全文获取类型
收费全文 | 12578篇 |
免费 | 2118篇 |
国内免费 | 1166篇 |
专业分类
电工技术 | 2182篇 |
技术理论 | 1篇 |
综合类 | 1223篇 |
化学工业 | 375篇 |
金属工艺 | 238篇 |
机械仪表 | 545篇 |
建筑科学 | 1174篇 |
矿业工程 | 290篇 |
能源动力 | 187篇 |
轻工业 | 1454篇 |
水利工程 | 144篇 |
石油天然气 | 364篇 |
武器工业 | 137篇 |
无线电 | 2033篇 |
一般工业技术 | 799篇 |
冶金工业 | 268篇 |
原子能技术 | 43篇 |
自动化技术 | 4405篇 |
出版年
2024年 | 68篇 |
2023年 | 261篇 |
2022年 | 445篇 |
2021年 | 554篇 |
2020年 | 603篇 |
2019年 | 494篇 |
2018年 | 472篇 |
2017年 | 569篇 |
2016年 | 563篇 |
2015年 | 729篇 |
2014年 | 948篇 |
2013年 | 933篇 |
2012年 | 1118篇 |
2011年 | 1098篇 |
2010年 | 829篇 |
2009年 | 781篇 |
2008年 | 869篇 |
2007年 | 906篇 |
2006年 | 677篇 |
2005年 | 598篇 |
2004年 | 489篇 |
2003年 | 383篇 |
2002年 | 301篇 |
2001年 | 226篇 |
2000年 | 190篇 |
1999年 | 159篇 |
1998年 | 113篇 |
1997年 | 91篇 |
1996年 | 76篇 |
1995年 | 45篇 |
1994年 | 48篇 |
1993年 | 27篇 |
1992年 | 38篇 |
1991年 | 28篇 |
1990年 | 23篇 |
1989年 | 15篇 |
1988年 | 10篇 |
1987年 | 12篇 |
1986年 | 4篇 |
1985年 | 13篇 |
1984年 | 4篇 |
1983年 | 12篇 |
1982年 | 7篇 |
1981年 | 4篇 |
1980年 | 5篇 |
1978年 | 3篇 |
1975年 | 3篇 |
1966年 | 3篇 |
1965年 | 3篇 |
1959年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
1.
《中国有色金属学会会刊》2021,31(8):2468-2478
An acoustic emission (AE) experiment was carried out to explore the AE location accuracy influenced by temperature. A hollow hemispherical specimen was used to simulate common underground structures. In the process of heating with the flame, the pulse signal of constant frequency was stimulated as an AE source. Then AE signals received by each sensor were collected and used for comparing localization accuracy at different temperatures. Results show that location errors of AE keep the same phenomenon in the early and middle heating stages. In the later stage of heating, location errors of AE increase sharply due to the appearance of cracks. This provides some beneficial suggestions on decreasing location errors of structural cracks caused by temperature and improves the ability of underground structure disaster prevention and control. 相似文献
2.
深凹露天矿山由于其特殊的结构,爆破产生的炮烟扩散稀释较为困难,严重危害生产作业人员的生命安全与健康。基于实际矿山构建了深凹露天矿山的二维物理及数学模型,采用非稳态数值分析方法研究了不同爆破位置下,深凹露天矿山采坑内爆破炮烟的扩散规律。研究结果表明:不同爆破位置下,露天采坑内均出现复环流,爆破点位置是影响露天采坑内风流结构特征的重要因素;露天采坑内的炮烟最高浓度均随着时间变化而逐渐下降,但下降的速率逐步减小,呈现三个阶段的下降趋势;爆破位置位于背风侧时露天采坑内的炮烟最高浓度和降至安全浓度所需时间远高于迎风侧三个爆破位置;随着背风侧爆破点距采坑底部距离的减小,炮烟最高浓度及降至安全浓度所需时间先降低后增加,炮烟最高浓度及降至安全浓度所需时间随着迎风侧爆破位置距采坑底部距离的减小而增加。研究结果对于指导深凹露天矿山企业合理组织爆破后的生产作业和保障作业人员安全具有重要意义。 相似文献
3.
《International Journal of Hydrogen Energy》2022,47(96):40582-40589
The objective of this study is to investigate the impact of biomass feeding location on rice husk gasification for hydrogen production. By comparing the results between top-feed and bottom-feed of the feedstock of the fluidized bed biomass gasification at the reaction temperature between 600~1000 °C and ER = 0.2, 0.27, and 0.33 without steam, the optimum low heating value was increase by 2.35 kJ/g-rice husk by the top-feed to gasifier. Although the yield of hydrogen was decreased by 42% for the rice husk gasification by the top-feed operation, the yield of CO, CO2, and CH4 were highly increased, which enhancing the heating value of the effluent gas. The study results suggested the potential route of the biomass gasification at the different feeding location. 相似文献
4.
Recent generative adversarial networks (GANs) have yielded remarkable performance in face image synthesis. GAN inversion embeds an image into the latent space of a pretrained generator, enabling it to be used for real face manipulation. However, current inversion approaches for real faces suffer the dilemma of initialization collapse and identity loss. In this paper, we propose a hierarchical GAN inversion for real faces with identity preservation based on mutual information maximization. We first use a facial domain guaranteed initialization to avoid the initialization collapse. Furthermore, we prove that maximizing the mutual information between inverted faces and their identities is equivalent to minimizing the distance between identity features from inverted and original faces. Optimization for real face inversion with identity preservation is implemented on this mutual information-maximizing constraint. Extensive experimental results show that our approach outperforms state-of-the-art solutions for inverting and editing real faces, particularly in terms of face identity preservation. 相似文献
5.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability. 相似文献
6.
