首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15164篇
  免费   1734篇
  国内免费   1606篇
电工技术   646篇
技术理论   4篇
综合类   1333篇
化学工业   128篇
金属工艺   67篇
机械仪表   506篇
建筑科学   185篇
矿业工程   133篇
能源动力   71篇
轻工业   88篇
水利工程   200篇
石油天然气   45篇
武器工业   49篇
无线电   4679篇
一般工业技术   548篇
冶金工业   214篇
原子能技术   7篇
自动化技术   9601篇
  2024年   18篇
  2023年   215篇
  2022年   362篇
  2021年   515篇
  2020年   615篇
  2019年   337篇
  2018年   332篇
  2017年   476篇
  2016年   532篇
  2015年   658篇
  2014年   1051篇
  2013年   1122篇
  2012年   1267篇
  2011年   1262篇
  2010年   947篇
  2009年   892篇
  2008年   959篇
  2007年   1020篇
  2006年   865篇
  2005年   834篇
  2004年   760篇
  2003年   731篇
  2002年   681篇
  2001年   664篇
  2000年   555篇
  1999年   347篇
  1998年   193篇
  1997年   90篇
  1996年   56篇
  1995年   37篇
  1994年   24篇
  1993年   22篇
  1992年   16篇
  1991年   13篇
  1990年   4篇
  1989年   3篇
  1988年   1篇
  1987年   7篇
  1986年   8篇
  1985年   3篇
  1984年   4篇
  1983年   2篇
  1981年   1篇
  1980年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability.  相似文献   
2.
随着教育信息化技术的发展,线上线下混合式教学模式已成为一种趋势。为了解决非全日制研究生课堂教学召集困难、效果不佳等问题,提出了基于“互联网+虚拟仿真技术”的线上线下混合式教学模式。本文以控制工程专业学位研究生为例,结合《现代电气控制技术》课程,探讨了线上线下混合式教学实现途径、师生互动方法、项目驱动案例教学法以及电气控制系统虚拟仿真实验平台的构建方法,切实提升非全日制研究生的培养质量。  相似文献   
3.
张宏科  冯博昊  权伟 《电子学报》2019,47(5):977-982
现有互联网因其原始设计不足已在服务质量、资源利用率、管控能力等诸多方面暴露出严重弊端,难以支撑起"互联网+"新业态高速发展对通信网络与服务日趋复杂化、多元化的需求.因此,如何设计全新的互联网已成为信息领域最为迫切与核心的研究内容之一,受到学术界与产业界的高度重视.本文基于前期"标识网络"与"智慧标识网络"研究,创造性提出"智融标识网络"体系及其关键机制,通过全网多空间、多维度资源的智慧融合,实现个性化服务的按需供给与灵活化组网的有效支撑,为不同行业与用户提供高效的差异化、定制化通信网络服务,以普遍适用于高铁网络、工业互联网、车联网等各类迥异应用情景.  相似文献   
4.
物联网中存在大量异构关系的实体,其信息间的交互造成了物联网的内在矛盾。针对这一问题,提出将物联网中实体抽象化为对应的Agent,并以个体人为中心,利用本体的语义匹配及改进的物间动态关系计算方法,计算出针对个体人的物间动态关系;将原本异构的实体关系转化为Agent间基于动态关系紧密度排序的网络关系。经实验验证,该方法构建的关系网络可明显改善异构实体间交互的矛盾,而且相比原有类似方法,该方法解决问题的准确率和误差率均有改善,说明了该方法的准确性和可行性。  相似文献   
5.
Freedom of expression is a foundational stone for democracy and embraces a number of other rights, including – freedom to seek, receive, and impart information using any medium. Around 16 million Ethiopians, comprising 15.4% of the total population, use the Internet. The Ethiopian Internet shutdown saga has been marked by competing narratives. On one hand, the government has been using two governing narratives, i.e. national security narrative and ‘economic growth’ narrative to justify shutdowns of the Internet. But, the individuals’ self-expressions on social media find itself as competing narrative. Since 2016, the Internet has been closed more than six times under the cloak of national security, quelling rising protests, controlling strikes, and exam cheating. As such, freedom of expression of millions has been muzzled. The article argues blanket Internet shutdowns do not meet the caveats of human rights law.  相似文献   
6.
