全文获取类型
收费全文 | 38853篇 |
免费 | 6833篇 |
国内免费 | 4212篇 |
专业分类
电工技术 | 2570篇 |
综合类 | 4485篇 |
化学工业 | 3317篇 |
金属工艺 | 1044篇 |
机械仪表 | 2697篇 |
建筑科学 | 3213篇 |
矿业工程 | 1236篇 |
能源动力 | 860篇 |
轻工业 | 1241篇 |
水利工程 | 1256篇 |
石油天然气 | 1792篇 |
武器工业 | 1016篇 |
无线电 | 5011篇 |
一般工业技术 | 2905篇 |
冶金工业 | 1957篇 |
原子能技术 | 281篇 |
自动化技术 | 15017篇 |
出版年
2024年 | 313篇 |
2023年 | 837篇 |
2022年 | 1587篇 |
2021年 | 1607篇 |
2020年 | 1647篇 |
2019年 | 1378篇 |
2018年 | 1228篇 |
2017年 | 1487篇 |
2016年 | 1776篇 |
2015年 | 1857篇 |
2014年 | 2519篇 |
2013年 | 2287篇 |
2012年 | 2994篇 |
2011年 | 3218篇 |
2010年 | 2485篇 |
2009年 | 2474篇 |
2008年 | 2391篇 |
2007年 | 2686篇 |
2006年 | 2414篇 |
2005年 | 1993篇 |
2004年 | 1631篇 |
2003年 | 1466篇 |
2002年 | 1243篇 |
2001年 | 1049篇 |
2000年 | 856篇 |
1999年 | 670篇 |
1998年 | 487篇 |
1997年 | 374篇 |
1996年 | 330篇 |
1995年 | 261篇 |
1994年 | 214篇 |
1993年 | 134篇 |
1992年 | 126篇 |
1991年 | 83篇 |
1990年 | 108篇 |
1989年 | 61篇 |
1988年 | 48篇 |
1987年 | 40篇 |
1986年 | 39篇 |
1985年 | 147篇 |
1984年 | 243篇 |
1983年 | 289篇 |
1982年 | 202篇 |
1981年 | 308篇 |
1980年 | 116篇 |
1979年 | 41篇 |
1978年 | 39篇 |
1977年 | 18篇 |
1975年 | 24篇 |
1974年 | 22篇 |
排序方式: 共有10000条查询结果,搜索用时 531 毫秒
1.
Small object detection is challenging and far from satisfactory. Most general object detectors suffer from two critical issues with small objects: (1) Feature extractor based on classification network cannot express the characteristics of small objects reasonably due to insufficient appearance information of targets and a large amount of background interference around them. (2) The detector requires a much higher location accuracy for small objects than for general objects. This paper proposes an effective and efficient small object detector YOLSO to address the above problems. For feature representation, we analyze the drawbacks in previous backbones and present a Half-Space Shortcut(HSSC) module to build a background-aware backbone. Furthermore, a coarse-to-fine Feature Pyramid Enhancement(FPE) module is introduced for layer-wise aggregation at a granular level to enhance the semantic discriminability. For loss function, we propose an exponential L1 loss to promote the convergence of regression, and a focal IOU loss to focus on prime samples with high classification confidence and high IOU. Both of them significantly improves the location accuracy of small objects. The proposed YOLSO sets state-of-the-art results on two typical small object datasets, MOCOD and VeDAI, at a speed of over 200 FPS. In the meantime, it also outperforms the baseline YOLOv3 by a wide margin on the common COCO dataset. 相似文献
2.
《International Journal of Hydrogen Energy》2022,47(76):32359-32371
On-site hydrogen production through steam-methane reforming (SMR) from city gas or natural gas is believed to be a cost-effective way for hydrogen-based infrastructure due to high cost of hydrogen transportation. In recent years, there have been a lot of on-site hydrogen fueling stations under design or construction in China. This study introduces current developments and technology prospects of skid-mounted SMR hydrogen generator. Also, technical solutions and economic analysis are discussed based on China's first on-site hydrogen fueling station project in Foshan. The cost of hydrogen product from skid-mounted SMR hydrogen generator is about 23 CNY/kg with 3.24 CNY/Nm3 natural gas. If hydrogen price is 60 CNY/kg, IRR of on-site hydrogen fueling station project reaches to 10.8%. While natural gas price fall to 2.3 CNY/Nm3, the hydrogen cost can be reduced to 18 CNY/kg, and IRR can be raised to 13.1%. The conclusion is that skid-mounted SMR technology has matured and is developing towards more compact and intelligent design, and will be a promising way for hydrogen fueling infrastructures in near future. 相似文献
3.
4.
Nonlinearity in regulating the metal to insulator transition of ReNiO3 towards low temperature range
《Ceramics International》2022,48(21):31995-32000
Among the existing material family of the correlated oxides, the rare earth nickelates (ReNiO3) exhibit broadly adjustable metal to insulator transition (MIT) properties that enables correlated electronic applications, such as thermistors, thermochromics, and logical devices. Nevertheless, how to accurately control the critical temperature (TMIT) of ReNiO3 via the co-occupation of the rare-earth elements is yet worthy to be further explored. Herein, we demonstrate the non-linearity in adjusting the TMIT of ReNiO3 towards lower temperatures via introducing Pr co-occupation within ReNiO3 (e.g., PrxNd1-xNiO3 and PrxSm1-xNiO3) as synthesized by KCl molten-salt assisted high oxygen pressure reaction approach. Although the TMIT is effectively reduced via Pr substitution, it does not strictly follow a linear relationship, in particular, when there is large difference in the ionic radius of the co-occupation rare-earth elements. Furthermore, the most significant deviation in TMIT from the expected linear relationship appears at an equal co-occupation ratio of the two different rare-earth elements, while the abruption in the variation of resistivity across TMIT is also reduced. The present work highlights the importance to use adjacent rare-earth elements with co-occupation ratio away from 1:1 for achieving more linear adjustment in designing the metal to insulator transition properties for ReNiO3. 相似文献
5.
