全文获取类型
收费全文 | 19777篇 |
免费 | 2003篇 |
国内免费 | 944篇 |
专业分类
电工技术 | 1361篇 |
综合类 | 1295篇 |
化学工业 | 2888篇 |
金属工艺 | 1330篇 |
机械仪表 | 1312篇 |
建筑科学 | 1621篇 |
矿业工程 | 707篇 |
能源动力 | 475篇 |
轻工业 | 1616篇 |
水利工程 | 396篇 |
石油天然气 | 1304篇 |
武器工业 | 183篇 |
无线电 | 2265篇 |
一般工业技术 | 2284篇 |
冶金工业 | 940篇 |
原子能技术 | 184篇 |
自动化技术 | 2563篇 |
出版年
2024年 | 150篇 |
2023年 | 432篇 |
2022年 | 744篇 |
2021年 | 1042篇 |
2020年 | 755篇 |
2019年 | 602篇 |
2018年 | 624篇 |
2017年 | 726篇 |
2016年 | 581篇 |
2015年 | 816篇 |
2014年 | 1045篇 |
2013年 | 1148篇 |
2012年 | 1286篇 |
2011年 | 1328篇 |
2010年 | 1180篇 |
2009年 | 1125篇 |
2008年 | 1046篇 |
2007年 | 1001篇 |
2006年 | 1104篇 |
2005年 | 1018篇 |
2004年 | 657篇 |
2003年 | 583篇 |
2002年 | 544篇 |
2001年 | 425篇 |
2000年 | 420篇 |
1999年 | 424篇 |
1998年 | 358篇 |
1997年 | 323篇 |
1996年 | 278篇 |
1995年 | 242篇 |
1994年 | 185篇 |
1993年 | 118篇 |
1992年 | 92篇 |
1991年 | 72篇 |
1990年 | 61篇 |
1989年 | 55篇 |
1988年 | 44篇 |
1987年 | 22篇 |
1986年 | 16篇 |
1985年 | 10篇 |
1984年 | 9篇 |
1983年 | 8篇 |
1982年 | 8篇 |
1981年 | 7篇 |
1980年 | 5篇 |
1959年 | 3篇 |
1951年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 16 毫秒
81.
Unusual Formation of ZnCo2O4 3D Hierarchical Twin Microspheres as a High‐Rate and Ultralong‐Life Lithium‐Ion Battery Anode Material 下载免费PDF全文
Jing Bai Xiaogang Li Guangzeng Liu Yitai Qian Shenglin Xiong 《Advanced functional materials》2014,24(20):3012-3020
A facile two‐step strategy involving a polyol method and subsequent thermal annealing treatment is successfully developed for the large‐scale preparation of ZnCo2O4 various hierarchical micro/nanostructures (twin mcrospheres and microcubes) without surfactant assistance. To the best of our knowledge, this is the first report on the synthesis of ZnCo2O4 mesoporous twin microspheres and microcubes. More significantly, based on the effect of the reaction time on the morphology evolution of the precursor, a brand‐new crystal growth mechanism, multistep splitting then in situ dissolution recrystallization accompanied by morphology and phase change, is first proposed to understand the formation of the 3D twin microshperes, providing new research opportunity for investigating the formation of novel micro/nanostructures. When evaluated as anode materials for lithium‐ion batteries (LIBs), ZnCo2O4 hierarchical microstructures exhibit superior capacity retention, excellent cycling stability at the 5 A g?1 rate for 2000 cycles. Surprisingly, the ZnCo2O4 twin microspheres show an exceptionally high rate capability up to the 10 A g?1 rate. It should be noted that such super‐high rate performance and cycling stability at such high charge/discharge rates are significantly higher than most work previously reported on ZnCo2O4 micro/nanostructures and ZnCo2O4‐based heterostructures. The ZnCo2O4 3D hierarchical micro/nanostructures demonstrate the great potential as negative electrode materials for high‐performance LIBs. 相似文献
82.
