首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   162110篇
  免费   12533篇
  国内免费   10579篇
电工技术   9854篇
技术理论   14篇
综合类   16049篇
化学工业   15503篇
金属工艺   7076篇
机械仪表   7487篇
建筑科学   8224篇
矿业工程   3100篇
能源动力   3938篇
轻工业   7035篇
水利工程   3532篇
石油天然气   8272篇
武器工业   1712篇
无线电   16856篇
一般工业技术   17422篇
冶金工业   3846篇
原子能技术   2996篇
自动化技术   52306篇
  2024年   204篇
  2023年   1188篇
  2022年   2256篇
  2021年   2951篇
  2020年   3471篇
  2019年   2895篇
  2018年   2814篇
  2017年   3255篇
  2016年   4039篇
  2015年   5091篇
  2014年   8736篇
  2013年   8971篇
  2012年   9072篇
  2011年   10242篇
  2010年   8305篇
  2009年   9673篇
  2008年   10149篇
  2007年   11359篇
  2006年   9981篇
  2005年   8672篇
  2004年   7553篇
  2003年   6999篇
  2002年   6283篇
  2001年   4820篇
  2000年   4813篇
  1999年   4236篇
  1998年   3445篇
  1997年   3185篇
  1996年   3166篇
  1995年   3226篇
  1994年   2846篇
  1993年   1804篇
  1992年   1725篇
  1991年   1258篇
  1990年   919篇
  1989年   818篇
  1988年   749篇
  1987年   458篇
  1986年   307篇
  1985年   472篇
  1984年   490篇
  1983年   510篇
  1982年   395篇
  1981年   450篇
  1980年   295篇
  1979年   153篇
  1978年   128篇
  1977年   94篇
  1976年   54篇
  1975年   63篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
Since the inception of blockchain-related technologies over a decade ago, investors’ uptake of the technologies has grown rapidly. But even with the advancement in standing from conceptual beginnings to real-world experimentation, mainstream adoption of the technologies in either organizational or individual contexts has yet to eventuate. To resolve this paradox, we examine progression of the technologies’ diffusion instead, and in the process, seek to uncover the underlying dynamics of sentiments at play. Diffusion involves multiple actions by different parties, with social discourses via diverse media playing an essential role. In demonstrating the interplay of support to resistance via media framing and the diffusion of innovation theory, findings from our paper contribute to the technology adoption literature. Understanding resistant behavior toward a new technology area could help resolve potential issues that may arise. This would hopefully lead to better technological implementation outcomes in future.  相似文献   
52.
Both fluorescent and luminescent observation are widely used to examine real-time gene expression patterns in living organisms. Several fluuorescent and luminescent proteins with specific optical properties have been developed and applied for simultaneous, multi-color observation of more than two gene expression profiles. Compared to fluorescent proteins, however, the application of multi-color luminescent imaging in living organisms is still limited. In this study, we introduced two-color luciferases into the soil nematode C. elegans and performed simultaneous analysis of two gene expression profiles. Using a green-emitting luciferase Eluc (emerald luciferase) and red-emitting luciferase SLR (stable luciferase red), the expression patterns of two genes were simultaneously observed in single animals from embryonic to adult stages over its whole life span. In addition, dual gene activities were observed at the single embryo level, with the simultaneous observation of morphological changes. These are the first application of a two-color luciferase system into a whole animal and suggest that precise relationship of expression patterns of multiple genes of interest can be analyzed over the whole life of the animal, dependent on the changes in genetic and/or environmental conditions.  相似文献   
53.
The extracellular matrix (ECM) is important for normal development and disease states, including inflammation and fibrosis. To understand the complex regulation of ECM, we performed a suppressor screening using Caenorhabditis elegans expressing the mutant ROL-6 collagen protein. One cuticle mutant has a mutation in dpy-23 that encodes the μ2 adaptin (AP2M1) of clathrin-associated protein complex II (AP-2). The subsequent suppressor screening for dpy-23 revealed the lon-2 mutation. LON-2 functions to regulate body size through negative regulation of the tumor growth factor-beta (TGF-β) signaling pathway responsible for ECM production. RNA-seq analysis showed a dominant change in the expression of collagen genes and cuticle components. We noted an increase in the cav-1 gene encoding caveolin-1, which functions in clathrin-independent endocytosis. By knockdown of cav-1, the reduced TGF-β signal was significantly restored in the dpy-23 mutant. In conclusion, the dpy-23 mutation upregulated cav-1 expression in the hypodermis, and increased CAV-1 resulted in a decrease of TβRI. Finally, the reduction of collagen expression including rol-6 by the reduced TGF-β signal influenced the cuticle formation of the dpy-23 mutant. These findings could help us to understand the complex process of ECM regulation in organism development and disease conditions.  相似文献   
54.
Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in encryption and decryption. This is because security of data greatly depends upon faster encryption and decryption in order to transfer it. In addition, its devices are considerably exposed to side channel attacks, including Power Analysis attacks that are capable of overturning the process. Constrained space and the ability of it is one of the most challenging tasks. To prevail over from this issue we are proposing a Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing. The t-Distributed Stochastic Neighbor Embedding is one of the efficient dimensionality reduction technique that greatly decreases the size of the non-linear data. The three dimensional image data obtained from the system, which are connected with it, are dimensionally reduced, and then lightweight encryption algorithm is employed. Hence, the security backlog can be solved effectively using this method.  相似文献   
55.
