首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   71737篇
  免费   9069篇
  国内免费   6748篇
电工技术   6221篇
技术理论   9篇
综合类   7761篇
化学工业   1701篇
金属工艺   889篇
机械仪表   4171篇
建筑科学   2878篇
矿业工程   1774篇
能源动力   924篇
轻工业   1053篇
水利工程   1538篇
石油天然气   2943篇
武器工业   843篇
无线电   13032篇
一般工业技术   3995篇
冶金工业   1376篇
原子能技术   786篇
自动化技术   35660篇
  2024年   153篇
  2023年   1005篇
  2022年   2016篇
  2021年   2534篇
  2020年   2673篇
  2019年   2124篇
  2018年   1869篇
  2017年   2255篇
  2016年   2420篇
  2015年   2970篇
  2014年   4885篇
  2013年   4381篇
  2012年   5434篇
  2011年   5731篇
  2010年   4401篇
  2009年   4343篇
  2008年   4970篇
  2007年   5531篇
  2006年   4677篇
  2005年   4263篇
  2004年   3681篇
  2003年   3175篇
  2002年   2458篇
  2001年   1919篇
  2000年   1590篇
  1999年   1140篇
  1998年   863篇
  1997年   734篇
  1996年   571篇
  1995年   560篇
  1994年   411篇
  1993年   310篇
  1992年   211篇
  1991年   213篇
  1990年   157篇
  1989年   129篇
  1988年   102篇
  1987年   81篇
  1986年   68篇
  1985年   98篇
  1984年   67篇
  1983年   83篇
  1982年   70篇
  1981年   42篇
  1980年   23篇
  1979年   37篇
  1978年   14篇
  1977年   22篇
  1976年   18篇
  1959年   7篇
排序方式: 共有10000条查询结果,搜索用时 93 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
2.
To benefit from recent advances in modeling and computational algorithms,as well as the availability of new covariance data,sensitivity and uncertainty analyses are needed to quantify the impact of uncertain sources on the design parameters of small prismatic high-temperature gas-cooled reactors(HTGRs).In particular,the contribution of nuclear data to the keff uncertainty is an important part of the uncertainty analysis of small-sized HTGR physical calculations.In this study,a small-sized HTGR designed by China Nuclear Power Engineering Co.,Ltd.was selected for keff uncertainty analysis during full lifetime burnup calculations.Models of the cold zero power(CZP)condition and full lifetime burnup process were constructed using the Reactor Monte Carlo Code RMC for neutron transport calculation,depletion calculation,and sensitivity and uncertainty analysis.For the sensitivity analysis,the Contribution-Linked eigenvalue sensitivity/Uncertainty estimation via Track length importance Characterization(CLUTCH)method was applied to obtain sensitive infor-mation,and the"sandwich"method was used to quantify the keff uncertainty.We also compared the keff uncertainties to other typical reactors.Our results show that 235U is the largest contributor to keff uncertainty for both the CZP and depletion conditions,while the contribution of 239Pu is not very significant because of the design of low discharge burnup.It is worth noting that the radioactive capture reaction of 28Si significantly contributes to the keff uncer-tainty owing to its specific fuel design.However,the keff uncertainty during the full lifetime depletion process was relatively stable,only increasing by 1.12%owing to the low discharge burnup design of small-sized HTGRs.These numerical results are beneficial for neutronics design and core parameters optimization in further uncertainty prop-agation and quantification study for small-sized HTGR.  相似文献   
3.
文婷  李波 《机械与电子》2021,39(2):21-24
对IEC 60870-5-104协议的调度命令进行了研究,提出了一种基于现有IEC 60870-5-104协议的调度命令发送新方法。此技术充分利用了IEC 60870-5-104协议的文件发送功能,通过远程终端单元(RTU)向电厂发送包含调度命令的文本文件。考虑到调度命令在电力系统和电力市场结算系统安全方面的重要性,将该方法应用在电网调度自动化 SCADA 系统中,可以实现交换数据的更高可用性。  相似文献   
4.
