全文获取类型
收费全文 | 75534篇 |
免费 | 7595篇 |
国内免费 | 6766篇 |
专业分类
电工技术 | 6354篇 |
技术理论 | 15篇 |
综合类 | 7884篇 |
化学工业 | 3093篇 |
金属工艺 | 645篇 |
机械仪表 | 3227篇 |
建筑科学 | 3729篇 |
矿业工程 | 1272篇 |
能源动力 | 1671篇 |
轻工业 | 993篇 |
水利工程 | 1332篇 |
石油天然气 | 736篇 |
武器工业 | 1069篇 |
无线电 | 8851篇 |
一般工业技术 | 4782篇 |
冶金工业 | 2355篇 |
原子能技术 | 225篇 |
自动化技术 | 41662篇 |
出版年
2024年 | 327篇 |
2023年 | 1042篇 |
2022年 | 1337篇 |
2021年 | 1795篇 |
2020年 | 2187篇 |
2019年 | 1932篇 |
2018年 | 1798篇 |
2017年 | 2417篇 |
2016年 | 2741篇 |
2015年 | 2764篇 |
2014年 | 4977篇 |
2013年 | 5881篇 |
2012年 | 4823篇 |
2011年 | 5360篇 |
2010年 | 4054篇 |
2009年 | 4782篇 |
2008年 | 4976篇 |
2007年 | 5178篇 |
2006年 | 4620篇 |
2005年 | 4126篇 |
2004年 | 3515篇 |
2003年 | 3173篇 |
2002年 | 2514篇 |
2001年 | 2038篇 |
2000年 | 1792篇 |
1999年 | 1432篇 |
1998年 | 1149篇 |
1997年 | 983篇 |
1996年 | 871篇 |
1995年 | 720篇 |
1994年 | 660篇 |
1993年 | 595篇 |
1992年 | 443篇 |
1991年 | 413篇 |
1990年 | 319篇 |
1989年 | 259篇 |
1988年 | 223篇 |
1987年 | 186篇 |
1986年 | 152篇 |
1985年 | 198篇 |
1984年 | 213篇 |
1983年 | 186篇 |
1982年 | 160篇 |
1981年 | 106篇 |
1980年 | 84篇 |
1979年 | 98篇 |
1978年 | 63篇 |
1977年 | 72篇 |
1976年 | 21篇 |
1975年 | 16篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
981.
针对MAG焊焊接过程的特点,采用被动式视觉传感的方式,利用近红外CCD摄像机,配合1064nm窄带滤光片和0.1%中性减光片组成的复合滤光系统,很好地排除了弧光的干扰,采集到大量高清晰的MAG焊短路过渡、射滴过渡、射流过渡熔池图像.利用数字图像处理技术对熔池图像进行图像处理,并提取出反映焊接质量的图像特征信息.对于单幅熔池图像进行了灰度分析,并提取了三条熔池图像等值轮廓线;对于连续多帧熔池图像,提出了利用熔池图像差影检测和熔池图像平均灰度来研究MAG焊焊接过程的新思路,为熔化极气体保护焊焊接过程质量控制奠定了基础. 相似文献
982.
总结了板材拉深试冲时的综合故障及原因,应用小波技术加混合式数据融合方法,将数据级、特征级和决策级融合通过神经网络方法综合在一起,对板材拉深试冲时的缺陷进行智能诊断,描述了小波神经网络的建模过程,探讨了通过多源互补信息减少故障诊断系统不确定性的优化方法,并给出了诊断结果。 相似文献
983.
基于柔性工程数据库的CAD与PDM系统集成方法研究 总被引:3,自引:0,他引:3
分析了信息集成的各种方式 ,研究了当前CAD与PDM系统集成过程中面临的实际问题 ,提出了以柔性工程数据库为基础的CAD与PDM系统集成的解决方法 ,并且描述了系统的框架结构。 相似文献
984.