阐述一种新型剪刀式桥梁展桥机构的工作原理。针对方案样机在架设初始状态时展桥机构驱动油缸小腔受力过大、引起间断液压油溢流问题,利用Denavit-Hatenberg齐次变换矩阵建立展桥机构的运动学和静力学模型。根据展桥机构驱动油缸闭锁力与驱动力不同的特点,提出确定剪刀式桥梁展桥机构关键铰点位置的多目标优化计算方法。对剪刀式桥梁方案样机展桥机构的关键铰点位置进行优化设计,利用机械系统动力学分析ADAMS软件进一步验证了优化计算模型。研究结果表明:优化后展桥油缸的最大拉力降幅达59.5%,展桥油缸的受力分布趋于合理;所提出的展桥机构计算模型正确;优化方法具有收敛速度快、稳定性好等特点;展桥机构优化计算结果为方案样机改进提供了依据。 相似文献
83.
为抑制摩擦非线性因素对电动直线负载模拟器(ELLS)的影响,采用仿真与实验结合的方法分析摩擦对ELLS的影响。利用遗传算法对系统中的摩擦模型进行辨识,并得出了系统摩擦力与速度的关系;提出了一种摩擦前馈加变增益PID的混合控制方法,摩擦前馈用于消除摩擦对系统的影响,变增益PID用于进一步抑制系统在低速时的相位滞后;进行了对比仿真与实验。仿真分析与实验结果表明:与传统PID控制相比,采用摩擦前馈加变增益PID控制的ELLS加载波形畸变被抑制、加载误差与相位滞后均明显减少;所提出控制方法能够较好地抑制摩擦对ELLS的影响,提高加载精度。 相似文献
84.
为详细了解高氯酸铵(AP)对5,5'-联四唑-1,1'-二氧二羟铵(HATO)热分解影响的机制,采用热重-质谱-傅里叶红外光谱(TG-MS-FTIR)联用技术、差示扫描量热法(DSC)、傅里叶红外光谱(FTIR)方法,对HATO和HATO/AP共混物的热分解特性、气体产物以及凝聚相变化进行了研究。结果表明,HATO具有两个连续热分解阶段,HATO/AP共混物则有3个热分解阶段;HATO、AP共混后,HATO使得AP熔融峰消失,AP可使HATO的热分解初始温度提前,热分解时间延长且不影响分解完全性;HATO热分解气体产物有CO_2、N_2O、HCN、NH_3、NO、N_2、H_2O,而HATO/AP共混物热分解产生气体主要有N_2、CO_2、N_2O、HCN、NH_3、H_2O、HCN、NO、HCl、NOCl;另外,采用等转化率法计算HATO和HATO/AP共混物四唑环基团的活化能分别为53.38 kJ·mol~(-1)和60.69 kJ·mol~(-1);通过对比HATO和HATO/AP共混物热分解特性以及凝聚相特征基团的变化,阐释了AP使HATO热分解温度提前的机理很可能是:AP的铵根离子与HATO之间发生了质子转移;推测AP导致HATO热分解时间延长的原因为:HATO/AP共混物产生的NH_3与热分解中间体1,1'-二羟基-5,5-联四唑(BTO)反应生成5,5'-联四唑-1,1'-二氧铵盐(ABTOX)。 相似文献
85.
Chip on glass (COG) technology is widely used in liquid crystal display (LCD) modules for connecting driver ICs to the displays especially for middle and small size panels. The most common COG technology currently used in display applications is based on anisotropic conductive films (ACF). As the increasing demand in higher resolution and cost reduction, the bump pitch of the driver ICs becomes finer and finer. With the reduction of bump pitch, the current ACF based COG technology is confronted with two issues: one is the increase of the chances of open circuit; the other is the increase of the chances of forming shorts. A new approach for ultra-fine pitch chip on glass (COG) bonding, named ”Particle on Bump (POB)”, is proposed in this paper. In this technique, conductive particles are planted on the top surface of bumps of a driver IC through Au–Sn intermetallic connection. The driver IC is then assembled on the glass substrate of a LCD panel with an insulated adhesive by thermal press. The new method ensures that electrical connections are established only between bumps and corresponding pads. The Au–Sn reflow process for particle planting and corresponding COG bonding process were investigated in detail. The results showed that reliable connections were formed between particles and bumps through an Au–Sn intermetallic layer and final COG interconnections thus formed performed well in reliability tests. It is concluded that the POB technique overcomes the shortcomings of current ACF technique and has good potential to provide a viable ultra-fine pitch flip chip on glass solution for display applications. 相似文献
86.