This paper analyses the perception of Artificial Intelligence (AI) by individuals in Spain and the factors associated with it. It uses data from 6308 individuals from a 2018 Spanish survey. A binary logit regression model is formulated and estimated for the attitude towards robots and AI and its possible determinants. As main results are that a gender gap is detected, and that people have a negative attitude if they are not interested in scientific discoveries and technological developments and if AI and robots are not useful at work.  相似文献   
5.
A recent development in tactile technology enables an improvement in the appreciation of the visual arts for people with visual impairment (PVI). The tactile sense, in conjunction with, or a possibly as an alternative to, the auditory sense, would allow PVIs to approach artwork in a more self‐driven and engaging way that would be difficult to achieve with just an auditory stimulus. Tactile colour pictograms (TCPs), which are raised geometric patterns, are ideographic characters that are designed to enable PVIs to identify colours and interpret information by touch. In this article, three TCPs are introduced to code colours in the Munsell colour system. Each colour pattern consists of a basic cell size of 10 mm × 10 mm to represent the patterns consistently in terms of regular shape. Each TCP consists of basic geometric patterns that are combined to create primary, secondary, and tertiary colour pictograms of shapes indicating colour hue, intensity and lightness. Each TCP represents 29 colours including six hues; they were then further expanded to represent 53 colours. Two of them did not increase the cell size, the other increased the cell size 1.5 times for some colours, such as yellow‐orange, yellow, blue, and blue‐purple. Our proposed TCPs use a slightly larger cell size compared to most tactile patterns currently used to indicate colour, but code for more colours. With user experience and identification tests, conducted with 23 visually impaired adults, the effectiveness of the TCPs suggests that they were helpful for the participants.  相似文献   
6.
7.
The ways in which environmental priorities are framed are varied and influenced by political forces. One technological advance--the proliferation of government open data portals (ODPs)--has the potential to improve governance through facilitating access to data. Yet it is also known that the data hosted on ODPs may simply reflect the goals and interests of multiple levels of political power. In this article, I use traditional statistical correlation and regression techniques along with newer natural language processing and machine learning algorithms to analyze the corpus of datasets hosted on government ODPs (total: 49,066) to extract patterns that relate scales of governance and political liberalism/conservatism to the priorities and meaning attached to environmental issues. I find that state-level and municipal-level ODPs host different categories of environmental datasets, with municipal-level ODPs generally hosting more datasets pertaining to services and amenities and state-level ODPs hosting more datasets pertaining to resource protection and extraction. Stronger trends were observed for the influences of political conservatism/liberalism among state-level ODPs than for municipal-level ODPs.  相似文献   
8.
9.
高性能集群的作业调度通常使用作业调度系统来实现,准确填写作业运行时间能在很大程度上提升作业调度效率。现有的研究通常使用机器学习的预测方式,在预测精度和实用性上还存在一定的提升空间。为了进一步提高集群作业运行时间预测的准确率,考虑先对集群作业日志进行聚类,将作业类别信息添加到作业特征中,再使用基于注意力机制的NR-Transformer网络对作业日志数据建模和预测。在数据处理上,根据与预测目标的相关性、特征的完整性和数据的有效性,从历史日志数据集中筛选出7维特征,并按作业运行时间的长度将其划分为多个作业集,再对各作业集分别进行训练和预测。实验结果表明,相比于传统机器学习和BP神经网络,时序神经网络结构有更好的预测性能,其中NR-Transformer在各作业集上都有较好的性能。  相似文献   
10.
针对现有基于视频监控的人流量统计方案成本高、算法复杂且不利于个人隐私保护的局限性,利用毫米波雷达体积小、成本低、分辨率高的特点,提出了一种基于双时间点检测的人流量监测方法。该方法先获取人体目标散射点位置和多普勒频移信息来构成点云数据,然后根据多普勒频移正负来判断人体的运动方向,并筛选具有高多普勒频移值的点云数据以降低干扰点对聚类结果的影响;在双时间点对特定区域内人员数量进行统计,并根据双时间点之间所获取的点云数据聚类结果对所统计人员数据进行修正。实验结果表明,该方法能够用匿名的方式以较高的正确率统计人员进出。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号