首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9086篇
  免费   839篇
  国内免费   196篇
电工技术   577篇
综合类   266篇
化学工业   1778篇
金属工艺   355篇
机械仪表   608篇
建筑科学   755篇
矿业工程   348篇
能源动力   288篇
轻工业   813篇
水利工程   131篇
石油天然气   490篇
武器工业   34篇
无线电   854篇
一般工业技术   1194篇
冶金工业   368篇
原子能技术   36篇
自动化技术   1226篇
  2024年   56篇
  2023年   210篇
  2022年   304篇
  2021年   488篇
  2020年   364篇
  2019年   346篇
  2018年   413篇
  2017年   426篇
  2016年   329篇
  2015年   445篇
  2014年   626篇
  2013年   727篇
  2012年   823篇
  2011年   819篇
  2010年   709篇
  2009年   586篇
  2008年   547篇
  2007年   473篇
  2006年   511篇
  2005年   378篇
  2004年   184篇
  2003年   125篇
  2002年   83篇
  2001年   36篇
  2000年   30篇
  1999年   25篇
  1998年   9篇
  1997年   8篇
  1996年   10篇
  1995年   5篇
  1994年   7篇
  1993年   2篇
  1992年   4篇
  1991年   2篇
  1990年   2篇
  1987年   1篇
  1986年   2篇
  1985年   2篇
  1981年   1篇
  1980年   1篇
  1979年   2篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
101.
In the steel industry, the iron making system deals with large quantities of materials and energy and so it can play a critical role in reducing emissions and production costs. More specifically, excess by-product gases should be used for electricity generation; otherwise, they lead to pollution. A life cycle analysis is performed to compare the environmental impact of an iron making system with a combined cycle power plant (CCPP), to a system producing the same amount of electricity in a coal power plant. The results for a Chinese steel plant show a 33% reduction in the energy conservation and emission reduction potential for the CCPP system, which is thus more environmentally friendly. A mathematical programming formulation is then proposed for optimal scheduling. It incorporates key technological constraints and is sensitive to hourly changing electricity prices. The outcome is a 19% increase in revenue from electricity sales compared to a schedule that does not dynamically adjust to the price profile. The results also show that emissions from by-product gases can be avoided completely. The paper ends with a sensitivity analysis to evaluate the impact of changes in product demand, gas storage and CCPP capacity, and emission cost.  相似文献   
102.
103.
Because of cost and time limitations, reliability experiments frequently contain subsampling, which is a restriction on randomization. A two‐stage approach can analyze right censored Weibull distributed reliability data with subsampling. However, in implementing such a method, we found that it did not address the problems of how to perform confidence intervals of low percentiles and reduce the bias of estimates. In this paper, we present a two‐stage bootstrapping approach and an unbiasing factor approach to solve the aforementioned problems. An example is provided to illustrate the proposed method. In addition, the proposed method is compared with existing methods through simulation. The resulting simulations show that the proposed method performs well in low percentiles. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   
104.
105.
本文通过全面分析电容式密度传感器在液氢环境下结构系数的不确定度来源,并依据测量不确定度评定方法,得到了密度传感器结构系数的不确定度,为液氢密度测量结果的准确性提供了重要的评判依据。  相似文献   
106.
107.
Photoluminescence (PL) of transition metal dichalcogenides (TMDs) can be engineered by controlling the density of defects, which provide active sites for electron-hole recombination, either radiatively or non-radiatively. However, the implantation of defects by external stimulation, such as uniaxial tension and irradiation, tends to introduce local damages or structural non-homogeneity, which greatly degrades their luminescence properties and impede their applicability in constructing optoelectronic devices. In this paper, we present a strategy to introduce a controllable level of defects into the MoS2 monolayers by adding a hydrogen flow during the chemical vapor deposition, without sacrificing their luminescence characteristics. The density of the defect is controlled directly by the concentration of hydrogen. For an appropriate hydrogen flux, the monolayer MoS2 sheets have three times stronger PL emission at the excitonic transitions, compared with those samples with nearly perfect crystalline structure. The defect-bounded exciton transitions at lower energies arising in the defective samples and are maximized when the total PL is the strongest. However, the B exciton, exhibits a monotonic decline as the defect density increases. The Raman spectra of the defective MoS2 reveal a redshift (blueshift) of the in-plane (out-of-plane) vibration modes as the hydrogen flux increases. All the evidence indicates that the generated defects are in the form of sulfur vacancies. This study renders the high-throughput synthesis of defective MoS2 possible for catalysis or light emitting applications.
  相似文献   
108.
Molecular dynamic model of nanofluid between flat plates under shear flow conditions was built. The nanofluid model consisted of 12 spherical copper nanoparticles with each particle diameter of 4 nm and argon atoms as base liquid. The Lennard–Jones (LJ) potential function was adopted to deal with the interactions between atoms. Thus, the motion states of nanoparticles during the process of flowing were obtained and the flow behaviors of nanofluid between flat plates at different moments could be analyzed. The simulation results showed that an absorption layer of argon atoms existed surrounding each nanoparticle and would accompany with the particle to move. The absorption layer contributed little to the flow of nanoparticles but much to the heat transferring in nanofluids. Another phenomenon observed during shear flowing process was that the nanoparticles would vibrate and rotate besides main flowing with liquid argon and these micro-motions could strengthen partial flowing in nanofluids.  相似文献   
109.
计算机硬件技术基础是普通高等教育理工科专业的一门重要计算机公共基础课。本文全面分析了2005年后出版的34本相关教材中教学内容和实验内容,以此为基础阐述了该课程在教材建设方面存在的教学定位不清晰、教学实验单一和教学内容陈旧等三个问题。结合北京理工大学在该课程上的教学实践经验,提出以实验建设为导向,"基本概念"和"基本硬件"相结合的教材组织理念,为该课程教材的进一步建设提供参考。  相似文献   
110.
Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication channel between tag and reader. In this paper, we analyze two recently proposed RFID authentication protocols. Both protocols are vulnerable to tag information leakage and untraceability attacks. For the attack on the first protocol, the adversary only needs to eavesdrop on the messages between reader and tag, and then perform an XOR operation. To attack the second protocol successfully, the adversary may execute a series of carefully designed challenges to determine the tag’s identification.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号