首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12922篇
  免费   787篇
  国内免费   685篇
电工技术   388篇
技术理论   3篇
综合类   776篇
化学工业   153篇
金属工艺   130篇
机械仪表   681篇
建筑科学   1443篇
矿业工程   228篇
能源动力   176篇
轻工业   103篇
水利工程   175篇
石油天然气   80篇
武器工业   101篇
无线电   1379篇
一般工业技术   439篇
冶金工业   297篇
原子能技术   32篇
自动化技术   7810篇
  2024年   3篇
  2023年   103篇
  2022年   169篇
  2021年   258篇
  2020年   259篇
  2019年   203篇
  2018年   221篇
  2017年   295篇
  2016年   357篇
  2015年   321篇
  2014年   808篇
  2013年   737篇
  2012年   780篇
  2011年   1115篇
  2010年   731篇
  2009年   702篇
  2008年   839篇
  2007年   921篇
  2006年   943篇
  2005年   790篇
  2004年   674篇
  2003年   672篇
  2002年   544篇
  2001年   406篇
  2000年   318篇
  1999年   272篇
  1998年   200篇
  1997年   139篇
  1996年   113篇
  1995年   113篇
  1994年   58篇
  1993年   46篇
  1992年   34篇
  1991年   35篇
  1990年   19篇
  1989年   27篇
  1988年   13篇
  1987年   12篇
  1986年   18篇
  1985年   30篇
  1984年   17篇
  1983年   15篇
  1982年   9篇
  1981年   17篇
  1980年   10篇
  1979年   8篇
  1977年   5篇
  1976年   4篇
  1975年   4篇
  1973年   3篇
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
1.
《工程爆破》2022,(4):78-84
介绍了在包头市某工程实施管道穿越黄河施工中,采用爆破法处理卡钻的经验。针对深水环境条件及钻杆内径小不宜采用集团装药的条件,确定采用"小直径爆破筒,钻杆内部装药"的爆破方案,阐述了爆破设计及施工注意事项。可供类似工程参考。  相似文献   
2.
In this paper, the feature representation of an image by CNN is used to hide the secret image into the cover image. The style of the cover image hides the content of the secret image and produce a stego image using Neural Style Transfer (NST) algorithm, which resembles the cover image and also contains the semantic content of secret image. The main technical contributions are to hide the content of the secret image in the in-between hidden layered style features of the cover image, which is the first of its kind in the present state-of-art-technique. Also, to recover the secret image from the stego image, destylization is done with the help of conditional generative adversarial networks (GANs) using Residual in Residual Dense Blocks (RRDBs). Further, stego images from different layer combinations of content and style features are obtained and evaluated. Evaluation is based on the visual similarity and quality loss between the cover-stego pair and the secret-reconstructed secret pair of images. From the experiments, it has been observed that the proposed algorithm has 43.95 dB Peak Signal-to-Noise Ratio (PSNR)), .995 Structural Similarity Index (SSIM), and .993 Visual Information Fidelity (VIF) for the ImageNet dataset. The proposed algorithm is found to be more robust against StegExpose than the traditional methods.  相似文献   
3.
针对传统大数据特征加密方法中大数据精度较差、加密耗时较长的问题,提出基于信息熵抑制的大数据特征隐匿性加密方法。分析信息熵抑制相关理论,采用信息熵映射函数对大数据分类,将信息熵抑制过程转化为计算2个文件相似性的过程,并根据余弦相似度公式以及Hamming距离值计算数据相似度,完成数据消冗。在完成数据消冗的基础上,分析分组密码方法和ECC加密方法,结合两种方法得到大数据特征隐匿性加密处理计算公式,实现基于信息熵抑制的大数据特征隐匿性加密。实验研究结果表明,所提方法能够有效去除冗余数据,提升大数据精度,加快数据加密的处理速度,高效完成大数据加密过程。  相似文献   
4.
Social media has been widely used for emergency communication both in disaster-affected areas and unaffected areas. Comparing emotional reaction and information propagation between on-site users and off-site users from a spatiotemporal perspective can help better comprehend collective human behavior during natural disasters. In this study, we investigate sentiment and retweet patterns of disaster-affected areas and disaster-unaffected areas at different stages of Hurricane Harvey. The results show that off-site tweets were more negative than on-site tweets, especially during the disaster. As for retweet patterns, indifferent-neutral and positive tweets spread broader than mixed-neutral and negative tweets. However, negative tweets spread faster than positive tweets, which reveals that social media users were more sensitive to negative information in disaster situations. With the development of the disaster, social media users were more sensitive to on-site positive messages than off-site negative posts. This data-driven study reveals the significant effect of sentiment expression on the publication and re-distribution of disaster-related messages. It generates implications for emergency communication and disaster management.  相似文献   
5.
