首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19226篇
  免费   1433篇
  国内免费   1284篇
电工技术   698篇
技术理论   5篇
综合类   1930篇
化学工业   1070篇
金属工艺   144篇
机械仪表   364篇
建筑科学   1284篇
矿业工程   2889篇
能源动力   762篇
轻工业   464篇
水利工程   3993篇
石油天然气   461篇
武器工业   55篇
无线电   989篇
一般工业技术   496篇
冶金工业   1014篇
原子能技术   53篇
自动化技术   5272篇
  2024年   41篇
  2023年   161篇
  2022年   332篇
  2021年   414篇
  2020年   441篇
  2019年   290篇
  2018年   364篇
  2017年   436篇
  2016年   574篇
  2015年   629篇
  2014年   1258篇
  2013年   1058篇
  2012年   1265篇
  2011年   1719篇
  2010年   1286篇
  2009年   1132篇
  2008年   1156篇
  2007年   1618篇
  2006年   1514篇
  2005年   1311篇
  2004年   1003篇
  2003年   962篇
  2002年   727篇
  2001年   530篇
  2000年   446篇
  1999年   284篇
  1998年   220篇
  1997年   153篇
  1996年   117篇
  1995年   101篇
  1994年   87篇
  1993年   68篇
  1992年   44篇
  1991年   34篇
  1990年   21篇
  1989年   16篇
  1988年   21篇
  1987年   16篇
  1986年   11篇
  1985年   16篇
  1984年   13篇
  1983年   14篇
  1982年   9篇
  1981年   3篇
  1980年   5篇
  1979年   5篇
  1978年   2篇
  1977年   7篇
  1976年   3篇
  1975年   2篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
The ability to detect gun and gun held in hand or other body parts is a typical human skill. The same problem presents an imperative task for computer vision system. Automatic observer independent detection of hand held gun or gun held in the other body part, whether it is visible or concealed, provides enhance security in vulnerable places and initiates appropriate action there. Compare to the automatic object detection systems, automatic detection of gun has very few successful attempts. In the present scope of this paper, we present an extensive survey on automatic detection of gun and define a taxonomy for this particular detection system. We also describe the inherent difficulties related with this problem. In this survey of published papers, we examine different approaches used in state-of-the-art attempts and compare performances of these approaches. Finally, this paper concludes pointing to the possible research gaps in related fields.  相似文献   
2.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
3.
This article presents a new method for pairing devices securely. The commitment-based authentication uses a fuzzy secret that the devices only know approximately. Its novel feature is time-based opening of commitments in a single round. We also introduce a new source for the fuzzy secret: synchronized drawing with two fingers of the same hand on two touch screens or surfaces. The drawings are encoded as strings and compared with an edit-distance metric. A prototype implementation of this surprisingly simple and natural pairing mechanism shows that it accurately differentiates between true positives and man-in-the-middle attackers.  相似文献   
4.
李荣先 《世界有色金属》2020,(3):114-114,116
随着社会的不断发展,矿产资源为我国带来了巨大的经济效益,并在社会经济发展中占有重要的地位。但在矿山资源开发的过程中,威胁人身安全的事故经常发生。因此,本文对探矿工程安全措施进行了研究和分析。  相似文献   
5.
We study a two-stage stochastic and nonlinear optimization model for operating a power grid exposed to a natural disaster. Although this approach can be generalized to any natural hazard of continuous (and not instantaneous) nature, our focus is on wildfires. We assume that an approaching wildfire impacts the power grid by reducing the transmission capacity of its overhead lines. At the time when proactive decisions have to be taken, the severity of the wildfire is not known. This introduces uncertainty. In this paper, we extend previous work by more realistically capturing this uncertainty and by strengthening the mathematical programming formulation through standard reformulation techniques. With these reformulation techniques, the resulting two-stage, convex mixed-integer quadratically constrained programming formulation can be efficiently solved using commercial quadratic programming solvers as demonstrated on a case study on a modified version of the IEEE 123-bus test system with 100 scenarios. We also quantify the uncertainties through a second case study using the following three standard metrics of two-stage stochastic optimization: the expected value of perfect information, the expected result of using the expected value solution and the value of the stochastic solution.  相似文献   
6.
