首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   41393篇
  免费   5041篇
  国内免费   3511篇
电工技术   2897篇
技术理论   15篇
综合类   4987篇
化学工业   1373篇
金属工艺   531篇
机械仪表   1115篇
建筑科学   4762篇
矿业工程   1431篇
能源动力   830篇
轻工业   1452篇
水利工程   2649篇
石油天然气   1529篇
武器工业   215篇
无线电   6221篇
一般工业技术   1668篇
冶金工业   729篇
原子能技术   205篇
自动化技术   17336篇
  2024年   95篇
  2023年   533篇
  2022年   1011篇
  2021年   1267篇
  2020年   1338篇
  2019年   980篇
  2018年   919篇
  2017年   1184篇
  2016年   1289篇
  2015年   1504篇
  2014年   3283篇
  2013年   2653篇
  2012年   3350篇
  2011年   3869篇
  2010年   2906篇
  2009年   3017篇
  2008年   3044篇
  2007年   3449篇
  2006年   2963篇
  2005年   2417篇
  2004年   1996篇
  2003年   1689篇
  2002年   1179篇
  2001年   879篇
  2000年   642篇
  1999年   468篇
  1998年   350篇
  1997年   246篇
  1996年   229篇
  1995年   204篇
  1994年   193篇
  1993年   130篇
  1992年   108篇
  1991年   73篇
  1990年   63篇
  1989年   71篇
  1988年   30篇
  1987年   25篇
  1986年   25篇
  1985年   55篇
  1984年   45篇
  1983年   35篇
  1982年   30篇
  1981年   19篇
  1980年   14篇
  1979年   15篇
  1978年   9篇
  1977年   10篇
  1975年   5篇
  1955年   4篇
排序方式: 共有10000条查询结果,搜索用时 16 毫秒
1.
Two-dimensional rotating detonation waves (RDWs) with separate injections of hydrogen and air are simulated using the Navier–Stokes equations together with a detailed chemical mechanism. The effects of injection stagnation temperature and slot width on the detonation propagation patterns are investigated. Results find that extremely high temperatures can lead to a chaotic mode in which detonation waves are generated and extinguished randomly. Increasing the slot width can reduce the number of detonation waves and finally trigger detonation quenching at a low injection stagnation temperature. But increasing the slot width can change the RDW propagation pattern from a chaotic to a stable mode under high injection temperature. Furthermore, the kinetic parameter τ (representing the chemical reactivity of the mixture) and the kinematic parameter α (representing the mixing efficiency of hydrogen and oxygen) are introduced to distinguish the RDW propagation patterns.  相似文献   
2.
南水北调中线总干渠无在线调蓄水库,对藻类生态调度过程中出现的问题开展生态调度实现策略和实施方式研究。主要实现策略包括:划定自身的调蓄区,隔离生态调度对下游的影响;采用高效的渠池运行方式,减少生态调度时蓄量的反复调整;综合考虑安全、快速、平稳等需求,设定生态调度实施进程和方式。具体实施方式包括:将总干渠划分为流速调控区、调蓄区和正常运行区,分别实施等体积、控制蓄量和闸前常水位方式运行;将生态调度过程划分为充水阶段和泄水阶段,基于流速调控目标值、持续时长和水位降幅约束条件,确定各阶段时长和各分区的闸门群调控方案等。基于2018年3月输水工况,采用明渠一维非恒定流模型,仿真总干渠上游15个渠池的藻类生态调度过程。结果表明,生态调度可在3.5 d内完成,各渠池的平均流速由0.48 m/s增至0.93 m/s,持续时间超过2 h。在整个生态调度过程中,水位变化平稳,水位变幅符合安全阈值要求,下游渠道的正常运行未受生态调度明显影响。  相似文献   
3.