The importance of cultural heritage for supporting the knowledge economy has promoted its digitisation and online publication. Many cultural heritage repositories have published millions of digitised items using semantic web technologies and Linked Data approaches. These repositories frequently use knowledge organisation systems to classify the resources, but the domain heterogeneity makes it difficult to know if they are the most suitable ones. This paper describes the process used to discover and profile the knowledge organisation systems used in the cultural heritage domain. Additionally, for those knowledge organisation systems with a thesaurus-like structure, a detailed quality analysis is performed. The results of this analysis can be used as a key factor for the selection of knowledge organisation systems in classification tasks.  相似文献   
56.
从MR原始数据特性出发研究数据结构与字段,采用基于线状特性分析MR大数据的地铁用户识别过滤方法和位置定位方法,该方法经过验证能够有效输出地铁用户数据并定位在地图上,解决人工地铁测试效率低且测试片面的问题,实现基于大数据的自动化地铁网络评估,提供海量的有效定位数据用于地铁评估与分析。  相似文献   
57.
For rechargeable wireless sensor networks, limited energy storage capacity, dynamic energy supply, low and dynamic duty cycles cause that it is unpractical to maintain a fixed routing path for packets delivery permanently from a source to destination in a distributed scenario. Therefore, before data delivery, a sensor has to update its waking schedule continuously and share them to its neighbors, which lead to high energy expenditure for reestablishing path links frequently and low efficiency of energy utilization for collecting packets. In this work, we propose the maximum data generation rate routing protocol based on data flow controlling technology. For a sensor, it does not share its waking schedule to its neighbors and cache any waking schedules of other sensors. Hence, the energy consumption for time synchronization, location information and waking schedule shared will be reduced significantly. The saving energy can be used for improving data collection rate. Simulation shows our scheme is efficient to improve packets generation rate in rechargeable wireless sensor networks.  相似文献   
58.
In [1] a procedure for bias-free estimation of the autocorrelation function is introduced for equidistantly sampled data with randomly occurring samples being invalid. The method incorporates sample-and-hold interpolation of the missing data points. The occurring dynamic error of the primary estimate of the correlation function is treated by a deconvolution procedure with two parameters c0 and c1 with c0+2c1=1, which are the on-diagonal and the aside-diagonal parameters of a specific correction matrix (at all lag times except zero). The parameters c0 and c1 were obtained as a function of the probability α of a sample to be valid by numerical simulation. However, explicit expressions for the parameters c0(α)=12α+2α2 and c1(α)=1α1α2 can be derived, which might improve the usability of the deconvolution procedure in [1].  相似文献   
59.
周爱平  朱琛刚 《计算机应用》2019,39(8):2354-2358
持续流是隐蔽的网络攻击过程中显现的一种重要特征,它不产生大量流量且在较长周期内有规律地发生,给传统的检测方法带来极大挑战。针对网络攻击的隐蔽性、单监测点的重负荷和信息有限的问题,提出全网络持续流检测方法。首先,设计一种概要数据结构,并将其部署在每个监测点;其次,当网络流到达监测点时,提取流的概要信息并更新概要数据结构的一位;然后,在测量周期结束时,主监测点将来自其他监测点的概要信息进行综合;最后,提出流持续性的近似估计,通过一些简单计算为每个流构建一个位向量,利用概率统计方法估计流持续性,使用修正后的持续性估计检测持续流。通过真实的网络流量进行实验,结果表明,与长持续时间流检测算法(TLF)相比,所提方法的准确性提高了50%,误报率和漏报率分别降低了22%和20%,说明全网络持续流检测方法能够有效监测高速网络流量。  相似文献   
60.
Abstract

Pilots’ operation has an important effect on flight safety and performance, particularly in the final landing stage when pilots need to deal with complicated operations. This study aims to determine the potential value of flight data and develop a method of evaluating a pilot’s performance during landing phase based on flight quick access recorder (QAR) data from the perspective of risk assessment. First, a Landing Operation Performance Evaluation Model was developed based on risk evaluation principles. Three landing parameters, which are touchdown distance, touchdown vertical acceleration and touchdown pitch angle, were selected as indicators to evaluate the pilots’ landing operation performance in this model. Second, the flight landing operation performance evaluation system (FLOPES) was set up based on the evaluation model. Test results showed that FLOPES can accomplish all calculation flow of operation performance evaluation. Finally, it concluded that this method is a more accurate and effective way for evaluating the landing operation performance of a flight. It could be as a practical tool for airlines to manage landing risk quantitatively and to provide a more practical support for improving training and design in aviation.Practitioner summary: This study aims to determine the potential value of flight data and to develop a method of evaluating pilot’s landing operation performance from the risk evaluation perspective. Test results showed that this method is effective and could be as a practical tool for airlines to manage landing risk and improve training.Abbreviations:QAR: Quick Access Recorder; FLOPES: Flight Landing Operation Performance Evaluation System; ICAO: International Civil Aviation Organization; IATA: International Air Transport Association; SMS: Safety Management System; CAAC: Civil Aviation Administration of China; FOQA: Flight Operations Quality Assurance; VBA: Visual Basic for Applications  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号