首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   28164篇
  免费   3050篇
  国内免费   1437篇
电工技术   2818篇
技术理论   8篇
综合类   3078篇
化学工业   1550篇
金属工艺   361篇
机械仪表   768篇
建筑科学   4843篇
矿业工程   1223篇
能源动力   1397篇
轻工业   2300篇
水利工程   2558篇
石油天然气   1144篇
武器工业   395篇
无线电   1290篇
一般工业技术   2318篇
冶金工业   2085篇
原子能技术   427篇
自动化技术   4088篇
  2024年   175篇
  2023年   475篇
  2022年   954篇
  2021年   1170篇
  2020年   1176篇
  2019年   963篇
  2018年   1007篇
  2017年   999篇
  2016年   1376篇
  2015年   1214篇
  2014年   2113篇
  2013年   2387篇
  2012年   2157篇
  2011年   2328篇
  2010年   1771篇
  2009年   1745篇
  2008年   1618篇
  2007年   1746篇
  2006年   1656篇
  2005年   1193篇
  2004年   961篇
  2003年   795篇
  2002年   610篇
  2001年   433篇
  2000年   308篇
  1999年   240篇
  1998年   198篇
  1997年   131篇
  1996年   127篇
  1995年   80篇
  1994年   87篇
  1993年   56篇
  1992年   44篇
  1991年   38篇
  1990年   40篇
  1989年   41篇
  1988年   38篇
  1987年   24篇
  1986年   23篇
  1985年   15篇
  1984年   19篇
  1983年   16篇
  1982年   14篇
  1981年   8篇
  1980年   9篇
  1979年   7篇
  1965年   15篇
  1963年   5篇
  1961年   6篇
  1959年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
研究雷达模拟器目标威胁度的准确评估问题,是辅助操作手对空中目标进行打击的重要依据.威胁度普通雷达是难以探测的.由于目标的速度、距离等随机性强,具体数据难以确定.针对威胁度评估问题,多限于权重分析、聚类分析等方法,对难以确定的参数有较大依赖.为解决上述问题,提出应用效能指数的方法来确定未知目标对雷达阵地的威胁度,根据雷达能够获取的数据,得出判断矩阵,实现对雷达所测数据的分析,并评估目标的威胁度.上述方法可用于雷达模拟器,能够灵活地根据情况调整威胁度评估方法.实验结果表明,方法能够较好地在某些属性未知的情况下,可对目标威胁度进行准确评估,证明改进方法为威胁度评估提供了有效依据.  相似文献   
72.
基于Virtools的虚拟现实技术及在特种设备教学中的应用   总被引:1,自引:0,他引:1  
本文以电梯为研究对象,运用虚拟现实技术建立电梯虚拟样机,开发了一种电梯零部件识别系统用于电梯司机的考核。现行的考核方式存在过程繁琐、成绩统计困难等问题,就这些问题提出了合理的解决方案,并将方案应用于开发的系统中。该系统是虚拟现实技术在特种设备领域的全新应用,构建的虚拟电梯完整地呈现了真实的电梯,而且可以从多角度观察其结构的每个细节,方便教学与考核。系统结合SolidWorks、3Dmax、Virtools等软件,以触摸选择为主要的操作方式,具有优良的操作性与交互性,且投资少、开发周期短。  相似文献   
73.
A 3-D model of a protein can be constructed from its amino acidsequence and the 3-D structures of one or more homologues byannealing three sets of fragments: the structurally conservedregions, structurally variable regions and the side chains.The method encoded in the computer program COMPOSER was assessedby generating 3-D models of eight proteins whose crystal structuresare already known and for which 3-D structures of homologuesare available. In the structurally conserved regions, differencesbetween modelled and X-ray structures are smaller than the differencesbetween the X-ray structures of the modelled protein and thehomologues used to build the model. When several homologuesare used, the contributions of the known structures are weighted,preferably by the square of sequence similarity; this is especiallyimportant when the similarities of the homologues to the modelledstructure differ greatly. The ‘collar’ extensionapproach, in which a similar region of different length in ahomologue is used to extend the framework, can result in a moreaccurate model. If known homologues comprise more than one relatedgroup of proteins and they are both distantly related to theunknown, then alignment of the sequence to be modelled witheach group of homologues facilitates identification of structurallyconserved regions of the unknown and leads to an improved model.Models have root mean square differences (r.m.s.d.s) with thestructures defined by X-ray analysis of between 0.73 and 1.56Å for all C atoms, for seven of the eight models. Forthe model of mucor pepsin, where the closest homologue has 33%sequence identity and 20% of the residues are in structurallyvariable regions, the r.m.s.d. for the framework region is 1.71Å and the r.m.s.d. for all C atoms is 3.47 Â.  相似文献   
74.
Thermodynamic properties and phase diagrams of the MCl–YCl3 (M=Na, K, Rb, Cs) systems were reassessed by using the CALPHAD method with the latest phase diagram data. A two-sublattice ionic solution model (M+)P(Cl, YCL63, YCl3)Q reflecting the ionic behavior of the components was adopted to describe the liquid phase in the systems. A new set of optimized model parameters was found, and the calculated phase diagrams and enthalpies of mixing have good agreement with experimental data. The calculated liquidus near to YCl3 side agrees much better with experimental data compared with previous work. In consideration of high and low temperature modifications as well as stability of intermediate compounds, Gibbs energies of formation of these compounds evaluated in the present work are more reasonable.  相似文献   
75.
Members of health social networks may be susceptible to privacy leaks by the amount of information they leave behind. The threat to privacy increases when members of these networks reuse their pseudonyms in other social networks. The risk of re‐identifying users from such networks requires quantitative estimates to evaluate its magnitude. The estimates will enable managers and members of health social communities to take corrective measures. We introduce a new re‐identification attack, the social network attack, that takes advantage of the fact that users reuse their pseudonyms. To demonstrate the attack, we establish links between MedHelp and Twitter (two popular social networks) based on matching pseudonyms. We used Bayesian networks to model the re‐identification risk and used stylometric techniques to identify the strength of the links. On the basis of our model 7‐11. 8% of the MedHelp members in the sample population who reused their pseudonyms in Twitter were re‐identifiable compared with 1% who did not. The risk estimates were measured at the 5% risk threshold. Our model was able to re‐identify users with a sensitivity of 41% and specificity of 96%. The potential for re‐identification increases as more data is accumulated from these profiles, which makes the threat of re‐identification more serious.  相似文献   
76.
Exposure to mechanical vibrations at work (e.g., due to handling powered tools) is a potential occupational risk as it may cause upper extremity complaints. However, reliable and valid assessment methods for vibration exposure at work are lacking. Measuring hand-arm vibration objectively is often difficult and expensive, while often used information provided by manufacturers lacks detail. Therefore, a subjective hand-arm vibration assessment method was tested on validity and inter-observer reliability.  相似文献   
77.