Chromosome banding patterns are very important features for karyotyping, based on which cytogenetic diagnosis procedures are conducted. Due to cell culture, staining, and imaging conditions, image enhancement is a desirable preprocessing step before performing chromosome classification. In this paper, we apply a family of differential wavelet transforms (Wang and Lee, 1998), (Wang, 1999) for this purpose. The proposed differential filters facilitate the extraction of multiscale geometric features of chromosome images. Moreover, desirable fast computation can be realized. We study the behavior of both banding edge pattern and noise in the wavelet transform domain. Based on the fact that image geometrical features like edges are correlated across different scales in the wavelet representation, a multiscale point-wise product (MPP) is used to characterize the correlation of the image features in the scale-space. A novel algorithm is proposed for the enhancement of banding patterns in a chromosome image. In order to compare objectively the performance of the proposed algorithm against several existing image-enhancement techniques, a quantitative criteria, the contrast improvement ratio (CIR), has been adopted to evaluate the enhancement results. The experimental results indicate that the proposed method consistently outperforms existing techniques in terms of the CIR measure, as well as in visual effect. The effect of enhancement on cytogenetic diagnosis is further investigated by classification tests conducted prior to and following the chromosome image enhancement. In comparison with conventional techniques, the proposed method leads to better classification results, thereby benefiting the subsequent cytogenetic diagnosis. 相似文献
87.
Achieving fast and bandwidth-efficient shared-path protection 总被引:4,自引:0,他引:4
Yizhi Xiong Dahai Xu Chunming Qiao 《Lightwave Technology, Journal of》2003,21(2):365-371
Dynamic provisioning of restorable bandwidth guaranteed paths is a challenge in the design of broad-band transport networks, especially next-generation optical networks. A common approach is called (failure-independent) path protection, whereby for every mission-critical active path to be established, a link (or node) disjoint backup path (BP) is also established. To optimize network resource utilization, shared path protection should be adopted, which often allows a new BP to share the bandwidth allocated to some existing BPs. However, it usually leads the backup paths to use too many links, with zero cost in term of additional backup bandwidth, along its route. It will violate the restoration time guarantee. In this paper, we propose novel integer linear programming (ILP) formulations by introducing two parameters (/spl epsi/ and /spl mu/) in both the sharing with complete information (SCI) scheme and the distributed partial information management (DPIM) scheme. Our results show that the proposed ILP formulations can not only improve the network resource utilization effectively, but also keep the BPs as short as possible. 相似文献
88.
Cancer Therapy: Targeted Nanoparticle‐Mediated Gene Therapy Mimics Oncolytic Virus for Effective Melanoma Treatment (Adv. Funct. Mater. 29/2018) 下载免费PDF全文
89.
The mobility and openness of wireless communication technologies make Mobile Healthcare Systems (mHealth) potentially exposed to a number of potential attacks, which significantly undermines their utility and impedes their widespread deployment. Attackers and criminals, even without knowing the context of the transmitted data, with simple eavesdropping on the wireless links, may benefit a lot from linking activities to the identities of patient’s sensors and medical staff members. These vulnerabilities apply to all tiers of the mHealth system. A new anonymous mutual authentication scheme for three-tier mobile healthcare systems with wearable sensors is proposed in this paper. Our scheme consists of three protocols: Protocol-1 allows the anonymous authentication nodes (mobile users and controller nodes) and the HSP medical server in the third tier, while Protocol-2 realizes the anonymous authentication between mobile users and controller nodes in the second tier, and Protocol-3 achieves the anonymous authentication between controller nodes and the wearable body sensors in the first tier. In the design of our protocols, the variation in the resource constraints of the different nodes in the mHealth system are taken into consideration so that our protocols make a better trade-off among security, efficiency and practicality. The security of our protocols are analyzed through rigorous formal proofs using BAN logic tool and informal discussions of security features, possible attacks and countermeasures. Besides, the efficiency of our protocols are concretely evaluated and compared with related schemes. The comparisons show that our scheme outperforms the previous schemes and provides more complete and integrated anonymous authentication services. Finally, the security of our protocols are evaluated by using the Automated Validation of Internet Security Protocols and Applications and the SPAN animator software. The simulation results show that our scheme is secure and satisfy all the specified privacy and authentication goals. 相似文献
90.