首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11813篇
  免费   673篇
  国内免费   644篇
电工技术   265篇
技术理论   1篇
综合类   679篇
化学工业   146篇
金属工艺   129篇
机械仪表   727篇
建筑科学   674篇
矿业工程   199篇
能源动力   87篇
轻工业   119篇
水利工程   101篇
石油天然气   78篇
武器工业   103篇
无线电   1365篇
一般工业技术   400篇
冶金工业   289篇
原子能技术   32篇
自动化技术   7736篇
  2024年   4篇
  2023年   70篇
  2022年   117篇
  2021年   185篇
  2020年   170篇
  2019年   140篇
  2018年   152篇
  2017年   220篇
  2016年   299篇
  2015年   274篇
  2014年   710篇
  2013年   539篇
  2012年   722篇
  2011年   1020篇
  2010年   678篇
  2009年   620篇
  2008年   805篇
  2007年   859篇
  2006年   907篇
  2005年   759篇
  2004年   660篇
  2003年   660篇
  2002年   528篇
  2001年   398篇
  2000年   304篇
  1999年   278篇
  1998年   220篇
  1997年   154篇
  1996年   120篇
  1995年   125篇
  1994年   65篇
  1993年   52篇
  1992年   40篇
  1991年   38篇
  1990年   22篇
  1989年   30篇
  1988年   17篇
  1987年   14篇
  1986年   18篇
  1985年   31篇
  1984年   17篇
  1983年   16篇
  1982年   10篇
  1981年   19篇
  1980年   11篇
  1979年   9篇
  1977年   8篇
  1976年   4篇
  1975年   4篇
  1973年   3篇
排序方式: 共有10000条查询结果,搜索用时 78 毫秒
1.
《工程爆破》2022,(4):78-84
介绍了在包头市某工程实施管道穿越黄河施工中,采用爆破法处理卡钻的经验。针对深水环境条件及钻杆内径小不宜采用集团装药的条件,确定采用"小直径爆破筒,钻杆内部装药"的爆破方案,阐述了爆破设计及施工注意事项。可供类似工程参考。  相似文献   
2.
In this paper, the feature representation of an image by CNN is used to hide the secret image into the cover image. The style of the cover image hides the content of the secret image and produce a stego image using Neural Style Transfer (NST) algorithm, which resembles the cover image and also contains the semantic content of secret image. The main technical contributions are to hide the content of the secret image in the in-between hidden layered style features of the cover image, which is the first of its kind in the present state-of-art-technique. Also, to recover the secret image from the stego image, destylization is done with the help of conditional generative adversarial networks (GANs) using Residual in Residual Dense Blocks (RRDBs). Further, stego images from different layer combinations of content and style features are obtained and evaluated. Evaluation is based on the visual similarity and quality loss between the cover-stego pair and the secret-reconstructed secret pair of images. From the experiments, it has been observed that the proposed algorithm has 43.95 dB Peak Signal-to-Noise Ratio (PSNR)), .995 Structural Similarity Index (SSIM), and .993 Visual Information Fidelity (VIF) for the ImageNet dataset. The proposed algorithm is found to be more robust against StegExpose than the traditional methods.  相似文献   
3.
针对传统大数据特征加密方法中大数据精度较差、加密耗时较长的问题,提出基于信息熵抑制的大数据特征隐匿性加密方法。分析信息熵抑制相关理论,采用信息熵映射函数对大数据分类,将信息熵抑制过程转化为计算2个文件相似性的过程,并根据余弦相似度公式以及Hamming距离值计算数据相似度,完成数据消冗。在完成数据消冗的基础上,分析分组密码方法和ECC加密方法,结合两种方法得到大数据特征隐匿性加密处理计算公式,实现基于信息熵抑制的大数据特征隐匿性加密。实验研究结果表明,所提方法能够有效去除冗余数据,提升大数据精度,加快数据加密的处理速度,高效完成大数据加密过程。  相似文献   
4.
Social media has been widely used for emergency communication both in disaster-affected areas and unaffected areas. Comparing emotional reaction and information propagation between on-site users and off-site users from a spatiotemporal perspective can help better comprehend collective human behavior during natural disasters. In this study, we investigate sentiment and retweet patterns of disaster-affected areas and disaster-unaffected areas at different stages of Hurricane Harvey. The results show that off-site tweets were more negative than on-site tweets, especially during the disaster. As for retweet patterns, indifferent-neutral and positive tweets spread broader than mixed-neutral and negative tweets. However, negative tweets spread faster than positive tweets, which reveals that social media users were more sensitive to negative information in disaster situations. With the development of the disaster, social media users were more sensitive to on-site positive messages than off-site negative posts. This data-driven study reveals the significant effect of sentiment expression on the publication and re-distribution of disaster-related messages. It generates implications for emergency communication and disaster management.  相似文献   
5.
