全文获取类型
收费全文 | 228719篇 |
免费 | 21170篇 |
国内免费 | 16033篇 |
专业分类
电工技术 | 32663篇 |
技术理论 | 13篇 |
综合类 | 22565篇 |
化学工业 | 16069篇 |
金属工艺 | 10727篇 |
机械仪表 | 20573篇 |
建筑科学 | 19265篇 |
矿业工程 | 9360篇 |
能源动力 | 5930篇 |
轻工业 | 7323篇 |
水利工程 | 6743篇 |
石油天然气 | 8233篇 |
武器工业 | 3316篇 |
无线电 | 18724篇 |
一般工业技术 | 12371篇 |
冶金工业 | 9167篇 |
原子能技术 | 1447篇 |
自动化技术 | 61433篇 |
出版年
2024年 | 476篇 |
2023年 | 3287篇 |
2022年 | 5586篇 |
2021年 | 6531篇 |
2020年 | 6874篇 |
2019年 | 5162篇 |
2018年 | 4388篇 |
2017年 | 6265篇 |
2016年 | 6790篇 |
2015年 | 7664篇 |
2014年 | 15153篇 |
2013年 | 12870篇 |
2012年 | 16933篇 |
2011年 | 18300篇 |
2010年 | 13769篇 |
2009年 | 14348篇 |
2008年 | 13896篇 |
2007年 | 17283篇 |
2006年 | 15507篇 |
2005年 | 13412篇 |
2004年 | 10980篇 |
2003年 | 9784篇 |
2002年 | 7703篇 |
2001年 | 6278篇 |
2000年 | 5321篇 |
1999年 | 4190篇 |
1998年 | 3242篇 |
1997年 | 2714篇 |
1996年 | 2227篇 |
1995年 | 1868篇 |
1994年 | 1626篇 |
1993年 | 1124篇 |
1992年 | 904篇 |
1991年 | 715篇 |
1990年 | 537篇 |
1989年 | 461篇 |
1988年 | 338篇 |
1987年 | 185篇 |
1986年 | 140篇 |
1985年 | 154篇 |
1984年 | 185篇 |
1983年 | 140篇 |
1982年 | 135篇 |
1981年 | 91篇 |
1980年 | 77篇 |
1979年 | 74篇 |
1978年 | 50篇 |
1977年 | 51篇 |
1959年 | 16篇 |
1951年 | 14篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security. 相似文献
2.
Tracking-by-detection (TBD) is a significant framework for visual object tracking. However, current trackers are usually updated online based on random sampling with a probability distribution. The performance of the learning-based TBD trackers is limited by the lack of discriminative features, especially when the background is full of semantic distractors. We propose an attention-driven data augmentation method, in which a residual attention mechanism is integrated into the TBD tracking network as supplementary references to identify discriminative image features. A mask generating network is used to simulate changes in target appearances to obtain positive samples, where attention information and image features are combined to identify discriminative features. In addition, we propose a method for mining hard negative samples, which searches for semantic distractors with the response of the attention module. The experiments on the OTB2015, UAV123, and LaSOT benchmarks show that this method achieves competitive performance in terms of accuracy and robustness. 相似文献
3.
Xiaojun Chen Hongyang Liu Dechao Hu Huaqing Liu Wenshi Ma 《Ceramics International》2021,47(17):23749-23761
With the blossom of information industry, electromagnetic wave technology shows increasingly potential in many fields. Nevertheless, the trouble caused by electromagnetic waves has also drawn extensive attention. For instance, electromagnetic pollution can threaten information safety in vital fields and the normal function of delicate electronic devices. Consequently, electromagnetic pollution and interference become an urgent issue that needs to be addressed. Carbon nanotubes (CNTs) have become a potential candidate to deal with these problems due to many advantages, such as high dielectric loss, remarkable thermodynamic stability, and low density. With the appearance of climbing demands, however, the carbon nanotubes combining various composites have shown greater prospects than the single CNTs in microwave absorbing materials. In this short review, recent advances in CNTs-based microwave absorbing materials were comprehensively discussed. Typically, we introduced the electromagnetic wave absorption mechanism of CNTs-based microwave absorbing materials and generalized the development of CNTs-based microwave absorbers, including CNTs-based magnetic metal composites, CNTs-based ferrite composites, and CNTs-based polymer composites. Ultimately, the growing trend and bottleneck of CNTs-based composites for microwave absorption were analyzed to provide some available ideas to more scientific workers. 相似文献
4.
Since the discovery in 1922 of 2,2-diphenyl-1-(2,4,6-trinitrophenyl) hydrazyl stable free radical (DPPH·), the chemistry of such open-shell compounds has developed continuously, allowing for both theoretical and practical advances in the free radical chemistry area. This review presents the important, general and modern aspects of the chemistry of hydrazyl free radicals and the science behind it. 相似文献
5.
