全文获取类型
收费全文 | 113754篇 |
免费 | 12781篇 |
国内免费 | 9149篇 |
专业分类
电工技术 | 10701篇 |
技术理论 | 2篇 |
综合类 | 11464篇 |
化学工业 | 13506篇 |
金属工艺 | 7828篇 |
机械仪表 | 8236篇 |
建筑科学 | 9362篇 |
矿业工程 | 4192篇 |
能源动力 | 3449篇 |
轻工业 | 11121篇 |
水利工程 | 3974篇 |
石油天然气 | 4323篇 |
武器工业 | 1627篇 |
无线电 | 12026篇 |
一般工业技术 | 10290篇 |
冶金工业 | 4528篇 |
原子能技术 | 2019篇 |
自动化技术 | 17036篇 |
出版年
2024年 | 538篇 |
2023年 | 1601篇 |
2022年 | 3523篇 |
2021年 | 4876篇 |
2020年 | 3519篇 |
2019年 | 2576篇 |
2018年 | 2758篇 |
2017年 | 3179篇 |
2016年 | 3026篇 |
2015年 | 4846篇 |
2014年 | 6106篇 |
2013年 | 7265篇 |
2012年 | 9133篇 |
2011年 | 9509篇 |
2010年 | 9244篇 |
2009年 | 8772篇 |
2008年 | 9335篇 |
2007年 | 9263篇 |
2006年 | 8115篇 |
2005年 | 6908篇 |
2004年 | 5117篇 |
2003年 | 3690篇 |
2002年 | 3452篇 |
2001年 | 3129篇 |
2000年 | 2511篇 |
1999年 | 1186篇 |
1998年 | 538篇 |
1997年 | 406篇 |
1996年 | 335篇 |
1995年 | 231篇 |
1994年 | 202篇 |
1993年 | 166篇 |
1992年 | 136篇 |
1991年 | 88篇 |
1990年 | 63篇 |
1989年 | 64篇 |
1988年 | 47篇 |
1987年 | 37篇 |
1986年 | 32篇 |
1985年 | 18篇 |
1984年 | 16篇 |
1983年 | 18篇 |
1982年 | 11篇 |
1981年 | 11篇 |
1980年 | 24篇 |
1979年 | 18篇 |
1976年 | 2篇 |
1964年 | 2篇 |
1959年 | 13篇 |
1951年 | 20篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
Liyan Wen Gang Tao Bin Jiang 《International Journal of Adaptive Control and Signal Processing》2021,35(3):373-400
In this article, adaptive compensation designs are developed for nonlinear systems with uncertainties from the system functions and persistent actuator failures of characterizations that (i) some unknown system inputs are stuck at some unknown fixed or varying values at unknown time instants and (ii) the failure pattern always switches from one to another and the switching does not stop. Such a controlled plant is described by an uncertain time-varying nonlinear system, and some robust adaptive feedback linearization based failure compensation results are studied for closed-loop system stabilization and bounded output tracking for some specific conditions. To improve the tracking performance in the presence of persistent actuator failures, a new adaptive control scheme is developed, using the failure indicator function which contains the failure pattern and failure time in the formulation. Detailed stability and tracking performance are shown. Simulation results are shown to verify the effectiveness of the proposed adaptive actuator failure compensation method. 相似文献
22.
Rachana R. Borkute Sren Woelke Gang Pei Anca Dorhoi 《International journal of molecular sciences》2021,22(9)
Neutrophils readily infiltrate infection foci, phagocytose and usually destroy microbes. In tuberculosis (TB), a chronic pulmonary infection caused by Mycobacterium tuberculosis (Mtb), neutrophils harbor bacilli, are abundant in tissue lesions, and their abundances in blood correlate with poor disease outcomes in patients. The biology of these innate immune cells in TB is complex. Neutrophils have been assigned host-beneficial as well as deleterious roles. The short lifespan of neutrophils purified from blood poses challenges to cell biology studies, leaving intracellular biological processes and the precise consequences of Mtb–neutrophil interactions ill-defined. The phenotypic heterogeneity of neutrophils, and their propensity to engage in cellular cross-talk and to exert various functions during homeostasis and disease, have recently been reported, and such observations are newly emerging in TB. Here, we review the interactions of neutrophils with Mtb, including subcellular events and cell fate upon infection, and summarize the cross-talks between neutrophils and lung-residing and -recruited cells. We highlight the roles of neutrophils in TB pathophysiology, discussing recent findings from distinct models of pulmonary TB, and emphasize technical advances that could facilitate the discovery of novel neutrophil-related disease mechanisms and enrich our knowledge of TB pathogenesis. 相似文献
23.
In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one bit secret information. Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource, it makes this protocol more convenient from an applied point of view. 相似文献
24.
Basins with various mineral resources coexisting and enriching often occupy an important strategic position. The exploration of various mineral resources is repetitive at present due to unshared data and imperfect management mechanism. This situation greatly increases the cost of energy exploitation in the country. Traditional data-sharing mode has several disadvantages, such as high cost, difficulty in confirming the right of data, and lack of incentive mechanism, which make achieving real data sharing difficult. In this paper, we propose a data-sharing mechanism based on blockchain and provide implementation suggestions and technical key points. Compared with traditional data-sharing methods, the proposed data-sharing mechanism can realize data sharing, ensure data quality, and protect intellectual property. Moreover, key points in the construction are stated in the case study section to verify the feasibility of the data-sharing system based on blockchain proposed in this paper. 相似文献
25.
26.
Wang Qibin Zhao Bo Ma Hongbo Chang Jiantao Mao Gang 《Journal of Mechanical Science and Technology》2019,33(6):2561-2571
Journal of Mechanical Science and Technology - Real-time monitoring and rapid evaluation of bearing operating conditions, especially for the reliability evaluation and remaining useful life (RUL)... 相似文献
27.
In the early design stage, automotive modeling should both meet the requirements of aesthetics and engineering. Therefore, a vehicle CAD (computer aided design) model that can be easily adjusted by feedbacks is necessary. Based on CE-Bézier surface, this paper presents a set of algorithms for parametric segmentation and fairing surface generation in a car model. This model is defined by a simplified automotive template and relevant control points, shape parameters and segmentation parameters, which can be modified to alter the car form efficiently. With this model and the corresponding adjustment method, more than fifty various vehicle models are established in this research according to different parameters. And two methods for calculating similarity index between car models are constructed, which are suitable for brand design trend analysis and modelling design decisionmaking. 相似文献
28.
29.
近年来,我国传统暴力犯罪与成年人犯罪呈下降态势,但是,犯罪案由层出不穷。为有效提升公安实践工作中犯罪预测能力,打击各类违法犯罪事件,本文针对犯罪数据,提出一种新型犯罪预测模型。利用密度聚类分析方法将犯罪数据分类,然后进行数据降维提取关键属性生成特征数据,继而对特征数据进行加权优化并采用机器学习的方式对特征数据进行学习,从而预测犯罪案由。实验结果表明,与传统方法相比,本文方法具有更好的预测效果,为公安实践工作中类似案件的侦破和预防,提供新的路径支撑。 相似文献
30.