首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15338篇
  免费   1268篇
  国内免费   972篇
电工技术   437篇
技术理论   1篇
综合类   1235篇
化学工业   136篇
金属工艺   144篇
机械仪表   956篇
建筑科学   703篇
矿业工程   248篇
能源动力   102篇
轻工业   105篇
水利工程   398篇
石油天然气   102篇
武器工业   641篇
无线电   2067篇
一般工业技术   563篇
冶金工业   354篇
原子能技术   36篇
自动化技术   9350篇
  2024年   15篇
  2023年   142篇
  2022年   223篇
  2021年   300篇
  2020年   317篇
  2019年   266篇
  2018年   292篇
  2017年   374篇
  2016年   476篇
  2015年   497篇
  2014年   1002篇
  2013年   797篇
  2012年   1009篇
  2011年   1379篇
  2010年   925篇
  2009年   885篇
  2008年   1049篇
  2007年   1189篇
  2006年   1140篇
  2005年   895篇
  2004年   751篇
  2003年   766篇
  2002年   597篇
  2001年   469篇
  2000年   357篇
  1999年   305篇
  1998年   243篇
  1997年   176篇
  1996年   142篇
  1995年   145篇
  1994年   75篇
  1993年   58篇
  1992年   43篇
  1991年   43篇
  1990年   25篇
  1989年   33篇
  1988年   17篇
  1987年   12篇
  1986年   19篇
  1985年   30篇
  1984年   18篇
  1983年   15篇
  1982年   10篇
  1981年   17篇
  1980年   11篇
  1979年   8篇
  1977年   5篇
  1976年   4篇
  1975年   4篇
  1973年   3篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
《工程爆破》2022,(4):78-84
介绍了在包头市某工程实施管道穿越黄河施工中,采用爆破法处理卡钻的经验。针对深水环境条件及钻杆内径小不宜采用集团装药的条件,确定采用"小直径爆破筒,钻杆内部装药"的爆破方案,阐述了爆破设计及施工注意事项。可供类似工程参考。  相似文献   
2.
诱导式卫星欺骗干扰可诱导航空器逐渐偏离预定航迹,难以被发现,因此及时有效地检测干扰是飞行安全的保障。在现有紧组合导航体制基础上,设计了一种基于误差估值累加开环校正的紧组合导航结构,并证明了其性能与传统闭环校正紧组合导航性能等效。在此结构中,将紧组合导航系统与自适应序贯概率比检测方法结合,提出了一种基于误差估值累加开环校正的诱导式欺骗检测方法,融合紧组合导航信息与其他不受欺骗影响的导航信息,构建欺骗检测统计量进行诱导式欺骗检测。仿真结果表明,开环校正结构可避免随时间累加的惯性导航系统误差所导致的组合导航滤波器发散问题,同时欺骗检测方法可进一步提高算法对“最坏”情形下微小诱导式欺骗的检测效果。  相似文献   
3.
更长的飞行时间是四旋翼无人机领域研究热点方向之一;在对实际飞行中瞬时消耗电流和电池电压数据的研究中发现,过大姿态角下电池电量消耗显著提升;为了延长飞行时间和提升电池电量使用效率,提出一种长续航飞行模式;在该模式下,基于现有的角速度串级PID姿态控制器,将飞行加速度的控制算法改为飞行速度控制,限制过大姿态角的操作;在无风、微风和强风环境下的飞行实验表明,长续航飞行模式比传统飞行方式飞行时间增加8%~20%;长续航飞行模式可广泛应用于多种无需快速变换飞行路径,但需要更长飞行时间的的应用场景中。  相似文献   
4.
We conceptualized security-related stress (SRS) and proposed a theoretical model linking SRS, discrete emotions, coping response, and information security policy (ISP) compliance. We used an experience sampling design, wherein 138 professionals completed surveys. We observed that SRS had a positive association with frustration and fatigue, and these negative emotions were associated with neutralization of ISP violations. Additionally, frustration and fatigue make employees more likely to follow through on their rationalizations of ISP violations by decreased ISP compliance. Our findings provide evidence that neutralization is not a completely stable phenomenon but can vary within individuals from one time point to another.  相似文献   
5.