A. Littner M. Francois B. Malaman J. Steinmetz M. Vilasi E. Elkaim 《Intermetallics》2003,11(11-12):1223
Efforts to improve the high temperature behavior of MoSi2 in oxidizing environments led to the investigation of the Mo–Ru–Si phase diagram. The isothermal section at 1673 K was determined by X-ray diffraction, optical and scanning electron microscopies and EPMA. Five new silicides were identified and their crystallographic structure was characterized using conventional and synchrotron X-ray as well as neutron powder diffraction. Mo15Ru35Si50, denoted α-phase, is of FeSi-type structure, space group P213, a=4.7535 (5) Å, Dx=7.90 g. cm−3, Bragg R=7.13. Mo60Ru30Si10 is the ordered extension of the Mo70Ru30 σ-phase with space group P42/mnm, a=9.45940(8) Å, c=4.94273(5) Å, Dx=6.14 g. cm−3, Bragg R=5.75. 相似文献
985.
986.
Supply chain management (SCM) is an important strategic tool that requires careful planning and management. While the availability of real-time information is a critical aspect of an SCM system, it possesses a potential to disrupt supply chain participants. Thus, the success of an SCM system hinges on how well participants deal with changes taking place in a real-time environment. This study adopts the concept of the real-time enterprise to understand the role of change management on SCM performance based on the concept of the information orientation. The study empirically validated the role of change management on SCM performance. 相似文献
987.
Travel patterns have gradually changed from group travel to individual travel. An increasing number of people acquire travel information through various types of media. One of the alternative information sources is social media, which enables users to exchange information among members. However, one of the characteristics of social media is information sharing, not information search, which involves both giving (i.e. posting) and taking (i.e. selective reading, forwarding, replying, linking, and liking) information. Compared to the ‘giving’ side of information-sharing research, less effort has been spent on the ‘taking’ side of information research. Therefore, we investigate travel information adoption in social media as well as how individuals communicate with each other. We use the elaboration likelihood model, which measures the impact of central (e.g. argument quality) and peripheral (e.g. credibility) cues on traveller information-sharing behaviour corresponding with social presence on social media. The results of an empirical analysis of 527 respondents, who were experienced in travel information adoption via social media, were examined. Our findings revealed that argument quality had a positive effect on perceived usefulness and source credibility positively affected perceived usefulness and social relationships. Perceived usefulness had a significant positive effect on social relationships. Both perceived usefulness and social relationships affected travel information adoption. Lastly, the levels of argument quality and source credibility perceived by social media members were found to differ according to the level of social presence. 相似文献
988.
We investigate the global robust tracking problem via output feedback for a class of cascade nonlinear systems with dynamic uncertainties and non-vanishing disturbances. It does not require a priori knowledge of the sign of the high-frequency gain. A recursive design scheme is presented using the ideas of pseudosign function, Nussbaum-type gain technique and the deadzone method. It is shown that under some conditions, the tracking error can be guaranteed asymptotic to the interval [?ε, ε]?? with arbitrary prescribed ε>0 after a finite time, while keeping all signals of the resulting closed-loop systems bounded. The simulation results demonstrate the effectiveness of the proposed algorithm. 相似文献
989.
Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distributing a secret K among a finite set of participants, in such a way that only predefined subset of participant is enabled to reconstruct a secret from their shares. A secret sharing scheme realizing uniform access structure described by a graph has received a considerable attention. In this scheme, each vertex represents a participant and each edge represents a minimum authorized subset. In this paper, an independent dominating set of vertices in a graph G is introduced and applied as a novel idea to construct a secret sharing scheme such that the vertices of the graph represent the participants and the dominating set of vertices in G represents the minimal authorized set. While most of the previous schemes were based on the principle of adjacent vertices, the proposed scheme is based upon the principle of non-adjacent vertices. We prove that the scheme is perfect, and the lower bound of the information rate of this new construction is improved when compared to some well-known previous constructions. We include an experiment involving security threats to demonstrate the effectiveness of the proposed scheme. 相似文献
990.
We place the continuous-time orbit problem in P, sharpening the decidability result shown by Hainry [7]. 相似文献