首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13624篇
  免费   1609篇
  国内免费   685篇
电工技术   1562篇
技术理论   5篇
综合类   1741篇
化学工业   696篇
金属工艺   85篇
机械仪表   237篇
建筑科学   2802篇
矿业工程   617篇
能源动力   432篇
轻工业   1410篇
水利工程   1244篇
石油天然气   551篇
武器工业   80篇
无线电   450篇
一般工业技术   1003篇
冶金工业   1045篇
原子能技术   139篇
自动化技术   1819篇
  2024年   92篇
  2023年   225篇
  2022年   495篇
  2021年   621篇
  2020年   635篇
  2019年   484篇
  2018年   522篇
  2017年   481篇
  2016年   662篇
  2015年   577篇
  2014年   1079篇
  2013年   1150篇
  2012年   1134篇
  2011年   1076篇
  2010年   834篇
  2009年   861篇
  2008年   817篇
  2007年   875篇
  2006年   852篇
  2005年   569篇
  2004年   474篇
  2003年   368篇
  2002年   257篇
  2001年   186篇
  2000年   134篇
  1999年   95篇
  1998年   71篇
  1997年   45篇
  1996年   37篇
  1995年   26篇
  1994年   24篇
  1993年   15篇
  1992年   19篇
  1991年   13篇
  1990年   18篇
  1989年   17篇
  1988年   10篇
  1987年   5篇
  1986年   5篇
  1985年   7篇
  1984年   8篇
  1983年   7篇
  1982年   7篇
  1981年   4篇
  1979年   5篇
  1975年   2篇
  1974年   2篇
  1964年   3篇
  1963年   3篇
  1961年   3篇
排序方式: 共有10000条查询结果,搜索用时 265 毫秒
81.
文章介绍了喜德县红莫升压站-鲁基升压站220kV线路工程滑坡地质灾害危险性现状评估和预测评估,确定了评估区内滑坡地质灾害对工程的影响,以及工程建设加剧已有滑坡地质灾害的危险性和自身可能遭受已存在滑坡地质灾害的危险性。据此评估结果,为工程在建设过程中提出了具体的防治处理措施建议。  相似文献   
82.
我国幅员辽阔,地质环境条件多样且复杂,导致了地质灾害发育强烈,种类繁多、危害较大。地质灾害与工程建设活动密切相关,既相互作用,相互依存,又相互影响[1]。电力工程项目遍布全国,特别是输电线路大多为人烟稀少的山区分布,线路长,跨越的地质地貌区域复杂,存在的地质灾害多种多样,或多或少面临着各种地质灾害的严重威胁[2]。通过电力工程地质灾害危险性评估工作的现状及评估工作流程的介绍,进一步分析电力工程地质灾害的危险性评估工作中存在的问题并提出了相应的看法。  相似文献   
83.
Through an ergonomic approach, this study aimed to evaluate whether workers involved in forest harvesting activities in rural properties are subject to the development of work-related diseases, as well as their consequences. A cross-sectional study with 267 forest workers in rural properties in the Brazilian Central region was used. The following evaluations were performed for each of the activities (felling, delimbing, tracing, manual extraction and manual loading): physical workload evaluation; biomechanical evaluation; risk of repetitive strain injuries/work-related musculoskeletal disorders; environmental noise and vibration factors, where relevant, and thermal overload through the Wetbulb Globe Temperature index. The results showed that in general the physical workload was very high, exceeding the cardiovascular load limits and adding to the need for work reorganization. All activities exposed workers to serious and imminent risks of developing injuries to the spine and lower limbs. Likewise, in general the risk of the appearance of RSI/WMSDs was very high for all activities evaluated. Such results are due to the combination of organizational work factors and factors of the work environment such as exposure to bad weather, uneven terrain, lifting and handling loads above tolerable limits, excessive noise and thermal overload. All of this allows to conclude that ergonomic risks and workers’ health hazards in forest harvesting in rural properties are latent and very worrying, and that these workers are exposed to a form of labor exploitation that invariably leads to physical and emotional exhaustion and therefore to their decreased labor capacity and useful working life.  相似文献   
84.
