首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   187971篇
  免费   26780篇
  国内免费   18660篇
电工技术   18736篇
技术理论   10篇
综合类   22864篇
化学工业   15771篇
金属工艺   6308篇
机械仪表   15135篇
建筑科学   15330篇
矿业工程   6407篇
能源动力   8853篇
轻工业   7971篇
水利工程   9862篇
石油天然气   9537篇
武器工业   2750篇
无线电   15310篇
一般工业技术   16720篇
冶金工业   6357篇
原子能技术   1580篇
自动化技术   53910篇
  2024年   1298篇
  2023年   3503篇
  2022年   6448篇
  2021年   7148篇
  2020年   7787篇
  2019年   6678篇
  2018年   6262篇
  2017年   7713篇
  2016年   8732篇
  2015年   9293篇
  2014年   12574篇
  2013年   12978篇
  2012年   14475篇
  2011年   15261篇
  2010年   11517篇
  2009年   12040篇
  2008年   11656篇
  2007年   13105篇
  2006年   11185篇
  2005年   9605篇
  2004年   7747篇
  2003年   6623篇
  2002年   5308篇
  2001年   4368篇
  2000年   3752篇
  1999年   2804篇
  1998年   2436篇
  1997年   2001篇
  1996年   1818篇
  1995年   1581篇
  1994年   1287篇
  1993年   931篇
  1992年   769篇
  1991年   611篇
  1990年   494篇
  1989年   414篇
  1988年   257篇
  1987年   154篇
  1986年   124篇
  1985年   111篇
  1984年   118篇
  1983年   64篇
  1982年   84篇
  1981年   42篇
  1980年   62篇
  1979年   59篇
  1978年   22篇
  1977年   12篇
  1959年   21篇
  1951年   22篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
22.
With the emergence of large-scale knowledge base, how to use triple information to generate natural questions is a key technology in question answering systems. The traditional way of generating questions require a lot of manual intervention and produce lots of noise. To solve these problems, we propose a joint model based on semi-automated model and End-to-End neural network to automatically generate questions. The semi-automated model can generate question templates and real questions combining the knowledge base and center graph. The End-to-End neural network directly sends the knowledge base and real questions to BiLSTM network. Meanwhile, the attention mechanism is utilized in the decoding layer, which makes the triples and generated questions more relevant. Finally, the experimental results on SimpleQuestions demonstrate the effectiveness of the proposed approach.  相似文献   
23.
Prostephanus truncatus is a notorious pest of stored-maize grain and its spread throughout sub-Saharan Africa has led to increased levels of grain storage losses. The current study developed models to predict the level of P. truncatus infestation and associated damage of maize grain in smallholder farmer stores. Data were gathered from grain storage trials conducted in Hwedza and Mbire districts of Zimbabwe and correlated with weather data for each site. Insect counts of P. truncatus and other common stored grain insect pests had a strong correlation with time of year with highest recorded numbers from January to May. Correlation analysis showed insect-generated grain dust from boring and feeding activity to be the best indicator of P. truncatus presence in stores (r = 0.70), while a moderate correlation (r = 0.48) was found between P. truncatus numbers and storage insect parasitic wasps, and grain damage levels significantly correlated with the presence of Tribolium castaneum (r = 0.60). Models were developed for predicting P. truncatus infestation and grain damage using parameter selection algorithms and decision-tree machine learning algorithms with 10-fold cross-validation. The P. truncatus population size prediction model performance was weak (r = 0.43) due to the complicated sampling and detection of the pest and eight-week long period between sampling events. The grain damage prediction model had a stronger correlation coefficient (r = 0.93) and is a good estimator for in situ stored grain insect damage. The models were developed for use under southern African climatic conditions and can be improved with more input data to create more precise models for building decision-support tools for smallholder maize-based production systems.  相似文献   
24.
基于神经网络和遗传算法的锭子弹性管性能优化   总被引:1,自引:0,他引:1  
为得到减振弹性管对下锭胆的支承弹性和锭子高速运动下的稳定性等性能的最优匹配效率,依据减振弹性管的等效抗弯刚度及底部等效刚度系数公式,利用MatLab数值分析软件构建弹性管抗弯刚度和底部挠度数学模型。首先,结合Isight优化软件基于径向基神经网络构建其近似模型,且使精度达到可接受水平,并以模型的关键结构参数弹性模量、螺距、槽宽、壁厚为设计变量,结合遗传算法对弹性管抗弯刚度和底部挠度进行多目标优化设计,得到Pareto最优解集和Pareto前沿图,确定出减振弹性管结构工艺参数的优化方案。通过对优化数据进行分析发现,该方案在保证减振弹性管弹性的同时,其底部振幅明显减弱。  相似文献   
25.
