首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5280篇
  免费   156篇
  国内免费   328篇
电工技术   125篇
综合类   228篇
化学工业   56篇
金属工艺   22篇
机械仪表   79篇
建筑科学   138篇
矿业工程   56篇
能源动力   84篇
轻工业   38篇
水利工程   14篇
石油天然气   24篇
武器工业   23篇
无线电   631篇
一般工业技术   121篇
冶金工业   35篇
原子能技术   14篇
自动化技术   4076篇
  2024年   7篇
  2023年   37篇
  2022年   64篇
  2021年   75篇
  2020年   68篇
  2019年   38篇
  2018年   51篇
  2017年   74篇
  2016年   111篇
  2015年   103篇
  2014年   363篇
  2013年   264篇
  2012年   331篇
  2011年   577篇
  2010年   364篇
  2009年   293篇
  2008年   357篇
  2007年   482篇
  2006年   418篇
  2005年   424篇
  2004年   290篇
  2003年   282篇
  2002年   225篇
  2001年   150篇
  2000年   97篇
  1999年   42篇
  1998年   36篇
  1997年   20篇
  1996年   18篇
  1995年   14篇
  1994年   18篇
  1993年   12篇
  1992年   3篇
  1991年   3篇
  1990年   5篇
  1989年   1篇
  1988年   2篇
  1987年   3篇
  1986年   4篇
  1985年   7篇
  1984年   8篇
  1983年   12篇
  1982年   5篇
  1981年   1篇
  1980年   1篇
  1977年   1篇
  1975年   1篇
  1966年   1篇
  1965年   1篇
排序方式: 共有5764条查询结果,搜索用时 15 毫秒
1.
Pc-WLEDs are considered to play a spectacular role in future generation light sources in view of their outstanding energy efficiency. In this regard, Eu3+ activated BaY2ZnO5 phosphor was prepared and investigated by XRD, PL and SEM analyses. Rietveld refinement analysis was carried out to confirm the structure of the synthesized phosphor. The prepared phosphor shows an intense red emission around 627 nm under excitation by near UV light. The 5D0-7F2 transition intensity of the prepared phosphor is three times higher compared to the commercial (Y,Gd)BO3:Eu3+ red phosphor. The CIE colour coordinates of BaY2ZnO5:Eu3+ (9mol%) phosphor corresponds to be (0.6169, 0.3742) and it has a high 97.9 % colour purity. The obtained results reveal the utility of BaY2ZnO5:Eu3+ phosphor as an efficient red component in WLEDs, anti-counterfeiting and fingerprint detection applications.  相似文献   
2.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
3.
Software updates are an important topic for increasingly software dependent and automated automotive systems. Besides ongoing technical developments, there are also regulatory requirements in development for such systems. We present here an overview of the automotive domain and the particular requirements on update systems, identify potentially suitable update frameworks and evaluate them based on automotive requirements. A focus is on a holistic view of requirements, considering safety, security, and availability.  相似文献   
4.
Recently, the Tactile Internet (TI) becomes a new era of the Internet. The TI provides ultra-reliable, ultra-responsive and intelligent network connectivity for delivering real-time control and physical haptic experiences from a remote location. The TI provides a different feeling to human–machine interaction by implementing the real-time interactive systems. In this review article, we discuss a generalized authentication model which can be used to perform authentication procedure among different communicating parties in order to secure remote surgery in the TI environment. By using the proposed authentication model, an authentication protocol can be designed so that an authenticated surgeon can use the robot/robotic arms to perform the surgery securely as well as remotely. Since the application is very critical, the important instructions provided by the surgeon to the robot/robotic arms must not be leaked in between the communication during the surgical procedure. To deal with this emerging research area, a secure mutual user authentication mechanism should be provided between a remote surgeon and the robot/robotic arms so that they can communicate securely using the established session key among them. Further, several security issues and challenges for such kind of communication are also discussed in this article. Finally, we discuss few points that need to be considered as future research works that are related to authentication for securing remote surgery in the TI environment.  相似文献   
5.
