首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   51371篇
  免费   5591篇
  国内免费   3245篇
电工技术   7121篇
技术理论   7篇
综合类   4284篇
化学工业   1602篇
金属工艺   744篇
机械仪表   2792篇
建筑科学   4790篇
矿业工程   3108篇
能源动力   1192篇
轻工业   1038篇
水利工程   3456篇
石油天然气   1033篇
武器工业   249篇
无线电   7117篇
一般工业技术   2023篇
冶金工业   900篇
原子能技术   538篇
自动化技术   18213篇
  2024年   97篇
  2023年   625篇
  2022年   1301篇
  2021年   1664篇
  2020年   1717篇
  2019年   1185篇
  2018年   1111篇
  2017年   1521篇
  2016年   1827篇
  2015年   2148篇
  2014年   4436篇
  2013年   3605篇
  2012年   5053篇
  2011年   5096篇
  2010年   3504篇
  2009年   3448篇
  2008年   3273篇
  2007年   3632篇
  2006年   3144篇
  2005年   2706篇
  2004年   2239篇
  2003年   1870篇
  2002年   1299篇
  2001年   922篇
  2000年   723篇
  1999年   479篇
  1998年   347篇
  1997年   265篇
  1996年   215篇
  1995年   164篇
  1994年   128篇
  1993年   78篇
  1992年   57篇
  1991年   52篇
  1990年   35篇
  1989年   37篇
  1988年   27篇
  1987年   8篇
  1986年   18篇
  1985年   30篇
  1984年   24篇
  1983年   27篇
  1982年   22篇
  1981年   13篇
  1980年   7篇
  1979年   8篇
  1978年   2篇
  1977年   2篇
  1975年   2篇
  1963年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
马晶  李鋆垚  张亚球  蔡宇婷 《红外》2022,43(8):44-52
为进一步提高城市生态监测的精确度,在前人开展的城市生态遥感监测研究的基础上引入“区域尺度”的概念,充分考虑小区域范围内不同地物间的交互作用,并利用移动窗口模型(Moving Window-Remote Sensing Ecology Index, MW-RSEI)对沈阳市浑南区的遥感影像进行逐像元分析。实验结果表明,MW-RSEI模型和生态遥感监测模型(Remote Sensing Ecology Index, RSEI)在整体生态评价趋势上表现出一致性。但MW-RSEI模型对城市生态中的细节区域表征更明显。考虑到建筑及裸地周围植被的影响,其较差生态区域的占比仅为6%,生态评价为优的区域占比为11%。研究区生态评价结果表现得较为连续,并未出现明显的断层现象。该结果具有现实意义且与实际生态分布更为符合。MW-RSEI模型在城市生态监测中更为适用,可为相关部门提供一定的技术参考。  相似文献   
2.
In this paper, the feature representation of an image by CNN is used to hide the secret image into the cover image. The style of the cover image hides the content of the secret image and produce a stego image using Neural Style Transfer (NST) algorithm, which resembles the cover image and also contains the semantic content of secret image. The main technical contributions are to hide the content of the secret image in the in-between hidden layered style features of the cover image, which is the first of its kind in the present state-of-art-technique. Also, to recover the secret image from the stego image, destylization is done with the help of conditional generative adversarial networks (GANs) using Residual in Residual Dense Blocks (RRDBs). Further, stego images from different layer combinations of content and style features are obtained and evaluated. Evaluation is based on the visual similarity and quality loss between the cover-stego pair and the secret-reconstructed secret pair of images. From the experiments, it has been observed that the proposed algorithm has 43.95 dB Peak Signal-to-Noise Ratio (PSNR)), .995 Structural Similarity Index (SSIM), and .993 Visual Information Fidelity (VIF) for the ImageNet dataset. The proposed algorithm is found to be more robust against StegExpose than the traditional methods.  相似文献   
3.
The supply of electrical energy is critical to convenient and comfortable living. However, people consume a large amount of energy, contributing to an energy crisis and global warming, and damaging some ecological cycles. Residential electricity consumption has greater elasticity than industrial and business consumption; it therefore has high energy-saving potential. This work establishes an automated platform, which provides information about residential electricity consumption in each city in Taiwan. Machine learning was used to forecast future residential electricity demand. A nature-inspired optimization method was applied to enhance the accuracy of the best machine learner, yielding an even better hybrid ensemble model. Performance measures indicate that the resulting model is accurate and provides effective information for reference. An automatic web-based system based on the model was combined with a web crawler and scheduled to run automatically to provide information on monthly residential electricity consumption in each county and city. By providing energy consumption information across the country, power providers and government can discuss policy and set different goals for energy use. The results of this study can facilitate the early implementation of energy-saving and carbon emission-reducing in cities and aid utility companies in establishing energy conservation guidelines.  相似文献   
4.