Basins with various mineral resources coexisting and enriching often occupy an important strategic position. The exploration of various mineral resources is repetitive at present due to unshared data and imperfect management mechanism. This situation greatly increases the cost of energy exploitation in the country. Traditional data-sharing mode has several disadvantages, such as high cost, difficulty in confirming the right of data, and lack of incentive mechanism, which make achieving real data sharing difficult. In this paper, we propose a data-sharing mechanism based on blockchain and provide implementation suggestions and technical key points. Compared with traditional data-sharing methods, the proposed data-sharing mechanism can realize data sharing, ensure data quality, and protect intellectual property. Moreover, key points in the construction are stated in the case study section to verify the feasibility of the data-sharing system based on blockchain proposed in this paper.  相似文献   
7.
Professional search in patent repositories poses several unique challenges. One key requirement is to search the entire affected space of concepts, following well-defined procedures to ensure traceability of results obtained. Several techniques have been introduced to enhance query generation, preferably via automated query term expansion, to improve retrieval effectiveness. Currently, these approaches are mostly limited to computing additional query terms from patent documents based on statistical measures. For conceptual search to solve the limitation of traditional keyword search standard dictionaries are used to provide synonyms and keyword phrases for query refinement. Studies show that these are insufficient in such highly specialized domains. In this paper, we present an approach to extract keyword phrases from query logs created during the validation procedure of the patent applications. This creates valuable domain-specific lexical databases for several specific patent classes that can be used to both expand as well as limit the scope of a patent search. This provides a more powerful means to guide a professional searcher through the search process. We evaluate the lexical databases based on real query sessions of patent examiners.  相似文献   
8.
Malic acid derived from fossil resources is currently applied in the food and beverage industries with a medium global production capacity. However, in the transition from a fossil-based to a bio-based economy, biotechnologically produced l -malic acid may become an important platform chemical with many new applications, especially in the field of biopolymers. In this review, currently used petrochemical production routes to dl -malic acid are outlined and insights into possible bio-based alternatives for microbial l -malic acid production are provided. Besides ecological reasons, the possibility to produce enantiopure l -malic acid by microbial fermentation is the biggest advantage over chemical synthesis. State-of-the-art and open challenges concerning production host engineering, substrate choice and downstream processing are addressed. With regard to production hosts, a literature overview is given covering the leading natural production strains of Aspergillus, Ustilago and Aureobasidium, as well as Escherichia coli as the most important engineered recombinant host. The utilization of renewable substrates as an alternative to glucose is emphasized in particular as a key aspect for a competitive bio-based production. Out of the alternative substrates discussed in this review, the industrial side-streams crude glycerol and molasses seem to be most promising for large-scale l -malic acid production. © 2019 The Authors. Journal of Chemical Technology & Biotechnology published by John Wiley & Sons Ltd on behalf of Society of Chemical Industry.  相似文献   
9.
流域泥沙灾害与泥沙资源性的研究   总被引:5,自引:0,他引:5  
泥沙灾害与泥沙资源性是流域泥沙的重要属性,二者在一定条件下可以相互转化。本文论述了泥沙淤积、泥沙冲刷、岸滩崩塌、山地崩塌与泥石流、粗沙淤积的土地沙化等泥沙灾害,指出泥沙灾害具有时空分布的不均匀性、渐变性或突发性、群发性、转化性及危害严重性等;流域泥沙资源化的主要途径包括填海造陆及造地、引洪淤灌、堤防淤临淤背、建筑材料、湿地形成(河流、湖泊与河口海岸)等,指出流域泥沙资源化及其优化配置既要解决思想观念、基本理论、目标效益等方面的问题,还要考虑与水资源联合配置问题。  相似文献   
10.
文中对曲沃县水资源开发利用现状进行了认真分析,并从思想观念、管理体制、管理模式上提出了问题,为解决问题提出了相应对策。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号