The lockdown due to COVID-19 in Italy resulted in the sudden closure of schools, with a shift from traditional teaching to the online one. Through an online questionnaire, this survey explores teachers' experience of online teaching, the level of risk factors (e.g., stress) and protective factors (e.g., locus of control) and their impact on satisfaction levels during the social distancing. One hundred seven high school teachers from Lombardy, an Italian region very affected by the COVID-19 outbreak, participated. Results show that depression and stress are the main predictors of satisfaction levels for online teaching. In addition, coping, locus of control and self-efficacy emerge as important protective factors. Finally, although there is great satisfaction with the online teaching experience, critical elements emerged. This study is relevant because it describes the critical elements of the online teaching experience, and identifies some protective factors and the main risk factors in teachers operating in an area strongly marked by social restrictions imposed by the pandemic. High school teachers emerge as a sub-group of the general population with specific psychological reactions. Considering the results, it is possible to suggest providing high-quality educational support and crisis-psychological oriented services to teachers, and help to maintain the psychological well-being.  相似文献   
85.
Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework is developed by means of a methodology based on a heuristic theory that incorporates knowledge generated by existing works as well as the experience of their implementation. The paper presents the design details of the framework, which consists of three stages: identification of data security requirements, management of data security risks and evaluation of data security performance in CCS.  相似文献   
86.
Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph in the conversion process, a related algorithm is proposed to generate the B_NAG model. Finally, to analyze the reachability of paths in B_NAG, the measuring indexs such as node attack complexity and node state transition are defined, and an iterative algorithm for obtaining the probability of reaching the target node is presented. On this basis, the posterior probability of related nodes can be calculated. A simulation environment is set up to evaluate the effectiveness of the B_NAG model. The experimental results indicate that the B_NAG model is realistic and effective in evaluating vulnerabilities of computer networks and can accurately highlight the degree of vulnerability in a chaotic relationship.  相似文献   
87.
Today, air pollution, smoking, use of fatty acids and ready‐made foods, and so on, have exacerbated heart disease. Therefore, controlling the risk of such diseases can prevent or reduce their incidence. The present study aimed at developing an integrated methodology including Markov decision processes (MDP) and genetic algorithm (GA) to control the risk of cardiovascular disease in patients with hypertension and type 1 diabetes. First, the efficiency of GA is evaluated against Grey Wolf optimization (GWO) algorithm, and then, the superiority of GA is revealed. Next, the MDP is employed to estimate the risk of cardiovascular disease. For this purpose, model inputs are first determined using a validated micro‐simulation model for screening cardiovascular disease developed at Tehran University of Medical Sciences, Iran by GA. The model input factors are then defined accordingly and using these inputs, three risk estimation models are identified. The results of these models support WHO guidelines that provide medicine with a high discount to patients with high expected LYs. To develop the MDP methodology, policies should be adopted that work well despite the difference between the risk model and the actual risk. Finally, a sensitivity analysis is conducted to study the behavior of the total medication cost against the changes of parameters.  相似文献   
88.
针对传统的入侵检测系统存在报警数量大、误报率高等缺陷,提出了一种基于网络安全风险评估的入侵检测方法,该方法基于入侵检测结果,引入抗体浓度随入侵强度动态变化这一人工免疫理论的最新研究成果进行网络安全风险的计算,然后根据当前网络面临的实时安全风险动态设置报警策略。实验结果表明,该方法能够实时、定量地计算主机和网络所面临的风险,并极大地降低报警数量和误报率。  相似文献   
89.
随着信息化进程的快速发展,保障信息系统的安全性和降低信息系统潜在的风险,一直是国内外学者关注的焦点,而风险评估正是解决该问题的有效方法之一,但是在风险评估过程中存在评估指标难以量化、风险值难以界定等困难,因此文章提出了一种基于灰色关联分析的信息安全风险评估方法,该方法首先建立了信息系统的风险评估指标体系,其次将评估的信息系统与最优信息系统进行关联度分析,最后得出信息系统风险的准确度量。该方法可以使信息系统的评估过程简单化,标准化。  相似文献   
90.
对分布式信息系统所面临的主要风险进行识别和评估是构建灾备系统的首要任务。以安徽烟草分布式信息系统为例,首先分析了该信息系统在环境、管理、技术、设备等方面所存在的风险,然后以层次分析法为核心构造了评估决策模型,结合专家打分,计算出各类风险对安徽烟草信息系统的威胁程度并进行排序,从而识别出主要的风险源,为构建灾备体系提供依据。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号