首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21924篇
  免费   3052篇
  国内免费   1557篇
电工技术   2284篇
技术理论   5篇
综合类   2832篇
化学工业   1382篇
金属工艺   309篇
机械仪表   1022篇
建筑科学   3306篇
矿业工程   852篇
能源动力   553篇
轻工业   1969篇
水利工程   1474篇
石油天然气   918篇
武器工业   227篇
无线电   1452篇
一般工业技术   1707篇
冶金工业   1675篇
原子能技术   338篇
自动化技术   4228篇
  2024年   106篇
  2023年   366篇
  2022年   738篇
  2021年   934篇
  2020年   974篇
  2019年   807篇
  2018年   784篇
  2017年   824篇
  2016年   1002篇
  2015年   997篇
  2014年   1613篇
  2013年   1765篇
  2012年   1851篇
  2011年   1721篇
  2010年   1321篇
  2009年   1383篇
  2008年   1316篇
  2007年   1462篇
  2006年   1361篇
  2005年   993篇
  2004年   821篇
  2003年   691篇
  2002年   488篇
  2001年   409篇
  2000年   321篇
  1999年   243篇
  1998年   184篇
  1997年   165篇
  1996年   149篇
  1995年   119篇
  1994年   104篇
  1993年   64篇
  1992年   71篇
  1991年   53篇
  1990年   62篇
  1989年   55篇
  1988年   38篇
  1987年   23篇
  1986年   19篇
  1985年   19篇
  1984年   22篇
  1983年   14篇
  1982年   15篇
  1981年   14篇
  1980年   4篇
  1979年   8篇
  1975年   4篇
  1974年   4篇
  1964年   4篇
  1963年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
181.
The lockdown due to COVID-19 in Italy resulted in the sudden closure of schools, with a shift from traditional teaching to the online one. Through an online questionnaire, this survey explores teachers' experience of online teaching, the level of risk factors (e.g., stress) and protective factors (e.g., locus of control) and their impact on satisfaction levels during the social distancing. One hundred seven high school teachers from Lombardy, an Italian region very affected by the COVID-19 outbreak, participated. Results show that depression and stress are the main predictors of satisfaction levels for online teaching. In addition, coping, locus of control and self-efficacy emerge as important protective factors. Finally, although there is great satisfaction with the online teaching experience, critical elements emerged. This study is relevant because it describes the critical elements of the online teaching experience, and identifies some protective factors and the main risk factors in teachers operating in an area strongly marked by social restrictions imposed by the pandemic. High school teachers emerge as a sub-group of the general population with specific psychological reactions. Considering the results, it is possible to suggest providing high-quality educational support and crisis-psychological oriented services to teachers, and help to maintain the psychological well-being.  相似文献   
182.
Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework is developed by means of a methodology based on a heuristic theory that incorporates knowledge generated by existing works as well as the experience of their implementation. The paper presents the design details of the framework, which consists of three stages: identification of data security requirements, management of data security risks and evaluation of data security performance in CCS.  相似文献   
183.
Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph in the conversion process, a related algorithm is proposed to generate the B_NAG model. Finally, to analyze the reachability of paths in B_NAG, the measuring indexs such as node attack complexity and node state transition are defined, and an iterative algorithm for obtaining the probability of reaching the target node is presented. On this basis, the posterior probability of related nodes can be calculated. A simulation environment is set up to evaluate the effectiveness of the B_NAG model. The experimental results indicate that the B_NAG model is realistic and effective in evaluating vulnerabilities of computer networks and can accurately highlight the degree of vulnerability in a chaotic relationship.  相似文献   
184.
Today, air pollution, smoking, use of fatty acids and ready‐made foods, and so on, have exacerbated heart disease. Therefore, controlling the risk of such diseases can prevent or reduce their incidence. The present study aimed at developing an integrated methodology including Markov decision processes (MDP) and genetic algorithm (GA) to control the risk of cardiovascular disease in patients with hypertension and type 1 diabetes. First, the efficiency of GA is evaluated against Grey Wolf optimization (GWO) algorithm, and then, the superiority of GA is revealed. Next, the MDP is employed to estimate the risk of cardiovascular disease. For this purpose, model inputs are first determined using a validated micro‐simulation model for screening cardiovascular disease developed at Tehran University of Medical Sciences, Iran by GA. The model input factors are then defined accordingly and using these inputs, three risk estimation models are identified. The results of these models support WHO guidelines that provide medicine with a high discount to patients with high expected LYs. To develop the MDP methodology, policies should be adopted that work well despite the difference between the risk model and the actual risk. Finally, a sensitivity analysis is conducted to study the behavior of the total medication cost against the changes of parameters.  相似文献   
185.