Although wearable devices are popular in recent years, the market share of smartwatches is relatively low. The main goal of this research is to investigate the antecedents of the intention to purchase a smartwatch. This research develops a conceptual model and hypotheses based on the theory of reasoned action and perceived values from the perspectives of software, hardware, and aesthetic design. An online questionnaire was developed and distributed on popular websites to collect data, and 260 usable responses are collected from the potential users of the Apple Watch in Taiwan. The thirteen hypotheses were validated by using partial least squares (PLS) techniques. Among the antecedents of purchase intention in the model, the attitude towards using smartwatches was found to have the strongest direct effect. Among the factors of the attitude, design aesthetics have the most significant effect. The results also show that all of the factors about smartwatch attributes directly affected the related perceived values. However, social value and performance/quality value did not affect the intention. The model demonstrated relatively good explanatory power for purchase intention in the context of smartwatches. The proposed model can provide insights to smartwatch vendors to develop their new products and marketing strategies.  相似文献   
6.
Simulation is a powerful tool for improving, evaluating and analyzing the performance of new and existing systems. Traffic simulators provide tools for studying transportation systems in smart cities as they describe the evolution of traffic to the highest level of detail. There are many types of traffic simulators that allow simulating traffic in modern cities. The most popular traffic simulation approach is the microscopic traffic simulation because of its ability to model traffic in a realistic manner. In many cities of Saudi Arabia, traffic management represents a major challenge as a result of expansion in traffic demands and increasing number of incidents. Unfortunately, employing simulation to provide effective traffic management for local scenarios in Saudi Arabia is limited to a number of commercial products in both public and private sectors. Commercial simulators are usually expensive, closed source and inflexible as they allow limited functionalities. In this project, we developed a local traffic simulator “KSUtraffic” for traffic modeling, planning and analysis with respect to different traffic control strategies and considerations. We modeled information specified by GIS and real traffic data. Furthermore, we designed experiments that manipulate simulation parameters and the underlying area. KSUTraffic visualizes traffic and provides statistical results on the simulated traffic which would help to improve traffic management and efficiency.  相似文献   
7.
This paper reviews the fire problem in critical transportation infrastructures such as bridges and tunnels. The magnitude of the fire problem is illustrated, and the recent increase in fire problems in bridges and tunnels is highlighted. Recent research undertaken to address fire problems in transportation structures is reviewed, as well as critical factors governing the performance of those structures. Furthermore, key strategies recommended for mitigating fire hazards in bridges and tunnels are presented, and their applicability to practical situations is demonstrated through a practical case study. Furthermore, research needs and emerging trends for enhancing the “state-of-the-art” in this area are discussed.  相似文献   
8.
Visual data analysis can be envisioned as a collaboration of the user and the computational system with the aim of completing a given task. Pursuing an effective system‐user integration, in which the system actively helps the user to reach his/her analysis goal has been focus of visualization research for quite some time. However, this problem is still largely unsolved. As a result, users might be overwhelmed by powerful but complex visual analysis systems which also limits their ability to produce insightful results. In this context, guidance is a promising step towards enabling an effective mixed‐initiative collaboration to promote the visual analysis. However, the way how guidance should be put into practice is still to be unravelled. Thus, we conducted a comprehensive literature research and provide an overview of how guidance is tackled by different approaches in visual analysis systems. We distinguish between guidance that is provided by the system to support the user, and guidance that is provided by the user to support the system. By identifying open problems, we highlight promising research directions and point to missing factors that are needed to enable the envisioned human‐computer collaboration, and thus, promote a more effective visual data analysis.  相似文献   
9.
Digital Twins are new solution elements to enable ongoing digital monitoring and active functional improvement of interconnected products, devices and machines. In addition, benefits of horizontal and vertical integration in manufacturing are targeted by the introduction of Digital Twins. Using the test environment of smart factory cells, this paper investigates methodological, technological, operative, and business aspects of developing and operating Digital Twins. The following Digital Twin dimensions are considered in scientific and application oriented analysis: (1) integration breadth, (2) connectivity modes, (3) update frequency, (4) CPS intelligence, (5) simulation capabilities, (6) digital model richness, (7) human interaction, and (8) product lifecycle. From this, design elements for the development of Digital Twins are derived and presented.  相似文献   
10.
Although many brands develop mobile applications (apps) to build relationships with consumers, most branded apps fail to retain consumers’ loyalty. This study examines the facilitation of consumer loyalty toward branded apps (continuance intention, in-app purchase intention, and word-of-mouth intention) from the dual-route perspective. One route is the affective (relationship) route, where brand benefits (functional benefits, experiential benefits, symbolic benefits, and monetary benefits) drive parasocial interactions between consumers and the brand, which, in turn, influences branded app loyalty. The other route is the utility route, where system characteristics (system quality and information quality) affect perceived usefulness, which, in turn, facilitates branded app loyalty. An online survey was conducted, and the research model was empirically tested using partial least squares structural equation modeling. The findings support the dual-route perspective according to which both affective and utilitarian paths facilitate branded app loyalty. The key theoretical contribution of this study is that it moves beyond the utilitarian path and finds the affective (relationship) path to give a more complete picture of the facilitation of consumer loyalty in the branded app context. A strategy is provided to suggest to practitioners how to design branded apps to facilitate consumer loyalty.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号