The Curriculum Vitae (CV, also referred to as “résumé”) is an established representation of a person's academic and professional history. A typical CV is comprised of multiple sections associated with spatio‐temporal, nominal, hierarchical, and ordinal data. The main task of a recruiter is, given a job application with specific requirements, to compare and assess CVs in order to build a short list of promising candidates to interview. Commonly, this is done by viewing CVs in a side‐by‐side fashion. This becomes challenging when comparing more than two CVs, because the reader is required to switch attention between them. Furthermore, there is no guarantee that the CVs are structured similarly, thus making the overview cluttered and significantly slowing down the comparison process. In order to address these challenges, in this paper we propose “CV3”, an interactive exploration environment offering users a new way to explore, assess, and compare multiple CVs, to suggest suitable candidates for specific job requirements. We validate our system by means of domain expert feedback whose results highlight both the efficacy of our approach and its limitations. We learned that CV3 eases the overall burden of recruiters thereby assisting them in the selection process.  相似文献   
6.
ABSTRACT

The purpose of this study was to examine the influence of trust variables (trust: competence, trust: benevolence, trust: integrity) on leadership regarding the organization’s information security policy (ISP) compliance. An instrument with four constructs was used to collect data from 474 non-management subjects from various organizations in the USA. Collected data were analyzed through multiple regression procedure. Results revealed that all trust variables (trust: competence, trust: benevolence, trust: integrity) were influential in predicting the leadership regarding the organization’s ISP compliance. The findings are discussed and implications for practice are outlined. Conclusion, limitations, and recommendations for future research are drawn.  相似文献   
7.
8.
Ken Yoda 《Advanced Robotics》2019,33(3-4):108-117
ABSTRACT

This review summarizes the advances in bio-logging technology that enables us to monitor foraging behavior, movement, behavioral performance, physiological performance, and sociality in a wide range of bird species, as well as their habitat. Subsequently, navigation is discussed, using long-distance movements in streaked shearwaters as a case study. Moreover, challenges and future research directions in bio-logging science are presented, with focus on: multimodal recording, big data analysis, feedback logging, low-power consumption and power generation systems, logger effects, and capture–recapture methods.  相似文献   
9.
Smart cities are built upon information and communication technologies (ICTs) to enable a broad range of advanced services. Through a comprehensive literature review, this study identified four pitfalls brought by the pervasive application of ICT, including information insecurity, privacy leakage, information islands, and digital divide. Therefore, a questionnaire survey together with 27 interviews was conducted in Hong Kong to investigate how the public perceived these pitfalls within the context of mobile apps providing real-time parking information which form a major part of smart mobility. System insecurity and privacy leakage were found to arouse worries among the app-users while their awareness of protecting personal data was found to have room for improvement. Islands of real-time parking information occur as a result of the lack of collaboration among private carpark operators. Digital divide existed widely among the disadvantaged groups and the problem cannot be solved by mere provision of ICT facilities. Overall, technologies alone cannot make a city smart or smarter. It is the suitable way in which ICTs are used to serve all citizens that matters.  相似文献   
10.
视觉里程计利用视频信息来估计相机运动的位姿参数,实现对智能体的定位。传统视觉里程计方法需要特征提取、特征匹配/跟踪、外点剔除、运动估计、优化等流程,解算非常复杂,因此,提出了基于卷积神经网络的方法来实现端对端的单目视觉里程计。借助卷积神经网络对彩色图片自动学习提取图像帧间变化的全局特征,将用于分类的卷积神经网络转化为帧间时序特征网络,通过三层全连接层输出相机的帧间相对位姿参数。在KITTI数据集上的实验结果表明,提出的Deep-CNN-VO模型可以较准确地估计车辆的运动轨迹,证明了方法的可行性。在简化了复杂模型的基础上,与传统的视觉里程计系统相比,该模型的精度也有所提高。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号