首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   228719篇
  免费   21170篇
  国内免费   16033篇
电工技术   32663篇
技术理论   13篇
综合类   22565篇
化学工业   16069篇
金属工艺   10727篇
机械仪表   20573篇
建筑科学   19265篇
矿业工程   9360篇
能源动力   5930篇
轻工业   7323篇
水利工程   6743篇
石油天然气   8233篇
武器工业   3316篇
无线电   18724篇
一般工业技术   12371篇
冶金工业   9167篇
原子能技术   1447篇
自动化技术   61433篇
  2024年   476篇
  2023年   3287篇
  2022年   5586篇
  2021年   6531篇
  2020年   6874篇
  2019年   5162篇
  2018年   4388篇
  2017年   6265篇
  2016年   6790篇
  2015年   7664篇
  2014年   15153篇
  2013年   12870篇
  2012年   16933篇
  2011年   18300篇
  2010年   13769篇
  2009年   14348篇
  2008年   13896篇
  2007年   17283篇
  2006年   15507篇
  2005年   13412篇
  2004年   10980篇
  2003年   9784篇
  2002年   7703篇
  2001年   6278篇
  2000年   5321篇
  1999年   4190篇
  1998年   3242篇
  1997年   2714篇
  1996年   2227篇
  1995年   1868篇
  1994年   1626篇
  1993年   1124篇
  1992年   904篇
  1991年   715篇
  1990年   537篇
  1989年   461篇
  1988年   338篇
  1987年   185篇
  1986年   140篇
  1985年   154篇
  1984年   185篇
  1983年   140篇
  1982年   135篇
  1981年   91篇
  1980年   77篇
  1979年   74篇
  1978年   50篇
  1977年   51篇
  1959年   16篇
  1951年   14篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
2.
Tracking-by-detection (TBD) is a significant framework for visual object tracking. However, current trackers are usually updated online based on random sampling with a probability distribution. The performance of the learning-based TBD trackers is limited by the lack of discriminative features, especially when the background is full of semantic distractors. We propose an attention-driven data augmentation method, in which a residual attention mechanism is integrated into the TBD tracking network as supplementary references to identify discriminative image features. A mask generating network is used to simulate changes in target appearances to obtain positive samples, where attention information and image features are combined to identify discriminative features. In addition, we propose a method for mining hard negative samples, which searches for semantic distractors with the response of the attention module. The experiments on the OTB2015, UAV123, and LaSOT benchmarks show that this method achieves competitive performance in terms of accuracy and robustness.  相似文献   
3.
With the blossom of information industry, electromagnetic wave technology shows increasingly potential in many fields. Nevertheless, the trouble caused by electromagnetic waves has also drawn extensive attention. For instance, electromagnetic pollution can threaten information safety in vital fields and the normal function of delicate electronic devices. Consequently, electromagnetic pollution and interference become an urgent issue that needs to be addressed. Carbon nanotubes (CNTs) have become a potential candidate to deal with these problems due to many advantages, such as high dielectric loss, remarkable thermodynamic stability, and low density. With the appearance of climbing demands, however, the carbon nanotubes combining various composites have shown greater prospects than the single CNTs in microwave absorbing materials. In this short review, recent advances in CNTs-based microwave absorbing materials were comprehensively discussed. Typically, we introduced the electromagnetic wave absorption mechanism of CNTs-based microwave absorbing materials and generalized the development of CNTs-based microwave absorbers, including CNTs-based magnetic metal composites, CNTs-based ferrite composites, and CNTs-based polymer composites. Ultimately, the growing trend and bottleneck of CNTs-based composites for microwave absorption were analyzed to provide some available ideas to more scientific workers.  相似文献   
4.
Since the discovery in 1922 of 2,2-diphenyl-1-(2,4,6-trinitrophenyl) hydrazyl stable free radical (DPPH·), the chemistry of such open-shell compounds has developed continuously, allowing for both theoretical and practical advances in the free radical chemistry area. This review presents the important, general and modern aspects of the chemistry of hydrazyl free radicals and the science behind it.  相似文献   
5.
