全文获取类型
收费全文 | 40414篇 |
免费 | 5565篇 |
国内免费 | 2712篇 |
专业分类
电工技术 | 7554篇 |
技术理论 | 3篇 |
综合类 | 2669篇 |
化学工业 | 3019篇 |
金属工艺 | 1095篇 |
机械仪表 | 1198篇 |
建筑科学 | 1799篇 |
矿业工程 | 480篇 |
能源动力 | 5840篇 |
轻工业 | 4666篇 |
水利工程 | 1263篇 |
石油天然气 | 1226篇 |
武器工业 | 299篇 |
无线电 | 3805篇 |
一般工业技术 | 3206篇 |
冶金工业 | 628篇 |
原子能技术 | 219篇 |
自动化技术 | 9722篇 |
出版年
2024年 | 297篇 |
2023年 | 1175篇 |
2022年 | 1771篇 |
2021年 | 2041篇 |
2020年 | 2019篇 |
2019年 | 1845篇 |
2018年 | 1481篇 |
2017年 | 1720篇 |
2016年 | 1664篇 |
2015年 | 1828篇 |
2014年 | 2796篇 |
2013年 | 2493篇 |
2012年 | 2953篇 |
2011年 | 2995篇 |
2010年 | 2210篇 |
2009年 | 2154篇 |
2008年 | 2084篇 |
2007年 | 2397篇 |
2006年 | 2087篇 |
2005年 | 1839篇 |
2004年 | 1656篇 |
2003年 | 1334篇 |
2002年 | 1103篇 |
2001年 | 891篇 |
2000年 | 702篇 |
1999年 | 592篇 |
1998年 | 465篇 |
1997年 | 346篇 |
1996年 | 318篇 |
1995年 | 269篇 |
1994年 | 240篇 |
1993年 | 165篇 |
1992年 | 149篇 |
1991年 | 98篇 |
1990年 | 66篇 |
1989年 | 59篇 |
1988年 | 59篇 |
1987年 | 48篇 |
1986年 | 43篇 |
1985年 | 55篇 |
1984年 | 33篇 |
1983年 | 28篇 |
1982年 | 23篇 |
1981年 | 18篇 |
1980年 | 16篇 |
1979年 | 13篇 |
1978年 | 9篇 |
1977年 | 9篇 |
1975年 | 7篇 |
1974年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
991.
New energy storage devices such as batteries and supercapacitors are widely used in various felds because of their
irreplaceable excellent characteristics. Because there are relatively few monitoring parameters and limited understanding of their operation, they present problems in accurately predicting their state and controlling operation, such
as state of charge, state of health, and early failure indicators. Poor monitoring can seriously afect the performance of
energy storage devices. Therefore, to maximize the efciency of new energy storage devices without damaging the
equipment, it is important to make full use of sensing systems to accurately monitor important parameters such as
voltage, current, temperature, and strain. These are highly related to their states. Hence, this paper reviews the sensing
methods and divides them into two categories: embedded and non-embedded sensors. A variety of measurement
methods used to measure the above parameters of various new energy storage devices such as batteries and supercapacitors are systematically summarized. The methods with diferent innovative points are listed, their advantages
and disadvantages are summarized, and the application of optical fber sensors is emphasized. Finally, the challenges
and prospects for these studies are described. The intent is to encourage researchers in relevant felds to study the
early warning of safety accidents from the root causes. 相似文献
992.
现有的电池储能模型一方面认为电池的充放电功率和效率为固定不变的,另一方面有关电池储能的充放电过程对循环老化的影响缺少考虑,这与电池单元本体的非线性等效电路模型相违背。因此,考虑电池储能的循环老化成本、需求侧响应,提出了交直流混合配电网动态重构方法。通过对实际电池储能的充放电功率的运行区域进行采样,在凸包络的采样点集合中将非理想状态下的电池储能模型重构为线性模型。在此基础上,分别建立了基于累积吞吐电量和放电深度的循环老化成本模型,构建了综合成本最小化的交直流混合配电网动态重构模型。并采用混合整数二阶锥规划方法求解。在改进的33节点算例上仿真验证了所提基于放电深度的循环老化成本模型的经济性,分析了交直流混合配电网重构方法经济性的影响因素。 相似文献
993.
