全文获取类型
收费全文 | 44189篇 |
免费 | 3917篇 |
国内免费 | 2015篇 |
专业分类
电工技术 | 2481篇 |
技术理论 | 2篇 |
综合类 | 2501篇 |
化学工业 | 7686篇 |
金属工艺 | 2608篇 |
机械仪表 | 2931篇 |
建筑科学 | 3025篇 |
矿业工程 | 1296篇 |
能源动力 | 1275篇 |
轻工业 | 2858篇 |
水利工程 | 647篇 |
石油天然气 | 2478篇 |
武器工业 | 337篇 |
无线电 | 5405篇 |
一般工业技术 | 5975篇 |
冶金工业 | 2477篇 |
原子能技术 | 492篇 |
自动化技术 | 5647篇 |
出版年
2024年 | 245篇 |
2023年 | 876篇 |
2022年 | 1511篇 |
2021年 | 2170篇 |
2020年 | 1572篇 |
2019年 | 1461篇 |
2018年 | 1513篇 |
2017年 | 1550篇 |
2016年 | 1452篇 |
2015年 | 1898篇 |
2014年 | 2263篇 |
2013年 | 2695篇 |
2012年 | 2777篇 |
2011年 | 3157篇 |
2010年 | 2481篇 |
2009年 | 2443篇 |
2008年 | 2456篇 |
2007年 | 2184篇 |
2006年 | 2291篇 |
2005年 | 1837篇 |
2004年 | 1332篇 |
2003年 | 1197篇 |
2002年 | 1125篇 |
2001年 | 981篇 |
2000年 | 951篇 |
1999年 | 996篇 |
1998年 | 835篇 |
1997年 | 714篇 |
1996年 | 631篇 |
1995年 | 526篇 |
1994年 | 408篇 |
1993年 | 277篇 |
1992年 | 228篇 |
1991年 | 205篇 |
1990年 | 169篇 |
1989年 | 155篇 |
1988年 | 101篇 |
1987年 | 88篇 |
1986年 | 57篇 |
1985年 | 51篇 |
1984年 | 37篇 |
1983年 | 37篇 |
1982年 | 29篇 |
1981年 | 23篇 |
1980年 | 26篇 |
1979年 | 17篇 |
1978年 | 15篇 |
1976年 | 18篇 |
1975年 | 10篇 |
1973年 | 13篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
Faa‐Jeng Lin Jonq‐Chin Hwang Kuang‐Hsiung Tan Zong‐Han Lu Yung‐Ruei Chang 《Asian journal of control》2012,14(3):768-783
An intelligent control for a stand‐alone doubly‐fed induction generator (DFIG) system using a proportional‐integral‐derivative neural network (PIDNN) is proposed in this study. This system can be applied as a stand‐alone power supply system or as the emergency power system when the electricity grid fails for all sub‐synchronous, synchronous, and super‐synchronous conditions. The rotor side converter is controlled using field‐oriented control to produce 3‐phase stator voltages with constant magnitude and frequency at different rotor speeds. Moreover, the grid side converter, which is also controlled using field‐oriented control, is primarily implemented to maintain the magnitude of the DC‐link voltage. Furthermore, the intelligent PIDNN controller is proposed for both the rotor and grid side converters to improve the transient and steady‐state responses of the DFIG system for different operating conditions. Both the network structure and online learning algorithm are introduced in detail. Finally, the feasibility of the proposed control scheme is verified through experimentation. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society 相似文献
92.
Pattern recognition techniques have been widely used in a variety of scientific disciplines including computer vision, artificial intelligence, biology, and so forth. Although many methods present satisfactory performances, they still have several weak points, thus leaving a lot of space for further improvements. In this paper, we propose two performance-driven subspace learning methods by extending the principal component analysis (PCA) and the kernel PCA (KPCA). Both methods adopt a common structure where genetic algorithms are employed to pursue optimal subspaces. Because the proposed feature extractors aim at achieving high classification accuracy, enhanced generalization ability can be expected. Extensive experiments are designed to evaluate the effectiveness of the proposed algorithms in real-world problems including object recognition and a number of machine learning tasks. Comparative studies with other state-of-the-art techniques show that the methods in this paper are capable of enhancing generalization ability for pattern recognition systems. 相似文献
93.
Jinguang Han Willy Susilo Yi Mu Jun Yan 《International Journal of Information Security》2012,11(6):389-401
Oblivious signature-based envelope (OSBE) schemes have demonstrated their potential applications in the protection of users privacy and rights. In an OSBE protocol, an encrypted message can only be decrypted by the receiver who holds a valid signature on a public message, while the sender (encrypter) does not know whether the receiver has the signature or not. Our major contributions in this work lie in the following aspects. We improve the notion of OSBE so that a valid credential holder cannot share his/her credential with other users (i.e., all-or-nothing non-transferability). We clarify the relationship between one-round OSBE and identity-based encryption (IBE) and show that one-round OSBE and semantically secure IBE against the adaptively chosen identity attack (IND-ID-CPA) are equivalent, if the signature in the OSBE scheme is existentially unforgeable against adaptively chosen message attacks. We propose an oblivious access control scheme to protect user privacy without the aid of any zero-knowledge proof. Finally, we also highlight some other novel applications of OSBE, such as attributed-based encryption. 相似文献
94.
