全文获取类型
收费全文 | 13088篇 |
免费 | 1798篇 |
国内免费 | 1206篇 |
专业分类
电工技术 | 1398篇 |
技术理论 | 3篇 |
综合类 | 1533篇 |
化学工业 | 280篇 |
金属工艺 | 263篇 |
机械仪表 | 878篇 |
建筑科学 | 299篇 |
矿业工程 | 250篇 |
能源动力 | 223篇 |
轻工业 | 150篇 |
水利工程 | 101篇 |
石油天然气 | 135篇 |
武器工业 | 147篇 |
无线电 | 1810篇 |
一般工业技术 | 594篇 |
冶金工业 | 196篇 |
原子能技术 | 69篇 |
自动化技术 | 7763篇 |
出版年
2024年 | 19篇 |
2023年 | 87篇 |
2022年 | 153篇 |
2021年 | 207篇 |
2020年 | 256篇 |
2019年 | 287篇 |
2018年 | 238篇 |
2017年 | 318篇 |
2016年 | 379篇 |
2015年 | 471篇 |
2014年 | 728篇 |
2013年 | 778篇 |
2012年 | 875篇 |
2011年 | 1030篇 |
2010年 | 877篇 |
2009年 | 924篇 |
2008年 | 1075篇 |
2007年 | 1147篇 |
2006年 | 1008篇 |
2005年 | 894篇 |
2004年 | 727篇 |
2003年 | 600篇 |
2002年 | 472篇 |
2001年 | 426篇 |
2000年 | 346篇 |
1999年 | 293篇 |
1998年 | 239篇 |
1997年 | 230篇 |
1996年 | 199篇 |
1995年 | 169篇 |
1994年 | 149篇 |
1993年 | 108篇 |
1992年 | 92篇 |
1991年 | 73篇 |
1990年 | 43篇 |
1989年 | 37篇 |
1988年 | 26篇 |
1987年 | 19篇 |
1986年 | 23篇 |
1985年 | 17篇 |
1984年 | 10篇 |
1983年 | 15篇 |
1982年 | 8篇 |
1981年 | 3篇 |
1980年 | 3篇 |
1979年 | 3篇 |
1978年 | 3篇 |
1973年 | 2篇 |
1957年 | 2篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Under the circumstance of perceptual consumption, it is still challenging to grasp consumer's emotions and demands due to the large search space, diversified preferences, and easy fatigue of consumers. To reduce user fatigue and enlarge search space, a novel method was presented to design and optimize the pattern of yarn-dyed plaid fabric using the isolation niche genetic algorithm and rough set theory. Each pattern was encoded as a chromosome based on the real number code. The population was initialized and evolved using INGA to maintain the diversity. The rough set theory was adopted as the fitness function of isolation niche genetic algorithm to extract the consumer's demands. After multiple evolutions, a large set of practical patterns of the yarn-dyed plaid fabric are obtained. Experiments were carried out by 24 testers of different ages and genders. The results prove that the proposed method based on the isolation niche genetic algorithm and rough set theory is feasible and effective, supplying references to the designer. 相似文献
2.
Jiewei Chen Ting Zhang Jingli Wang Ning Zhang Wei Ji Shuyun Zhou Yang Chai 《Advanced functional materials》2021,31(40):2104192
Charge-based field-effect transistors (FETs) greatly suffer from unavoidable carrier scattering and heat dissipation. Analogous to valley degree of freedom in semiconductors, chiral anomaly current in Weyl/Dirac semimetals is theoretically predicted to be nearly nondissipative over long distances, but still lacks experimental ways to efficiently control its transport. Here, field-effect chirality devices are demonstrated with Dirac semimetal PtSe2, in which its Fermi level is close to the Dirac point in the conduction band owing to intrinsic defects. The chiral anomaly is further corroborated by the planar Hall effect and nonlocal valley transport measurement, which can also be effectively modulated by external fields, showing robust nonlocal valley transport with micrometer diffusion length. Similar to charge-based FETs, the chiral conductivity in PtSe2 devices can be modulated by electrostatic gating with an ON/OFF ratio of more than 103. Basic logic functions in the devices are also demonstrated with electric and magnetic fields as input signals. 相似文献
3.