5G系统将移动通信服务从移动电话、移动宽带和大规模机器通信扩展到新的应用领域,即所谓对通信服务有特殊要求的垂直领域。对使能未来工厂的5G能力进行了全面的分析总结,包括弹性网络架构、灵活频谱、超可靠低时延通信、时间敏感网络、安全和定位,而弹性网络架构又包括对网络切片、非公共网络、5G局域网和边缘计算的支持。希望从广度到深度,对相关的理论及技术应用做透彻、全面的梳理,对其挑战做清晰的总结,从而为相关研究和工程技术人员提供借鉴。  相似文献   
5.
采用定向控制爆破技术拆除立柱加固型7层框架大楼。为了彻底炸毁加固立柱,确保大楼顺利定向倾倒,通过多次爆破试验确定了炸药单耗、布孔参数和装药结构。为了控制大楼塌落时的触地震动,采取了秒差分区爆破、空中解体、铺垫缓冲层和开挖减震沟等技术措施。爆破过程中进行了震动监测。此外还介绍了起爆顺序、安全防护措施及爆破结果。  相似文献   
6.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
7.
以井下供电监控及防越级跳闸运用为对象开展探究。在分析矿井供电系统运行中现存主要问题的基础上,对供电监控与防越级跳闸系统整体应用的积极意义进行了分析和总结,希望能够让更多矿井技术人员了解供电监控及防越级跳闸系统的优越性,为其在矿井中的广泛推广普及提供便利,为煤矿行业更加高效地发展提供帮助。  相似文献   
8.
Abstract

Cross-contamination can be broadly defined as the transfer, direct or indirect, of microorganisms from a contaminated product to a non-contaminated product. Events that may result in cross-contamination include inadequate hygiene practices, contaminated equipment surfaces, contamination via food handling personnel, further product processing, or storage abuse All of these niches require consistent environmental surveillance systems to monitor microbial harborage sites to prevent foodborne illnesses via cross-contamination. Environmental surveillance is achieved through routine surface sampling of the food contact surfaces and surrounding areas. To better understand cross-contamination, the role of environmental surface transmission during outbreaks due to the presence and persistence of pathogenic microorganisms on various food contact surfaces must be investigated. However, studies on environmental sampling techniques are rarely performed in an actual food processing environment but rather under controlled variables within a laboratory-setting. Moreover, results and conclusions of studies differ because of the considerable variability across surface sampling tools due to individual operator dependency, low recovery rates, and low reproducibility. Information is also often lacking on environmental sampling tools used within a processing facility, the characterization of these tools, and the optimization of recovery of microorganisms for surface sampling. Thus, this review aims to: (1) discuss and compare factors impacting the recovery of microorganisms and the standardization of surface sampling methods for optimal recovery of microorganisms and (2) examine how research strategies could focus more towards the development of standard methodologies for surface sampling.  相似文献   
9.
美国自2018年5月宣布重启对伊朗全面制裁,伊朗再次成为国际社会关注的焦点。本文系统梳理了伊朗能源禀赋及开发利用现状,分析了伊朗对中国能源安全的保障程度及其优势,发现1997~2017年伊朗对中国石油安全的保障程度呈波动上升态势,对维护中国油气资源供给安全具有重要意义,认为中伊能源合作具有战略互补性、地缘政治优势、经济优势、历史文化基础和降低美元计价风险等优势。在上述基础上,本文从能源价格、供给渠道和运输安全三方面剖析了此次美国全面制裁伊朗对中国能源安全可能产生的影响,并从规避美国制裁风险和保障国家能源安全角度,提出了相关对策建议。  相似文献   
10.
An early-warning performance monitoring system (EPMS) is proposed to objectively measure and monitor the performance of a project for early detection of inherent poor performance problems. The EPMS is built based on project progress data and consists of a database of business information, an optimized theoretical model used as a performance measurement baseline, and an index for monitoring and forecasting the performance. By monitoring the performance through an application of the EPMS to the Korean construction project, the quarterly variation of index was found to differ by project type. These results could explain the environmental changes in the project execution. Therefore, the EPMS is expected to be an alternative for objective performance monitoring and forecasting while applying the existing methods is difficult because of the limited available data on performance indicators. The development procedures may also be useful to researchers interested in approaches to quantitatively analyze trends in various industries.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号