全文获取类型
收费全文 | 17914篇 |
免费 | 1644篇 |
国内免费 | 832篇 |
专业分类
电工技术 | 1156篇 |
综合类 | 1186篇 |
化学工业 | 2599篇 |
金属工艺 | 1195篇 |
机械仪表 | 1177篇 |
建筑科学 | 1444篇 |
矿业工程 | 631篇 |
能源动力 | 420篇 |
轻工业 | 1452篇 |
水利工程 | 336篇 |
石油天然气 | 1186篇 |
武器工业 | 160篇 |
无线电 | 2023篇 |
一般工业技术 | 2063篇 |
冶金工业 | 885篇 |
原子能技术 | 140篇 |
自动化技术 | 2337篇 |
出版年
2024年 | 111篇 |
2023年 | 341篇 |
2022年 | 554篇 |
2021年 | 772篇 |
2020年 | 600篇 |
2019年 | 495篇 |
2018年 | 517篇 |
2017年 | 621篇 |
2016年 | 494篇 |
2015年 | 721篇 |
2014年 | 931篇 |
2013年 | 1049篇 |
2012年 | 1147篇 |
2011年 | 1186篇 |
2010年 | 1081篇 |
2009年 | 1047篇 |
2008年 | 980篇 |
2007年 | 956篇 |
2006年 | 1060篇 |
2005年 | 982篇 |
2004年 | 620篇 |
2003年 | 547篇 |
2002年 | 526篇 |
2001年 | 409篇 |
2000年 | 404篇 |
1999年 | 405篇 |
1998年 | 350篇 |
1997年 | 305篇 |
1996年 | 268篇 |
1995年 | 230篇 |
1994年 | 180篇 |
1993年 | 110篇 |
1992年 | 89篇 |
1991年 | 68篇 |
1990年 | 58篇 |
1989年 | 53篇 |
1988年 | 42篇 |
1987年 | 22篇 |
1986年 | 14篇 |
1985年 | 10篇 |
1984年 | 9篇 |
1983年 | 8篇 |
1982年 | 8篇 |
1981年 | 6篇 |
1980年 | 2篇 |
1951年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
Chromosome banding patterns are very important features for karyotyping, based on which cytogenetic diagnosis procedures are conducted. Due to cell culture, staining, and imaging conditions, image enhancement is a desirable preprocessing step before performing chromosome classification. In this paper, we apply a family of differential wavelet transforms (Wang and Lee, 1998), (Wang, 1999) for this purpose. The proposed differential filters facilitate the extraction of multiscale geometric features of chromosome images. Moreover, desirable fast computation can be realized. We study the behavior of both banding edge pattern and noise in the wavelet transform domain. Based on the fact that image geometrical features like edges are correlated across different scales in the wavelet representation, a multiscale point-wise product (MPP) is used to characterize the correlation of the image features in the scale-space. A novel algorithm is proposed for the enhancement of banding patterns in a chromosome image. In order to compare objectively the performance of the proposed algorithm against several existing image-enhancement techniques, a quantitative criteria, the contrast improvement ratio (CIR), has been adopted to evaluate the enhancement results. The experimental results indicate that the proposed method consistently outperforms existing techniques in terms of the CIR measure, as well as in visual effect. The effect of enhancement on cytogenetic diagnosis is further investigated by classification tests conducted prior to and following the chromosome image enhancement. In comparison with conventional techniques, the proposed method leads to better classification results, thereby benefiting the subsequent cytogenetic diagnosis. 相似文献
92.
