首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   85416篇
  免费   5277篇
  国内免费   3658篇
电工技术   4430篇
技术理论   27篇
综合类   7093篇
化学工业   9609篇
金属工艺   3788篇
机械仪表   4888篇
建筑科学   10418篇
矿业工程   5286篇
能源动力   2015篇
轻工业   8065篇
水利工程   2088篇
石油天然气   3862篇
武器工业   2158篇
无线电   9654篇
一般工业技术   4164篇
冶金工业   3899篇
原子能技术   313篇
自动化技术   12594篇
  2024年   259篇
  2023年   828篇
  2022年   1811篇
  2021年   2318篇
  2020年   2432篇
  2019年   1419篇
  2018年   1254篇
  2017年   1953篇
  2016年   2280篇
  2015年   2610篇
  2014年   6724篇
  2013年   4679篇
  2012年   6519篇
  2011年   6869篇
  2010年   5307篇
  2009年   5439篇
  2008年   4979篇
  2007年   6044篇
  2006年   5426篇
  2005年   4725篇
  2004年   4064篇
  2003年   3622篇
  2002年   2962篇
  2001年   2439篇
  2000年   1866篇
  1999年   1436篇
  1998年   957篇
  1997年   710篇
  1996年   592篇
  1995年   472篇
  1994年   336篇
  1993年   247篇
  1992年   183篇
  1991年   130篇
  1990年   115篇
  1989年   82篇
  1988年   62篇
  1987年   33篇
  1986年   38篇
  1985年   24篇
  1984年   25篇
  1983年   11篇
  1982年   12篇
  1981年   13篇
  1980年   13篇
  1979年   6篇
  1978年   3篇
  1975年   3篇
  1964年   3篇
  1963年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
现今国内的数字集群网络发展存在局限性、差异性,还远没有达到“网”状分布的程度,因此,共网数字集群发展空间巨大、前景广阔。通过列举共网数字集群系统在龙嘉国际机场和长春雷锋车队的成功应用案例,探讨了我国共网数字集群系统应用的可行性和必要性。  相似文献   
2.
A small handful of recent studies have addressed a phenomenon known as “phantom vibration syndrome”. This refers to when phone users perceive their device to vibrate, indicating that a call or text is incoming, when in fact the phone did not vibrate at all. Though these studies show that most users do not find phantom vibration hallucinations to be very bothersome, they also find that a large majority of users experience this phenomenon. This paper explores what the striking prevalence of phantom vibration syndrome means for our contemporary relationships with technology. I begin with a review of the theories purporting to explain these data, which largely rely on particular understandings of the brain. Next I develop an alternative theory of phantom vibration syndrome based on insights from the philosophical tradition of phenomenology. This account considers the ways users develop bodily and perceptual habits regarding how the phone is understood and used. By critically contrasting these different theories, we can refine our questions about what the high prevalence of phantom vibration syndrome implies about our contemporary technological situation.  相似文献   
3.
Rectangular section control technology(RSCT)was introduced to achieve high-precision profile control during silicon steel rolling.The RSCT principle and method were designed,and the whole RSCT control strategy was developed.Specifically,RSCT included roll contour design,rolling technology optimization,and control strategy development,aiming at both hot strip mills(HSMs)and cold strip mills(CSMs).Firstly,through the high-performance variable crown(HVC)work roll optimization design in the upper-stream stands and the limited shifting technology for schedule-free rolling in the downstream stands of HSMs,a hot strip with a stable crown and limited wedge,local spot,and single wave was obtained,which was suitable for cold rolling.Secondly,an approximately rectangular section was obtained by edge varying contact(EVC)work roll contour design,edge-drop setting control,and closed loop control in the upper-stream stands of CSMs.Moreover,complex-mode flatness control was realized by coordinating multiple shape-control methods in the downstream stands of CSMs.In addition,the RSCT approach was applied in several silicon-steel production plants,where an outstanding performance and remarkable economic benefits were observed.  相似文献   
4.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved.  相似文献   
5.