医院建筑项目是非常复杂且具有挑战性的建设项目。传统的交付模式无法满足人们对医院建筑建设、运营方面的高要求,为此开展面向医院建筑项目的IPD模式应用研究。在对IPD模式发展现状整理的基础上,阐述医院建筑项目IPD模式的适用性。分析采用IPD模式的医院建筑项目特点,并以上海市某公立三甲专科医院项目为例,对IPD模式在国内的应用进行探索性研究。  相似文献   
26.
Small group detection and tracking in crowd scenes are basis for high level crowd analysis tasks. However, it suffers from the ambiguities in generating proper groups and in handling dynamic changes of group configurations. In this paper, we propose a novel delay decision-making based method for addressing the above problems, motivated by the idea that these ambiguities can be solved using rich temporal context. Specifically, given individual detections, small group hypotheses are generated. Then candidate group hypotheses across consecutive frames and their potential associations are built in a tree. By seeking for the best non-conflicting subset from the hypothesis tree, small groups are determined and simultaneously their trajectories are got. So this framework is called joint detection and tracking. This joint framework reduces the ambiguities in small group decision and tracking by looking ahead for several frames. However, it results in the unmanageable solution space because the number of track hypotheses grows exponentially over time. To solve this problem, effective pruning strategies are developed, which can keep the solution space manageable and also improve the credibility of small groups. Experiments on public datasets demonstrate the effectiveness of our method. The method achieves the state-of-the-art performance even in noisy crowd scenes.  相似文献   
27.
The controller design for the robotic manipulator faces different challenges such as the system's nonlinearities and the uncertainties of the parameters. Furthermore, the tracking of different linear and nonlinear trajectories represents a vital role by the manipulator. This paper suggests an optimal design for the nonlinear model predictive control (NLMPC) based on a new improved intelligent technique and it is named modified multitracker optimization algorithm (MMTOA). The proposed modification of the MTOA is carried out based on opposition-based learning (OBL) and quasi OBL approaches. This modification improves the exploration behavior of the MTOA to prevent it from becoming trapped in a local optimum. The proposed method is applied on the robotic manipulator to track different linear and nonlinear trajectories. The NLMPC parameters are tuned by the MMTOA rather than the trial and error method of the designer. The proposed NLMPC based on MMTOA is compared with the original MTOA, genetic algorithm, and cuckoo search algorithm in literature. The superiority and effectiveness of the proposed controller are confirmed to track different linear and nonlinear trajectories. Furthermore, the robustness of the proposed method is emphasized against the uncertainties of the parameters.  相似文献   
28.
The main objective of this study was to develop the primary and secondary models to describe the growth kinetics of Salmonella as well as background microorganisms in raw, shucked oysters. Samples, inoculated with a cocktail of two Salmonella serotypes, S. Typhimurium (CICC22956) and S. Enteritidis (CICC21482), were incubated at 4, 8, 12, 16, 20, 25, 30, 33, 37, 40, and 43 °C. Growth of Salmonella was observed at all temperatures, except at 4 °C. The background microorganisms grew at all temperatures. All growth curves clearly exhibited lag, exponential and stationary phases, and were analyzed using the Huang growth model. Three secondary models (Ratkowsky square-root, Huang square-root, and Cardinal parameter models) were compared for evaluating the effect of temperature on bacterial growth rates. Data analysis was performed using IPMP 2013, a free predictive microbiology software tool developed by the USDA ARS.The Cardinal parameters model underestimated the specific rates of the microorganisms at low temperatures. The Huang square-root model was more suitable than the Ratkowsky square-root model for describing the effect of temperature on growth of Salmonella, while the Ratkowsky square-root model, on the other hand, was more suitable for background microorganisms. For both Salmonella and background microorganisms, the logarithms of the lag phase were expressed as linear functions of the logarithms of specific growth rates. The results of this study can be used by the food retailers and regulatory agencies to estimate the microbial shelf-life of raw, shucked oysters.  相似文献   
29.
A 2D computational fluid dynamics (Eulerian–Eulerian) multiphase flow model coupled with a population balance model (CFD-PBM) was implemented to investigate the fluidization structure in terms of entrance region in an industrial-scale gas phase fluidized bed reactor. The simulation results were compared with the industrial data, and good agreement was observed. Two cases including perforated distributor and complete sparger were applied to examine the flow structure through the bed. The parametric sensitivity analysis of time step, number of node, drag coefficient, and specularity coefficient was carried out. It was found that the results were more sensitive to the drag model. The results showed that the entrance configuration has significant effect on the flow structure. While the dead zones are created in both corners of the distributors, the perforated distributor generates more startup bubbles, heterogeneous flow field, and better gas–solid interaction above the entrance region due to jet formation.  相似文献   
30.
本文以云杉八齿小蠹Ips typographus Linnaeus为例,经标本选取,观察虫体整体形态,绘制整体结构草图,电子显微镜观察局部、得到局部数字图像,分别建立虫体每一部分的高精度细节。把模型每部分拼装在一起组成整体模型,构建出了云杉八齿小蠹三维虚拟昆虫数字化模型。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号