余芸 《自动化仪表》2021,(1):73-76,80
通过调研焊接车间锅炉筒节匹配现状,发现目前的方法是根据工人的经验测量几个点进行匹配。这样的匹配方法不仅不够精确,并且不利于追溯匹配记录。因此,提出锅炉筒节匹配算法的系统设计和实现方法。系统使用激光测距仪代替人工测量,用优化匹配算法代替传统的根据工人经验进行匹配的方法,使筒节匹配过程更精确。首先,利用激光测距仪代替人工测量获得筒节端面8个点的直径值。然后,结合软件循环匹配、排序、寻求最小值等算法,找到最适合焊接一起的筒节以及焊接角度。最后,完成系统功能设计,开发控制软件。焊接车间的实际应用表明,该系统更精确地进行筒节匹配,避免工人测量误差和经验不足造成匹配错误返工现象。该系统可运用在各种管道焊接中,对推动智能控制技术在工业过程中的实际应用有借鉴意义。  相似文献   
186.
针对传统的入侵检测系统存在报警数量大、误报率高等缺陷,提出了一种基于网络安全风险评估的入侵检测方法,该方法基于入侵检测结果,引入抗体浓度随入侵强度动态变化这一人工免疫理论的最新研究成果进行网络安全风险的计算,然后根据当前网络面临的实时安全风险动态设置报警策略。实验结果表明,该方法能够实时、定量地计算主机和网络所面临的风险,并极大地降低报警数量和误报率。  相似文献   
187.
随着信息化进程的快速发展,保障信息系统的安全性和降低信息系统潜在的风险,一直是国内外学者关注的焦点,而风险评估正是解决该问题的有效方法之一,但是在风险评估过程中存在评估指标难以量化、风险值难以界定等困难,因此文章提出了一种基于灰色关联分析的信息安全风险评估方法,该方法首先建立了信息系统的风险评估指标体系,其次将评估的信息系统与最优信息系统进行关联度分析,最后得出信息系统风险的准确度量。该方法可以使信息系统的评估过程简单化,标准化。  相似文献   
188.
对分布式信息系统所面临的主要风险进行识别和评估是构建灾备系统的首要任务。以安徽烟草分布式信息系统为例,首先分析了该信息系统在环境、管理、技术、设备等方面所存在的风险,然后以层次分析法为核心构造了评估决策模型,结合专家打分,计算出各类风险对安徽烟草信息系统的威胁程度并进行排序,从而识别出主要的风险源,为构建灾备体系提供依据。  相似文献   
189.
针对云计算环境下网络信息系统会面临更多安全风险问题,总结出8种威胁安全准则,并对应得到影响因素;结合云计算技术具有协作性、虚拟性等特点,采用层次分析法并引入相关系数对多决策目标进行分析,提出一种基于云环境下的信息安全风险评估模型;最后运用该模型建模得出云计算环境下的信息系统安全风险评估思路;实验结果表明文章提出的风险评估模型具有一定的实际应用价值。  相似文献   
190.
空中交通预警与防撞系统(TCAS)风险及对策研究   总被引:1,自引:0,他引:1  
空中交通预警与防撞系统TCAS对飞行安全非常重要,它能够通过对附近的飞机进行冲突检测,预测未来可能发生的危险,提示飞行员避免危险,帮助机组维持与其他飞机之间的空中交通安全间隔;但TCAS本身依然存在风险;在此对TCAS进行了半物理仿真测试,包括数字样机开发测试、物理样机开发测试、虚拟试飞以及数据统计分析等,对其各项功能进行测试与验证;在参阅众多相关文献的基础上,结合所做的研究工作,讨论了TCAS的主要风险,并针对这些风险,提出TCAS在设计、测试、操作方面需要改进的地方,从各方面完善TCAS,降低其风险,进一步保障飞行安全。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号