High-density La0.9-xSrxK0.1MnO3 ceramics (LSKMO, A-site = La, Sr and K, 0 ≤ x ≤ 0.25) are successfully fabricated by using facile sol-gel method. Electrical properties are performed by using combination of phenomenological percolation (PP) model, double exchange (DE) mechanism, and Jahn-Teller (JT) effect. Moreover, X-ray diffraction and scanning electron microscopy are employed to analyze the structure and morphology of LSKMO ceramics. Valence states and ionic stoichiometry are assessed by using X-ray photoemission spectrometry. Results reveal that Sr2+ ions, substituting La3+ ions, significantly influenced DE mechanism and JT effect. In addition, Sr-doping plays essential role in improving electrical properties of LSKMO ceramics. At optimal doping content of x = 0.09, peak temperature coefficient of resistance (TCR) of the resistivity is found to be 11.56% K?1 at 297.15 K, which is optimal TCR for A-site K-occupied perovskite manganese oxides. These results confirm that polycrystalline LSKMO ceramics render high room-temperature TCR values due to Sr-doping.  相似文献   
6.
Bulk micromachining of single-crystal SiC has been challenging due to its extreme stability both mechanically and chemically. To address this issue, a novel tool-based electrolytic plasma etching method is proposed, with which micropatterns and micro-holes are fabricated in SiC in a hydrofluoric acid-free aqueous solution with no need for masks. The material removal is the result of the combined effects of electrolytic plasma chemistry and physics. The chemistry refers to the reaction of Si with hydroxyl radical to form various SiOx and with H to form silanes, and the reactions of C to form volatile carbon oxides or hydrocarbons, all of which are accomplished and enhanced under the electrolytic plasma atmosphere. Besides, the local high temperature of plasma thermally promotes the evaporation or dissolution of SiO2 in NaOH solution. The tool-based electrolytic plasma etching method provides alternative approaches for the fabrication of SiC-based MEMS and devices.  相似文献   
7.
引入句法依存信息到原方面术语,提出一种新的方面术语表示方法,利用Glove词向量表示单词以及单词与单词之间的依存关系,构造出包含句法依存信息的依存关系邻接矩阵和依存关系表示矩阵,利用图卷积神经网络和多头注意力机制将句法依存信息融入到方面术语中,使得方面术语表达与上下文结构高度相关。将改进后的方面词术语表示替换到现有模型后,模型泛化能力得到有效提升。对比试验和分析结果表明:该方法具有有效性和泛化性。  相似文献   
8.
9.
The turbulent boundary layer control on NACA 0012 airfoil with Mach number ranging from 0.3 to 0.5 by a spanwise array of dielectric barrier discharge(DBD)plasma actuators by hot-film sensor technology is investigated.Due to temperature change mainly caused through heat produced along with plasma will lead to measurement error of shear stress measured by hot-film sensor,the correction method that takes account of the change measured by another sensor is used and works well.In order to achieve the value of shear stress change,we combine computational fluid dynamics computation with experiment to calibrate the hot-film sensor.To test the stability of the hot-film sensor,seven repeated measurements of shear stress at Ma = 0.3 are conducted and show that confidence interval of hot-film sensor measurement is from-0.18 to 0.18 Pa and the root mean square is 0.11 Pa giving a relative error 0.5%over all Mach numbers in this experiment.The research on the turbulent boundary layer control with DBD plasma actuators demonstrates that the control makes shear stress increase by about 6%over the three Mach numbers,which is thought to be reliable through comparing it with the relative error 0.5%,and the value is hardly affected by burst frequency and excitation voltage.  相似文献   
10.
云计算、大数据、5G通信等技术的快速发展,有力的促进了计算机网络在多个领域的普及和使用,人们已经进入到了“互联网+”时代,实现了工作、生活和学习的数字化、智能化和共享化。计算机网络在为人们提供各种便利服务的同时也面临着许多的安全威胁,比如木马、病毒等,不法分子攻击网络数据中心,破坏用户服务终端及服务器,为人们带来严重的威胁。网络安全学者或企业机构也提出了许多安全防御技术,比如入侵检测技术、深度包过滤技术、防火墙技术、数据加密技术等,一定程度上提高了网络安全防御的能力,但是随着互联网数据流量的增多,需要引入更加先进的人工智能技术,以便能够快速的采集、分析网络数据流,确定数据流中是否存在病毒或木马,以便及时的对其进行查杀,进一步提高网络安全防御的主动性、积极性  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号