表 | 28418篇 |
建筑科学 | 28085篇 |
矿业工程 | 13062篇 |
能源动力 | 10856篇 |
轻工业 | 17403篇 |
水利工程 | 9017篇 |
石油天然气 | 13196篇 |
武器工业 | 5587篇 |
无线电 | 49170篇 |
一般工业技术 | 27016篇 |
冶金工业 | 11881篇 |
原子能技术 | 3961篇 |
自动化技术 | 92443篇 |
出版年
2024年 | 862篇 |
2023年 | 4851篇 |
2022年 | 8783篇 |
2021年 | 12309篇 |
2020年 | 10960篇 |
2019年 | 8812篇 |
2018年 | 8523篇 |
2017年 | 11584篇 |
2016年 | 13919篇 |
2015年 | 15707篇 |
2014年 | 25516篇 |
2013年 | 23034篇 |
2012年 | 28207篇 |
2011年 | 28215篇 |
2010年 | 21667篇 |
2009年 | 22101篇 |
2008年 | 22504篇 |
2007年 | 28963篇 |
2006年 | 26485篇 |
2005年 | 22978篇 |
2004年 | 17667篇 |
2003年 | 16046篇 |
2002年 | 12216篇 |
2001年 | 10042篇 |
2000年 | 8602篇 |
1999年 | 6784篇 |
1998年 | 5085篇 |
1997年 | 4210篇 |
1996年 | 3584篇 |
1995年 | 3016篇 |
1994年 | 2508篇 |
1993年 | 1815篇 |
1992年 | 1499篇 |
1991年 | 1175篇 |
1990年 | 942篇 |
1989年 | 751篇 |
1988年 | 556篇 |
1987年 | 360篇 |
1986年 | 268篇 |
1985年 | 300篇 |
1984年 | 268篇 |
1983年 | 217篇 |
1982年 | 213篇 |
1981年 | 159篇 |
1980年 | 163篇 |
1979年 | 107篇 |
1978年 | 78篇 |
1977年 | 62篇 |
1962年 | 71篇 |
1959年 | 50篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
31.
A robust model-free controller for a three-phase grid-connected photovoltaic system based on ultra-local model 下载免费PDF全文
In this paper, a robust model-free controller for a grid-connected photovoltaic (PV) system is designed. The system consists of a PV generator connected to a three-phase grid by a DC/AC converter. The control objectives of the overall system are to extract maximum power from the PV source, to control reactive power exchange and to improve the quality of the current injected into the grid. The model-free control technique is based on the use of an ultra-local model instead of the dynamic model of the overall system. The local model is continuously updated based on a numerical differentiator using only the input–output behavior of the controlled system. The model-free controller consists of a classical feedback controller and a compensator for the effects of internal parameter changes and external disturbances. Simulation results illustrate the efficiency of the controller for grid-connected PV systems. 相似文献
32.
Cell surface and secreted proteins provide essential functions for multicellular life. They enter the endoplasmic reticulum (ER) lumen co-translationally, where they mature and fold into their complex three-dimensional structures. The ER is populated with a host of molecular chaperones, associated co-factors, and enzymes that assist and stabilize folded states. Together, they ensure that nascent proteins mature properly or, if this process fails, target them for degradation. BiP, the ER HSP70 chaperone, interacts with unfolded client proteins in a nucleotide-dependent manner, which is tightly regulated by eight DnaJ-type proteins and two nucleotide exchange factors (NEFs), SIL1 and GRP170. Loss of SIL1′s function is the leading cause of Marinesco-Sjögren syndrome (MSS), an autosomal recessive, multisystem disorder. The development of animal models has provided insights into SIL1′s functions and MSS-associated pathologies. This review provides an in-depth update on the current understanding of the molecular mechanisms underlying SIL1′s NEF activity and its role in maintaining ER homeostasis and normal physiology. A precise understanding of the underlying molecular mechanisms associated with the loss of SIL1 may allow for the development of new pharmacological approaches to treat MSS. 相似文献
33.
34.
《International Journal of Hydrogen Energy》2022,47(45):19821-19836
Machine learning-based fault detection methods are frequently combined with wavelet transform (WT) to detect an unintentional islanding condition. In contrast to this condition, these methods have long detection and computation time. Thus, selecting a useful signal processing-based approach is required for reliable islanding detection, especially in real-time applications. This paper presents a new modified signal processing-based islanding detection method (IDM) for real-time applications of hydrogen energy-based distributed generators. In the study, a new IDM using a modified pyramidal algorithm approach with an undecimated wavelet transform (UWT) is presented. The proposed method is performed with different grid conditions with the presence of electric noise in real-time. Experimental results show that oscillations in the acquired signal can be reduced by the UWT, and noise sensitivity is lower than other WT-based methods. The non-detection zone is zero and the maximum detection and computational time is also 75 ms at a close power match. 相似文献
35.
36.
37.
目的:研究抗坏血酸(ascorbic acid,AsA)-还原型谷胱甘肽(reduced glutathione,GSH)循环代谢在水杨酸处理采后甜瓜诱导的过量H2O2清除过程中的作用。方法:用4 mmol/L水杨酸浸泡‘玉金香’厚皮甜瓜10 min,测定处理后果实常温贮藏过程中丙二醛(malondialdehyde,MDA)含量,分析活性氧的积累水平、超氧化物歧化酶(superoxide dismutase,SOD)和过氧化氢酶(catalase,CAT)活力,以及AsA-GSH循环过程相关酶活力及产物和底物含量。结果:水杨酸处理降低了果实MDA含量,第10天处理组MDA含量较对照组降低14.6%;显著提高了果实O2-·的产生速率和H2O2含量(P<0.05),其中处理后第2天O2-·的产生速率高出同期对照组的1.9 倍,第6天H2O2含量高出对照组果实29.7%;提高了果实SOD活力,但抑制了CAT活力,说明H2O2的清除可能是依赖于除酶促系统外的其他系统。此外,水杨酸处理提高了果实抗坏血酸过氧化物酶、单脱氢抗坏血酸过氧化物酶、脱氢抗坏血酸还原酶和谷胱甘肽还原酶的活力,增加了AsA和氧化型谷胱甘肽的含量,降低了脱氢抗坏血酸和GSH的含量。结论:水杨酸处理诱导了厚皮甜瓜果实的氧爆,抑制了MDA产生,由水杨酸诱导产生的过量H2O2主要依靠AsA-GSH循环系统清除。 相似文献
38.
The ability to detect gun and gun held in hand or other body parts is a typical human skill. The same problem presents an imperative task for computer vision system. Automatic observer independent detection of hand held gun or gun held in the other body part, whether it is visible or concealed, provides enhance security in vulnerable places and initiates appropriate action there. Compare to the automatic object detection systems, automatic detection of gun has very few successful attempts. In the present scope of this paper, we present an extensive survey on automatic detection of gun and define a taxonomy for this particular detection system. We also describe the inherent difficulties related with this problem. In this survey of published papers, we examine different approaches used in state-of-the-art attempts and compare performances of these approaches. Finally, this paper concludes pointing to the possible research gaps in related fields. 相似文献
39.
40.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)). 相似文献