马晶  李鋆垚  张亚球  蔡宇婷 《红外》2022,43(8):44-52
为进一步提高城市生态监测的精确度,在前人开展的城市生态遥感监测研究的基础上引入“区域尺度”的概念,充分考虑小区域范围内不同地物间的交互作用,并利用移动窗口模型(Moving Window-Remote Sensing Ecology Index, MW-RSEI)对沈阳市浑南区的遥感影像进行逐像元分析。实验结果表明,MW-RSEI模型和生态遥感监测模型(Remote Sensing Ecology Index, RSEI)在整体生态评价趋势上表现出一致性。但MW-RSEI模型对城市生态中的细节区域表征更明显。考虑到建筑及裸地周围植被的影响,其较差生态区域的占比仅为6%,生态评价为优的区域占比为11%。研究区生态评价结果表现得较为连续,并未出现明显的断层现象。该结果具有现实意义且与实际生态分布更为符合。MW-RSEI模型在城市生态监测中更为适用,可为相关部门提供一定的技术参考。  相似文献   
4.
In this paper, the feature representation of an image by CNN is used to hide the secret image into the cover image. The style of the cover image hides the content of the secret image and produce a stego image using Neural Style Transfer (NST) algorithm, which resembles the cover image and also contains the semantic content of secret image. The main technical contributions are to hide the content of the secret image in the in-between hidden layered style features of the cover image, which is the first of its kind in the present state-of-art-technique. Also, to recover the secret image from the stego image, destylization is done with the help of conditional generative adversarial networks (GANs) using Residual in Residual Dense Blocks (RRDBs). Further, stego images from different layer combinations of content and style features are obtained and evaluated. Evaluation is based on the visual similarity and quality loss between the cover-stego pair and the secret-reconstructed secret pair of images. From the experiments, it has been observed that the proposed algorithm has 43.95 dB Peak Signal-to-Noise Ratio (PSNR)), .995 Structural Similarity Index (SSIM), and .993 Visual Information Fidelity (VIF) for the ImageNet dataset. The proposed algorithm is found to be more robust against StegExpose than the traditional methods.  相似文献   
5.
5G系统将移动通信服务从移动电话、移动宽带和大规模机器通信扩展到新的应用领域,即所谓对通信服务有特殊要求的垂直领域。对使能未来工厂的5G能力进行了全面的分析总结,包括弹性网络架构、灵活频谱、超可靠低时延通信、时间敏感网络、安全和定位,而弹性网络架构又包括对网络切片、非公共网络、5G局域网和边缘计算的支持。希望从广度到深度,对相关的理论及技术应用做透彻、全面的梳理,对其挑战做清晰的总结,从而为相关研究和工程技术人员提供借鉴。  相似文献   
6.
《Journal of dairy science》2022,105(10):8130-8142
Residual feed intake (RFI) is a measurement of the difference between actual and predicted feed intake when adjusted for energy sinks; more efficient cows eat less than predicted (low RFI) and inefficient cows eat more than predicted (high RFI). Data evaluating the relationship between RFI and feeding behaviors (FB) are limited in dairy cattle; therefore, the objective of this study was to determine daily and temporal FB in mid-lactation Holstein cows across a range of RFI values. Mid-lactation Holstein cows (n = 592 multiparous; 304 primiparous) were enrolled in 17 cohorts at 97 ± 26 d in milk (± standard deviation), and all cows within a cohort were fed a common diet using automated feeding bins. Cow RFI was calculated as the difference between predicted and observed dry matter intake (DMI) after accounting for parity, days in milk, milk energy, metabolic body weight and change, and experiment. The associations between RFI and FB at the level of meals and daily totals were evaluated using mixed models with the fixed effect of RFI and the random effects of cow and cohort. Daily temporal FB analyses were conducted using 2-h blocks and analyzed using mixed models with the fixed effects of RFI, time, RFI × time, and cohort, and the random effect of cow (cohort). There was a positive linear association between RFI and DMI in multiparous cows and a positive quadratic relationship in primiparous cows, where the rate of increase in DMI was less at higher RFI. Eating rate, DMI per meal, and size of the largest daily meal were positively associated with RFI. Daily temporal analysis of FB revealed an interaction between RFI and time for eating rate in multiparous and primiparous cows. The eating rate increased with greater RFI at 11 of 12 time points throughout the day, and eating rate differed across RFI between multiple time points. There tended to be an interaction between RFI and time for eating time and bin visits in multiparous cows but not primiparous cows. Overall, there was a time effect for all FB variables, where DMI, eating time and rate, and bin visits were greatest after the initial daily feeding at 1200 h, increased slightly after each milking, and reached a nadir at 0600 h (6 h before feeding). Considering the relationship between RFI and eating rate, additional efforts to determine cost-effective methods of quantifying eating rate in group-housed dairy cows is warranted. Further investigation is also warranted to determine if management strategies to alter FB, especially eating rate, can be effective in increasing feed efficiency in lactating dairy cattle.  相似文献   
7.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
8.