为降低专网物联网(P-IoT)的建网成本,实现灵活部署和增强抗毁性以满足行业用户的应用要求,需对P-IoT自组网模式进行研究。首先,阐述了P-IoT自组网模式的重要性;在此基础上,从系统架构、支持的拓扑类型、协议栈设计以及技术优势对P-IoT自组网模式加以分析;最后,分析了P-IoT自组网模式在智能抄表与智能林防领域的创新应用。P-IoT自组网模式在多种应用环境下都能很好地满足行业用户的需求,在未来专网市场P-IoT自组网模式必将具备极强的竞争力。  相似文献   
7.
The consumption of fossil fuel has resulted in global warming, environmental pollution, and many other crucial problems. Replacing fossil fuel with renewable energy has become an important issue over the recent decades. As a renewable clean energy, wind power is a relatively well‐developed and promising energy method for current technology development in China. Under the background of growing demand for electricity and enhancing awareness for environmental, the “Internet+ wind power” concept has emerged based on both the wind power's characteristics that renewable and non‐polluting, and the rapid development of the Internet in China. Through querying an amount of literature and information, this paper reveals the resource endowment and policy environment about wind power and energy Internet at first. Then, the PEST‐SWOT strategy analysis model is used to analyze the internalities (strengths and weaknesses) and the externalities (opportunities and threats) of “Internet+ wind power”. According to these results, the paper puts forward some measures (development and utilization, business mode) for wind power accommodation. Then some policy recommendations have been proposed. The government should provide favorable conditions for wind power grid with the “Internet+” technology innovation.  相似文献   
8.
针对水库下游地区河道洪水与漫堤洪水模拟需求,建立了一维—二维耦合的洪水演进数学模型。一维模型采用Pressimann格式离散求解,二维模型采用能够适应复杂几何形状和多种流态的Osher格式求解,一维—二维连接处采用堰流公式实现水流交互。应用该模型模拟白溪流域2015年"苏迪罗"台风实际洪水,可得到洪水在计算区域的演进过程和淹没情况。对比模拟结果与实际情况可知,该模型计算合理、准确,计算结果可为防汛部门防洪预案制定、防汛调度决策提供技术支撑。  相似文献   
9.
针对能源互联网中的海量分布式设备和电动汽车的需求,利用C#和Java编程语言设计并开发面向能源互联网的能量管理系统。该系统采用典型B/S 架构,以Asp.Net动态网页开发技术和数据库技术为核心,由云端后台算法、云端服务器的MySQL数据库、前端的网页三大部分构成。详细介绍了软件平台的系统框架,分为上下两层。其中,上层为日前-实时协同的多时间尺度能量管理系统模块,下层包含分布式设备协调控制子系统和电动汽车协调控制子系统。最后,通过仿真算例分析,能量管理系统能对海量的分布式设备和电动汽车进行优化调度,验证了该软件的可移植性、有效性和实用性。  相似文献   
10.
Digitalisation in mining refers to the use of computerised or digital devices or systems and digitised data that are to reduce costs, improve business productivity, and transform mining practices. However, it remains increasingly difficult for mining companies to decide which digital technologies are most relevant to their needs and individual mines. This paper provides an overview of digital technologies currently relevant to mining companies as presented and discussed by mining journals, the media and insight reports of leading consultancy agencies. Relevant technologies were systematically identified using text-mining techniques, and network analyses established the relations between significant technologies. Results demonstrated that currently 107 different digital technologies are pursued in the mining sector. Also, an analysis of the actual implementation of digital technologies in 158 active surface and underground mines reveals a limited uptake of digital technologies in general and that the uptake increases with the run-of-mine production. Large-scale mining operations appear to select and apply digital technologies suitable to their needs, whereas operations with lower production rates do not implement the currently available digital technologies to the same extent. These minor producers may require other digital transformation solutions tailored to their capabilities and needs and applicable to their scale of operations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号