带关键字搜索的公钥加密(PEKS)是一种有用的加密原语,它允许用户将在加密数据上搜索的功能委托给不可信的第三方服务器,而不影响原始数据的安全性和隐私性。但是,由于缺乏对于数据的加密以及解密能力,PEKS方案不能单独进行使用,必须与标准的公钥加密方案(PKE)相结合。因此,Baek等人在2006年引入了一种新的加密原语,称为结合PKE和PEKS的加密方案(PKE+PEKS),它同时提供了PKE和PEKS的功能。目前,已有文献提出了几种PKE+PEKS方案。然而,他们都没有考虑关键字猜测攻击的问题。本文提出一个新的高效且能够抵抗关键字猜测攻击的PKE+PEKS方案,与已有方案相比,该方案在性能上有很大的提升,并且在生成关键字和数据密文时,不需要使用双线性对,极大地降低了计算和存储成本。安全性分析表明,本文中所提出的方案能够满足密文隐私安全性、陷门不可区分性和抗关键字猜测攻击的安全性。效率分析表明,本分提出的方案更加高效。  相似文献   
6.
Health information technology (IT) is a promising way to achieve safer medication management in the delivery of healthcare. However, human factors/ergonomics dictates that in order to make the complex, cognitive work of healthcare delivery safer, health IT must properly support human cognition. This means, for example, that new health IT must reduce, not increase, workload during safety-critical tasks. The present study was the first to quantitatively assess the short- and long-term impact of bar coded medication administration (BCMA) IT on nurses' mental workload as well as on perceived medication safety. One-hundred seventy registered nurses across 3 dissimilar clinical units at an academic, freestanding pediatric hospital in the Midwest US participated in surveys administered before, 3 months after, and 12 months after the hospital implemented BCMA. Nurses rated their external mental workload (interruptions, divided attention, being rushed) and internal mental workload (concentration, mental effort) during medication administration tasks as well as the likelihood of each of three medication safety events: medication administration errors, medication errors on the clinical unit, and clinical unit-level adverse drug events. Clinical unit differences were assessed. Findings generally confirmed the hypothesis that external but not internal mental workload was associated with the perceived likelihood of a medication safety event. Comparisons of mental workload from pre- to post-BCMA revealed statistically significant changes in the critical care unit only. Medication safety appeared to improve over the long term in the hematology/oncology unit only. In the critical care and medical/surgical units, medication safety exhibited short-term improvements that were eliminated over time. Changes in mental workload and medication safety, two classically microergonomic constructs, were deeply embedded in macroergonomic phenomena. These included the fit between the BCMA system and the nature of nursing work, the process of BCMA implementation, and BCMA interactions with concurrent changes occurring in the hospital. Findings raise questions about achieving sustainable performance improvement with health IT as well as the balance between micro- and macroergonomic approaches to studying technology change.Relevance to industryDesigners must consider how technology changes cognitive work, including mental workload. Hospitals and other implementers of technology must ensure that new technology fits its users, their tasks, and the context of use, which may entail tailoring implementation, for example, to specific clinical units. Evaluators must look over time to assess both changes in cognitive work and implementation issues. Healthcare practitioners must also recognize that new technology means a complex transformation to an already complex sociotechnical system, which calls for a macroergonomic approach to design and analysis.  相似文献   
7.
新汶矿业集团经过探索和实践,研究运用了差异互补式全掩护支护技术、掩护支架自牵引联动装置工艺、矿车运输、滑移运输多用轨道、自动找正装车平台、液控调整装置等新技术、新工艺,做到了液压支架综合流程快速回撤,实现了高效化、连贯化安全回撤,取得了良好的经济效益。  相似文献   
8.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。  相似文献   
9.
针对目前量子私有信息检索不能适用与云存储的多数据库问题,基于现在成熟的量子密钥分发方法,提出了一种适合在多数据库环境下,实用的量子私有信息检索协议。对于不同大小的数据库,协议可通过调节参数θ和k,在保证数据库安全及用户隐私的情况下,完成信息的检索。性能分析结果表明,协议的通信复杂度低,检索成功率高、易于实施。  相似文献   
10.
杨凡 《住宅产业》2020,(3):64-65
随着BIM技术的进步,建筑行业越来越重视BIM技术的应用,并在应用过程中取得一定的成效。本文从工程造价决策、设计、招投标、施工、竣工五个阶段阐述BIM技术在建筑工程造价中的应用对策。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号