全文获取类型
收费全文 | 251665篇 |
免费 | 20870篇 |
国内免费 | 14798篇 |
专业分类
电工技术 | 36645篇 |
技术理论 | 29篇 |
综合类 | 29729篇 |
化学工业 | 10980篇 |
金属工艺 | 8146篇 |
机械仪表 | 19834篇 |
建筑科学 | 19719篇 |
矿业工程 | 9686篇 |
能源动力 | 8428篇 |
轻工业 | 5329篇 |
水利工程 | 6944篇 |
石油天然气 | 7053篇 |
武器工业 | 4092篇 |
无线电 | 27135篇 |
一般工业技术 | 13189篇 |
冶金工业 | 7378篇 |
原子能技术 | 2563篇 |
自动化技术 | 70454篇 |
出版年
2024年 | 321篇 |
2023年 | 2184篇 |
2022年 | 4142篇 |
2021年 | 5562篇 |
2020年 | 6006篇 |
2019年 | 4162篇 |
2018年 | 3626篇 |
2017年 | 5322篇 |
2016年 | 6274篇 |
2015年 | 7710篇 |
2014年 | 15814篇 |
2013年 | 13415篇 |
2012年 | 18647篇 |
2011年 | 19943篇 |
2010年 | 15240篇 |
2009年 | 15429篇 |
2008年 | 15759篇 |
2007年 | 19971篇 |
2006年 | 17914篇 |
2005年 | 16041篇 |
2004年 | 13136篇 |
2003年 | 11969篇 |
2002年 | 9066篇 |
2001年 | 7670篇 |
2000年 | 6365篇 |
1999年 | 5038篇 |
1998年 | 3824篇 |
1997年 | 3103篇 |
1996年 | 2810篇 |
1995年 | 2388篇 |
1994年 | 1993篇 |
1993年 | 1332篇 |
1992年 | 1132篇 |
1991年 | 839篇 |
1990年 | 667篇 |
1989年 | 561篇 |
1988年 | 400篇 |
1987年 | 246篇 |
1986年 | 160篇 |
1985年 | 196篇 |
1984年 | 186篇 |
1983年 | 155篇 |
1982年 | 132篇 |
1981年 | 91篇 |
1980年 | 72篇 |
1979年 | 63篇 |
1978年 | 40篇 |
1977年 | 43篇 |
1976年 | 26篇 |
1959年 | 21篇 |
排序方式: 共有10000条查询结果,搜索用时 125 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security. 相似文献
2.
Xiao-Lei Qiu Zi-Rui Fan Yang-Yang Liu Ding-Fu Wang Shi-Xin Wang Chun-Xia Li 《International journal of molecular sciences》2021,22(8)
A self-nanoemulsifying drug delivery system (SNEDDS) was developed to enhance the absorption of heparin after oral administration, in which heparin was compounded with phospholipids to achieve better fat solubility in the form of heparin-phospholipid (HEP-Pc) complex. HEP-Pc complex was prepared using the solvent evaporation method, which increased the solubility of heparin in n-octanol. The successful preparation of HEP-Pc complex was confirmed by differential scanning calorimetry (DSC), Fourier-transform infrared (FT-IR) spectroscopy, NMR, and SEM. A heparin lipid microemulsion (HEP-LM) was prepared by high-pressure homogenization and characterized. HEP-LM can enhance the absorption of heparin after oral administration, significantly prolong activated partial thromboplastin time (APTT) and thrombin time (TT) in mice, and reduce fibrinogen (FIB) content. All these outcomes indicate that HEP-LM has great potential as an oral heparin formulation. 相似文献
3.
4.
云计算、大数据、5G通信等技术的快速发展,有力的促进了计算机网络在多个领域的普及和使用,人们已经进入到了“互联网+”时代,实现了工作、生活和学习的数字化、智能化和共享化。计算机网络在为人们提供各种便利服务的同时也面临着许多的安全威胁,比如木马、病毒等,不法分子攻击网络数据中心,破坏用户服务终端及服务器,为人们带来严重的威胁。网络安全学者或企业机构也提出了许多安全防御技术,比如入侵检测技术、深度包过滤技术、防火墙技术、数据加密技术等,一定程度上提高了网络安全防御的能力,但是随着互联网数据流量的增多,需要引入更加先进的人工智能技术,以便能够快速的采集、分析网络数据流,确定数据流中是否存在病毒或木马,以便及时的对其进行查杀,进一步提高网络安全防御的主动性、积极性 相似文献
5.
邓乐善 《中国水能及电气化》2021,(1):56-58
针对民乐县农村人饮机井水位自动供水系统控制中存在的可靠性低、成本高等问题,文章结合深井泵提取地下水进行供水的实际情况,提出了软启动控制柜+浮球开关+微电脑时间控制器改进的思路和方法,运用效果良好。 相似文献
6.
7.
谭金军 《自动化技术与应用》2021,40(1):181-183
为进一步提升企业思想政治教育工作的信息化水平,本文详细介绍了企业思想政治教育系统的数据库设计方案,以便更加充分地发挥各种多媒体教学设备在企业思想政治教育工作方面的优势。 相似文献
8.
9.
10.
In this paper, a novel method is proposed for increasing the performance through coupling of top-down models adjusting the object detector based on a new loss function. Generally, object detectors and keypoint estimators are sequentially used in real-time multi-person pose estimations; however, these two models are separately trained. Therefore, the results of the object detector are not optimized for the keypoint estimator. To solve this problem, we analyze the relationship between the two models and propose a feedback-based loss optimization in the object detector, based on the estimation results of the keypoint estimator. In addition, the resulting bounding box of the object detector is readjusted to improve the accuracy of the keypoint estimation model. The experimental results demonstrate that the proposed approach can perform real-time operations with a high frame rate similar to that of the baseline model. Moreover, it achieved an accuracy of 74.2 average precision (AP), which is higher than the state-of-the-arts model including the human detector used in the experiment. 相似文献