首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13610篇
  免费   1623篇
  国内免费   682篇
电工技术   1598篇
技术理论   5篇
综合类   1731篇
化学工业   683篇
金属工艺   83篇
机械仪表   238篇
建筑科学   2786篇
矿业工程   614篇
能源动力   442篇
轻工业   1403篇
水利工程   1243篇
石油天然气   551篇
武器工业   79篇
无线电   462篇
一般工业技术   1001篇
冶金工业   1039篇
原子能技术   139篇
自动化技术   1818篇
  2024年   76篇
  2023年   230篇
  2022年   489篇
  2021年   622篇
  2020年   641篇
  2019年   487篇
  2018年   523篇
  2017年   486篇
  2016年   666篇
  2015年   583篇
  2014年   1086篇
  2013年   1151篇
  2012年   1138篇
  2011年   1080篇
  2010年   835篇
  2009年   862篇
  2008年   816篇
  2007年   872篇
  2006年   844篇
  2005年   565篇
  2004年   468篇
  2003年   368篇
  2002年   255篇
  2001年   185篇
  2000年   134篇
  1999年   94篇
  1998年   70篇
  1997年   46篇
  1996年   37篇
  1995年   24篇
  1994年   23篇
  1993年   15篇
  1992年   19篇
  1991年   13篇
  1990年   18篇
  1989年   17篇
  1988年   10篇
  1987年   5篇
  1986年   5篇
  1985年   7篇
  1984年   8篇
  1983年   7篇
  1982年   7篇
  1981年   4篇
  1979年   5篇
  1975年   2篇
  1974年   2篇
  1964年   3篇
  1963年   3篇
  1961年   3篇
排序方式: 共有10000条查询结果,搜索用时 109 毫秒
91.
我国幅员辽阔,地质环境条件多样且复杂,导致了地质灾害发育强烈,种类繁多、危害较大。地质灾害与工程建设活动密切相关,既相互作用,相互依存,又相互影响[1]。电力工程项目遍布全国,特别是输电线路大多为人烟稀少的山区分布,线路长,跨越的地质地貌区域复杂,存在的地质灾害多种多样,或多或少面临着各种地质灾害的严重威胁[2]。通过电力工程地质灾害危险性评估工作的现状及评估工作流程的介绍,进一步分析电力工程地质灾害的危险性评估工作中存在的问题并提出了相应的看法。  相似文献   
92.
在湿陷性黄土地区开展雨水集中下渗的海绵城市建设面临着湿陷变形的风险,以黄土湿陷性较为严重的西咸新区空港新城临空产业区为例,采用数值模拟的方法模拟了研究区湿陷性黄土在不同设计降雨情况下的雨水集中入渗后的湿陷情况。应用GAST模型计算雨洪过程,并将降雨量下渗过程作为边界条件输入Midas GTS/NX软件来模拟黄土基础变形情况。通过分析5个典型黄土区因降雨下渗导致的湿陷量,发现其等级为Ⅱ级及以上,其中最严重情况下的雨水下渗深度为5.02~6.51 m,总湿陷量和自重湿陷量分别为468.18~1015.56 mm和88.99~239.03 mm,湿陷等级为Ⅲ级。可见局部集中下渗会导致较高的湿陷风险,故建议在湿陷性黄土地区海绵城市建设中应进行量化评估并合理规避湿陷风险。  相似文献   
93.
Through an ergonomic approach, this study aimed to evaluate whether workers involved in forest harvesting activities in rural properties are subject to the development of work-related diseases, as well as their consequences. A cross-sectional study with 267 forest workers in rural properties in the Brazilian Central region was used. The following evaluations were performed for each of the activities (felling, delimbing, tracing, manual extraction and manual loading): physical workload evaluation; biomechanical evaluation; risk of repetitive strain injuries/work-related musculoskeletal disorders; environmental noise and vibration factors, where relevant, and thermal overload through the Wetbulb Globe Temperature index. The results showed that in general the physical workload was very high, exceeding the cardiovascular load limits and adding to the need for work reorganization. All activities exposed workers to serious and imminent risks of developing injuries to the spine and lower limbs. Likewise, in general the risk of the appearance of RSI/WMSDs was very high for all activities evaluated. Such results are due to the combination of organizational work factors and factors of the work environment such as exposure to bad weather, uneven terrain, lifting and handling loads above tolerable limits, excessive noise and thermal overload. All of this allows to conclude that ergonomic risks and workers’ health hazards in forest harvesting in rural properties are latent and very worrying, and that these workers are exposed to a form of labor exploitation that invariably leads to physical and emotional exhaustion and therefore to their decreased labor capacity and useful working life.  相似文献   
94.