Small object detection is challenging and far from satisfactory. Most general object detectors suffer from two critical issues with small objects: (1) Feature extractor based on classification network cannot express the characteristics of small objects reasonably due to insufficient appearance information of targets and a large amount of background interference around them. (2) The detector requires a much higher location accuracy for small objects than for general objects. This paper proposes an effective and efficient small object detector YOLSO to address the above problems. For feature representation, we analyze the drawbacks in previous backbones and present a Half-Space Shortcut(HSSC) module to build a background-aware backbone. Furthermore, a coarse-to-fine Feature Pyramid Enhancement(FPE) module is introduced for layer-wise aggregation at a granular level to enhance the semantic discriminability. For loss function, we propose an exponential L1 loss to promote the convergence of regression, and a focal IOU loss to focus on prime samples with high classification confidence and high IOU. Both of them significantly improves the location accuracy of small objects. The proposed YOLSO sets state-of-the-art results on two typical small object datasets, MOCOD and VeDAI, at a speed of over 200 FPS. In the meantime, it also outperforms the baseline YOLOv3 by a wide margin on the common COCO dataset. 相似文献
7.
中国的海相富有机质页岩经历了多期构造改造,其含气性具有明显的差异。页岩气在不同构造演化阶段的保存条件是揭示页岩气差异富集机理的关键科学问题之一,开展构造-热演化研究可以明确其热演化史和构造隆升-剥蚀过程,为其评价提供演化格架。研究以丁山地区下古生界页岩为对象,联合磷灰石裂变径迹、磷灰石(U-Th)/He和锆石(U-Th)/He等多个古温标反演热演化史,结合镜质体反射率重建的最高古地温剖面,对丁山地区燕山期以来的差异构造隆升过程和剥蚀量进行了恢复,并在此基础上结合流体包裹体分析对丁山地区龙马溪组页岩的压力演化过程进行了模拟;根据页岩在埋藏—抬升过程中的温、压演化特征,定量表征了不同抬升阶段页岩含气量的变化,建立了龙马溪组页岩"埋藏—生烃—抬升"的演化格架。分析表明,丁山地区在燕山期和喜马拉雅期经历了不同的构造隆升过程。燕山期表现为"早期快速隆升—晚期缓慢隆升"的分段隆升,具有自NW向SE递进隆升且隆升幅度逐渐增大的特征;喜马拉雅期表现为整体快速隆升。燕山期是丁山地区产生差异构造隆升的主要时期。受这种差异构造隆升-剥蚀作用的影响,龙马溪组页岩的降温、降压过程和页岩气的散失过程具有明显的差异。燕山期的差异构造隆升是造成丁山地区龙马溪组页岩含气性呈平面分带的主要原因。 相似文献
8.
Trinidad Rico 《Material Religion》2019,15(2):148-163
AbstractIn this article I argue that the study of cultural heritage preservation practices in the context of Muslim societies has been constructed—and obstructed—through specific historical trajectories and challenges. These originate within the field of cultural heritage preservation, through its own history and principles which have complicated the interplay between heritage and religious values and uses. As a result, situated studies of preservation practices in and by Muslim communities are in their infancy. In this article I revisit the points of contact between the emergence of a Eurocentric preservation dogma and its encounter with different articulations and practices related to Islam that are now approached as part of heritage assemblages and debates. I consider specific biases inherent in these discourses and propose, as a result, to approach the study of Islam and heritage in its own terms—rather than as an alternative to Western preservation paradigms. 相似文献
9.
Yuhang Wang Yanbin Sun Shen Su Zhihong Tian Mohan Li Jing Qiu Xianzhi Wang 《计算机、材料和连续体(英文)》2019,59(3):983-993
With the evolution of location-based services (LBS), a new type of LBS has already gain a lot of attention and implementation, we name this kind of LBS as the Device-Dependent LBS (DLBS). In DLBS, the service provider (SP) will not only send the information according to the user’s location, more significant, he also provides a service device which will be carried by the user. DLBS has been successfully practised in some of the large cities around the world, for example, the shared bicycle in Beijing and London. In this paper, we, for the first time, blow the whistle of the new location privacy challenges caused by DLBS, since the service device is enabled to perform the localization without the permission of the user. To conquer these threats, we design a service architecture along with a credit system between DLBS provider and the user. The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy, DLBS provider has to sacrifice their revenue in order to gain extra location information of their device. We make the simulation of our proposed scheme and the result convince its effectiveness. 相似文献
10.
The volume of freight vehicles operating within city boundaries is steadily increasing, which contributes to road congestion, especially in urban areas with a parking deficit. The proper identification of the location and size of commercial parking lay-by areas, where delivery vehicles can park for a limited time to perform loading/unloading operations, can relieve road congestion. Compared to the existing literature, this paper presents an improved two-stage approach, which includes a mathematical programme and a simulation model for determining the location and sizing of lay-by areas. The robustness and soundness of the results from a methodological and practical point of view are discussed using an example application. 相似文献