首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   62057篇
  免费   8271篇
  国内免费   3495篇
电工技术   14693篇
技术理论   3篇
综合类   6180篇
化学工业   2731篇
金属工艺   1517篇
机械仪表   4411篇
建筑科学   2722篇
矿业工程   1545篇
能源动力   4196篇
轻工业   1491篇
水利工程   1440篇
石油天然气   2536篇
武器工业   646篇
无线电   12449篇
一般工业技术   4822篇
冶金工业   1832篇
原子能技术   517篇
自动化技术   10092篇
  2024年   146篇
  2023年   917篇
  2022年   1644篇
  2021年   1987篇
  2020年   2186篇
  2019年   1824篇
  2018年   1710篇
  2017年   2238篇
  2016年   2503篇
  2015年   2816篇
  2014年   4201篇
  2013年   3834篇
  2012年   5075篇
  2011年   5341篇
  2010年   4063篇
  2009年   4014篇
  2008年   3745篇
  2007年   4403篇
  2006年   3807篇
  2005年   3130篇
  2004年   2478篇
  2003年   2130篇
  2002年   1783篇
  2001年   1506篇
  2000年   1243篇
  1999年   988篇
  1998年   735篇
  1997年   591篇
  1996年   508篇
  1995年   473篇
  1994年   400篇
  1993年   300篇
  1992年   217篇
  1991年   200篇
  1990年   149篇
  1989年   106篇
  1988年   67篇
  1987年   64篇
  1986年   47篇
  1985年   40篇
  1984年   41篇
  1983年   18篇
  1982年   24篇
  1981年   18篇
  1980年   26篇
  1979年   15篇
  1978年   7篇
  1977年   9篇
  1975年   7篇
  1959年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
2.
频率特性分析在工程应用中具有重要的作用,在电路分析、模拟电子技术、信号与系统、自动控制理论等相关课程中都涉及到相关章节内容,在不同课程中如何根据工程应用和学生学习阶段把握具体的讲解内容和讲解方式非常重要。本文从频率特性的求解方法和具体物理意义角度开展在不同课程中讲解的方法,从时域和频域角度分别讨论其物理意义和具体的分析方法。通过渐进深化的教学过程和教学方法不断提高学生的知识掌握和应用技能,提高学生的工程意识、工程素质和工程创新能力,强化学生对于频率特性课程知识的综合应用能力。  相似文献   
3.
Amides from indole-3-glyoxylic acid and 4-benzoyl-2-methylpiperazine, which are related to entry inhibitors developed by Bristol-Myers Squibb (BMS), have been synthesized with aliphatic chains located at the C7 position of the indole ring. These spacers contain an azido group suitable for the well-known Cu(I)-catalyzed (3+2)-cycloaddition or an activated triple bond for the nucleophilic addition of thiols under physiological conditions. Reaction with polyols (β-cyclodextrin and hyperbranched polyglycerol) decorated with complementary click partners has afforded polyol-BMS-like conjugates that are not cytotoxic (TZM.bl cells) and retain the activity against R5-HIV-1NLAD8 isolates. Thus, potential vaginal microbicides based on entry inhibitors, which can be called of 4th generation, are reported here for the first time.  相似文献   
4.
Ferrites are materials of interest due to their broad applications in high technological devices and a lot of research has been focused to synthesize new ferrites. In this regard, an effort has been devoted to synthesize spinel Pr–Ni co-substituted strontium ferrites with a nominal formula of Sr1-xPrxFe2-yNiyO4 (0.0 ≤ x ≤ 0.1, 0.0 ≤ y ≤ 1.0). The cubic structure of pure and Pr–Ni co-substituted strontium ferrite samples calcinated at 1073 K for 3 h has been confirmed through X-ray diffraction (XRD). Average sizes of crystallites (18–25 nm) have been estimated from XRD analysis and nanometer particle sizes of synthesized ferrites have been further verified by scanning electron microscopy (SEM). SEM results have also shown that particles are mostly agglomerated and all the samples possess porosity. It has been observed that at 298 K, the values of resistivity (ρ) increase, while that of AC conductivity, dielectric loss, and dielectric constants decrease with increasing amounts of Pr3+ and Ni2+ ions. The values of dielectric parameters initially decrease with frequency and later become constant and can be explained on the basis of dielectric polarization. Electrochemical impedance spectroscopy (EIS) studies show that the charge transport phenomenon in ferrite materials is mainly controlled via grain boundaries. Overall, synthesized ferrite materials own enhanced resistivity values in the range of 1.38 × 109–1.94 × 109 Ω cm and minimum dielectric losses, which makes them suitable candidates for high frequency devices applications.  相似文献   
5.