Hao Yuan Haifeng Dai Wei Wu Jiaping Xie Jun Shen Xuezhe Wei 《International Journal of Hydrogen Energy》2021,46(7):5714-5728
In a vehicular fuel cell system, alternative load and frequent purge action can lead to anode pressure varies with the hydrogen mass flow fluctuation. It's crucial to control the pressure difference between anode and cathode within a reasonable range to avoid adverse phenomena such as membrane failure, reactant starvation, or even water management fault. In this paper, an improved proportional integrative (PI) controller by the fuzzy logic technique that considers the engineer experience and knowledge on the hydrogen supply system behavior is proposed for hydrogen pressure control, in which the PI parameters are tuned by a fuzzy decision process. Furthermore, load current and purge action regarded as input disturbances are applied for feedforward compensation to reduce the pressure response hysteresis. A hydrogen supply subsystem based on the proportional valve is modeled, and corresponding parameters are determined by analyzing the response time and steady pressure fluctuation. The performance of the conventional PI controller, the fuzzy logic PI (FLPI) controller and fuzzy logic PI with feedforward (FLPIF) controller is validated. The presented results indicated that the FLPI controller significantly improves the dynamic response of hydrogen pressure compared to the PI controller, and the FLPIF controller can further reduce overshoot caused by disturbance. Finally, the proposed FLPIF controller is implemented on a rapid prototype platform of the hydrogen supply subsystem and an actual fuel cell system, exhibiting satisfactory performance. 相似文献
4.
图像增强在提高SAR图像舰船目标检测精度方面具有十分重要的意义。由于传统算法不能很好地对SAR图像进行目标增强,提出了基于改进粗糙集理论和引力场强度的目标增强算法。通过借鉴引力场相关理论知识,将粗糙集条件属性集中的梯度属性改进为引力场强度属性,从而实现对原图像的目标增强。与其他算法进行了实验比较,结果表明提出的改进算法相比于其他算法更适用于SAR图像特性,能更好地对舰船目标像素进行针对性增强,具备一定的工程应用价值。 相似文献
5.
6.
In this paper, a novel interval type-2 fuzzy fractional order super twisting algorithm (IT2FFOSTA) which is essentially a second order sliding mode controller is presented. The proposed IT2FFOSTA enhances fractional order super twisting algorithm (FOSTA) by taking advantage of an interval type-2 fuzzy fractional order sliding surface (IT2FFOSS) for some classes of fully-actuated and under-actuated nonlinear systems in presence of uncertainty. The FOSTA significantly reduces the amount of chattering and the IT2FFOSS results in decreasing the tracking error, control effort, and chattering level. In order to control under-actuated systems, a hierarchical sliding surface is employed. The multi-tracker optimization algorithm is utilized to adjust the controller’s parameters; this leads to an optimal performance for the IT2FFOSTA. To examine the performance of the IT2FFOSTA, some simulation and experimental tests on three examples of different classes of fully-actuated and under-actuated systems, including ball and plate, inverted pendulum, and ball and beam systems are carried out. The simulation and experimental results demonstrate the superiority of the IT2FFOSTA in reducing the amount of chattering, tracking error, and control effort compared to those of the other control methods. 相似文献
7.
8.
现有对混凝-膜过滤过程中膜污染的预测分析,一般采用XDLVO理论对光滑界面的作用能进行计算,但混凝絮体表面形态会对预测结果产生较大的影响。利用正弦波球体模型对粗糙腐殖酸(HA)絮体表面进行模拟,并通过表面元素积分法(SEI)结合XDLVO理论与复合辛普森规则,对不同粗糙程度的混凝絮体与聚偏氟乙烯(PVDF)膜的界面作用能进行量化模拟;并将结果与传统XDLVO理论模拟的光滑界面作用能进行了比较。实验结果表明,该模型适用于混凝-膜过滤体系中絮体界面作用能的模拟,同时在模拟过程中,由于粗糙度的不同会导致界面作用能在数值上存在1~2个数量级的差异;并且粗糙的絮体较完全光滑的絮体与膜污染趋势的拟合程度更高,即引入絮体表面形态对利用絮体与膜界面间相互作用能表征膜污染趋势的置信度更高。 相似文献
10.
Identifying and Verifying Vulnerabilities through PLC Network Protocol and Memory Structure Analysis
Joo-Chan Lee Hyun-Pyo Choi Jang-Hoon Kim Jun-Won Kim Da-Un Jung Ji-Ho Shin Jung-Taek Seo 《计算机、材料和连续体(英文)》2020,65(1):53-67
Cyberattacks on the Industrial Control System (ICS) have recently been
increasing, made more intelligent by advancing technologies. As such, cybersecurity for
such systems is attracting attention. As a core element of control devices, the
Programmable Logic Controller (PLC) in an ICS carries out on-site control over the ICS. A
cyberattack on the PLC will cause damages on the overall ICS, with Stuxnet and Duqu as
the most representative cases. Thus, cybersecurity for PLCs is considered essential, and
many researchers carry out a variety of analyses on the vulnerabilities of PLCs as part of
preemptive efforts against attacks. In this study, a vulnerability analysis was conducted on
the XGB PLC. Security vulnerabilities were identified by analyzing the network protocols
and memory structure of PLCs and were utilized to launch replay attack, memory
modulation attack, and FTP/Web service account theft for the verification of the results.
Based on the results, the attacks were proven to be able to cause the PLC to malfunction
and disable it, and the identified vulnerabilities were defined. 相似文献