全文获取类型
收费全文 | 42290篇 |
免费 | 5660篇 |
国内免费 | 2901篇 |
专业分类
电工技术 | 3094篇 |
技术理论 | 10篇 |
综合类 | 6050篇 |
化学工业 | 2949篇 |
金属工艺 | 1067篇 |
机械仪表 | 2828篇 |
建筑科学 | 3673篇 |
矿业工程 | 1469篇 |
能源动力 | 1418篇 |
轻工业 | 581篇 |
水利工程 | 1148篇 |
石油天然气 | 948篇 |
武器工业 | 681篇 |
无线电 | 3813篇 |
一般工业技术 | 4762篇 |
冶金工业 | 2465篇 |
原子能技术 | 359篇 |
自动化技术 | 13536篇 |
出版年
2024年 | 541篇 |
2023年 | 765篇 |
2022年 | 925篇 |
2021年 | 1126篇 |
2020年 | 1335篇 |
2019年 | 1247篇 |
2018年 | 1283篇 |
2017年 | 1439篇 |
2016年 | 1581篇 |
2015年 | 1614篇 |
2014年 | 2383篇 |
2013年 | 2981篇 |
2012年 | 2747篇 |
2011年 | 3148篇 |
2010年 | 2598篇 |
2009年 | 2667篇 |
2008年 | 2818篇 |
2007年 | 2940篇 |
2006年 | 2666篇 |
2005年 | 2287篇 |
2004年 | 1830篇 |
2003年 | 1544篇 |
2002年 | 1282篇 |
2001年 | 1014篇 |
2000年 | 870篇 |
1999年 | 758篇 |
1998年 | 607篇 |
1997年 | 519篇 |
1996年 | 440篇 |
1995年 | 424篇 |
1994年 | 344篇 |
1993年 | 298篇 |
1992年 | 275篇 |
1991年 | 193篇 |
1990年 | 162篇 |
1989年 | 183篇 |
1988年 | 135篇 |
1987年 | 75篇 |
1986年 | 98篇 |
1985年 | 75篇 |
1984年 | 74篇 |
1983年 | 57篇 |
1982年 | 59篇 |
1981年 | 47篇 |
1980年 | 35篇 |
1979年 | 37篇 |
1978年 | 33篇 |
1977年 | 28篇 |
1964年 | 26篇 |
1955年 | 35篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
42.
Designing Metallic and Insulating Nanocrystal Heterostructures to Fabricate Highly Sensitive and Solution Processed Strain Gauges for Wearable Sensors 下载免费PDF全文
Woo Seok Lee Seung‐Wook Lee Hyungmok Joh Mingi Seong Haneun Kim Min Su Kang Ki‐Hyun Cho Yun‐Mo Sung Soong Ju Oh 《Small (Weinheim an der Bergstrasse, Germany)》2017,13(47)
All‐solution processed, high‐performance wearable strain sensors are demonstrated using heterostructure nanocrystal (NC) solids. By incorporating insulating artificial atoms of CdSe quantum dot NCs into metallic artificial atoms of Au NC thin film matrix, metal–insulator heterostructures are designed. This hybrid structure results in a shift close to the percolation threshold, modifying the charge transport mechanism and enhancing sensitivity in accordance with the site percolation theory. The number of electrical pathways is also manipulated by creating nanocracks to further increase its sensitivity, inspired from the bond percolation theory. The combination of the two strategies achieves gauge factor up to 5045, the highest sensitivity recorded among NC‐based strain gauges. These strain sensors show high reliability, durability, frequency stability, and negligible hysteresis. The fundamental charge transport behavior of these NC solids is investigated and the combined site and bond percolation theory is developed to illuminate the origin of their enhanced sensitivity. Finally, all NC‐based and solution‐processed strain gauge sensor arrays are fabricated, which effectively measure the motion of each finger joint, the pulse of heart rate, and the movement of vocal cords of human. This work provides a pathway for designing low‐cost and high‐performance electronic skin or wearable devices. 相似文献
43.
YIN YunFei GONG GuangHong & HAN Liang College of Computer Science Chongqing University Chongqing China School of Automation Science Electrical Engineering Beijing University of Aeronautics Astronautics Beijing 《中国科学:信息科学(英文版)》2011,(4)
For the large quantity of data,rules and models generated in the course of computer generated forces (CGFs) behavior modeling,the common analytical methods are statistical methods based on the tactical rules,tactical doctrine and empirical knowledge.However,from the viewpoint of data mining,we can find many of these analytical methods are also each-and-every different data mining methods.In this paper,we survey the data mining theory and techniques that have appeared in the course of CGF behavior modeling f... 相似文献
44.
