首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   24627篇
  免费   2921篇
  国内免费   1654篇
电工技术   2036篇
技术理论   6篇
综合类   3100篇
化学工业   892篇
金属工艺   397篇
机械仪表   536篇
建筑科学   3787篇
矿业工程   1006篇
能源动力   918篇
轻工业   1569篇
水利工程   4995篇
石油天然气   847篇
武器工业   133篇
无线电   1287篇
一般工业技术   1541篇
冶金工业   1223篇
原子能技术   189篇
自动化技术   4740篇
  2024年   168篇
  2023年   439篇
  2022年   896篇
  2021年   1019篇
  2020年   1034篇
  2019年   897篇
  2018年   892篇
  2017年   914篇
  2016年   1078篇
  2015年   1076篇
  2014年   1782篇
  2013年   1793篇
  2012年   1934篇
  2011年   1907篇
  2010年   1475篇
  2009年   1531篇
  2008年   1475篇
  2007年   1583篇
  2006年   1470篇
  2005年   1105篇
  2004年   977篇
  2003年   759篇
  2002年   614篇
  2001年   499篇
  2000年   408篇
  1999年   320篇
  1998年   233篇
  1997年   193篇
  1996年   133篇
  1995年   122篇
  1994年   98篇
  1993年   78篇
  1992年   54篇
  1991年   40篇
  1990年   46篇
  1989年   38篇
  1988年   28篇
  1987年   15篇
  1986年   12篇
  1985年   9篇
  1984年   9篇
  1983年   9篇
  1982年   8篇
  1981年   4篇
  1979年   5篇
  1974年   2篇
  1964年   3篇
  1963年   3篇
  1961年   3篇
  1959年   3篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
41.
42.
This is the second part of a two-part review of human error identification (HEI) approaches in human reliability assessment (HRA). Part 1 reviewed the probabilistic risk assessment (PRA) context in which HRA occurs, and then detailed 12 HEI techniques which have evolved in the field of HRA. Part 2 attempts to compare the way these techniques perform against a range of criteria relevant to HEI theoretical and empirical validity, and practical usefulness in applied HRA. It is hoped that these comparisons will help assessors in the selection of techniques for practical applications. The comparisons also point to research and development needs in the area of applied HEI.  相似文献   
43.
This study aims to improve the general flood vulnerability approach using fuzzy TOPSIS based on α-cut level sets which can reduce the uncertainty inherent in even fuzzy multi-criteria decision making process. Since fuzzy TOPSIS leads to a crisp closeness for each alternative, it is frequently argued that fuzzy weights and fuzzy ratings should be in fuzzy relative closeness. Therefore, this study used a modified α-cut level set based fuzzy TOPSIS to develop a spatial flood vulnerability approach for Han River in Korea, considering various uncertainties in weights derivation and crisp data aggregation. Two results from fuzzy TOPSIS and modified fuzzy TOPSIS were compared. Some regions which showed no or small ranking changes have their centro-symmetric distributions, while other regions whose rankings varied dynamically, have biased (anti-symmetric) distributions. It can be concluded that α-cut level set based fuzzy TOPSIS produce more robust prioritization since more uncertainties can be considered. This method can be applied to robust spatial vulnerability or decision making in water resources management.  相似文献   
44.
Members of health social networks may be susceptible to privacy leaks by the amount of information they leave behind. The threat to privacy increases when members of these networks reuse their pseudonyms in other social networks. The risk of re‐identifying users from such networks requires quantitative estimates to evaluate its magnitude. The estimates will enable managers and members of health social communities to take corrective measures. We introduce a new re‐identification attack, the social network attack, that takes advantage of the fact that users reuse their pseudonyms. To demonstrate the attack, we establish links between MedHelp and Twitter (two popular social networks) based on matching pseudonyms. We used Bayesian networks to model the re‐identification risk and used stylometric techniques to identify the strength of the links. On the basis of our model 7‐11. 8% of the MedHelp members in the sample population who reused their pseudonyms in Twitter were re‐identifiable compared with 1% who did not. The risk estimates were measured at the 5% risk threshold. Our model was able to re‐identify users with a sensitivity of 41% and specificity of 96%. The potential for re‐identification increases as more data is accumulated from these profiles, which makes the threat of re‐identification more serious.  相似文献   
45.
为了能够有效对RFID系统的已知攻击和未知攻击进行检测和预警,在分析大量RFID安全协议的基础上,提出了利用构建多决策树的方法对RFID系统的入侵行为进行检测。通过分析,得到所构造出的多决策树能够发现针对RFID系统的攻击之间的关系,并且具有可扩展性和高效性,使之能够适用于各种实际的RFID系统的应用。  相似文献   
46.