Background and objective

The degeneration of the balance control system in the elderly and in many pathologies requires measuring the equilibrium conditions very often. In clinical practice, equilibrium control is commonly evaluated by using a force platform (stabilometric platform) in a clinical environment.In this paper, we demonstrate how a simple movement analysis system, based on a 3D video camera and a 3D real time model reconstruction of the human body, can be used to collect information usually recorded by a physical stabilometric platform.

Methods

The algorithm used to reconstruct the human body model as a set of spheres is described and discussed. Moreover, experimental measurements and comparisons with data collected by a physical stabilometric platform are also reported. The measurements were collected on a set of 6 healthy subjects to whom a change in equilibrium condition was stimulated by performing an equilibrium task.

Results

The experimental results showed that more than 95% of data collected by the proposed method were not significantly different from those collected by the classic platform, thus confirming the usefulness of the proposed system.

Conclusions

The proposed virtual balance assessment system can be implemented at low cost (about 500$) and, for this reason, can be considered a home use medical device. On the contrary, astabilometric platform has a cost of about 10,000$ and requires periodical calibration. The proposed system does not require periodical calibration, as is necessary for stabilometric force platforms, and it is easy to use. In future, the proposed system with little integration can be used, besides being an emulator of a stabilometric platform, also to recognize and track, in real time, head, legs, arms and trunk, that is to collect information actually obtained by sophisticated optoelectronic systems.  相似文献   
78.
为了能够有效对RFID系统的已知攻击和未知攻击进行检测和预警,在分析大量RFID安全协议的基础上,提出了利用构建多决策树的方法对RFID系统的入侵行为进行检测。通过分析,得到所构造出的多决策树能够发现针对RFID系统的攻击之间的关系,并且具有可扩展性和高效性,使之能够适用于各种实际的RFID系统的应用。  相似文献   
79.
为提高云数据中心的抗毁能力,针对软硬件日趋复杂化带来的诸多故障问题,以传统的服务器心跳检测机制为基础,结合云计算的特点,提出一种保证云数据中心有效运行的心跳检测与故障评估方案。在实验室搭建仿真平台进行实验,实验结果表明,该方案能够及时检测到节点故障,依据预先制定的故障等级评估标准,采用模糊综合法进行评估,为云数据中心的管理与运作提供参考依据与保障。  相似文献   
80.
针对拟型服务机器人在家庭环境中的自主抓取任务,提出了一种强调运动姿态似人特性的机器人手臂动作的运动规划方法.该方法基于人体工程学中的快速上肢评估准则评价机器人运动姿态的似人特性,并在此基础上以机器人传速速率最优为目标规划机器人持物动作的姿态构型.最后以Motoman SDA10D拟人双臂机器人为例,具体介绍了该方法的应用和规划的结果,规划结果证明了该方法的可行性和有效性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号