全文获取类型
收费全文 | 8002篇 |
免费 | 750篇 |
国内免费 | 350篇 |
专业分类
电工技术 | 465篇 |
技术理论 | 3篇 |
综合类 | 572篇 |
化学工业 | 1358篇 |
金属工艺 | 418篇 |
机械仪表 | 534篇 |
建筑科学 | 616篇 |
矿业工程 | 284篇 |
能源动力 | 221篇 |
轻工业 | 457篇 |
水利工程 | 169篇 |
石油天然气 | 616篇 |
武器工业 | 70篇 |
无线电 | 823篇 |
一般工业技术 | 971篇 |
冶金工业 | 384篇 |
原子能技术 | 94篇 |
自动化技术 | 1047篇 |
出版年
2024年 | 49篇 |
2023年 | 155篇 |
2022年 | 310篇 |
2021年 | 398篇 |
2020年 | 293篇 |
2019年 | 246篇 |
2018年 | 260篇 |
2017年 | 286篇 |
2016年 | 273篇 |
2015年 | 356篇 |
2014年 | 391篇 |
2013年 | 464篇 |
2012年 | 499篇 |
2011年 | 533篇 |
2010年 | 486篇 |
2009年 | 461篇 |
2008年 | 393篇 |
2007年 | 369篇 |
2006年 | 397篇 |
2005年 | 363篇 |
2004年 | 229篇 |
2003年 | 260篇 |
2002年 | 232篇 |
2001年 | 198篇 |
2000年 | 216篇 |
1999年 | 200篇 |
1998年 | 141篇 |
1997年 | 108篇 |
1996年 | 121篇 |
1995年 | 98篇 |
1994年 | 73篇 |
1993年 | 43篇 |
1992年 | 45篇 |
1991年 | 45篇 |
1990年 | 26篇 |
1989年 | 25篇 |
1988年 | 19篇 |
1987年 | 14篇 |
1986年 | 6篇 |
1985年 | 4篇 |
1984年 | 5篇 |
1983年 | 3篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 4篇 |
1975年 | 1篇 |
1951年 | 1篇 |
排序方式: 共有9102条查询结果,搜索用时 15 毫秒
1.
《无机及分析化学》在多媒体教学的应用及思考 总被引:1,自引:0,他引:1
对多媒体技术在无机及分析化学教学的应用进行了,阐述和分析,指出使用多媒体教学应注意的问题。 相似文献
2.
Wei Shang Guohao Jing Yulin Wang Tianlong Chen Zhou Liu Zhongzhong Zheng 《Asian journal of control》2023,25(4):2699-2719
The formation control for multiple quadrotors subject to maintaining the formation configuration and collision avoidance in the situation of stochastic links failure is investigated in this paper. First, the distributed formation controller is designed, the position controller is developed to manage the desired formation of position, and the attitude controller is developed to control the translation and rotation movements of the quadrotor. Then, in order to avoid the collisions between multiple quadrotors and the obstacles, a potential energy function method is introduced into the quadrotor formation control combined with the nest adaptive control. Inspired by the design of event trigger controller, a communication compensation controller is designed to ensure the stability of quadrotor formation under the condition of random communication interruption and recovery. Moreover, a prescribed time function is designed, which means the convergence time of the formation system can be set in advance. The prescribed time stability of the formation control system is proved by Lyapunov theory. Finally, the simulation results verify the effectiveness and superiority of this method. 相似文献
3.
4.
X. Li T. Liu P. Lin W. Xiang H. Shang Y. Liu S. Zhang 《Materialwissenschaft und Werkstofftechnik》2023,54(1):98-108
Carbon fiber reinforced composites have attracted lots of attention in many fields. However, on account of the poor infiltration of resin to carbon fiber, the weak interface performance between fiber and resin has been restricting the interface properties of composites. In recent progress, the review attaches more importance to the introduction of the third phase monomer, which mainly uses physical and chemical methods to assemble nanomaterials (such as carbon nanotubes, graphene, etc.) on the carbon fiber surface to modify the interface structure of the carbon fiber reinforced composites, and all of them have been demonstrated in this paper. Furthermore, the effects of introducing nanomaterials on the structure of the fiber/resin interface and the relationship between multi-scale interface structure and properties have been investigated. It can be seen that the design idea of researchers mainly uses one or more theories to improve the interface properties of carbon fiber reinforced composites, such as transition layer, chemical bonding, mechanical interlocking, infiltration, diffusion, and adsorption. In brief, this work provides some novel insights for the preparation of carbon fiber reinforced composites with excellent interlaminar shear strength. 相似文献
5.