Qiyong Han Xiaodong Zhang Dong Chen Pengfei Wang 《Metallurgical and Materials Transactions B》1988,19(4):617-622
The equilibrium Ca3P2(s) = 3[Ca] + 2[P] was studied at 1600 ° by equilibrating liquid iron, saturated with Ca3P2, and contained in a TiN crucible, with Ca vapor. The source of Ca was liquid Ca contained in an Mo crucible, and the vapor
pressure of Ca was varied by varying the position of the Mo crucible in the temperature gradient of a vertical tube furnace.
A least-squares analysis of the data gave and. The simultaneous equilibria CaO(s) = [Ca] + [O] and CaS(s) = [Ca] + [S] were studied at 1600 ° by equilibrating liquid iron, contained in a pressed and sintered CaO-CaS crucible with
Ca vapor. The advantage of this technique is that two equilibrium constants,K
cas andK
cao, and two interaction coefficients, and can be determined from one set of experiments. It was determined that, at 1600 °,K
cas = 5.9 × 10−8
K
cao = 5.5 × 10−9,, and.
Formerly Graduate Students 相似文献
95.
Simulation of stainless-steel weld metals was performed using a Gleeble-1500 thermomechanical simulator. Two classes of materials were investigated, including both fully austenitic and austenitic-ferritic stainless steels. The niobium content varied within each class. The simulation comprised heating to melting point, melting for a short time, and cooling to a number of temperatures, at which point the samples were fractured under a tensile load. The hot ductility, in terms of reduction of area, was measured. Metallographic examinations were performed using both optical and electron microscopy. The hot ductilities of the austenitic-ferritic weld metals investigated were superior to those of fully austenitic weld metals of corresponding niobium content. The beneficial effects of ferrite were found to decrease with increasing niobium content. The effect of niobium on hot ductility was detrimental, i.e. an increase in niobium content resulted in a decrease in hot ductility which was attributed to the formation of (FeCrNi)2Nb-, a low melting eutectic, along the austenitic grain boundaries. The criterion of hot ductility by simulation of the weld metals was also found to be reliable for evaluating susceptibility to solidification cracking. 相似文献
96.
红外弱小目标的匹配方法研究与仿真 总被引:1,自引:0,他引:1
研究红外图像中的目标匹配问题。针对传统的红外图像中目标匹配效果不理想,匹配不准确。当红外图像中是弱小目标时,背景灰度值与目标灰度值非常相近,灰度直方图均衡化无法实现目标与背景的完整分离,导致漏匹配率较高的问题。为提高目标的匹配精度,提出一种形态学预处理的红外目标匹配方法,通过形态学算法提取出图像中的形状信息,利用形状信息将红外图像中的目标与背景完整分离,避免了只依靠灰度图像信息造成的不能完整分离目标与背景带来的漏匹配问题。进行仿真的结果证明,采用的形态学与处理的匹配方法能够完整将目标与背景分离,成功完成目标匹配,取得了满意的结果。 相似文献
97.
研究了一种制造低电电压氧化锌压敏电阻器的方法。在基本成分的基础上适当加入二氧化钛可降低梯度电压(V1mA/mm),适量掺硼和改进热处理工艺可减小元件的漏电流和提高其稳定性。 相似文献
98.
Silicon - In this paper, an analytical model for negative capacitance double gate field effect transistor (NC-DG-FET) is proposed. This model includes interface traps and temperature effects, which... 相似文献
99.
利用室内自行研制的可调频脉动水力压裂系统及预制充填型单缝的煤岩,开展不同频率条件下水力脉动解堵试验,研究脉动作用下解堵水压演化过程和解堵效果。试验结果表明,水力脉动解堵压力演化过程可分为三个阶段:压力上升阶段、压力下降阶段和压力波动稳定阶段。在疲劳损伤和脉动波的双重作用下,脉动作用下的煤岩解堵表现出解堵压力阀值比定常流作用下更低、压降持续时间更短、压降幅值更小的特点。定常流作用下煤粉运移集中在压力下降阶段;脉动压力作用下煤粉在压力下降阶段和压力波动稳定阶段均有运移,且压力下降时间与运移煤粉总量成正相关关系,但煤粉总的运移量和定常流作用下的相当。脉动作用和定常流作用下径向渗透主要发生在压力上升至压力峰值阶段,但脉动流的解堵时间短,则滤液渗透半径小对储层的伤害小。综合考虑解堵压力、煤粉运移、解堵渗透路径和解堵渗流深度,特别是解堵压力和解堵渗流深度作为主要评价因素,在3 Hz条件下解堵效果最好,其具有较低的解堵压力和最小的解堵渗流深度。 相似文献
100.
利用快速测长法研究了混合材对碱—碳酸盐反应的影响。通过试验证明混合材能减缓碱—碳酸盐反应的速度,但不能有效地抑制碱—碳酸盐反应,并初步探讨了混合材不能有效地抑制碱—碳酸盐反应的机理。 相似文献