The lockdown due to COVID-19 in Italy resulted in the sudden closure of schools, with a shift from traditional teaching to the online one. Through an online questionnaire, this survey explores teachers' experience of online teaching, the level of risk factors (e.g., stress) and protective factors (e.g., locus of control) and their impact on satisfaction levels during the social distancing. One hundred seven high school teachers from Lombardy, an Italian region very affected by the COVID-19 outbreak, participated. Results show that depression and stress are the main predictors of satisfaction levels for online teaching. In addition, coping, locus of control and self-efficacy emerge as important protective factors. Finally, although there is great satisfaction with the online teaching experience, critical elements emerged. This study is relevant because it describes the critical elements of the online teaching experience, and identifies some protective factors and the main risk factors in teachers operating in an area strongly marked by social restrictions imposed by the pandemic. High school teachers emerge as a sub-group of the general population with specific psychological reactions. Considering the results, it is possible to suggest providing high-quality educational support and crisis-psychological oriented services to teachers, and help to maintain the psychological well-being.  相似文献   
95.
Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework is developed by means of a methodology based on a heuristic theory that incorporates knowledge generated by existing works as well as the experience of their implementation. The paper presents the design details of the framework, which consists of three stages: identification of data security requirements, management of data security risks and evaluation of data security performance in CCS.  相似文献   
96.
Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph in the conversion process, a related algorithm is proposed to generate the B_NAG model. Finally, to analyze the reachability of paths in B_NAG, the measuring indexs such as node attack complexity and node state transition are defined, and an iterative algorithm for obtaining the probability of reaching the target node is presented. On this basis, the posterior probability of related nodes can be calculated. A simulation environment is set up to evaluate the effectiveness of the B_NAG model. The experimental results indicate that the B_NAG model is realistic and effective in evaluating vulnerabilities of computer networks and can accurately highlight the degree of vulnerability in a chaotic relationship.  相似文献   
97.
Today, air pollution, smoking, use of fatty acids and ready‐made foods, and so on, have exacerbated heart disease. Therefore, controlling the risk of such diseases can prevent or reduce their incidence. The present study aimed at developing an integrated methodology including Markov decision processes (MDP) and genetic algorithm (GA) to control the risk of cardiovascular disease in patients with hypertension and type 1 diabetes. First, the efficiency of GA is evaluated against Grey Wolf optimization (GWO) algorithm, and then, the superiority of GA is revealed. Next, the MDP is employed to estimate the risk of cardiovascular disease. For this purpose, model inputs are first determined using a validated micro‐simulation model for screening cardiovascular disease developed at Tehran University of Medical Sciences, Iran by GA. The model input factors are then defined accordingly and using these inputs, three risk estimation models are identified. The results of these models support WHO guidelines that provide medicine with a high discount to patients with high expected LYs. To develop the MDP methodology, policies should be adopted that work well despite the difference between the risk model and the actual risk. Finally, a sensitivity analysis is conducted to study the behavior of the total medication cost against the changes of parameters.  相似文献   
98.
针对传统的入侵检测系统存在报警数量大、误报率高等缺陷,提出了一种基于网络安全风险评估的入侵检测方法,该方法基于入侵检测结果,引入抗体浓度随入侵强度动态变化这一人工免疫理论的最新研究成果进行网络安全风险的计算,然后根据当前网络面临的实时安全风险动态设置报警策略。实验结果表明,该方法能够实时、定量地计算主机和网络所面临的风险,并极大地降低报警数量和误报率。  相似文献   
99.
随着信息化进程的快速发展,保障信息系统的安全性和降低信息系统潜在的风险,一直是国内外学者关注的焦点,而风险评估正是解决该问题的有效方法之一,但是在风险评估过程中存在评估指标难以量化、风险值难以界定等困难,因此文章提出了一种基于灰色关联分析的信息安全风险评估方法,该方法首先建立了信息系统的风险评估指标体系,其次将评估的信息系统与最优信息系统进行关联度分析,最后得出信息系统风险的准确度量。该方法可以使信息系统的评估过程简单化,标准化。  相似文献   
100.
对分布式信息系统所面临的主要风险进行识别和评估是构建灾备系统的首要任务。以安徽烟草分布式信息系统为例,首先分析了该信息系统在环境、管理、技术、设备等方面所存在的风险,然后以层次分析法为核心构造了评估决策模型,结合专家打分,计算出各类风险对安徽烟草信息系统的威胁程度并进行排序,从而识别出主要的风险源,为构建灾备体系提供依据。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号