全文获取类型
收费全文 | 9086篇 |
免费 | 839篇 |
国内免费 | 196篇 |
专业分类
电工技术 | 577篇 |
综合类 | 266篇 |
化学工业 | 1778篇 |
金属工艺 | 355篇 |
机械仪表 | 608篇 |
建筑科学 | 755篇 |
矿业工程 | 348篇 |
能源动力 | 288篇 |
轻工业 | 813篇 |
水利工程 | 131篇 |
石油天然气 | 490篇 |
武器工业 | 34篇 |
无线电 | 854篇 |
一般工业技术 | 1194篇 |
冶金工业 | 368篇 |
原子能技术 | 36篇 |
自动化技术 | 1226篇 |
出版年
2024年 | 56篇 |
2023年 | 210篇 |
2022年 | 304篇 |
2021年 | 488篇 |
2020年 | 364篇 |
2019年 | 346篇 |
2018年 | 413篇 |
2017年 | 426篇 |
2016年 | 329篇 |
2015年 | 445篇 |
2014年 | 626篇 |
2013年 | 727篇 |
2012年 | 823篇 |
2011年 | 819篇 |
2010年 | 709篇 |
2009年 | 586篇 |
2008年 | 547篇 |
2007年 | 473篇 |
2006年 | 511篇 |
2005年 | 378篇 |
2004年 | 184篇 |
2003年 | 125篇 |
2002年 | 83篇 |
2001年 | 36篇 |
2000年 | 30篇 |
1999年 | 25篇 |
1998年 | 9篇 |
1997年 | 8篇 |
1996年 | 10篇 |
1995年 | 5篇 |
1994年 | 7篇 |
1993年 | 2篇 |
1992年 | 4篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
101.
In the steel industry, the iron making system deals with large quantities of materials and energy and so it can play a critical role in reducing emissions and production costs. More specifically, excess by-product gases should be used for electricity generation; otherwise, they lead to pollution. A life cycle analysis is performed to compare the environmental impact of an iron making system with a combined cycle power plant (CCPP), to a system producing the same amount of electricity in a coal power plant. The results for a Chinese steel plant show a 33% reduction in the energy conservation and emission reduction potential for the CCPP system, which is thus more environmentally friendly. A mathematical programming formulation is then proposed for optimal scheduling. It incorporates key technological constraints and is sensitive to hourly changing electricity prices. The outcome is a 19% increase in revenue from electricity sales compared to a schedule that does not dynamically adjust to the price profile. The results also show that emissions from by-product gases can be avoided completely. The paper ends with a sensitivity analysis to evaluate the impact of changes in product demand, gas storage and CCPP capacity, and emission cost. 相似文献
102.
103.
Guodong Wang Zhanwen Niu Shanshan Lv Liang Qu Zhen He 《Quality and Reliability Engineering International》2016,32(5):1945-1953
Because of cost and time limitations, reliability experiments frequently contain subsampling, which is a restriction on randomization. A two‐stage approach can analyze right censored Weibull distributed reliability data with subsampling. However, in implementing such a method, we found that it did not address the problems of how to perform confidence intervals of low percentiles and reduce the bias of estimates. In this paper, we present a two‐stage bootstrapping approach and an unbiasing factor approach to solve the aforementioned problems. An example is provided to illustrate the proposed method. In addition, the proposed method is compared with existing methods through simulation. The resulting simulations show that the proposed method performs well in low percentiles. Copyright © 2015 John Wiley & Sons, Ltd. 相似文献
104.
Memory Devices: Eliminating Negative‐SET Behavior by Suppressing Nanofilament Overgrowth in Cation‐Based Memory (Adv. Mater. 48/2016) 下载免费PDF全文
105.
106.
107.
Ke Wu Zhe Li Jibo Tang Xianglong Lv Hailing Wang Ruichun Luo Pan Liu Lihua Qian Shunping Zhang Songliu Yuan 《Nano Research》2018,11(8):4123-4132
Photoluminescence (PL) of transition metal dichalcogenides (TMDs) can be engineered by controlling the density of defects, which provide active sites for electron-hole recombination, either radiatively or non-radiatively. However, the implantation of defects by external stimulation, such as uniaxial tension and irradiation, tends to introduce local damages or structural non-homogeneity, which greatly degrades their luminescence properties and impede their applicability in constructing optoelectronic devices. In this paper, we present a strategy to introduce a controllable level of defects into the MoS2 monolayers by adding a hydrogen flow during the chemical vapor deposition, without sacrificing their luminescence characteristics. The density of the defect is controlled directly by the concentration of hydrogen. For an appropriate hydrogen flux, the monolayer MoS2 sheets have three times stronger PL emission at the excitonic transitions, compared with those samples with nearly perfect crystalline structure. The defect-bounded exciton transitions at lower energies arising in the defective samples and are maximized when the total PL is the strongest. However, the B exciton, exhibits a monotonic decline as the defect density increases. The Raman spectra of the defective MoS2 reveal a redshift (blueshift) of the in-plane (out-of-plane) vibration modes as the hydrogen flux increases. All the evidence indicates that the generated defects are in the form of sulfur vacancies. This study renders the high-throughput synthesis of defective MoS2 possible for catalysis or light emitting applications. 相似文献
108.
Molecular dynamic model of nanofluid between flat plates under shear flow conditions was built. The nanofluid model consisted
of 12 spherical copper nanoparticles with each particle diameter of 4 nm and argon atoms as base liquid. The Lennard–Jones
(LJ) potential function was adopted to deal with the interactions between atoms. Thus, the motion states of nanoparticles
during the process of flowing were obtained and the flow behaviors of nanofluid between flat plates at different moments could
be analyzed. The simulation results showed that an absorption layer of argon atoms existed surrounding each nanoparticle and
would accompany with the particle to move. The absorption layer contributed little to the flow of nanoparticles but much to
the heat transferring in nanofluids. Another phenomenon observed during shear flowing process was that the nanoparticles would
vibrate and rotate besides main flowing with liquid argon and these micro-motions could strengthen partial flowing in nanofluids. 相似文献
109.
110.
Radio frequency identification (RFID) systems suffer many security risks because they use an insecure wireless communication
channel between tag and reader. In this paper, we analyze two recently proposed RFID authentication protocols. Both protocols
are vulnerable to tag information leakage and untraceability attacks. For the attack on the first protocol, the adversary
only needs to eavesdrop on the messages between reader and tag, and then perform an XOR operation. To attack the second protocol
successfully, the adversary may execute a series of carefully designed challenges to determine the tag’s identification. 相似文献