首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   58416篇
  免费   6780篇
  国内免费   3900篇
电工技术   5081篇
技术理论   8篇
综合类   6990篇
化学工业   2285篇
金属工艺   803篇
机械仪表   2210篇
建筑科学   5736篇
矿业工程   2390篇
能源动力   1418篇
轻工业   4086篇
水利工程   2556篇
石油天然气   4342篇
武器工业   976篇
无线电   6738篇
一般工业技术   3158篇
冶金工业   1440篇
原子能技术   361篇
自动化技术   18518篇
  2024年   146篇
  2023年   790篇
  2022年   1512篇
  2021年   1914篇
  2020年   2010篇
  2019年   1589篇
  2018年   1479篇
  2017年   1742篇
  2016年   2131篇
  2015年   2285篇
  2014年   4543篇
  2013年   3836篇
  2012年   4994篇
  2011年   5275篇
  2010年   3820篇
  2009年   3962篇
  2008年   3734篇
  2007年   4300篇
  2006年   3711篇
  2005年   3197篇
  2004年   2567篇
  2003年   2185篇
  2002年   1508篇
  2001年   1243篇
  2000年   925篇
  1999年   711篇
  1998年   489篇
  1997年   461篇
  1996年   385篇
  1995年   311篇
  1994年   253篇
  1993年   195篇
  1992年   130篇
  1991年   123篇
  1990年   78篇
  1989年   92篇
  1988年   48篇
  1987年   35篇
  1986年   34篇
  1985年   49篇
  1984年   48篇
  1983年   47篇
  1982年   29篇
  1981年   22篇
  1980年   12篇
  1979年   13篇
  1978年   13篇
  1977年   11篇
  1959年   9篇
  1956年   10篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
2.
朱宏  张蔚翔  郭成英 《中州煤炭》2021,(11):239-243
为应对电力系统安全分析中的停机问题,基于概率法的方式,将常用的确定停机计算与加入了概率法的概率停机进行比较,研究了二者的区别与其在长期投资方向的不同。在进行电力系统停机分析时,通常会分别从确定停机与概率停机的角度出发,对其应急状态下的潮流进行计算。但前者的方法可能导致极低概率的停机事件被忽略,进而影响长期的资金投资。通过加入概率法的计算,使得对单个停机事件的判定由其具体的频率来确定,增加了系统运行的稳定性。  相似文献   
3.
4.
Oblivious polynomial evaluation (OPE) is a two-party protocol that allows a receiver, R to learn an evaluation f(α), of a sender, S's polynomial f(x), whilst keeping both α and f(x) private. This protocol has attracted a lot of attention recently, as it has wide ranging applications in the field of cryptography. In this article we review some of these applications and, additionally, take an in-depth look at the special case of information theoretic OPE. Specifically, we provide a current and critical review of the existing information theoretic OPE protocols in the literature. We divide these protocols into two distinct cases (three-party and distributed OPE) allowing for the easy distinction and classification of future information theoretic OPE protocols. In addition to this work, we also develop several modifications and extensions to existing schemes, resulting in increased security, flexibility and efficiency. Lastly, we also identify a security flaw in a previously published OPE scheme.  相似文献   
5.
为缓解我国水、能源和粮食资源紧张问题,促进资源可持续利用,构建水-能源-粮食系统,利用耦合协调度模型对我国的30个省(自治区、直辖市)进行测算,并利用空间杜宾模型分析主要影响因素。结果表明:2003—2017年,我国能源、粮食评价[JP]指数高于水资源评价指数,系统综合评价指数逐年递增;大部分省份耦合协调度处于初级协调水平且呈现逐年上升的态势,个别省份耦合协调度濒临失调;耦合协调度空间自相关性较强,虽有明显波动,但是呈现逐年加强的态势;影响耦合协调度的主要因素有从业人口数、固定资产投资额、人均生产总值、人口总数、[JP]文盲人口占比、工业污染排放、城镇化。  相似文献   
6.