针对学校等大型科研平台拥有的精密器材种类繁多、安置位置分散、操作流程特异、操作人员流动性大的现象,基于监测的思想设计了此仪器管理系统,旨在督促实验人员按稳妥的使用流程操作仪器,并为器材的更迭维修提供参考。系统分为终端、服务端两部分,终端通过检测电流来判断仪器状态,使用者使用需用有效IC卡辨别身份,终端相应给予声光提示,并且拍照留据。相应的状态情况可以通过网络传输到服务器,例如使用者有效卡号、报警照片等且客户端可以从服务端获取人员信息更新等资料。通过对本工程中心内部分仪器的监管测试表明,较好的提高了操作人员使用素质,提高了仪器管理水平。  相似文献   
47.
The paper studies a 3D fingerprint reconstruction technique based on multi-view touchless fingerprint images. This technique offers a solution for 3D fingerprint image generation and application when only multi-view 2D images are available. However, the difficulties and stresses of 3D fingerprint reconstruction are the establishment of feature correspondences based on 2D touchless fingerprint images and the estimation of the finger shape model. In this paper, several popular used features, such as scale invariant feature transformation (SIFT) feature, ridge feature and minutiae, are employed for correspondences establishment. To extract these fingerprint features accurately, an improved fingerprint enhancement method has been proposed by polishing orientation and ridge frequency maps according to the characteristics of 2D touchless fingerprint images. Therefore, correspondences can be established by adopting hierarchical fingerprint matching approaches. Through an analysis of 440 3D point cloud finger data (220 fingers, 2 pictures each) collected by a 3D scanning technique, i.e., the structured light illumination (SLI) method, the finger shape model is estimated. It is found that the binary quadratic function is more suitable for the finger shape model than the other mixed model tested in this paper. In our experiments, the reconstruction accuracy is illustrated by constructing a cylinder. Furthermore, results obtained from different fingerprint feature correspondences are analyzed and compared to show which features are more suitable for 3D fingerprint images generation.  相似文献   
48.
《Pattern recognition》2014,47(2):535-543
Robust face recognition (FR) is an active topic in computer vision and biometrics, while face occlusion is one of the most challenging problems for robust FR. Recently, the representation (or coding) based FR schemes with sparse coding coefficients and coding residual have demonstrated good robustness to face occlusion; however, the high complexity of l1-minimization makes them less useful in practical applications. In this paper we propose a novel coding residual map learning scheme for fast and robust FR based on the fact that occluded pixels usually have higher coding residuals when representing an occluded face image over the non-occluded training samples. A dictionary is learned to code the training samples, and the distribution of coding residuals is computed. Consequently, a residual map is learned to detect the occlusions by adaptive thresholding. Finally the face image is identified by masking the detected occlusion pixels from face representation. Experiments on benchmark databases show that the proposed scheme has much lower time complexity but comparable FR accuracy with other popular approaches.  相似文献   
49.
This study investigates perceived risk and trust in relationship to the Diffusion of Innovation Theory [Rogers, E.M., 1962. Diffusion of innovations. Glencoe, IL: The Free Press; 1983. Diffusion of innovations. 3rd ed. New York: The Free Press] from a cultural perspective to understand the determinants of behavioural intent to adopt mobile commerce among the Y Generation in Kazakhstan. Surveys from 345 university-level students and subsequent structural equation modelling revealed perceived risk, trustworthiness and Rogers’ five innovation characteristics are important determinants. Perceived risk and trustworthiness are important determinants because of the high uncertainty avoidance characteristics of the Kazakh society. This study advances theory regarding culture- and generation-based characteristics to transition economies by verifying theoretical proposition regarding the behavioural intent towards mobile commerce adoption, resulting in a greater understanding of mobile commerce adoption among the Y Generation in transition economies. Marketing implications are discussed.  相似文献   
50.
In this paper, we introduce triangular subdivision operators which are composed of a refinement operator and several averaging operators, where the refinement operator splits each triangle uniformly into four congruent triangles and in each averaging operation, every vertex will be replaced by a convex combination of itself and its neighboring vertices. These operators form an infinite class of triangular subdivision schemes including Loop's algorithm with a restricted parameter range and the midpoint schemes for triangular meshes. We analyze the smoothness of the resulting subdivision surfaces at their regular and extraordinary points by generalizing an established technique for analyzing midpoint subdivision on quadrilateral meshes. General triangular midpoint subdivision surfaces are smooth at all regular points and they are also smooth at extraordinary points under certain conditions. We show some general triangular subdivision surfaces and compare them with Loop subdivision surfaces.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号