Achieving fast and bandwidth-efficient shared-path protection 总被引:4,自引:0,他引:4
Yizhi Xiong Dahai Xu Chunming Qiao 《Lightwave Technology, Journal of》2003,21(2):365-371
Dynamic provisioning of restorable bandwidth guaranteed paths is a challenge in the design of broad-band transport networks, especially next-generation optical networks. A common approach is called (failure-independent) path protection, whereby for every mission-critical active path to be established, a link (or node) disjoint backup path (BP) is also established. To optimize network resource utilization, shared path protection should be adopted, which often allows a new BP to share the bandwidth allocated to some existing BPs. However, it usually leads the backup paths to use too many links, with zero cost in term of additional backup bandwidth, along its route. It will violate the restoration time guarantee. In this paper, we propose novel integer linear programming (ILP) formulations by introducing two parameters (/spl epsi/ and /spl mu/) in both the sharing with complete information (SCI) scheme and the distributed partial information management (DPIM) scheme. Our results show that the proposed ILP formulations can not only improve the network resource utilization effectively, but also keep the BPs as short as possible. 相似文献
93.
Cancer Therapy: Targeted Nanoparticle‐Mediated Gene Therapy Mimics Oncolytic Virus for Effective Melanoma Treatment (Adv. Funct. Mater. 29/2018) 下载免费PDF全文
94.
The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient’s sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals. 相似文献
95.
96.
On the complexity of and algorithms for finding the shortest path with a disjoint counterpart 总被引:4,自引:0,他引:4
Dahai Xu Yang Chen Yizhi Xiong Chunming Qiao Xin He 《Networking, IEEE/ACM Transactions on》2006,14(1):147-158
Finding a disjoint path pair is an important component in survivable networks. Since the traffic is carried on the active (working) path most of the time, it is useful to find a disjoint path pair such that the length of the shorter path (to be used as the active path) is minimized. In this paper, we first address such a Min-Min problem. We prove that this problem is NP-complete in either single link cost (e.g., dedicated backup bandwidth) or dual link cost (e.g., shared backup bandwidth) networks. In addition, it is NP-hard to obtain a K-approximation to the optimal solution for any K>1. Our proof is extended to another open question regarding the computational complexity of a restricted version of the Min-Sum problem in an undirected network with ordered dual cost links (called the MSOD problem). To solve the Min-Min problem efficiently, we introduce a novel concept called conflicting link set which provides insights into the so-called trap problem, and develop a divide-and-conquer strategy. The result is an effective heuristic for the Min-Min problem called COnflicting Link Exclusion (COLE), which can outperform other approaches in terms of both the optimality and running time. We also apply COLE to the MSOD problem to efficiently provide shared path protection and conduct comprehensive performance evaluation as well as comparison of various schemes for shared path protection. We show that COLE not only processes connection requests much faster than existing integer linear programming (ILP)-based approaches but also achieves a good balance among the active path length, bandwidth efficiency, and recovery time. 相似文献
97.
Naihe Liu Jian Xiong Gang Wang Zhen He Junqian Dai Yongsong Zhang Yu Huang Zheling Zhang Dongjie Wang Sha Li Bo Liu Xuefan Deng Haibo Zhang Jian Zhang 《Advanced functional materials》2023,33(28):2300396
Efficient modification of the interface between metal cathode and electron transport layer are critical for achieving high performance and stability of the inverted perovskite solar cells (PSCs). Herein, a new alcohol-soluble rhodamine-functionalized dodecahydro-closo-dodecaborate derivate, RBH, is developed and applied as an efficient cathode interlayer to overcome the (6,6)-phenyl-C61 butyrie acid methyl ester (PCBM)/Ag interface issues. By introducing RBH cathode interlayer, the functions of the interface traps passivation, interfacial hydrophobicity enhancement, interface contact improvement as well as built-in potential enhancement are realized at the same time and thus correspondingly improve the device performance and stability. Consequently, a power conversion efficiency (PCE) of 21.08% and high fill factor of 83.37% are achieved, which is one of the highest values based on solution-processed MAPbI3/PCBM heterojunction PSCs. Moreover, RBH can act as a shielding layer to slow down moisture erosion and self-corrosion. The PCE of the RBH devices still maintain 84% for 456 h (85 °C @ N2), 87% for 360 h (23 °C @ relative humidity (RH) 35%) of its initial PCE value, while the control device can only maintain ≈23%, 58% of its initial PCE value under the same exposure conditions, respectively. 相似文献
98.