为简化含分布电源的配电网故障定位算法过程,并提高故障定位算法的容错性,以矩阵算法为基础提出一种改进的区段定位算法。首先,建立描述节点区段关系的结构描述矩阵,并通过判断是否检测到过电流及过流方向建立故障信息矩阵。然后,利用结构描述矩阵和故障信息矩阵相乘得到故障判断矩阵,并根据区段对应矩阵中行元素构成的不同将区段划分类型,建立各类型区段下反映所有故障情况的故障判据。最后,对照故障判断矩阵行元素与故障判据,判断出发生故障的区段。针对配网中FTU上传信息易发生畸变的情况,提出了基于相量校正的信息畸变校正方法,通过故障电流与正常运行电流相位差异进行定位结果的修正,降低故障信息畸变对定位结果的影响。对DG的投切状况以及配电网两相和三相短路的单重多重故障进行仿真,结果验证了所提故障定位算法的原理简单、准确度好并具有一定的容错能力。 相似文献
994.
为抑制直流母线低频波动功率对储能系统的影响,以飞跨电容双向直流变换器为研究对象,提出基于单目标定频模型预测控制(model predictive control, MPC)低频波动功率抑制策略。为降低传统MPC算法的运算负荷,通过对变换器数学模型进行分析,提出一种单目标定频MPC控制算法。该算法仅需通过电感电流单目标约束函数,即可实现对系统电流及双端飞跨电容电压的控制,无须对两端飞跨电容电压进行独立寻优,极大地降低了计算量。为实现对储能系统低频波动功率的抑制,引入低频波动功率抑制算法,通过与所提MPC算法的融合,使最终控制方案能够在实现储能控制目标的前提下,具备低频波动功率抑制能力,且保持良好的动态性能。通过搭建小功率实验平台对所提控制策略的有效性进行了验证。 相似文献
995.
为了使微电网控制系统中PI控制器的参数能够更好地适应可再生能源的随机性和波动性,提出了基于自适应步长的四分区多策略果蝇优化算法(fruit fly optimization algorithm, FOA)对PI参数进行实时优化。首先,以风光燃储微电网不同微源控制系统中的变换器为控制对象,建立微电网整体控制系统模型,基于此模型实时调整PI参数。然后,根据不同果蝇个体的适应度值将果蝇种群分为4个区,同时考虑4个区果蝇收敛性以及多样性的差异,设计不同的自适应更新策略。最后,采用所提算法对各微源控制过程中的PI参数进行寻优,与其他3种智能算法进行对比,验证了所提算法的可行性和优越性。仿真结果表明,所提算法可以使系统变换器响应速度更快,输出更加稳定。 相似文献
996.
Bowen Jin Yuanhui Liu Junya Cui Shimeng Zhang Yu Wu Annan Xu Ming Xu Mingfei Shao 《Advanced functional materials》2023,33(31):2301909
Regarding the complex properties of various cations, the design of aqueous batteries that can simultaneously store multi-ions with high capacity and satisfactory rate performance is a great challenge. Here an amorphization strategy to boost cation-ion storage capacities of anode materials is reported. In monovalent (H+, Li+, K+), divalent (Mg2+, Ca2+, Zn2+) and even trivalent (Al3+) aqueous electrolytes, the capacity of the resulting amorphous MoOx is more than quadruple than that of crystalline MoOx and exceeds those of other reported multiple-ion storage materials. Both experimental and theoretical calculations reveal the generation of ample active sites and isotropic ions in the amorphous phase, which accelerates cation migration within the electrode bulk. Amorphous MoOx can be coupled with multi-ion storage cathodes to realize electrochemical energy storage devices with different carriers, promising high energy and power densities. The power density exceeded 15000 W kg−1, demonstrating the great potential of amorphous MoOx in advanced aqueous batteries. 相似文献
997.