The spectral properties of the incidence matrix of the communication graph are exploited to provide solutions to two multi-agent control problems. In particular, we consider the problem of state agreement with quantized communication and the problem of distance-based formation control. In both cases, stabilizing control laws are provided when the communication graph is a tree. It is shown how the relation between tree graphs and the null space of the corresponding incidence matrix encode fundamental properties for these two multi-agent control problems. 相似文献
45.
Sanjeev Saxena 《Information Processing Letters》2010,110(4):168-170
In this paper a linear time algorithm is proposed for preprocessing the edges of a graph. After preprocessing (in linear time), the fundamental cut set of any tree edge can be determined in time proportional to the size of that cut set. 相似文献
46.
Circular splicing systems are a formal model of a generative mechanism of circular words, inspired by a recombinant behaviour of circular DNA. Some unanswered questions are related to the computational power of such systems, and finding a characterization of the class of circular languages generated by circular splicing systems is still an open problem. In this paper we solve this problem for monotone complete systems, which are finite circular splicing systems with rules of a simpler form. We show that a circular language L is generated by a monotone complete system if and only if the set Lin(L) of all words corresponding to L is a pure unitary language generated by a set closed under the conjugacy relation. The class of pure unitary languages was introduced by A. Ehrenfeucht, D. Haussler, G. Rozenberg in 1983, as a subclass of the class of context-free languages, together with a characterization of regular pure unitary languages by means of a decidable property. As a direct consequence, we characterize (regular) circular languages generated by monotone complete systems. We can also decide whether the language generated by a monotone complete system is regular. Finally, we point out that monotone complete systems have the same computational power as finite simple systems, an easy type of circular splicing system defined in the literature from the very beginning, when only one rule of a specific type is allowed. From our results on monotone complete systems, it follows that finite simple systems generate a class of languages containing non-regular languages, showing the incorrectness of a longstanding result on simple systems. 相似文献
47.
In this paper, we consider the following nonlinear fractional three-point boundary value problem
48.
为了能够在认知无线电网络中有效、准确地检测出授权用户,提出了基于改进的证据理论的合作频谱感知方案设计方法.根据各个次用户对授权用户进行多次本地检测得出的时域DS融合结果,设计并改进融合顺序和融合结构,将多个时域DS融合结果送到融合中心进行空域DS融合,得到最终判决.在此基础上,给出了融合顺序、融合结构的改变对算法性能的... 相似文献
49.
Geometrically non-linear behavior of structural systems with random material property: An asymptotic spectral stochastic approach 总被引:1,自引:0,他引:1
M. Tootkaboni L. Graham-Brady B.W. Schafer 《Computer Methods in Applied Mechanics and Engineering》2009,198(37-40):3173-3185
An asymptotic spectral stochastic approach is presented for computing the statistics of the equilibrium path in the post-bifurcation regime for structural systems with random material properties. The approach combines numerical implementation of Koiter’s asymptotic theory with a stochastic Galerkin scheme and collocation in stochastic space to quantify uncertainties in the parametric representation of the load–displacement relationship, specifically in the form of uncertain post-buckling slope, post-buckling curvature, and a family of stochastic displacement fields. Using the proposed method, post-buckling response statistics for two plane frames are obtained and shown to be in close agreement with those obtained from Monte Carlo simulation, provided a fine enough spectral representation is used to model the variability in the random dimension. 相似文献
50.
We consider the problem of revenue maximization on multi‐unit auctions where items are distinguished by their relative values; any pair of items has the same ratio of values to all buyers. As is common in the study of revenue maximizing problems, we assume that buyers' valuations are drawn from public known distributions and they have additive valuations for multiple items. Our problem is well motivated by sponsored search auctions, which made money for Google and Yahoo! in practice. In this auction, each advertiser bids an amount bi to compete for ad slots on a web page. The value of each ad slot corresponds to its click‐through‐rate, and each buyer has her own per‐click valuations, which is her private information. Obviously, a strategic bidder may bid an amount that is different with her true valuation to improve her utility. Our goal is to design truthful mechanisms avoiding this misreporting. We develop the optimal (with maximum revenue) truthful auction for a relaxed demand model (where each buyer i wants at most di items) and a sharp demand model (where buyer i wants exactly di items). We also find an auction that always guarantees at least half of the revenue of the optimal auction when the buyers are budget constrained. Moreover, all of the auctions we design can be computed efficiently, that is, in polynomial time. 相似文献