全文获取类型
收费全文 | 5716篇 |
免费 | 356篇 |
国内免费 | 206篇 |
专业分类
电工技术 | 254篇 |
综合类 | 501篇 |
化学工业 | 832篇 |
金属工艺 | 334篇 |
机械仪表 | 367篇 |
建筑科学 | 512篇 |
矿业工程 | 137篇 |
能源动力 | 166篇 |
轻工业 | 392篇 |
水利工程 | 92篇 |
石油天然气 | 258篇 |
武器工业 | 56篇 |
无线电 | 641篇 |
一般工业技术 | 695篇 |
冶金工业 | 320篇 |
原子能技术 | 46篇 |
自动化技术 | 675篇 |
出版年
2024年 | 14篇 |
2023年 | 67篇 |
2022年 | 111篇 |
2021年 | 139篇 |
2020年 | 106篇 |
2019年 | 100篇 |
2018年 | 129篇 |
2017年 | 131篇 |
2016年 | 99篇 |
2015年 | 179篇 |
2014年 | 241篇 |
2013年 | 332篇 |
2012年 | 374篇 |
2011年 | 416篇 |
2010年 | 386篇 |
2009年 | 324篇 |
2008年 | 392篇 |
2007年 | 396篇 |
2006年 | 365篇 |
2005年 | 304篇 |
2004年 | 225篇 |
2003年 | 136篇 |
2002年 | 119篇 |
2001年 | 112篇 |
2000年 | 130篇 |
1999年 | 128篇 |
1998年 | 133篇 |
1997年 | 106篇 |
1996年 | 103篇 |
1995年 | 95篇 |
1994年 | 74篇 |
1993年 | 65篇 |
1992年 | 56篇 |
1991年 | 34篇 |
1990年 | 43篇 |
1989年 | 18篇 |
1988年 | 14篇 |
1987年 | 15篇 |
1986年 | 13篇 |
1985年 | 13篇 |
1984年 | 11篇 |
1983年 | 10篇 |
1982年 | 6篇 |
1977年 | 3篇 |
1976年 | 2篇 |
1975年 | 2篇 |
1972年 | 1篇 |
1968年 | 1篇 |
1967年 | 1篇 |
1965年 | 1篇 |
排序方式: 共有6278条查询结果,搜索用时 15 毫秒
81.
双脉冲激光诱导等离子体在激光加工、元素检测、材料去除等领域有广阔的应用前景和发展空间,对其进行诊断具有重要意义。针对延迟双脉冲激光诱导铝等离子体的作用效果和影响机理,采用双波长干涉法对其时间演化规律展开研究。基于马赫-曾德尔干涉仪搭建了双波长干涉诊断系统,得到了双脉冲激光诱导等离子体干涉图。通过对干涉图的处理和分析,得到了等离子体电子密度随双脉冲激光延迟时间的变化规律。结果表明,随着双脉冲激光延迟时间的增加,第二束脉冲激光对等离子体电子密度的增强效果先加强后减弱。其中,双脉冲激光延迟时间为10 ns时,对等离子体电子密度的增强效果最强,在30 ns时刻,其中心区域平均电子密度可达6.49×1019 cm?3,相较于同等能量单脉冲激光诱导等离子体提升了26%。同时研究了延迟时间对第二束脉冲激光作用机制的影响。研究结果为双脉冲激光诱导等离子体的优化方向提供了参考。 相似文献
82.
介绍了定向控制爆破技术拆除一座烟囱、水塔的结合体,拟爆结构物地坪以上27 m处设置钢筋混凝土结构水箱,致使重心高于一般烟囱,其外壁采用ф12 mm钢筋网箍和60 mm厚混凝土进行加固。周边环境复杂,距高压配电房仅1.4 m,为避免地坪处+0.5 m烟道口对定向的影响,将爆破切口位置提高到+3.0 m处;为减小触地振动、防止倾倒过程中出现后座,采用梯形切口,爆破切口长度取其周长62%,爆破切口高度取1.4 m。为克服烟囱外壁加固层和圆拱墙体钻凿深度不准确的影响,同排相邻炮孔采用一深、一浅的布置方式,其炮眼深度差值2~3 cm,装药结构应用正、反向起爆综合技术。采用开挖减震沟、设置缓冲带控制爆破振动等措施,爆破效果理想,保证了邻近建筑物及设施安全。 相似文献
83.
