首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   20972篇
  免费   2259篇
  国内免费   832篇
电工技术   1756篇
技术理论   5篇
综合类   2380篇
化学工业   971篇
金属工艺   133篇
机械仪表   491篇
建筑科学   3811篇
矿业工程   675篇
能源动力   548篇
轻工业   3426篇
水利工程   1482篇
石油天然气   607篇
武器工业   102篇
无线电   700篇
一般工业技术   1556篇
冶金工业   2526篇
原子能技术   176篇
自动化技术   2718篇
  2024年   152篇
  2023年   403篇
  2022年   805篇
  2021年   1000篇
  2020年   994篇
  2019年   804篇
  2018年   765篇
  2017年   799篇
  2016年   950篇
  2015年   840篇
  2014年   1447篇
  2013年   1597篇
  2012年   1528篇
  2011年   1595篇
  2010年   1234篇
  2009年   1227篇
  2008年   1208篇
  2007年   1274篇
  2006年   1290篇
  2005年   954篇
  2004年   752篇
  2003年   603篇
  2002年   436篇
  2001年   314篇
  2000年   199篇
  1999年   145篇
  1998年   99篇
  1997年   73篇
  1996年   60篇
  1995年   43篇
  1994年   34篇
  1993年   32篇
  1992年   31篇
  1991年   18篇
  1990年   36篇
  1989年   30篇
  1988年   28篇
  1987年   15篇
  1986年   15篇
  1985年   19篇
  1984年   19篇
  1983年   19篇
  1982年   24篇
  1981年   11篇
  1980年   13篇
  1979年   12篇
  1964年   9篇
  1963年   13篇
  1961年   10篇
  1958年   9篇
排序方式: 共有10000条查询结果,搜索用时 312 毫秒
121.
随着云计算技术的快速发展和更广泛应用,云计算的潜在风险越来越受到关注。文章介绍了云计算的应用现状及重要特点,分析了云计算存在的风险,从技术的角度对云计算的潜在风险进行分析。  相似文献   
122.
曹瑞  程春田  申建建  蒋燕  张聪通 《水利学报》2021,52(10):1193-1203
短期径流的大幅波动使得以平均径流为基础制定的水库长期调度方案面临较大弃水风险,是影响水库长期调度决策合理性的重要因素。本文考虑日尺度径流波动影响,提出一种蓄水期弃水风险量化方法,并建立了耦合弃水风险的水库长期发电调度模型。利用长系列日径流资料,结合风险最小蓄水规则,以不蓄弃水流量为指标量化蓄水期各月弃水风险;采用Copula函数构建月均入流与弃水风险的联合分布和条件概率分布,明晰了特定入流条件的风险置信区间;最后,将弃水风险以弃电损失函数融入优化模型,以获得更符合实际的长期调度方案。以澜沧江流域小湾水库为工程背景进行调度模拟分析,结果表明本文方法能够有效降低水库长期优化调度方案的弃水风险,有利于提高优化结果的可操作性,与传统方法相比,能够使多年平均弃水减少约4.76亿m3、发电量增加约1.15亿kW·h。  相似文献   
123.
地质灾害是建设用地选址时考虑的关键因素之一,也是危险性区划的主要参考要素,其直接或间接危害到人类安全并给社会和经济建设造成重大损失。为了降低建设用地规划中地质灾害的影响,应将地质灾害危险性分区考虑到建设用地适宜性评价当中。以干旱河谷山区丹巴县为研究区,运用确定系数和逻辑回归相结合的方法,构建地质灾害危险性评价体系对该区进行地质灾害危险性分区。选择安全因子、自然因子、社会因子和生态因子共同构成建设用地适宜性评价指标体系,利用层次分析法对研究区进行建设用地适宜性评价。结果表明:(1)对丹巴县进行危险性分区,极高危险区217.20km2,高危险区744.95km2,中度危险区1352.44km2,低度危险区1295.08km2以及极低危险区875.32km2。(2)丹巴县建设用地最适宜区面积为115.72km2,占县域总面积的2.57%,适宜建设的土地少且多集中在小金川、革什扎河、东谷河和大渡河沿岸河谷地区。较适宜区、基本适宜区、较不适宜区和禁止建设区面积分别为683.47km2、623.21km2、590.66km2、2494.21km2。(3)已建成的城镇空间中38.50%和37.62%分布在最适宜区和较适宜区,整体分布状况良好。有5.85%的城镇空间建设在较不适宜区,2.67%在禁止建设区,存在生态安全风险,该区域应加强灾害预警与防灾减灾工作,有条件地适度搬迁。  相似文献   
124.
