全文获取类型
收费全文 | 35288篇 |
免费 | 7991篇 |
国内免费 | 4965篇 |
专业分类
电工技术 | 2599篇 |
综合类 | 4046篇 |
化学工业 | 1520篇 |
金属工艺 | 1272篇 |
机械仪表 | 2858篇 |
建筑科学 | 1513篇 |
矿业工程 | 833篇 |
能源动力 | 627篇 |
轻工业 | 757篇 |
水利工程 | 425篇 |
石油天然气 | 1123篇 |
武器工业 | 651篇 |
无线电 | 7801篇 |
一般工业技术 | 3086篇 |
冶金工业 | 993篇 |
原子能技术 | 738篇 |
自动化技术 | 17402篇 |
出版年
2024年 | 139篇 |
2023年 | 1040篇 |
2022年 | 1924篇 |
2021年 | 1991篇 |
2020年 | 2014篇 |
2019年 | 1667篇 |
2018年 | 1317篇 |
2017年 | 1504篇 |
2016年 | 1691篇 |
2015年 | 1853篇 |
2014年 | 2436篇 |
2013年 | 2337篇 |
2012年 | 2895篇 |
2011年 | 2917篇 |
2010年 | 2248篇 |
2009年 | 2338篇 |
2008年 | 2289篇 |
2007年 | 2532篇 |
2006年 | 2147篇 |
2005年 | 1889篇 |
2004年 | 1549篇 |
2003年 | 1465篇 |
2002年 | 1318篇 |
2001年 | 1147篇 |
2000年 | 842篇 |
1999年 | 689篇 |
1998年 | 467篇 |
1997年 | 394篇 |
1996年 | 271篇 |
1995年 | 183篇 |
1994年 | 163篇 |
1993年 | 92篇 |
1992年 | 82篇 |
1991年 | 70篇 |
1990年 | 96篇 |
1989年 | 47篇 |
1988年 | 22篇 |
1987年 | 26篇 |
1986年 | 33篇 |
1985年 | 22篇 |
1984年 | 9篇 |
1983年 | 13篇 |
1982年 | 24篇 |
1981年 | 18篇 |
1980年 | 5篇 |
1979年 | 5篇 |
1978年 | 4篇 |
1977年 | 4篇 |
1959年 | 4篇 |
1951年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 203 毫秒
1.
针对目标估计过程需要大量人工参与、自动化程度低的问题,提出了基于数据质量评价的目标估计方法。利用目标数据质量评价方法,对不同传感器得到的目标数据质量进行科学、有效的测度和评价,并根据质量得分动态调整各数据源在目标估计过程中所占的权重,从而减少人工干预,提高目标估计效能。仿真试验结果证明了该方法的有效性。 相似文献
2.
3.
Aiming at the performance degradation of the existing presentation attack detection methods due to the illumination variation, a two-stream vision transformers framework (TSViT) based on transfer learning in two complementary spaces is proposed in this paper. The face images of RGB color space and multi-scale retinex with color restoration (MSRCR) space are fed to TSViT to learn the distinguishing features of presentation attack detection. To effectively fuse features from two sources (RGB color space images and MSRCR images), a feature fusion method based on self-attention is built, which can effectively capture the complementarity of two features. Experiments and analysis on Oulu-NPU, CASIA-MFSD, and Replay-Attack databases show that it outperforms most existing methods in intra-database testing and achieves good generalization performance in cross-database testing. 相似文献
4.
《Ceramics International》2022,48(6):8069-8080
Homogeneous thin films of Molybdenum oxide (MoO3) were grown on quartz and glass substrates using the thermal evaporation method. XRD results showed that the MoO3 powder has a polycrystalline structure with an orthorhombic crystal system whereas the MoO3 thin films have amorphous nature. SEM images showed that the MoO3 thin films have a nearly uniform surfaces with worm-like shape grains. The film thickness influences on the linear and nonlinear optical characteristics of MoO3 thin films that were examined using spectrophotometric measurements and from which, the linear optical constants of the MoO3 thin films were estimated. The electronic transition type was determined as a direct allowed one. The values of the optical band gap were obtained to be in the range of 3.88–3.72 eV. The dispersion parameters, third-order nonlinear optical susceptibility, and the nonlinear refractive index of the MoO3 thin films were determined and interpreted in the light of the single oscillator model. The temperature dependence of the DC electrical conductivity and the corresponding conduction mechanism for the MoO3 films were investigated at temperatures ranging from 303 to 463 K. 相似文献
5.
《Current Opinion in Solid State & Materials Science》2022,26(6):101024
One of the main challenges in the laser powder bed fusion (LPBF) process is making dense and defect-free components. These porosity defects are dependent upon the melt pool geometry and the processing conditions. Power-velocity (PV) processing maps can aid in visualizing the effects of LPBF processing variables and mapping different defect regimes such as lack-of-fusion, under-melting, balling, and keyholing. This work presents an assessment of existing analytical equations and models that provide an estimate of the melt pool geometry as a function of material properties. The melt pool equations are then combined with defect criteria to provide a quick approximation of the PV processing maps for a variety of materials. Finally, the predictions of these processing maps are compared with experimental data from the literature. The predictive processing maps can be computed quickly and can be coupled with dimensionless numbers and high-throughput (HT) experiments for validation. The present work provides a boundary framework for designing the optimal processing parameters for new metals and alloys based on existing analytical solutions. 相似文献
6.
《Geotextiles and Geomembranes》2022,50(4):779-793
As a new type of material for civil engineering projects, the rubber and sand mixture is widely used in roadbed fillers, offering environmental benefits over traditional tyre disposal methods. This study uses a large-scale direct shear apparatus to examine the interface shear properties of the geogrid-reinforced rubber and sand mixture, considering different particle size ratios (r), rubber contents, and normal stresses. Based on indoor tests, direct shear models of the mixture with different values of r are established in PFC3D, revealing the meso-mechanical mechanism of the mixture in the direct shear process. The results show that when r is greater than 1, incorporating a certain amount of rubber particles can increase the shear strength of the mixture. The r values of 15.78, 7.63, and 3.98 correspond to an optimal rubber content of 30%, 10%, and 20%, respectively. When r is less than 1, mixing rubber particles can only reduce the shear strength of the mixture. When the rubber content is low, the smaller the value of r, the greater is the thickness of the shear band. Furthermore, the normal and tangential contact forces are greater. The fabric anisotropy evolution law of the mixture is consistent with the change in the contact force distribution. 相似文献
7.
高效率地使用工程车辆是工程项目管理中节约成本的有效方法,无人监管环境下工程车辆的工况识别,是实现工程车辆高效率使用的有效手段。目前以GPS等技术为核心的车辆智能管理系统未对工程车辆进行工况识别,提出一种基于GRU循环神经网络的工程车辆工况识别方法,通过对工程车辆在不同工况下产生的音频信号进行分析,从中提取Mel倒谱系数作为主要特征,构建GRU循环神经网络模型进行训练和识别。实验结果表明,该方法可以实现对工程车辆工况的有效识别。 相似文献
8.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security. 相似文献
9.
10.