首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16274篇
  免费   2101篇
  国内免费   1770篇
电工技术   788篇
综合类   1735篇
化学工业   177篇
金属工艺   139篇
机械仪表   720篇
建筑科学   449篇
矿业工程   217篇
能源动力   80篇
轻工业   187篇
水利工程   127篇
石油天然气   75篇
武器工业   110篇
无线电   4854篇
一般工业技术   1122篇
冶金工业   384篇
原子能技术   26篇
自动化技术   8955篇
  2024年   44篇
  2023年   274篇
  2022年   470篇
  2021年   577篇
  2020年   647篇
  2019年   540篇
  2018年   552篇
  2017年   678篇
  2016年   709篇
  2015年   767篇
  2014年   1277篇
  2013年   1223篇
  2012年   1237篇
  2011年   1202篇
  2010年   988篇
  2009年   955篇
  2008年   1115篇
  2007年   1185篇
  2006年   952篇
  2005年   945篇
  2004年   818篇
  2003年   716篇
  2002年   537篇
  2001年   483篇
  2000年   257篇
  1999年   173篇
  1998年   135篇
  1997年   129篇
  1996年   103篇
  1995年   129篇
  1994年   68篇
  1993年   49篇
  1992年   35篇
  1991年   26篇
  1990年   24篇
  1989年   11篇
  1988年   11篇
  1987年   6篇
  1986年   5篇
  1985年   11篇
  1984年   4篇
  1983年   11篇
  1982年   8篇
  1976年   4篇
  1964年   12篇
  1962年   5篇
  1961年   5篇
  1960年   5篇
  1959年   4篇
  1955年   4篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
2.
We report here the development of two computational tools PCFPS (Photonic Crystal Fiber Parameter Study) and PCFPA (Photonic Crystal Fiber Parameter Analysis), equipped with graphical user interface (GUI) for modeling of photonic crystal fiber. The tools are based on different structural parameters, and they provide characteristic analysis of the modal parameters from the structural parameters. The main feature of PCFPS is that it enables the user to find out the values of each defining modal parameter that has an immense contribution towards the manufacture of photonic crystal fiber. Additionally, PCFPA allows the user to observe the variation in the modal parameters with respect to the changes in structural parameters (such as d, Λ, d/Λ, and λ/>Λ). Besides their ease of use, these two schemes have high computational precision and adaptability, giving a novel platform to optical engineers to modulate the microstructured fibers according to their requirement.  相似文献   
3.
Understanding the mechanisms leading to the rise and dissemination of antimicrobial resistance (AMR) is crucially important for the preservation of power of antimicrobials and controlling infectious diseases. Measures to monitor and detect AMR, however, have been significantly delayed and introduced much later after the beginning of industrial production and consumption of antimicrobials. However, monitoring and detection of AMR is largely focused on bacterial pathogens, thus missing multiple key events which take place before the emergence and spread of AMR among the pathogens. In this regard, careful analysis of AMR development towards recently introduced antimicrobials may serve as a valuable example for the better understanding of mechanisms driving AMR evolution. Here, the example of evolution of tet(X), which confers resistance to the next-generation tetracyclines, is summarised and discussed. Initial mechanisms of resistance to these antimicrobials among pathogens were mostly via chromosomal mutations leading to the overexpression of efflux pumps. High-level resistance was achieved only after the acquisition of flavin-dependent monooxygenase-encoding genes from the environmental microbiota. These genes confer resistance to all tetracyclines, including the next-generation tetracyclines, and thus were termed tet(X). ISCR2 and IS26, as well as a variety of conjugative and mobilizable plasmids of different incompatibility groups, played an essential role in the acquisition of tet(X) genes from natural reservoirs and in further dissemination among bacterial commensals and pathogens. This process, which took place within the last decade, demonstrates how rapidly AMR evolution may progress, taking away some drugs of last resort from our arsenal.  相似文献   
4.
A random placement of large-scale sensor network in the outdoor environment often causes low coverage.An area coverage optimization algorithm of mobile sensor network (MSN) based on virtual force perturbation and Cuckoo search (VF-CS) was proposed.Firstly,the virtual force of the sensor nodes within the Thiessen polygon was analyzed based on the partitioning of Voronoi diagram of the monitoring area.Secondly,the force of polygon vertices and neighbor nodes was taken as the perturbation factor for updating the node’s location of the Cuckoo search (CS).Finally,the VF-CS guided the node to move so as to achieve the optimal coverage.The simulation results demonstrate that the proposed algorithm has higher coverage and shorter average moving distance of nodes than the Voronoi diagram based algorithms in literatures.  相似文献   
5.
