全文获取类型
收费全文 | 22816篇 |
免费 | 2510篇 |
国内免费 | 579篇 |
专业分类
电工技术 | 674篇 |
技术理论 | 1篇 |
综合类 | 1276篇 |
化学工业 | 748篇 |
金属工艺 | 420篇 |
机械仪表 | 976篇 |
建筑科学 | 1126篇 |
矿业工程 | 9229篇 |
能源动力 | 477篇 |
轻工业 | 177篇 |
水利工程 | 141篇 |
石油天然气 | 71篇 |
武器工业 | 180篇 |
无线电 | 2205篇 |
一般工业技术 | 904篇 |
冶金工业 | 1711篇 |
原子能技术 | 153篇 |
自动化技术 | 5436篇 |
出版年
2024年 | 22篇 |
2023年 | 250篇 |
2022年 | 520篇 |
2021年 | 754篇 |
2020年 | 890篇 |
2019年 | 351篇 |
2018年 | 364篇 |
2017年 | 430篇 |
2016年 | 619篇 |
2015年 | 759篇 |
2014年 | 1510篇 |
2013年 | 1380篇 |
2012年 | 2172篇 |
2011年 | 2082篇 |
2010年 | 1479篇 |
2009年 | 1374篇 |
2008年 | 1382篇 |
2007年 | 1512篇 |
2006年 | 1240篇 |
2005年 | 1179篇 |
2004年 | 1006篇 |
2003年 | 918篇 |
2002年 | 688篇 |
2001年 | 538篇 |
2000年 | 471篇 |
1999年 | 372篇 |
1998年 | 326篇 |
1997年 | 266篇 |
1996年 | 203篇 |
1995年 | 179篇 |
1994年 | 159篇 |
1993年 | 112篇 |
1992年 | 104篇 |
1991年 | 71篇 |
1990年 | 47篇 |
1989年 | 46篇 |
1988年 | 33篇 |
1987年 | 21篇 |
1986年 | 10篇 |
1985年 | 23篇 |
1984年 | 7篇 |
1983年 | 14篇 |
1982年 | 6篇 |
1981年 | 5篇 |
1980年 | 4篇 |
1979年 | 4篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
深凹露天矿山由于其特殊的结构,爆破产生的炮烟扩散稀释较为困难,严重危害生产作业人员的生命安全与健康。基于实际矿山构建了深凹露天矿山的二维物理及数学模型,采用非稳态数值分析方法研究了不同爆破位置下,深凹露天矿山采坑内爆破炮烟的扩散规律。研究结果表明:不同爆破位置下,露天采坑内均出现复环流,爆破点位置是影响露天采坑内风流结构特征的重要因素;露天采坑内的炮烟最高浓度均随着时间变化而逐渐下降,但下降的速率逐步减小,呈现三个阶段的下降趋势;爆破位置位于背风侧时露天采坑内的炮烟最高浓度和降至安全浓度所需时间远高于迎风侧三个爆破位置;随着背风侧爆破点距采坑底部距离的减小,炮烟最高浓度及降至安全浓度所需时间先降低后增加,炮烟最高浓度及降至安全浓度所需时间随着迎风侧爆破位置距采坑底部距离的减小而增加。研究结果对于指导深凹露天矿山企业合理组织爆破后的生产作业和保障作业人员安全具有重要意义。 相似文献
2.
3.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)). 相似文献
4.
Text messages are characterised by a casual language style, ‘textese’ (e.g., c u on thurs). This study investigated adolescents’ perceptions of the use of different levels of textese in digital messages which varied in their intended recipient (friend, teacher). Grade 8 students in Australia (N = 90, aged 13–14 years) each read six text messages purportedly written by a fellow student, and rated the extent to which they agreed (on a 7-point Likert scale) that the message writer was intelligent, paid attention to detail, used an appropriate writing style, and was friendly. Overall, participants rated message senders most favourably on all measures when they used no textese, and least favourably when they used high levels of textese. This pattern was even stronger when messages were addressed to teachers rather than same-aged friends. The findings suggest that adolescents are sensitive to both writing style and recipient when considering digital messages. 相似文献
5.