在比较电力系统频率跟踪技术中软硬件同步优缺点的基础上,提出了一种基于FPGA的全数字锁相环(ADPLL)电路实现电力系统频率跟踪的技术;将FPGA技术运用于同步跟踪技术中,解决了软硬同步方法中的各个不足之处;全数字锁相环电路采用VHDL语言和FPGA设计,仿真波形和实验结果表明,该电路能够很好地跟踪电网频率的实时变化,相位误差仅为0.1%,频率测量误差仅为0.06%,实现了同频率同相位的锁定;速度快、精度高;对电网的谐波计算有较大的实际意义. 相似文献
6.
7.
Quantum cryptography is believed to be unconditionally secure because its security is ensured by physical laws rather than computational complexity. According to spectrum characteristic, quantum information can be classified into two categories, namely discrete variables and continuous variables. Continuous-variable quantum protocols have gained much attention for their ability to transmit more information with lower cost. To verify the identities of different data sources in a quantum network, we propose a continuous-variable quantum homomorphic signature scheme. It is based on continuous-variable entanglement swapping and provides additive and subtractive homomorphism. Security analysis shows the proposed scheme is secure against replay, forgery and repudiation. Even under nonideal conditions, it supports effective verification within a certain verification threshold. 相似文献
8.
在公共场所中人们都倾向于以分组的形式进行运动,本文把这种以分组形式运动的若干个行人称为运动群组,具有视觉显著性的人群运动群组是场景理解的重点,其对人群的整体运动也影响最大。本文对运动群组的视觉显著性展开了研究,分别从规模、速度、组内紧致度和变化度4个方面来对运动群组的视觉显著性进行度量,并基于该度量给出了视觉显著性运动群组检测方法。首先,利用光流法对运动人群进行分析得到光流向量;然后通过层次聚类算法对运动人群进行分组;最后,基于本文所给出的度量计算每个群组的视觉显著性,以检测出视觉显著性最高的运动群组。实验表明该方法能够有效地对视觉显
著性运动群组进行检测,该研究成果可应用于人群场景理解、人群运动分析和人群场景分类等计算机视觉研究领域。 相似文献
9.
The virtual world has become a new channel in which people can contact with others, and organizations can provide service to their customers. Selling symbolic virtual goods has also emerged as a new economy in the virtual world. Such symbolic goods cannot facilitate people to accomplish any specific tasks; people buy them simply to decorate their avatars. This study is based on the theories of symbolic consumption, self-presentation, and computer-mediated environment, to investigate why people buy decorative symbolic goods in the virtual world. The results show that people buy symbolic virtual goods for both emotional and social values. While user perceived social presence and telepresence affect both social and emotional value of symbolic goods, individual self-presentation motivation affects only social value. Besides, anonymous users in the virtual world show behaviors that differ with non-anonymous ones. 相似文献
10.
Shift-full-rank matrices and applications in space-time trellis codes for relay networks with asynchronous cooperative diversity 总被引:1,自引:0,他引:1
Shang Y. Xia X.-G. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2006,52(7):3153-3167
To achieve full cooperative diversity in a relay network, most of the existing space-time coding schemes require the synchronization between terminals. A family of space-time trellis codes that achieve full cooperative diversity order without the assumption of synchronization has been recently proposed. The family is based on the stack construction by Hammons and El Gamal and its generalizations by Lu and Kumar. It has been shown that the construction of such a family is equivalent to the construction of binary matrices that have full row rank no matter how their rows are shifted, where a row corresponds to a terminal (or transmit antenna) and its length corresponds to the memory size of the trellis code on that terminal. We call such matrices as shift-full-rank (SFR) matrices. A family of SFR matrices has been also constructed, but the memory sizes of the corresponding space-time trellis codes (the number of columns of SFR matrices) grow exponentially in terms of the number of terminals (the number of rows of SFR matrices), which may cause a high decoding complexity when the number of terminals is not small. In this paper, we systematically study and construct SFR matrices of any sizes for any number of terminals. Furthermore, we construct shortest (square) SFR (SSFR) matrices that correspond to space-time trellis codes with the smallest memory sizes and asynchronous full cooperative diversity. We also present some simulation results to illustrate the performances of the space-time trellis codes associated with SFR matrices in asynchronous cooperative communications. 相似文献