全文获取类型
收费全文 | 51371篇 |
免费 | 5591篇 |
国内免费 | 3245篇 |
专业分类
电工技术 | 7121篇 |
技术理论 | 7篇 |
综合类 | 4284篇 |
化学工业 | 1602篇 |
金属工艺 | 744篇 |
机械仪表 | 2792篇 |
建筑科学 | 4790篇 |
矿业工程 | 3108篇 |
能源动力 | 1192篇 |
轻工业 | 1038篇 |
水利工程 | 3456篇 |
石油天然气 | 1033篇 |
武器工业 | 249篇 |
无线电 | 7117篇 |
一般工业技术 | 2023篇 |
冶金工业 | 900篇 |
原子能技术 | 538篇 |
自动化技术 | 18213篇 |
出版年
2024年 | 97篇 |
2023年 | 625篇 |
2022年 | 1301篇 |
2021年 | 1664篇 |
2020年 | 1717篇 |
2019年 | 1185篇 |
2018年 | 1111篇 |
2017年 | 1521篇 |
2016年 | 1827篇 |
2015年 | 2148篇 |
2014年 | 4436篇 |
2013年 | 3605篇 |
2012年 | 5053篇 |
2011年 | 5096篇 |
2010年 | 3504篇 |
2009年 | 3448篇 |
2008年 | 3273篇 |
2007年 | 3632篇 |
2006年 | 3144篇 |
2005年 | 2706篇 |
2004年 | 2239篇 |
2003年 | 1870篇 |
2002年 | 1299篇 |
2001年 | 922篇 |
2000年 | 723篇 |
1999年 | 479篇 |
1998年 | 347篇 |
1997年 | 265篇 |
1996年 | 215篇 |
1995年 | 164篇 |
1994年 | 128篇 |
1993年 | 78篇 |
1992年 | 57篇 |
1991年 | 52篇 |
1990年 | 35篇 |
1989年 | 37篇 |
1988年 | 27篇 |
1987年 | 8篇 |
1986年 | 18篇 |
1985年 | 30篇 |
1984年 | 24篇 |
1983年 | 27篇 |
1982年 | 22篇 |
1981年 | 13篇 |
1980年 | 7篇 |
1979年 | 8篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1975年 | 2篇 |
1963年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
为进一步提高城市生态监测的精确度,在前人开展的城市生态遥感监测研究的基础上引入“区域尺度”的概念,充分考虑小区域范围内不同地物间的交互作用,并利用移动窗口模型(Moving Window-Remote Sensing Ecology Index, MW-RSEI)对沈阳市浑南区的遥感影像进行逐像元分析。实验结果表明,MW-RSEI模型和生态遥感监测模型(Remote Sensing Ecology Index, RSEI)在整体生态评价趋势上表现出一致性。但MW-RSEI模型对城市生态中的细节区域表征更明显。考虑到建筑及裸地周围植被的影响,其较差生态区域的占比仅为6%,生态评价为优的区域占比为11%。研究区生态评价结果表现得较为连续,并未出现明显的断层现象。该结果具有现实意义且与实际生态分布更为符合。MW-RSEI模型在城市生态监测中更为适用,可为相关部门提供一定的技术参考。 相似文献
2.
In this paper, the feature representation of an image by CNN is used to hide the secret image into the cover image. The style of the cover image hides the content of the secret image and produce a stego image using Neural Style Transfer (NST) algorithm, which resembles the cover image and also contains the semantic content of secret image. The main technical contributions are to hide the content of the secret image in the in-between hidden layered style features of the cover image, which is the first of its kind in the present state-of-art-technique. Also, to recover the secret image from the stego image, destylization is done with the help of conditional generative adversarial networks (GANs) using Residual in Residual Dense Blocks (RRDBs). Further, stego images from different layer combinations of content and style features are obtained and evaluated. Evaluation is based on the visual similarity and quality loss between the cover-stego pair and the secret-reconstructed secret pair of images. From the experiments, it has been observed that the proposed algorithm has 43.95 dB Peak Signal-to-Noise Ratio (PSNR)), .995 Structural Similarity Index (SSIM), and .993 Visual Information Fidelity (VIF) for the ImageNet dataset. The proposed algorithm is found to be more robust against StegExpose than the traditional methods. 相似文献
3.