Optimization of room-temperature TCR of polycrystalline La0.9-xSrxK0.1MnO3 ceramics by Sr adjustment
Hongjiang Li Kaili Chu Xingrui Pu Xiaohan Yu Xiaoli Guan Shuaizhao Jin Xiang Liu 《Ceramics International》2021,47(1):94-101
High-density La0.9-xSrxK0.1MnO3 ceramics (LSKMO, A-site = La, Sr and K, 0 ≤ x ≤ 0.25) are successfully fabricated by using facile sol-gel method. Electrical properties are performed by using combination of phenomenological percolation (PP) model, double exchange (DE) mechanism, and Jahn-Teller (JT) effect. Moreover, X-ray diffraction and scanning electron microscopy are employed to analyze the structure and morphology of LSKMO ceramics. Valence states and ionic stoichiometry are assessed by using X-ray photoemission spectrometry. Results reveal that Sr2+ ions, substituting La3+ ions, significantly influenced DE mechanism and JT effect. In addition, Sr-doping plays essential role in improving electrical properties of LSKMO ceramics. At optimal doping content of x = 0.09, peak temperature coefficient of resistance (TCR) of the resistivity is found to be 11.56% K?1 at 297.15 K, which is optimal TCR for A-site K-occupied perovskite manganese oxides. These results confirm that polycrystalline LSKMO ceramics render high room-temperature TCR values due to Sr-doping. 相似文献
6.
Shunda Zhan Bangyan Dong Hongqiang Wang Yonghua Zhao 《Journal of the European Ceramic Society》2021,41(10):5075-5087
Bulk micromachining of single-crystal SiC has been challenging due to its extreme stability both mechanically and chemically. To address this issue, a novel tool-based electrolytic plasma etching method is proposed, with which micropatterns and micro-holes are fabricated in SiC in a hydrofluoric acid-free aqueous solution with no need for masks. The material removal is the result of the combined effects of electrolytic plasma chemistry and physics. The chemistry refers to the reaction of Si with hydroxyl radical to form various SiOx and with H to form silanes, and the reactions of C to form volatile carbon oxides or hydrocarbons, all of which are accomplished and enhanced under the electrolytic plasma atmosphere. Besides, the local high temperature of plasma thermally promotes the evaporation or dissolution of SiO2 in NaOH solution. The tool-based electrolytic plasma etching method provides alternative approaches for the fabrication of SiC-based MEMS and devices. 相似文献
7.
引入句法依存信息到原方面术语,提出一种新的方面术语表示方法,利用Glove词向量表示单词以及单词与单词之间的依存关系,构造出包含句法依存信息的依存关系邻接矩阵和依存关系表示矩阵,利用图卷积神经网络和多头注意力机制将句法依存信息融入到方面术语中,使得方面术语表达与上下文结构高度相关。将改进后的方面词术语表示替换到现有模型后,模型泛化能力得到有效提升。对比试验和分析结果表明:该方法具有有效性和泛化性。 相似文献
8.
9.
Yueqiang LI Chao GAO Bin WU Yushuai WANG Haibo ZHENG Ming XUE Yuling WANG 《等离子体科学和技术》2021,23(2):25501-37
The turbulent boundary layer control on NACA 0012 airfoil with Mach number ranging from 0.3 to 0.5 by a spanwise array of dielectric barrier discharge(DBD)plasma actuators by hot-film sensor technology is investigated.Due to temperature change mainly caused through heat produced along with plasma will lead to measurement error of shear stress measured by hot-film sensor,the correction method that takes account of the change measured by another sensor is used and works well.In order to achieve the value of shear stress change,we combine computational fluid dynamics computation with experiment to calibrate the hot-film sensor.To test the stability of the hot-film sensor,seven repeated measurements of shear stress at Ma = 0.3 are conducted and show that confidence interval of hot-film sensor measurement is from-0.18 to 0.18 Pa and the root mean square is 0.11 Pa giving a relative error 0.5%over all Mach numbers in this experiment.The research on the turbulent boundary layer control with DBD plasma actuators demonstrates that the control makes shear stress increase by about 6%over the three Mach numbers,which is thought to be reliable through comparing it with the relative error 0.5%,and the value is hardly affected by burst frequency and excitation voltage. 相似文献
10.
云计算、大数据、5G通信等技术的快速发展,有力的促进了计算机网络在多个领域的普及和使用,人们已经进入到了“互联网+”时代,实现了工作、生活和学习的数字化、智能化和共享化。计算机网络在为人们提供各种便利服务的同时也面临着许多的安全威胁,比如木马、病毒等,不法分子攻击网络数据中心,破坏用户服务终端及服务器,为人们带来严重的威胁。网络安全学者或企业机构也提出了许多安全防御技术,比如入侵检测技术、深度包过滤技术、防火墙技术、数据加密技术等,一定程度上提高了网络安全防御的能力,但是随着互联网数据流量的增多,需要引入更加先进的人工智能技术,以便能够快速的采集、分析网络数据流,确定数据流中是否存在病毒或木马,以便及时的对其进行查杀,进一步提高网络安全防御的主动性、积极性 相似文献