Guohua Zhang Jingrun Qin Yue Zhang Guodong Gong Zi-Yu Xiong Xiangyu Ma Ziyu Lv Ye Zhou Su-Ting Han 《Advanced functional materials》2023,33(42):2302929
The booming development of artificial intelligence (AI) requires faster physical processing units as well as more efficient algorithms. Recently, reservoir computing (RC) has emerged as an alternative brain-inspired framework for fast learning with low training cost, since only the weights associated with the output layers should be trained. Physical RC becomes one of the leading paradigms for computation using high-dimensional, nonlinear, dynamic substrates. Among them, memristor appears to be a simple, adaptable, and efficient framework for constructing physical RC since they exhibit nonlinear features and memory behavior, while memristor-implemented artificial neural networks display increasing popularity towards neuromorphic computing. In this review, the memristor-implemented RC systems from the following aspects: architectures, materials, and applications are summarized. It starts with an introduction to the RC structures that can be simulated with memristor blocks. Specific interest then focuses on the dynamic memory behaviors of memristors based on various material systems, optimizing the understanding of the relationship between the relaxation behaviors and materials, which provides guidance and references for building RC systems coped with on-demand application scenarios. Furthermore, recent advances in the application of memristor-based physical RC systems are surveyed. In the end, the further prospects of memristor-implemented RC system in a material view are envisaged. 相似文献
99.
Yikun Su Weirui Yu Liming Liao Xinbo Xiong Huanwen Chen Lingzhi Hu Tongjia Lei Jinlai Zhao Dong Chen Wenjie Mai 《Advanced functional materials》2023,33(42):2303976
Photo-electrochemical (PEC) water splitting is a promising method for converting solar energy into clean energy, but the mechanism of improving PEC efficiency through the interfacial contact and defect strategy remains highly controversial. Herein, reduced graphene oxide (rGO) and oxygen vacancies are introduced into α-Fe2O3 nanorod (NR) arrays using a simple spin-coating method and acid treatment. The resultant oxygen vacancy–α-Fe2O3/rGO-integrated system exhibits a higher photocurrent, four times than the pristine α-Fe2O3. It is well evidenced that the electronic interface interaction between α-Fe2O3 and rGO is boosted with the oxygen vacancies, facilitating electron transfer from α-Fe2O3 to rGO. Moreover, the oxygen vacancies not only create interband states in α-Fe2O3 that can trap photogenerated holes and thus facilitate charge separation but significantly also strengthen the adsorption of oxidative intermediates and reduce the energy barrier of rate-determining step during oxygen evolution reaction (OER). This study demonstrates an rGO–oxygen vacancy synergistic interfacial contact and defect modification approach to design semiconducting photocatalysts for high-efficiency solar energy capture and conversion. The generated principle is expected to be extendable to another material system. 相似文献
100.
电磁搅拌作用下激光熔池电磁场、温度场和流场的数值模拟 总被引:1,自引:0,他引:1
建立了描述电磁搅拌辅助激光熔凝过程的电磁场和流场的三维数学模型,采用有限元和有限体积结合的方法实现激光熔池中电磁场与温度场及流场的耦合模拟分析,研究了电磁场对激光熔池流场与温度场的影响。结果表明,电磁力在水平面上呈周向分布,切向电磁力的大小从熔池边缘到中心递减;在旋转磁场的作用下,熔池内温度略有降低,温度梯度减小;熔池内液体趋向旋转运动,速度场分布与电磁力相似;熔池纵向环流增加,使熔池内的熔体对流加剧,有利于传热,加快冷却;激励电流大小对电磁场和熔池流场有明显影响。为激光加工提供理论参考。 相似文献