This study was conducted to evaluate the effect of red-wine grape pomaces on the quality and sensory attributes of beef hamburger patties. Both phenolic content and antioxidant activity were assessed using Syrah, Merlot and Cabernet Sauvignon pomaces. Following the assessment, hamburger patties were prepared with Merlot pomace at 0%, 2% and 4% for the patty quality and sensory attributes. Grape seeds possessed significantly higher phenolics and antioxidant activities over the seedless pomace (P < 0.05), whereas no significant difference was found for phenolics and antioxidant activities within the seeds and seedless pomaces. The patty pH decreased as the pomace was added for 2% and 4%. Colour values (L*, a* and b*) of patties lowered as the pomace was added. Allo-Kramer shear force and hardness values increased while cooking yield decreased (P < 0.05) with the addition of pomace. No significant difference between control and Merlot patties was found for flavour, juiciness and colour, whereas lower sensory attributes were observed for texture, taste and overall acceptability. It is observed that the addition of fermented red-wine grape pomace provides hamburger patties with health promoting factors such as antioxidant and other functional components, but it also provided darker, sourer and lower cooking yield.  相似文献   
7.
《Ceramics International》2022,48(11):15243-15251
Green combustion was used to prepare a ferrite composition of Mg0.4Zn0.6Fe2O4 using a blend of fresh lemon juice as a natural fuel-reductant. Effect of heat treatment on phase, morphological, dielectric, and humidity sensor properties is discussed. The formation of a cubic spinel ferrite has been established by XRD-diffraction and vibrational spectroscopic studies. The experimental lattice parameter ranges from 8.3721 to 8.3631 Å. The broadening of octahedral band (υ2) in the vibrational spectra is an identification for the existence of ferrite nanoparticles in various sizes. The typical crystallite size ranges from 10.2 to 36.9 nm. Using micrographs obtained from field-effect scanning electron microscopy (FESEM), researchers observed a spherical-shaped microstructure with agglomerated nanoparticles. Dielectric investigations have shown that the current ferrite composition has typical dielectric dispersion. The highest reported value for saturation magnetization (Ms) in the present study is 33 emu/g. Magnetic behaviour is primarily influenced by magnetocrystalline anisotropy, cation distribution, and crystallite size. The existence of void spaces in the sintered samples, as well as their porous nature, rendered them suitable for humidity sensor applications. Sintered samples have good sensing capability at 900 °C. The current findings are integrated in terms of cation distribution and magnetocrystalline anisotropy, assuming fine size effects of ferrite nanoparticles.  相似文献   
8.
互联网通讯采取标准化模式主要以TCP/IP协议为载体,通讯的优越特性体现在同时具备便捷性与开放性,为办公提供很大的便利,但基于网络系统也会入侵病毒、也会给信息数据与办公体系安全性造成威胁,直接影响企业综合稳定发展。据此,为保障办公工作的顺利开展,本文对计算机网络办公自动化及安全策略进行详细分析。  相似文献   
9.
Sweet pickled mango named Ma-Muang Bao Chae-Im is a traditional preserved mango from Hat Yai, Thailand. This study investigated (I) volatile and non-volatile compound profiles of commercial Ma-Muang Bao Chae-Im and (II) their relationship to consumer preference. Untargeted metabolomics profiling was performed by gas chromatography-mass quadrupole-time of flight analysis. There were 117 volatile and 44 non-volatile compounds annotated in six commercial brands of Ma-Muang Bao Chae-Im. Furthermore, 46 volatile and 19 non-volatile compounds’ discriminant markers were found by Partial least square discriminant analysis. Among those markers, sorbic and benzoic acid were observed in several brands; moreover, the combination of both compounds altered the volatile profile, especially the ester group. Partial least square regression revealed that overall consumer liking is correlated to 1-heptanol; 1-octanol; acetoin; acetic acid, 2-phenylethyl ester; D-manitol; terpenes and terpenoids, while firmness to sucrose and L-(-)-sorbofuranose. On the other hand, most ester compounds were not related to consumer preference.  相似文献   
10.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号