Ting-Ting Li An-Pang Chen Po-Wen Hwang Yi-Jun Pan Wen-Hao Hsing Ching-Wen Lou 《Materials and Manufacturing Processes》2018,33(2):149-155
This study presents the synergistic effects of graphene nanosheets (GNSs) and carbon fibers (CFs) additions on the electrical and electromagnetic shielding properties of GNS/CF/polypropylene (PP) composites. These composites were fabricated by the melt blending of different ratios of GNSs and CFs (20:0, 15:5, 10:10, 5:15 and 0:20 wt/wt%) into a PP polymer matrix using a Brabender mixer. Besides, the chemical and crystalline structures and the thermal stability of the resultant GNS/CF/PP composites were characterized by Fourier transform infrared (FT-IR) spectroscopy, X-ray diffraction (XRD) and thermogravimetric analysis (TGA). FT-IR and XRD showed that with the addition of GNSs content, transmittances at 1373.4?cm?1 and 1454.4?cm?1 became smaller and the characteristic peak at 26.82° became stronger. TGA showed that the GNS/CF/PP composite can be used at high temperature below 456°C. Blending 10?wt% CFs and 10?wt% GNSs into the PP polymer resulted in excellent conductivity (0.397 S/cm), which indicated the occurrence of the critical percolation threshold phenomenon, and also reached the maximum electromagnetic shielding effectiveness (EMSE) of 20?dB at 1.28–2.00?GHz. Laminated with five layers of composites, its EMSE achieved 25–38?dB at 0.3–3.0?GHz, corresponding to blocking of 94.38–98.74% electromagnetic waves. 相似文献
84.
MRI Probes: Timely Visualization of the Collaterals Formed during Acute Ischemic Stroke with Fe3O4 Nanoparticle‐based MR Imaging Probe (Small 23/2018) 下载免费PDF全文
85.
Behaviormetrika - The paper’s extended Diagnostic Classification Modeling setting assumes (a) nominal item (question) coding, thus including multiple-choice (MC) items, and (b)... 相似文献
86.
87.
为了提高高技术战争条件下电子装备战场抢修的快捷性、时效性,减少备件携带数量,以某雷达火控计算机中4块数字电路板为背景设计了一种多功能替换版;该替换版以一块FPGA芯片为控制核心,并配以海绵电路区和跳线插座的设计,使得在战场紧急情况下只需更换EPROM存储芯片,并在海绵电路区上焊接相应的集成电路器件以及调整跳线插座来控制信号走向,就可以在短时间内方便快捷地对损坏电路板实施替换;结果证实,该技术可作为一种备用的维修手段,可以在很大程度上提高部队装备战场维修率. 相似文献
88.
In order to conveniently analyze stability of uncertain multiple input-delayed closed-loop systems and successfully synthesize passive controllers for a general class of uncertain multiple input-delayed systems with disturbance, the so-called reduction method is applied to the multiple input-delayed systems with parametric uncertainties. A feedback controller associated with the system state and the past control action is designed to guarantee the passivity of the closed-loop systems for all admissible uncertainties. The theoretical findings are illustrated and verified with one numerical example. 相似文献
89.
In this paper, we elaborate an extension of classical power iteration method to nonlinear power iteration for blind separation of multiple independent sources from observed array output signals. The present algorithm, referred to as NPI, considers the estimating of the separating matrix as a nonlinear power iteration problem. By naturally choosing the positive definite normalizer for nonlinear power term, the resulting algorithm not only yields robust convergence behavior but also guarantees the orthonormality of the separating matrix at each iteration. To circumvent the difficulty of solving the inverse square root for the normalizer, an efficient adaptive singular value decomposition (SVD) technique is also adopted to obtain a fast implementation of NPI. The estimation accuracy and convergence speed of the present algorithm are illustrated through simulation results and compared with the existing adaptive algorithms. 相似文献
90.
In many applications, it is desired to dynamically establish temporary multicast groups for secure message delivery. It is also often the case that the group membership information itself is sensitive and needs to be well protected. However, existing solutions either fail to address the issue of membership anonymity or do not scale well for dynamically established groups. In this paper, we propose a highly scalable solution for dynamical multicast group setup with group membership anonymity. In the proposed solution, scalability and membership anonymity are achieved via a novel design that integrates techniques such as ciphertext-policy attribute-based encryption (CP-ABE). In our design, multicast groups are specified through group member attributes. As these attributes are potentially able to be shared by unlimited number of group members, our proposed scheme scales well. Also, high level of membership anonymity is guaranteed such that every group member knows nothing but his own group membership only. The complexity of our proposed scheme in terms of computational overhead and ciphertext size is O(n), where n is the number of attributes and independent to the group size. 相似文献