面对三维空间移动机器人从起始点到终止点的最短路径问题,提出一种新型的边缘点树启发式搜索(TreeEP)算法,该方法将地图空间进行密度可调的三维离散化处理,根据障碍安全距离筛选出障碍物的可靠边缘点信息,再利用树扩散架构选出最能引导搜索方向的潜力点进行扩散搜索,最终得出最短路径。提出局部调整策略,得到改进的Tree-EP算法。实验结果表明,在带障碍复杂地形最短路径搜索应用中,提出的Tree-EP算法与已有方法相比,能找到更短的移动路径。  相似文献   
6.
Search results of spatio-temporal data are often displayed on a map, but when the number of matching search results is large, it can be time-consuming to individually examine all results, even when using methods such as filtered search to narrow the content focus. This suggests the need to aggregate results via a clustering method. However, standard unsupervised clustering algorithms like K-means (i) ignore relevance scores that can help with the extraction of highly relevant clusters, and (ii) do not necessarily optimize search results for purposes of visual presentation. In this article, we address both deficiencies by framing the clustering problem for search-driven user interfaces in a novel optimization framework that (i) aims to maximize the relevance of aggregated content according to cluster-based extensions of standard information retrieval metrics and (ii) defines clusters via constraints that naturally reflect interface-driven desiderata of spatial, temporal, and keyword coherence that do not require complex ad-hoc distance metric specifications as in K-means. After comparatively benchmarking algorithmic variants of our proposed approach – RadiCAL – in offline experiments, we undertake a user study with 24 subjects to evaluate whether RadiCAL improves human performance on visual search tasks in comparison to K-means clustering and a filtered search baseline. Our results show that (a) our binary partitioning search (BPS) variant of RadiCAL is fast, near-optimal, and extracts higher-relevance clusters than K-means, and (b) clusters optimized via RadiCAL result in faster search task completion with higher accuracy while requiring a minimum workload leading to high effectiveness, efficiency, and user satisfaction among alternatives.  相似文献   
7.
为了提高夹心式压电驱动移动系统的机械输出性能,提出了一种U型预压力调节机构,并开展了预压力对夹心式压电驱动履带移动系统输出性能影响关系的实验研究。首先,针对U型预压力调节机构的安装对夹心式压电振子的振动特性影响关系开展了有限元仿真分析,发现U型预压力调节机构始终处在夹心式压电振子的两相工作模态振动节点位置;其次,开展了夹心式压电驱动履带移动系统的原理样机的预压力调节测试实验,确定了系统的最大输出牵引力及其所对应的最佳预压力;最后,在最佳预压力工作状态下,开展了原理样机的牵引力特性、越障性能以及模拟月壤环境下的运动特性实验。研究结果表明,在最佳预压力工作状态下,夹心式压电驱动履带移动系统的机械输出性能最佳,为其进一步在月面巡视器上的应用提供了技术支持和试验基础。  相似文献   
8.
ABSTRACT

People around the world spend hours of their daily lives using smartphones; therefore, it is important to conduct cross-cultural research on the effects of smartphone use on health and well-being as culture influences values, motivations and communication patterns. The purpose of this study was to explore 5 popular uses of the smartphone – messaging, browsing the Internet, posting social content, reading social content, and playing games – how they relate to anxiety and depression scores, and how they vary depending on the country of the participants: Spain, the United States, and Colombia. In all three countries the ranking of most popular uses was the same: (1) Messaging, (2) Reading social content, and (3) Browsing the Internet. In the USA, game playing contributed to anxiety scores whereas reading social content was a protective factor; regarding depression scores, text messaging was a contributing factor. In Spain, browsing the Internet contributed to anxiety scores; regarding depression scores, messaging was a contributing factor and posting social content was a protective factor. In Colombia, no specific use influenced anxiety scores; regarding depression scores, only game playing was a protective factor. Our results showed that in all the countries, problematic smartphone use contributed to anxiety scores.  相似文献   
9.
牛文博 《电子测试》2020,(10):139-140
伴随着教育信息化和混合式教学的浪潮,许多课程都开始了信息化的教学改革。本文以《移动商务》课程为例,从课程定位、课程目标、课程设计、课程实施、课程评价五个方面对该课程的信息化教学予以总结,希望进一步提高《移动商务》课程的教学效果。  相似文献   
10.
胡滨 《中州煤炭》2020,(2):1-5,9
为进一步减少煤矿事故发生后的人员伤亡、财产损失,在分析国内外煤矿井下避难系统发展的基础上,以何家塔煤矿井下避难硐室系统的构建设计与应用为例,详细介绍了井下避难硐室系统的分类、结构构成、功能需求和配套设施等,并通过紧急避险疏散时间的校验计算,提出避难硐室距离采掘工作面以不超过1 000 m为宜,且应按照“地面最安全,先逃生后避险”原则进行避险救援,为国内其他矿井避难硐室的构建应用和相关标准的制定提供了参考。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号