Visual data analysis can be envisioned as a collaboration of the user and the computational system with the aim of completing a given task. Pursuing an effective system‐user integration, in which the system actively helps the user to reach his/her analysis goal has been focus of visualization research for quite some time. However, this problem is still largely unsolved. As a result, users might be overwhelmed by powerful but complex visual analysis systems which also limits their ability to produce insightful results. In this context, guidance is a promising step towards enabling an effective mixed‐initiative collaboration to promote the visual analysis. However, the way how guidance should be put into practice is still to be unravelled. Thus, we conducted a comprehensive literature research and provide an overview of how guidance is tackled by different approaches in visual analysis systems. We distinguish between guidance that is provided by the system to support the user, and guidance that is provided by the user to support the system. By identifying open problems, we highlight promising research directions and point to missing factors that are needed to enable the envisioned human‐computer collaboration, and thus, promote a more effective visual data analysis.  相似文献   
6.
Digital Twins are new solution elements to enable ongoing digital monitoring and active functional improvement of interconnected products, devices and machines. In addition, benefits of horizontal and vertical integration in manufacturing are targeted by the introduction of Digital Twins. Using the test environment of smart factory cells, this paper investigates methodological, technological, operative, and business aspects of developing and operating Digital Twins. The following Digital Twin dimensions are considered in scientific and application oriented analysis: (1) integration breadth, (2) connectivity modes, (3) update frequency, (4) CPS intelligence, (5) simulation capabilities, (6) digital model richness, (7) human interaction, and (8) product lifecycle. From this, design elements for the development of Digital Twins are derived and presented.  相似文献   
7.
Although many brands develop mobile applications (apps) to build relationships with consumers, most branded apps fail to retain consumers’ loyalty. This study examines the facilitation of consumer loyalty toward branded apps (continuance intention, in-app purchase intention, and word-of-mouth intention) from the dual-route perspective. One route is the affective (relationship) route, where brand benefits (functional benefits, experiential benefits, symbolic benefits, and monetary benefits) drive parasocial interactions between consumers and the brand, which, in turn, influences branded app loyalty. The other route is the utility route, where system characteristics (system quality and information quality) affect perceived usefulness, which, in turn, facilitates branded app loyalty. An online survey was conducted, and the research model was empirically tested using partial least squares structural equation modeling. The findings support the dual-route perspective according to which both affective and utilitarian paths facilitate branded app loyalty. The key theoretical contribution of this study is that it moves beyond the utilitarian path and finds the affective (relationship) path to give a more complete picture of the facilitation of consumer loyalty in the branded app context. A strategy is provided to suggest to practitioners how to design branded apps to facilitate consumer loyalty.  相似文献   
8.
Smart cities are built upon information and communication technologies (ICTs) to enable a broad range of advanced services. Through a comprehensive literature review, this study identified four pitfalls brought by the pervasive application of ICT, including information insecurity, privacy leakage, information islands, and digital divide. Therefore, a questionnaire survey together with 27 interviews was conducted in Hong Kong to investigate how the public perceived these pitfalls within the context of mobile apps providing real-time parking information which form a major part of smart mobility. System insecurity and privacy leakage were found to arouse worries among the app-users while their awareness of protecting personal data was found to have room for improvement. Islands of real-time parking information occur as a result of the lack of collaboration among private carpark operators. Digital divide existed widely among the disadvantaged groups and the problem cannot be solved by mere provision of ICT facilities. Overall, technologies alone cannot make a city smart or smarter. It is the suitable way in which ICTs are used to serve all citizens that matters.  相似文献   
9.
The electricity consumption in the buildings sector has been steadily increasing during the last decade, up to the point that energy efficiency in this sector has become a major problem for governments, utilities, customers, and the environment. The foreseen high penetration of distributed micro-generation facilities based on renewables can help to reduce the environmental footprint of buildings and households, although the complexity of managing effectively the electric grid increases dramatically under these conditions. The IEEE 2030 standard for interoperability in the Smart Grid remarks upon the importance of well-defined data models in such complex scenarios and puts emphasis on the benefits of ontologies and OWL (Web Ontology Language) for this purpose. This paper presents an OWL-based ontology that formally defines the vocabulary and taxonomy and captures the engineering and business semantics of this domain of knowledge (i.e., energy efficiency in the so-called nZEN – nearly Zero-Energy Neighborhoods). This ontology has been defined under the scope of the EU (European Union) research project ENERsip. The paper also highlights the main benefits the ontology brought to all the phases of the project life cycle, as well as how future work can make the most out of it.  相似文献   
10.
Building Information Models (BIMs) are becoming the official standard in the construction industry for encoding, reusing, and exchanging information about structural assets. Automatically generating such representations for existing assets stirs up the interest of various industrial, academic, and governmental parties, as it is expected to have a high economic impact. The purpose of this paper is to provide a general overview of the as-built modelling process, with focus on the geometric modelling side. Relevant works from the Computer Vision, Geometry Processing, and Civil Engineering communities are presented and compared in terms of their potential to lead to automatic as-built modelling.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号