首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   56162篇
  免费   6773篇
  国内免费   4906篇
电工技术   5192篇
技术理论   15篇
综合类   7311篇
化学工业   883篇
金属工艺   372篇
机械仪表   2132篇
建筑科学   3284篇
矿业工程   1549篇
能源动力   636篇
轻工业   838篇
水利工程   1452篇
石油天然气   635篇
武器工业   997篇
无线电   9791篇
一般工业技术   2300篇
冶金工业   1637篇
原子能技术   121篇
自动化技术   28696篇
  2024年   105篇
  2023年   623篇
  2022年   1234篇
  2021年   1570篇
  2020年   1695篇
  2019年   1235篇
  2018年   1121篇
  2017年   1521篇
  2016年   1787篇
  2015年   2081篇
  2014年   4347篇
  2013年   3729篇
  2012年   4714篇
  2011年   4924篇
  2010年   3766篇
  2009年   4001篇
  2008年   4230篇
  2007年   4616篇
  2006年   4084篇
  2005年   3549篇
  2004年   2961篇
  2003年   2625篇
  2002年   1792篇
  2001年   1400篇
  2000年   1073篇
  1999年   669篇
  1998年   447篇
  1997年   345篇
  1996年   292篇
  1995年   223篇
  1994年   207篇
  1993年   149篇
  1992年   107篇
  1991年   83篇
  1990年   52篇
  1989年   59篇
  1988年   47篇
  1987年   27篇
  1986年   28篇
  1985年   45篇
  1984年   52篇
  1983年   43篇
  1982年   28篇
  1981年   18篇
  1980年   19篇
  1979年   17篇
  1977年   8篇
  1965年   10篇
  1964年   11篇
  1961年   7篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
杨岳衡  唐红艳 《微电子学》2020,50(3):396-402
Based on bibliometric, national and international research output within 2000~2018 of the third generation of semiconductor material SiC and GaN was collected. Analysis and studies were made in the region of time distribution, research forces and research hotspots. The general international development tendency and scientific research level in China were also discussed. Meanwhile, study directions clustering and burst key words detecting were used to discover and explain the inner law of evolutionary in this field, especially in the different research focus of various development stages. This paper could also provide a reference on research and arrangement in further studies.  相似文献   
82.
疲劳断裂是金属结构中的主要失效形式,而金属结构中的早期疲劳断裂信号通常难以检测。TOA方法是常用的声发射定位源方法,但是声波传播过程中波速变换和路径的复杂性对其结果影响很大。运用Delta T声发射源定位方法,用断铅实验模拟声发射源,用AIC信息准则对到达时间进行优化,通过使用差值求源点坐标和图像处理的方法,求得声发射源坐标。通过在平板上的实验,比较两种源定位方法在不同结构中的定位结果,分析定位误差,结果表明图像处理方法更为优秀。  相似文献   
83.
基于信息披露的主体框架,分析披露体系中具体的供需信息对于市场成员的引导作用。建立日前市场的双层竞价优化模型,采用强化学习的方法,通过市场中有无关键供求信息披露对于发电商报价预期的影响,推演模拟不同信息披露程度下发电商报价行为,然后从策略演化过程、策略偏离度以及策略收敛速度3个角度进行信息披露程度对市场成员交易行为影响的定量分析,验证市场供需信息的发布程度对于市场成员的引导作用,最后基于推演结果进行总结,并对我国信息披露的建设提出建议与思考。  相似文献   
84.
在模糊信息系统中,通过有序加权平均(Ordered weighted averaging,OWA)算子计算对象相似度,可以建立λ截集的相容关系。当λ的值确定后,OWA算子中量词参数(α,β)的选取直接关系到不可区分关系的建立以及信息粒的粗细。因此合理选取参数(α,β)是值得进一步研究的问题。本文采用粗糙集三支决策理论,研究模糊信息系统 OWA算子参数选择的相关内容。基于参数的激进、中庸和消极语义,确定OWA算子(α,β)的3种常用取值;进而研究相似度、相容类、双向近似和三支区域在3种参数选择下的性质关系。最后利用实例验证分析了模糊量词参数语义解释的合理性。本文采用三支决策创新视角,得到模糊信息系统OWA算子的深入性质,为相关模糊量词参数提供语义解释与选择依据。  相似文献   
85.
There are numerous methods currently used to calculate required water flow rates for sprinklered and non-sprinklered buildings. The aim of this study is provide a flexible automated procedure for indentifying locations lacking adequate fire flow. To accomplish this objective, this research uses a GIS procedure to determine the spatial relationships between fire hydrants and historical fire incidences, and integrates the recommended hydrant spacing and building type specifications from the International Fire Code. This method was tested in two communities in eastcentral Michigan, USA. The results indicate an ability to define clusters of fires, determine the availability of hydrants, and assess the suitability of the available fire flow, including areas of potential extra capacity. Using these same data, additional GIS analyses can optimize hydrant location, ascertain the frequencies of different categories of fires, and identify the patterns of building types prone to fires.  相似文献   
86.