Over the past years, an increasing number of publications in information visualization, especially within the field of visual analytics, have mentioned the term “embedding” when describing the computational approach. Within this context, embeddings are usually (relatively) low-dimensional, distributed representations of various data types (such as texts or graphs), and since they have proven to be extremely useful for a variety of data analysis tasks across various disciplines and fields, they have become widely used. Existing visualization approaches aim to either support exploration and interpretation of the embedding space through visual representation and interaction, or aim to use embeddings as part of the computational pipeline for addressing downstream analytical tasks. To the best of our knowledge, this is the first survey that takes a detailed look at embedding methods through the lens of visual analytics, and the purpose of our survey article is to provide a systematic overview of the state of the art within the emerging field of embedding visualization. We design a categorization scheme for our approach, analyze the current research frontier based on peer-reviewed publications, and discuss existing trends, challenges, and potential research directions for using embeddings in the context of visual analytics. Furthermore, we provide an interactive survey browser for the collected and categorized survey data, which currently includes 122 entries that appeared between 2007 and 2023. 相似文献
998.
In cloud storage, because the data owner loses the physical control of the data, the data may be tampered with or deleted. Although, it has been proposed to adopt provable data possession (PDP) or proofs of retrievability (POR) mechanism to ensure the integrity of cloud storage data. However, at present, most PDP/POR schemes are based on traditional cryptographic mechanisms and cannot resist quantum computer attacks. For this reason, the first POR scheme based on coding mechanism (BC-POR) is proposed in this paper. The scheme is constructed based on the difficulty assumptions of 2-regular word syndrome decoding (2-RWSD) problem and Goppa code distinguishing problem. Moreover, considering the low computing power of lightweight users, this paper adopts an audit scheme that supports the outsourcing of data tag calculation on the client side, that is, the calculation of data tag generation is outsourced to a third-party institution for execution. First of all, this scheme can prevent third-party institution from obtaining the real content of the data in the process of calculation tags and realize the privacy protection of user data. Secondly, the scheme uses a FSB hash function to generate a decodable syndrome, and this algorithm does not require iterative operations during the tagging process, thereby reducing the computational overhead of the tag. Finally, the provable security method is used to prove the security of the proposed scheme, and the performance of the proposed audit scheme is evaluated to prove the effectiveness of the scheme. 相似文献
999.
In the context of increasingly competitive intelligent manufacturing, the multi-load Automated guided vehicles (AGVs) based Automated Storage and Retrieval System (AS/RS) has been of particular interest, as reductions in the number of AGVs required can significantly decrease potential congestions and increase the system effectiveness. In comparison with the single-load AGVs system, more difficult and critical issue of scheduling multi-load AGVs to automate storage/retrieval missions and to maximize economic benefits remains unresolved. Therefore, we propose a task scheduling optimization method for multi-load AGVs-based systems, with which, the objectives of least number of occupied AGVs, shortest travel time and minimum conflicts can be met simultaneously. The experiments are conducted in various scenarios, and verify that our work can use fewer AGVs to optimize tasks delivery, which enables the AS/RS stakeholders to reach win-win results for system performance and AGVs investment, thus maximizing economic benefit. 相似文献
1000.
When it comes to data storage, cloud computing and cloud storage providers play a critical role. The cloud data can be accessed from any location with an internet connection. Additionally, the risk of losing privacy when data is stored in a cloud environment is also increased. A variety of security techniques are employed in the cloud to enhance security. In this paper, we aim at maintaining the privacy of stored data in cloud environment by implementing block-based modelling to boost the privacy level with Anti-Codify Technique (ACoT) and block cipher-based algorithms. Initially, the cipher text is generated using Deoxyribo Nucleic Acid (DNA) model. Block-cipher-based encryption is used by ACoT, but the original encrypted file and its extension are broken up into separate blocks. When the original file is broken up into two separate blocks, it raises the security level and makes it more difficult for outsiders to cloud data access. ACoT improves the security and privacy of cloud storage data. Finally, the fuzzy-based classification is used that stores various access types in servers. The simulation results shows that the ACoT-DNA method achieves higher entropy against various block size with reduced computational cost than existing methods. 相似文献