In the past, thinking of carrying electronic devices inside our bodies was only posed by non-real scenarios. The emergence of insertable devices has changed this. Since this technology is still in its initial development stages, few studies have investigated factors that influence its acceptance. This paper analyzes the predictors of the intention to use non-medical insertable devices in two Latin American contexts. We used partial least squares structural equation modeling to examine whether six constructs predicted intention to use insertable devices. A questionnaire was administered to undergraduate students located in Colombia and Chile (n = 672). We also examined whether these predictors influenced intention differently for both of them. Four common constructs significantly and positively influenced both Chilean and Colombian respondents to use insertable devices (hedonic motivation, habit, performance expectancy, and social influence). Also, the habit has a complementary mediating effect on the relationship between social influence and behavioral intention. By contrast, effort expectations were a positive and significant predictor, but only among Chilean respondents. Findings suggest that when technologies are emerging, well-known predictors of intention (e.g., performance and effort expectations) are less influential than predictors related to self-efficacy (e.g., habit and hedonic motivation). The use of insertable devices has a significant impact on society. Thus, a better understanding of what motivates their use has implications for both academia and industry. 相似文献
6.
The evaluation of the volumetric accuracy of a machine tool is an open challenge in the industry, and a wide variety of technical solutions are available in the market and at research level. All solutions have advantages and disadvantages concerning which errors can be measured, the achievable uncertainty, the ease of implementation, possibility of machine integration and automation, the equipment cost and the machine occupation time, and it is not always straightforward which option to choose for each application. The need to ensure accuracy during the whole lifetime of the machine and the availability of monitoring systems developed following the Industry 4.0 trend are pushing the development of measurement systems that can be integrated in the machine to perform semi-automatic verification procedures that can be performed frequently by the machine user to monitor the condition of the machine. Calibrated artefact based calibration and verification solutions have an advantage in this field over laser based solutions in terms of cost and feasibility of machine integration, but they need to be optimized for each machine and customer requirements to achieve the required calibration uncertainty and minimize machine occupation time.This paper introduces a digital twin-based methodology to simulate all relevant effects in an artefact-based machine tool calibration procedure, from the machine itself with its expected error ranges, to the artefact geometry and uncertainty, artefact positions in the workspace, probe uncertainty, compensation model, etc. By parameterizing all relevant variables in the design of the calibration procedure, this simulation methodology can be used to analyse the effect of each design variable on the error mapping uncertainty, which is of great help in adapting the procedure to each specific machine and user requirements. The simulation methodology and the analysis possibilities are illustrated by applying it on a 3-axis milling machine tool. 相似文献
7.
《Information & Management》2022,59(3):103384
Digital entrepreneurship possesses immense societal implications beyond its commercial significance. Yet our knowledge of the emancipatory potential of digital entrepreneurship remains limited because few studies have gone beyond the conventional emphasis on profits and wealth creation. Drawing on the emancipatory perspective that views entrepreneurship as change creation through the removal of constraints, this article examines how emancipation can occur through the actions of digital entrepreneurs. Using an empirical investigation of entrepreneurial endeavours set against disadvantaged communities in Indonesia, we uncover constraints facing a developing economy and the role of digital technologies in ameliorating them. Through extensive fieldwork and in-depth case study analyses, we identify constraining societal norms and restrictive practices, as well as the three forms of digital enablement - to emulate services, aggregate capital and equalise opportunities – necessary for the enactment of digitally enabled emancipation. We present a framework to illustrate the enactment of emancipatory digital entrepreneurship for the inclusive development of businesses and communities. 相似文献
8.
9.
以井下供电监控及防越级跳闸运用为对象开展探究。在分析矿井供电系统运行中现存主要问题的基础上,对供电监控与防越级跳闸系统整体应用的积极意义进行了分析和总结,希望能够让更多矿井技术人员了解供电监控及防越级跳闸系统的优越性,为其在矿井中的广泛推广普及提供便利,为煤矿行业更加高效地发展提供帮助。 相似文献
10.