This paper addresses a new distributed cost optimization (DCO) method for load shedding (LS) of an islanded microgrid considering cost. A two-layer improved average consensus algorithm (IACA) of multi-agent system (MAS) is proposed, and the consensus characteristic of which is analyzed in detail. With the global information discovered in the first layer of the IACA, the DCO of LS can be solved by using the synchronization processing of the IACA in the second layer. PSCAD/EMTDC-based simulation models are built to study the value settings of consensus constants and the performances of the proposed DCO method. Simulation results verified the convergence improvement of the IACA and the effectiveness of the proposed DCO.  相似文献   
87.
The need for feature selection and dimension reduction is felt as a fundamental step in security assessment of large power systems in which the number of features representing the state of power grids dramatically increases. These large amounts of attributes are not proper to be used for computational intelligence (CI) techniques as inputs, because it may lead to a time consuming procedure with insufficient results and they are not suitable for on-line purposes and updates.This paper proposes a combined method for an online voltage security assessment in which the dimension of the token data from phasor measurement units (PMUs) is reduced by principal component analysis (PCA). Then, the features with different stability indices are put into several categories and feature selection is done by correlation analysis in each category. These selected features are then given to decision trees (DTs) for classification and security assessment of power systems.The method is applied to 39-bus test system and a part of Iran power grid. It is seen from the results that the DTs with reduced data have simpler splitting rules, better performance in saving time, reasonable DT error and they are more suitable for constant updates.  相似文献   
88.
Nowadays, despite the ever increasing need of people for staying “connected” at any time and everywhere, in many areas of the world data connection is extremely expensive or even absent. The Global System for Mobile Communication (GSM) network virtually covers all the populated areas of the world and on average, the entire world population have a handheld device capable of accessing at least the GSM services. Therefore, it makes sense to consider the Short Message Service (SMS) as the most popular wireless data service for such devices. In this work, we exploit the SMS as mechanism for data transfer, especially in scenarios where there is no other network coverage than GSM, such as in rural areas and developing regions. In particular, we propose a framework, based on the SMS as transport facility, which enables secure end-to-end data communication in a ubiquitous and pervasive manner. Moreover, we investigated how, by using compression techniques, the overall processing and transmission efforts needed for secure data communication can be effectively reduced, with the obvious consequences also in terms of energy consumption on the involved devices. Finally, we successfully tested the effectiveness of the proposed framework within the context of a proof of concept implementation.  相似文献   
89.
Health information technology (IT) is a promising way to achieve safer medication management in the delivery of healthcare. However, human factors/ergonomics dictates that in order to make the complex, cognitive work of healthcare delivery safer, health IT must properly support human cognition. This means, for example, that new health IT must reduce, not increase, workload during safety-critical tasks. The present study was the first to quantitatively assess the short- and long-term impact of bar coded medication administration (BCMA) IT on nurses' mental workload as well as on perceived medication safety. One-hundred seventy registered nurses across 3 dissimilar clinical units at an academic, freestanding pediatric hospital in the Midwest US participated in surveys administered before, 3 months after, and 12 months after the hospital implemented BCMA. Nurses rated their external mental workload (interruptions, divided attention, being rushed) and internal mental workload (concentration, mental effort) during medication administration tasks as well as the likelihood of each of three medication safety events: medication administration errors, medication errors on the clinical unit, and clinical unit-level adverse drug events. Clinical unit differences were assessed. Findings generally confirmed the hypothesis that external but not internal mental workload was associated with the perceived likelihood of a medication safety event. Comparisons of mental workload from pre- to post-BCMA revealed statistically significant changes in the critical care unit only. Medication safety appeared to improve over the long term in the hematology/oncology unit only. In the critical care and medical/surgical units, medication safety exhibited short-term improvements that were eliminated over time. Changes in mental workload and medication safety, two classically microergonomic constructs, were deeply embedded in macroergonomic phenomena. These included the fit between the BCMA system and the nature of nursing work, the process of BCMA implementation, and BCMA interactions with concurrent changes occurring in the hospital. Findings raise questions about achieving sustainable performance improvement with health IT as well as the balance between micro- and macroergonomic approaches to studying technology change.Relevance to industryDesigners must consider how technology changes cognitive work, including mental workload. Hospitals and other implementers of technology must ensure that new technology fits its users, their tasks, and the context of use, which may entail tailoring implementation, for example, to specific clinical units. Evaluators must look over time to assess both changes in cognitive work and implementation issues. Healthcare practitioners must also recognize that new technology means a complex transformation to an already complex sociotechnical system, which calls for a macroergonomic approach to design and analysis.  相似文献   
90.
A theoretical framework to consensus building within a networked social group is put forward. This article investigates a trust based estimation and aggregation methods as part of a visual consensus model for multiple criteria group decision making with incomplete linguistic information. A novel trust propagation method is proposed to derive trust relationship from an incomplete connected trust network and the trust score induced order weighted averaging operator is presented to aggregate the orthopairs of trust/distrust values obtained from different trust paths. Then, the concept of relative trust score is defined, whose use is twofold: (1) to estimate the unknown preference values and (2) as a reliable source to determine experts’ weights. A visual feedback process is developed to provide experts with graphical representations of their consensus status within the group as well as to identify the alternatives and preference values that should be reconsidered for changing in the subsequent consensus round. The feedback process also includes a recommendation mechanism to provide advice to those experts that are identified as contributing less to consensus on how to change their identified preference values. It is proved that the implementation of the visual feedback mechanism guarantees the convergence of the consensus reaching process.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号