首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   50956篇
  免费   4080篇
  国内免费   1982篇
电工技术   1483篇
技术理论   1篇
综合类   2129篇
化学工业   3327篇
金属工艺   969篇
机械仪表   1601篇
建筑科学   702篇
矿业工程   272篇
能源动力   1963篇
轻工业   451篇
水利工程   172篇
石油天然气   162篇
武器工业   174篇
无线电   11386篇
一般工业技术   4367篇
冶金工业   186篇
原子能技术   165篇
自动化技术   27508篇
  2024年   38篇
  2023年   1338篇
  2022年   1263篇
  2021年   1678篇
  2020年   1841篇
  2019年   1659篇
  2018年   1729篇
  2017年   3455篇
  2016年   3518篇
  2015年   3057篇
  2014年   4491篇
  2013年   4190篇
  2012年   4024篇
  2011年   3808篇
  2010年   3292篇
  2009年   3592篇
  2008年   2509篇
  2007年   2781篇
  2006年   2465篇
  2005年   1336篇
  2004年   738篇
  2003年   741篇
  2002年   754篇
  2001年   668篇
  2000年   519篇
  1999年   532篇
  1998年   275篇
  1997年   156篇
  1996年   96篇
  1995年   72篇
  1994年   70篇
  1993年   52篇
  1992年   31篇
  1991年   22篇
  1990年   26篇
  1989年   14篇
  1988年   7篇
  1987年   15篇
  1986年   18篇
  1985年   24篇
  1984年   27篇
  1983年   14篇
  1982年   9篇
  1981年   15篇
  1980年   11篇
  1979年   10篇
  1978年   7篇
  1977年   8篇
  1976年   6篇
  1975年   5篇
排序方式: 共有10000条查询结果,搜索用时 16 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
2.
Due to the limited improvement of single-image based super-resolution (SR) methods in recent years, the reference based image SR (RefSR) methods, which super-resolve the low-resolution (LR) input with the guidance of similar high-resolution (HR) reference images are emerging. There are two main challenges in RefSR, i.e. reference image warping and exploring the guidance information from the warped references. For reference warping, we propose an efficient dense warping method to deal with large displacements, which is much faster than traditional patch (or texture) matching strategy. For the SR process, since different reference images complement each other, and have different similarities with the LR image, we further propose a similarity based feature fusion strategy to take advantage of the most similar reference regions. The SR process is realized by an encoder–decoder network and trained with pixel-level reconstruction loss, degradation loss and feature-level perceptual loss. Extensive experiments on three benchmark datasets demonstrate that the proposed method outperforms state-of-the-art SR methods in both subjective and objective measurements.  相似文献   
3.
4.
Wireless Personal Communications - A Delay Tolerant Network (DTN) is a network capable of handling long delays and data loss efficiently in various challenged scenarios and environments. Owing to...  相似文献   
5.
Power conversion efficiency (PCE) and stability are two important properties of perovskite solar cells (PSCs). Particularly, defects in the perovskite films could cause the generation of trap states, thereby increasing the nonradiative recombination. To address this issue, suitable dopants can be incorporated to react with non-bonded atoms or surface dangling bonds to passivate the defects. Herein, we introduced TiI4 into CH3NH3PbI3 (MAPbI3) film and obtained a dense and uniform morphology with large crystal grains and low defect density. The champion cell based on 0.5% TiI4-doped MAPbI3 achieved a PCE as high as 20.55%, which is superior to those based on pristine MAPbI3 (17.64%). Moreover, the optimal solar cell showed remarkable stability without encapsulation. It retained 88.03% of its initial PCE after 300 h of storage in ambient. This work demonstrates TiI4 as a new and effective passivator for MAPbI3 film.  相似文献   
6.
7.
The audit point is to understand and use to perform the upgrade wearable innovation injuries in sports. Understanding the game's biomechanics is that damage response and performance upgrades are essential, and usually, investigation uses optical motion capture. In any case, this approach may be limited by the amount of limit catch climatic factors and the overwhelmed wearable research center of innovation. Ordered to make queries are used to study in seven information centers and sports car wearable innovation factors. This article was banned because they do not measure the program members on the sensor zero and the motor or motor factors or the application of an innovative set. Thirty-three incorporated into the collection of the full text of the survey carried out to identify members' dynamic development through observation and a slice of wearable progress in the game. Inertial sensors, the sensor and the flexible, attractive and precise speed field sensors are used in the game with more than 15 measured motion gadgets. The use of wearable innovation, the potential of these innovative practices, and the impact of competitors' training methods are still in the exploratory stage.  相似文献   
8.
Organic solar cells (OSCs) have recently reached a remarkably high efficiency and become a promising technology for commercial application. However, OSCs with top efficiency are mostly processed by halogenated solvents and with additives that are not environmentally friendly, which hinders large-scale manufacture. In this study, high-performance tandem OSCs, based on polymer donors and two small-molecule acceptors with different bandgaps, are fabricated by solution processing with non-halogenated solvents without additive. Importantly, the two active layers developed from non-halogenated solvents show better phase segregation and charge transport properties, leading to superior performance than halogenated ones. As a result, a tandem OSC with high efficiency of up to 16.67% is obtained, showing unique advantages in future massive production.  相似文献   
9.
10.
Built-in applications built on a stand-alone device, TCP / IP network and interconnected are a need for high integration with other systems. The system provided through Web services interconnects service-oriented distributed architecture. The TCP / IP network is widely employed to integrate business applications. This integration is still not provided through the embedded application. The applications connected to the Internet are an especially difficult problem in embedded systems to interpret the sensor data. Real-time sensor function generates a training/classification result for IoT application selected, customized, or data structure design. It has an integrated hardware/software system to achieve the continuous training and real-time data analysis and re-training of Machine Learning (ML) algorithm. World of English native speakers on top of all, this is the database of words that have been separated from the local and non-collection English. It also reported a variety of methods that are used in the English vocabulary recognition system. Please check the study of learners of mediation based on the part of the corpus. Students, in writing, too much-advanced technology and general vocabulary. These students, publicly their discourse in and contributed to the professional corpus of "existence" I mentioned that there is a professional writer, is better. To stimulate the different means of integration, it evaluated several network technology today, discussing the balance between the use of shared with this integration in the adaptability and built-in the field of Web network technology of today.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号