激光测厚具有安全可靠、测量精度高、测量范围大等优点,广泛应用于纸张、电池极片等薄膜类材料厚度的在线测量。带材宽幅方向扫描测厚时由于扫描架往复运动会产生机械振动,影响在线测厚精度。针对该问题,以锂离子电池极片厚度测量为例,使用双激光差动式测厚平台对电池极片和铜箔分别进行厚度测量,然后对测厚数据进行频谱分析,探究其振动规律的相似性,并基于频谱分析结果采用滑动带阻滤波方式对测厚数据进行处理,滤波后极片和铜箔的厚度极差分别降低了33.4%和73.8%,有效过滤了机械振动导致的测量误差,可满足极片和铜箔厚度测量的精度要求。  相似文献   
6.
李路  庄鹏  谢晨波  王邦新  邢昆明 《红外与激光工程》2021,50(3):20200289-1-20200289-8
多普勒测风激光雷达通过分析系统回波信号的多普勒频移反演出风速,为提高风场探测精度,从稳频技术方面展开研究。在稳频过程中,分别采取措施消除激光频率的长期漂移和短期抖动。针对激光频率的长期漂移,设计并研制了种子激光器温控箱,通过水浴的控温方式大大减小了激光频率的长期漂移,将激光频率稳定在±50 MHz以内;针对激光频率的短期抖动,采用以碘分子吸收池为核心器件的稳频系统,通过半导体控温方式对碘分子吸收池精确控温,控温精度达0.03 ℃,提高了稳频精度,将激光频率进一步稳定在±8 MHz以内,满足±10 MHz以内的设计精度要求。通过搭建多普勒测风激光雷达系统,对发射激光稳频装置进行系统验证,连续4组风场观测结果表明:系统探测高度为17 km,绝大部分方差在4 m/s以下,满足测风激光雷达测量指标的要求。  相似文献   
7.
研究辊速差对连铸连轧7075铝板显微组织、织构及力学性能的影响。采用3种不同上辊/下辊转速比(ω/ω0,ω为上辊转速,ω0为下辊转速)1:1、1:1.2及1:1.4进行多次试验。结果显示,在最大辊速差条件下(ω/ω0=1:1.4),7075铝板在轧制方向的屈服强度和极限抗拉强度分别提高41.5%和21.9%。此外,当辊速比ω/ω0为1:1.4时,成品轧制板的平均晶粒尺寸减小36%,横剖面平均硬度增加约9.2%。织构研究结果显示,辊速差越大,成品各向同性及硬度越大。然而,采用不同辊速度的连铸连轧会导致变形板伸长率降低约6%。  相似文献   
8.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)).  相似文献   
9.
高效率地使用工程车辆是工程项目管理中节约成本的有效方法,无人监管环境下工程车辆的工况识别,是实现工程车辆高效率使用的有效手段。目前以GPS等技术为核心的车辆智能管理系统未对工程车辆进行工况识别,提出一种基于GRU循环神经网络的工程车辆工况识别方法,通过对工程车辆在不同工况下产生的音频信号进行分析,从中提取Mel倒谱系数作为主要特征,构建GRU循环神经网络模型进行训练和识别。实验结果表明,该方法可以实现对工程车辆工况的有效识别。  相似文献   
10.
We propose a self-sustaining power supply system consisting of a “Hybrid Energy Storage System (HESS)” and renewable energy sources to ensure a stable supply of high-quality power in remote islands. The configuration of the self-sustaining power supply system that can utilize renewable energy sources effectively on remote islands where the installation area is limited is investigated. It is found that it is important to select renewable energy sources whose output power curve is close to the load curve to improve the efficiency of the system. The operation methods that can increase the cost-effectiveness of the self-sustaining power supply system are also investigated. It is clarified that it is important for increasing the cost effectiveness of the self-sustaining power supply system to operate the HESS with a smaller capacity of its components by setting upper limits on the output power of the renewable energy sources and cutting the infrequent generated power.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号