The supply of electrical energy is critical to convenient and comfortable living. However, people consume a large amount of energy, contributing to an energy crisis and global warming, and damaging some ecological cycles. Residential electricity consumption has greater elasticity than industrial and business consumption; it therefore has high energy-saving potential. This work establishes an automated platform, which provides information about residential electricity consumption in each city in Taiwan. Machine learning was used to forecast future residential electricity demand. A nature-inspired optimization method was applied to enhance the accuracy of the best machine learner, yielding an even better hybrid ensemble model. Performance measures indicate that the resulting model is accurate and provides effective information for reference. An automatic web-based system based on the model was combined with a web crawler and scheduled to run automatically to provide information on monthly residential electricity consumption in each county and city. By providing energy consumption information across the country, power providers and government can discuss policy and set different goals for energy use. The results of this study can facilitate the early implementation of energy-saving and carbon emission-reducing in cities and aid utility companies in establishing energy conservation guidelines. 相似文献
4.
5G系统将移动通信服务从移动电话、移动宽带和大规模机器通信扩展到新的应用领域,即所谓对通信服务有特殊要求的垂直领域。对使能未来工厂的5G能力进行了全面的分析总结,包括弹性网络架构、灵活频谱、超可靠低时延通信、时间敏感网络、安全和定位,而弹性网络架构又包括对网络切片、非公共网络、5G局域网和边缘计算的支持。希望从广度到深度,对相关的理论及技术应用做透彻、全面的梳理,对其挑战做清晰的总结,从而为相关研究和工程技术人员提供借鉴。 相似文献
5.
6.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security. 相似文献
7.
以井下供电监控及防越级跳闸运用为对象开展探究。在分析矿井供电系统运行中现存主要问题的基础上,对供电监控与防越级跳闸系统整体应用的积极意义进行了分析和总结,希望能够让更多矿井技术人员了解供电监控及防越级跳闸系统的优越性,为其在矿井中的广泛推广普及提供便利,为煤矿行业更加高效地发展提供帮助。 相似文献
8.
Sarah L. Jones Steven C. Ricke D. Keith Roper 《Critical reviews in food science and nutrition》2020,60(2):225-243
AbstractCross-contamination can be broadly defined as the transfer, direct or indirect, of microorganisms from a contaminated product to a non-contaminated product. Events that may result in cross-contamination include inadequate hygiene practices, contaminated equipment surfaces, contamination via food handling personnel, further product processing, or storage abuse All of these niches require consistent environmental surveillance systems to monitor microbial harborage sites to prevent foodborne illnesses via cross-contamination. Environmental surveillance is achieved through routine surface sampling of the food contact surfaces and surrounding areas. To better understand cross-contamination, the role of environmental surface transmission during outbreaks due to the presence and persistence of pathogenic microorganisms on various food contact surfaces must be investigated. However, studies on environmental sampling techniques are rarely performed in an actual food processing environment but rather under controlled variables within a laboratory-setting. Moreover, results and conclusions of studies differ because of the considerable variability across surface sampling tools due to individual operator dependency, low recovery rates, and low reproducibility. Information is also often lacking on environmental sampling tools used within a processing facility, the characterization of these tools, and the optimization of recovery of microorganisms for surface sampling. Thus, this review aims to: (1) discuss and compare factors impacting the recovery of microorganisms and the standardization of surface sampling methods for optimal recovery of microorganisms and (2) examine how research strategies could focus more towards the development of standard methodologies for surface sampling. 相似文献
9.
美国自2018年5月宣布重启对伊朗全面制裁,伊朗再次成为国际社会关注的焦点。本文系统梳理了伊朗能源禀赋及开发利用现状,分析了伊朗对中国能源安全的保障程度及其优势,发现1997~2017年伊朗对中国石油安全的保障程度呈波动上升态势,对维护中国油气资源供给安全具有重要意义,认为中伊能源合作具有战略互补性、地缘政治优势、经济优势、历史文化基础和降低美元计价风险等优势。在上述基础上,本文从能源价格、供给渠道和运输安全三方面剖析了此次美国全面制裁伊朗对中国能源安全可能产生的影响,并从规避美国制裁风险和保障国家能源安全角度,提出了相关对策建议。 相似文献
10.
Chang-Won Kim Wi Sung Yoo Hyunsu Lim Ilhan Yu Hunhee Cho Kyung-In Kang 《International Journal of Project Management》2018,36(5):730-743
An early-warning performance monitoring system (EPMS) is proposed to objectively measure and monitor the performance of a project for early detection of inherent poor performance problems. The EPMS is built based on project progress data and consists of a database of business information, an optimized theoretical model used as a performance measurement baseline, and an index for monitoring and forecasting the performance. By monitoring the performance through an application of the EPMS to the Korean construction project, the quarterly variation of index was found to differ by project type. These results could explain the environmental changes in the project execution. Therefore, the EPMS is expected to be an alternative for objective performance monitoring and forecasting while applying the existing methods is difficult because of the limited available data on performance indicators. The development procedures may also be useful to researchers interested in approaches to quantitatively analyze trends in various industries. 相似文献