张程  陈付龙  刘超  齐学梅 《计算机应用》2019,39(6):1842-1848
信息物理融合系统(CPS)涉及多种计算模型的集成和协同工作,针对CPS设计方法不统一、重塑性差、复杂度高、难以协同建模验证等问题,提出一种结构化、可描述行为的异元组件模型。首先,用统一组件建模方法进行建模,解决模型不开放问题;然后,用可扩展标记语言(XML)规范描述各类组件,解决不同计算模型描述语言不一致和不可扩展问题;最后,用多级开放组件模型的协同仿真验证方式进行仿真验证,解决验证的不可协同问题。通过通用组件建模方法、XML组件规范描述语言以及验证工具平台XModel对医用恒温箱进行了建模、描述和仿真。医用恒温箱的案例表明,这种模型驱动建立可重塑异元组件并确认其设计正确性的过程,支持信息物理协同设计和边构建边纠正,可避免在系统实现过程中发现问题时再进行反复修改。  相似文献   
6.
《工程(英文)》2019,5(4):624-636
An intelligent manufacturing system is a composite intelligent system comprising humans, cyber systems, and physical systems with the aim of achieving specific manufacturing goals at an optimized level. This kind of intelligent system is called a human–cyber–physical system (HCPS). In terms of technology, HCPSs can both reveal technological principles and form the technological architecture for intelligent manufacturing. It can be concluded that the essence of intelligent manufacturing is to design, construct, and apply HCPSs in various cases and at different levels. With advances in information technology, intelligent manufacturing has passed through the stages of digital manufacturing and digital-networked manufacturing, and is evolving toward new-generation intelligent manufacturing (NGIM). NGIM is characterized by the in-depth integration of new-generation artificial intelligence (AI) technology (i.e., enabling technology) with advanced manufacturing technology (i.e., root technology); it is the core driving force of the new industrial revolution. In this study, the evolutionary footprint of intelligent manufacturing is reviewed from the perspective of HCPSs, and the implications, characteristics, technical frame, and key technologies of HCPSs for NGIM are then discussed in depth. Finally, an outlook of the major challenges of HCPSs for NGIM is proposed.  相似文献   
7.
化石能源的利用弊端下能源安全问题日趋复杂化,成为全球共同的挑战。能源体系的清洁、低碳化转型是破解能源安全问题的关键,这主要是由于能源转型促进了三大转变,加强了能源安全:发展模式由资源依赖转向技术依赖,为共享的能源安全奠定了基础;能源生产由矿物开采转向装备制造,创造了新的经济机遇;能源消费进入电气化时代,保障了可持续能源安全。在此背景下,中国必须坚定能源转型的基本路线,正确把握能源安全的新形势,推动落实全球能源安全的“三大转变”,为国际社会,尤其是其他发展中国家提供必要的、可行的能源转型中国方案。  相似文献   
8.
李荣先 《世界有色金属》2020,(3):114-114,116
随着社会的不断发展,矿产资源为我国带来了巨大的经济效益,并在社会经济发展中占有重要的地位。但在矿山资源开发的过程中,威胁人身安全的事故经常发生。因此,本文对探矿工程安全措施进行了研究和分析。  相似文献   
9.
As social media continues to transform firm–customer interactions, firms must leverage customer reactions to generate actionable insights, especially in contexts (e.g., crisis events) where customer reactions are critical. Using the justice theory, we categorize customer reactions of two firms, Home Depot and Target, during the time-frame of a security hack to understand key themes/topics. We then map the themes/topics to customer sentiments in those reactions. We found that customers associate justice with simple procedures than the experience of dealing with the firm. In addition, it is critical for firms to carefully assess and control customer sentiments on social media during crisis events.  相似文献   
10.
A directional control method (DCM) for power flows on a set of interface lines between two regions of power system considering static voltage stability margin is developed in this paper. A surface approximation approach is firstly used to obtain the relationship between the interface flow solution and the generation direction of generator (the portion of generation variation in each participating generator to satisfy the desired power increase on the interface and the system loss). Then, an optimization model is built to determine the optimum dispatching scheme of generators. This method not only can control the total power on the interface to satisfy the power demand but also can realize the directional control of power on each interface line based on the needs of operation. The proposed DCM is further extended to determine the optimum dispatching scheme of generators for maximizing the interface flow margin (IFM), which is the active power margin of the key transmission lines between two regions of power system constrained by static voltage stability. A modified continuation power flow (MCPF) is used to show and evaluate the impacts of the DCM on the IFM. The New England 39-bus system and the IEEE 300-bus system have been employed to verify the effectiveness of the DCM.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号