Alexander Detzner Martin Eigner 《Quality and Reliability Engineering International》2021,37(1):335-351
Manufacturing companies not only strive to deliver flawless products but also monitor product failures in the field to identify potential quality issues. When product failures occur, quality engineers must identify the root cause to improve any affected product and process. This root-cause analysis can be supported by feature selection methods that identify relevant product attributes, such as manufacturing dates with an increased number of product failures. In this paper, we present different methods for feature selection and evaluate their ability to identify relevant product attributes in a root-cause analysis. First, we compile a list of feature selection methods. Then, we summarize the properties of product attributes in warranty case data and discuss these properties regarding the challenges they pose for machine learning algorithms. Next, we simulate datasets of warranty cases, which emulate these product properties. Finally, we compare the feature selection methods based on these simulated datasets. In the end, the univariate filter information gain is determined to be a suitable method for a wide range of applications. The comparison based on simulated data provides a more general result than other publications, which only focus on a single use case. Due to the generic nature of the simulated datasets, the results can be applied to various root-cause analysis processes in different quality management applications and provide a guideline for readers who wish to explore machine learning methods for their analysis of quality data. 相似文献
6.
The effect of the emergency perception of bystanders of cyberbullying victims on helping behaviors is often neglected in research on cyberbullying. In this study, we explored the influence of this cognitive factor on cyber-bystanders’ helping tendencies as well as elucidated possible underlying processes. The results of two studies were reported. In Study 1, 150 undergraduates read a true case of a girl experiencing cyberbullying. The results indicated that when the participants perceived the victim’s situation to be more critical (i.e., higher emergency perception), their helping tendencies were stronger, partly through increased state empathy followed by feelings of responsibility to help. In Study 2, we randomly assigned 300 undergraduates to two groups. The low emergency group read the same cyberbullying case as Study 1, whereas the cyberbullying case read by the high emergency group contained additional emergency information of the victim. The results indicated that the high emergency group expressed stronger helping tendencies than did the low emergency group. This effect was caused by a stronger perception that the victim was in an emergency situation, which not only strengthened the participants’ helping tendencies directly but also indirectly through increasing their state empathy and feelings of responsibility to help. 相似文献
7.
Rosa Maria Vitale Fabio Arturo Iannotti Pietro Amodeo 《International journal of molecular sciences》2021,22(9)
Cannabidiol (CBD), the major nonpsychoactive Cannabis constituent, has been proposed for the treatment of a wide panel of neurological and neuropsychiatric disorders, including anxiety, schizophrenia, epilepsy and drug addiction due to the ability of its versatile scaffold to interact with diverse molecular targets that are not restricted to the endocannabinoid system. Albeit the molecular mechanisms responsible for the therapeutic effects of CBD have yet to be fully elucidated, many efforts have been devoted in the last decades to shed light on its complex pharmacological profile. In particular, an ever-increasing number of molecular targets linked to those disorders have been identified for this phytocannabinoid, along with the modulatory effects of CBD on their cascade signaling. In this view, here we will try to provide a comprehensive and up-to-date overview of the molecular basis underlying the therapeutic effects of CBD involved in the treatment of neurological and neuropsychiatric disorders. 相似文献
8.
Isabel Fernandes Cecília Melo-Alvim Raquel Lopes-Brs Miguel Esperana-Martins Luís Costa 《International journal of molecular sciences》2021,22(2)
Osteosarcoma (OS) is a rare condition with very poor prognosis in a metastatic setting. Basic research has enabled a better understanding of OS pathogenesis and the discovery of new potential therapeutic targets. Phase I and II clinical trials are already ongoing, with some promising results for these patients. This article reviews OS pathogenesis and new potential therapeutic targets. 相似文献
9.
Vancha Harish Effi Haque Magdalena
miech Hiroaki Taniguchi Sarah Jamieson Devesh Tewari Anupam Bishayee 《International journal of molecular sciences》2021,22(9)
Xanthohumol (XH) is an important prenylated flavonoid that is found within the inflorescence of Humulus lupulus L. (Hop plant). XH is an important ingredient in beer and is considered a significant bioactive agent due to its diverse medicinal applications, which include anti-inflammatory, antimicrobial, antioxidant, immunomodulatory, antiviral, antifungal, antigenotoxic, antiangiogenic, and antimalarial effects as well as strong anticancer activity towards various types of cancer cells. XH acts as a wide ranging chemopreventive and anticancer agent, and its isomer, 8-prenylnaringenin, is a phytoestrogen with strong estrogenic activity. The present review focuses on the bioactivity of XH on various types of cancers and its pharmacokinetics. In this paper, we first highlight, in brief, the history and use of hops and then the chemistry and structure–activity relationship of XH. Lastly, we focus on its prominent effects and mechanisms of action on various cancers and its possible use in cancer prevention and treatment. Considering the limited number of available reviews on this subject, our goal is to provide a complete and detailed understanding of the anticancer effects of XH against different cancers. 相似文献
10.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security. 相似文献