全文获取类型
收费全文 | 100585篇 |
免费 | 14043篇 |
国内免费 | 9572篇 |
专业分类
电工技术 | 11149篇 |
技术理论 | 15篇 |
综合类 | 11383篇 |
化学工业 | 2154篇 |
金属工艺 | 1042篇 |
机械仪表 | 5579篇 |
建筑科学 | 6076篇 |
矿业工程 | 2577篇 |
能源动力 | 1570篇 |
轻工业 | 1513篇 |
水利工程 | 2610篇 |
石油天然气 | 3381篇 |
武器工业 | 1190篇 |
无线电 | 16409篇 |
一般工业技术 | 4755篇 |
冶金工业 | 2049篇 |
原子能技术 | 952篇 |
自动化技术 | 49796篇 |
出版年
2024年 | 213篇 |
2023年 | 1372篇 |
2022年 | 2843篇 |
2021年 | 3461篇 |
2020年 | 3724篇 |
2019年 | 3012篇 |
2018年 | 2703篇 |
2017年 | 3367篇 |
2016年 | 3819篇 |
2015年 | 4427篇 |
2014年 | 7368篇 |
2013年 | 6490篇 |
2012年 | 8172篇 |
2011年 | 8856篇 |
2010年 | 6851篇 |
2009年 | 6827篇 |
2008年 | 7349篇 |
2007年 | 8192篇 |
2006年 | 6853篇 |
2005年 | 5857篇 |
2004年 | 4818篇 |
2003年 | 4001篇 |
2002年 | 2922篇 |
2001年 | 2205篇 |
2000年 | 1798篇 |
1999年 | 1241篇 |
1998年 | 933篇 |
1997年 | 766篇 |
1996年 | 639篇 |
1995年 | 572篇 |
1994年 | 465篇 |
1993年 | 328篇 |
1992年 | 250篇 |
1991年 | 227篇 |
1990年 | 197篇 |
1989年 | 164篇 |
1988年 | 126篇 |
1987年 | 88篇 |
1986年 | 79篇 |
1985年 | 115篇 |
1984年 | 90篇 |
1983年 | 90篇 |
1982年 | 75篇 |
1981年 | 42篇 |
1980年 | 26篇 |
1979年 | 40篇 |
1978年 | 14篇 |
1977年 | 20篇 |
1976年 | 16篇 |
1959年 | 11篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security. 相似文献
2.
To benefit from recent advances in modeling and computational algorithms,as well as the availability of new covariance data,sensitivity and uncertainty analyses are needed to quantify the impact of uncertain sources on the design parameters of small prismatic high-temperature gas-cooled reactors(HTGRs).In particular,the contribution of nuclear data to the keff uncertainty is an important part of the uncertainty analysis of small-sized HTGR physical calculations.In this study,a small-sized HTGR designed by China Nuclear Power Engineering Co.,Ltd.was selected for keff uncertainty analysis during full lifetime burnup calculations.Models of the cold zero power(CZP)condition and full lifetime burnup process were constructed using the Reactor Monte Carlo Code RMC for neutron transport calculation,depletion calculation,and sensitivity and uncertainty analysis.For the sensitivity analysis,the Contribution-Linked eigenvalue sensitivity/Uncertainty estimation via Track length importance Characterization(CLUTCH)method was applied to obtain sensitive infor-mation,and the"sandwich"method was used to quantify the keff uncertainty.We also compared the keff uncertainties to other typical reactors.Our results show that 235U is the largest contributor to keff uncertainty for both the CZP and depletion conditions,while the contribution of 239Pu is not very significant because of the design of low discharge burnup.It is worth noting that the radioactive capture reaction of 28Si significantly contributes to the keff uncer-tainty owing to its specific fuel design.However,the keff uncertainty during the full lifetime depletion process was relatively stable,only increasing by 1.12%owing to the low discharge burnup design of small-sized HTGRs.These numerical results are beneficial for neutronics design and core parameters optimization in further uncertainty prop-agation and quantification study for small-sized HTGR. 相似文献
3.
4.
引入句法依存信息到原方面术语,提出一种新的方面术语表示方法,利用Glove词向量表示单词以及单词与单词之间的依存关系,构造出包含句法依存信息的依存关系邻接矩阵和依存关系表示矩阵,利用图卷积神经网络和多头注意力机制将句法依存信息融入到方面术语中,使得方面术语表达与上下文结构高度相关。将改进后的方面词术语表示替换到现有模型后,模型泛化能力得到有效提升。对比试验和分析结果表明:该方法具有有效性和泛化性。 相似文献
5.
This paper analyses the perception of Artificial Intelligence (AI) by individuals in Spain and the factors associated with it. It uses data from 6308 individuals from a 2018 Spanish survey. A binary logit regression model is formulated and estimated for the attitude towards robots and AI and its possible determinants. As main results are that a gender gap is detected, and that people have a negative attitude if they are not interested in scientific discoveries and technological developments and if AI and robots are not useful at work. 相似文献
6.
7.
The ways in which environmental priorities are framed are varied and influenced by political forces. One technological advance--the proliferation of government open data portals (ODPs)--has the potential to improve governance through facilitating access to data. Yet it is also known that the data hosted on ODPs may simply reflect the goals and interests of multiple levels of political power. In this article, I use traditional statistical correlation and regression techniques along with newer natural language processing and machine learning algorithms to analyze the corpus of datasets hosted on government ODPs (total: 49,066) to extract patterns that relate scales of governance and political liberalism/conservatism to the priorities and meaning attached to environmental issues. I find that state-level and municipal-level ODPs host different categories of environmental datasets, with municipal-level ODPs generally hosting more datasets pertaining to services and amenities and state-level ODPs hosting more datasets pertaining to resource protection and extraction. Stronger trends were observed for the influences of political conservatism/liberalism among state-level ODPs than for municipal-level ODPs. 相似文献
8.
9.
10.
针对现有基于视频监控的人流量统计方案成本高、算法复杂且不利于个人隐私保护的局限性,利用毫米波雷达体积小、成本低、分辨率高的特点,提出了一种基于双时间点检测的人流量监测方法。该方法先获取人体目标散射点位置和多普勒频移信息来构成点云数据,然后根据多普勒频移正负来判断人体的运动方向,并筛选具有高多普勒频移值的点云数据以降低干扰点对聚类结果的影响;在双时间点对特定区域内人员数量进行统计,并根据双时间点之间所获取的点云数据聚类结果对所统计人员数据进行修正。实验结果表明,该方法能够用匿名的方式以较高的正确率统计人员进出。 相似文献