为提高堤防工程风险评价的准确性,提出了基于极限学习机的堤防工程多元风险指标评价方法。首先,综合考虑影响堤防风险的28个评价指标,利用层次分析法从预警系统、堤防工程系统、环境系统和社会经济系统这4个方面建立了堤防工程多元风险评价指标体系。接着,基于极限学习机算法对28个指标进行标准化处理及分级标准构建,以风险指标作为输入量,分级隶属度作为输出量,划分风险等级,量化评价指标,估计多元风险评价指标值和判断风险的严重程度。最后,依托鄱阳湖重点堤防——康山大堤,构建多元风险评价指标体系,运用极限学习机算法计算多元风险评价指标值。评价结果表明:康山大堤目前处于基本安全水平,符合康山大堤经过两次加固后的工程实际情况,并与其他方法进行对比,验证了提出方法的可靠性和有效性。该方法可拓展应用到其他重要水工结构工程风险评估中。  相似文献   
125.
文章介绍了喜德县红莫升压站-鲁基升压站220kV线路工程滑坡地质灾害危险性现状评估和预测评估,确定了评估区内滑坡地质灾害对工程的影响,以及工程建设加剧已有滑坡地质灾害的危险性和自身可能遭受已存在滑坡地质灾害的危险性。据此评估结果,为工程在建设过程中提出了具体的防治处理措施建议。  相似文献   
126.
我国幅员辽阔,地质环境条件多样且复杂,导致了地质灾害发育强烈,种类繁多、危害较大。地质灾害与工程建设活动密切相关,既相互作用,相互依存,又相互影响[1]。电力工程项目遍布全国,特别是输电线路大多为人烟稀少的山区分布,线路长,跨越的地质地貌区域复杂,存在的地质灾害多种多样,或多或少面临着各种地质灾害的严重威胁[2]。通过电力工程地质灾害危险性评估工作的现状及评估工作流程的介绍,进一步分析电力工程地质灾害的危险性评估工作中存在的问题并提出了相应的看法。  相似文献   
127.
Through an ergonomic approach, this study aimed to evaluate whether workers involved in forest harvesting activities in rural properties are subject to the development of work-related diseases, as well as their consequences. A cross-sectional study with 267 forest workers in rural properties in the Brazilian Central region was used. The following evaluations were performed for each of the activities (felling, delimbing, tracing, manual extraction and manual loading): physical workload evaluation; biomechanical evaluation; risk of repetitive strain injuries/work-related musculoskeletal disorders; environmental noise and vibration factors, where relevant, and thermal overload through the Wetbulb Globe Temperature index. The results showed that in general the physical workload was very high, exceeding the cardiovascular load limits and adding to the need for work reorganization. All activities exposed workers to serious and imminent risks of developing injuries to the spine and lower limbs. Likewise, in general the risk of the appearance of RSI/WMSDs was very high for all activities evaluated. Such results are due to the combination of organizational work factors and factors of the work environment such as exposure to bad weather, uneven terrain, lifting and handling loads above tolerable limits, excessive noise and thermal overload. All of this allows to conclude that ergonomic risks and workers’ health hazards in forest harvesting in rural properties are latent and very worrying, and that these workers are exposed to a form of labor exploitation that invariably leads to physical and emotional exhaustion and therefore to their decreased labor capacity and useful working life.  相似文献   
128.
The lockdown due to COVID-19 in Italy resulted in the sudden closure of schools, with a shift from traditional teaching to the online one. Through an online questionnaire, this survey explores teachers' experience of online teaching, the level of risk factors (e.g., stress) and protective factors (e.g., locus of control) and their impact on satisfaction levels during the social distancing. One hundred seven high school teachers from Lombardy, an Italian region very affected by the COVID-19 outbreak, participated. Results show that depression and stress are the main predictors of satisfaction levels for online teaching. In addition, coping, locus of control and self-efficacy emerge as important protective factors. Finally, although there is great satisfaction with the online teaching experience, critical elements emerged. This study is relevant because it describes the critical elements of the online teaching experience, and identifies some protective factors and the main risk factors in teachers operating in an area strongly marked by social restrictions imposed by the pandemic. High school teachers emerge as a sub-group of the general population with specific psychological reactions. Considering the results, it is possible to suggest providing high-quality educational support and crisis-psychological oriented services to teachers, and help to maintain the psychological well-being.  相似文献   
129.
Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework is developed by means of a methodology based on a heuristic theory that incorporates knowledge generated by existing works as well as the experience of their implementation. The paper presents the design details of the framework, which consists of three stages: identification of data security requirements, management of data security risks and evaluation of data security performance in CCS.  相似文献   
130.
Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph in the conversion process, a related algorithm is proposed to generate the B_NAG model. Finally, to analyze the reachability of paths in B_NAG, the measuring indexs such as node attack complexity and node state transition are defined, and an iterative algorithm for obtaining the probability of reaching the target node is presented. On this basis, the posterior probability of related nodes can be calculated. A simulation environment is set up to evaluate the effectiveness of the B_NAG model. The experimental results indicate that the B_NAG model is realistic and effective in evaluating vulnerabilities of computer networks and can accurately highlight the degree of vulnerability in a chaotic relationship.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号