Idiosyncratic drug-induced liver injury (IDILI) remains a significant problem for patients and drug development. The idiosyncratic nature of IDILI makes mechanistic studies difficult, and little is known of its pathogenesis for certain. Circumstantial evidence suggests that most, but not all, IDILI is caused by reactive metabolites of drugs that are bioactivated by cytochromes P450 and other enzymes in the liver. Additionally, there is overwhelming evidence that most IDILI is mediated by the adaptive immune system; one example being the association of IDILI caused by specific drugs with specific human leukocyte antigen (HLA) haplotypes, and this may in part explain the idiosyncratic nature of these reactions. The T cell receptor repertoire likely also contributes to the idiosyncratic nature. Although most of the liver injury is likely mediated by the adaptive immune system, specifically cytotoxic CD8+ T cells, adaptive immune activation first requires an innate immune response to activate antigen presenting cells and produce cytokines required for T cell proliferation. This innate response is likely caused by either a reactive metabolite or some form of cell stress that is clinically silent but not idiosyncratic. If this is true it would make it possible to study the early steps in the immune response that in some patients can lead to IDILI. Other hypotheses have been proposed, such as mitochondrial injury, inhibition of the bile salt export pump, unfolded protein response, and oxidative stress although, in most cases, it is likely that they are also involved in the initiation of an immune response rather than representing a completely separate mechanism. Using the clinical manifestations of liver injury from a number of examples of IDILI-associated drugs, this review aims to summarize and illustrate these mechanistic hypotheses.  相似文献   
9.
Under the circumstance of perceptual consumption, it is still challenging to grasp consumer's emotions and demands due to the large search space, diversified preferences, and easy fatigue of consumers. To reduce user fatigue and enlarge search space, a novel method was presented to design and optimize the pattern of yarn-dyed plaid fabric using the isolation niche genetic algorithm and rough set theory. Each pattern was encoded as a chromosome based on the real number code. The population was initialized and evolved using INGA to maintain the diversity. The rough set theory was adopted as the fitness function of isolation niche genetic algorithm to extract the consumer's demands. After multiple evolutions, a large set of practical patterns of the yarn-dyed plaid fabric are obtained. Experiments were carried out by 24 testers of different ages and genders. The results prove that the proposed method based on the isolation niche genetic algorithm and rough set theory is feasible and effective, supplying references to the designer.  相似文献   
10.
美国自2018年5月宣布重启对伊朗全面制裁,伊朗再次成为国际社会关注的焦点。本文系统梳理了伊朗能源禀赋及开发利用现状,分析了伊朗对中国能源安全的保障程度及其优势,发现1997~2017年伊朗对中国石油安全的保障程度呈波动上升态势,对维护中国油气资源供给安全具有重要意义,认为中伊能源合作具有战略互补性、地缘政治优势、经济优势、历史文化基础和降低美元计价风险等优势。在上述基础上,本文从能源价格、供给渠道和运输安全三方面剖析了此次美国全面制裁伊朗对中国能源安全可能产生的影响,并从规避美国制裁风险和保障国家能源安全角度,提出了相关对策建议。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号