首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2006篇
  免费   186篇
  国内免费   71篇
电工技术   140篇
技术理论   2篇
综合类   132篇
化学工业   27篇
金属工艺   13篇
机械仪表   39篇
建筑科学   796篇
矿业工程   33篇
能源动力   97篇
轻工业   7篇
水利工程   77篇
石油天然气   5篇
武器工业   9篇
无线电   234篇
一般工业技术   94篇
冶金工业   11篇
原子能技术   2篇
自动化技术   545篇
  2024年   3篇
  2023年   39篇
  2022年   59篇
  2021年   86篇
  2020年   95篇
  2019年   69篇
  2018年   74篇
  2017年   93篇
  2016年   90篇
  2015年   74篇
  2014年   157篇
  2013年   240篇
  2012年   128篇
  2011年   146篇
  2010年   100篇
  2009年   120篇
  2008年   96篇
  2007年   111篇
  2006年   86篇
  2005年   91篇
  2004年   76篇
  2003年   53篇
  2002年   52篇
  2001年   31篇
  2000年   38篇
  1999年   25篇
  1998年   6篇
  1997年   5篇
  1996年   8篇
  1995年   4篇
  1994年   3篇
  1993年   2篇
  1989年   1篇
  1986年   1篇
  1983年   1篇
排序方式: 共有2263条查询结果,搜索用时 31 毫秒
1.
Automatic load shedding is the ultimate countermeasure against imbalance in a power system and can effectively help preventing large blackouts. Taking into account a high penetration of renewable energy sources (RES) in the distribution grid, a clear distinction between load and generation at the PCC becomes increasingly more difficult. For that reason an adaptation of frequency relay parameters and their locations of installation are necessary. In Europe this is rest on a multi-step plan based on values such as the yearly peak load. In this paper a novel probabilistic method for automatic load shedding is presented that uses the average values instead of peak values for load shedding. Its applicability is verified by a dynamic power system model that was developed to compare the classical and novel probabilistic load shedding principle. The method is verified using data from a German TSO.  相似文献   
2.
PKI/CA技术综述   总被引:6,自引:0,他引:6  
公开密钥基础设施(PKI)是解决网络安全的技术.典型PKI应用系统包括安全Web、注册机构(RA)、认证机构(CA)、目录(LDAP)和数据库等服务器.RA验证客户证书申请后提交CA.CA检查信息完整和数字签名正确后把证书存放到证书库和目录服务器,并将签发证书序列号通知客户和RA.客户即可使用该号通过目录服务器下载证书.1993年以来,美、加、欧洲、韩、日等国已相继展开PKI研究.我国2001年将PKI列入十五863计划,并着手解决PKI标准化、CA互联互通等关键技术问题。  相似文献   
3.
Ting-Lin   《Technology in Society》2006,28(4):533-552
For the past decade, the Taiwanese government has applied the policy of “North heavy, South light” to put more emphasis on development in northern Taiwan instead of the south. This has resulted in uneven development between the northern and southern regions, especially when introducing, developing, and supporting high technology and resource allocation in education. Industry clusters have become the centerpiece of economic development policy in many parts of the world. In this study, it is assumed that there are two categories of less-advantaged regions in Taiwan: (1) older industrialized regions dominated by labor-intensive/capital-intensive industries, and (2) industrial regions that have merged with potential high-technology small firms but still lack infrastructure. This study discusses the following points: (a) How do industrial clusters work in action? (b) What barriers do less-advantaged industrial clusters face? (c) What action strategies promote less-advantaged industrial clusters?  相似文献   
4.
为了满足海军诸兵种一体化作战模拟系统从整体上展现综合战场态势的需求,基于高层体系结构( HLA)技术,提出了综合战场态势仿真系统的设计方案,分析了系统所需的功能,阐述了系统实现时所涉及的5个关键技术,重点解决了在态势中如何显示矢量军标的难题,并优化了数据更新流程及态势显示处理方法,极大地提高了态势显示刷新的速度与效率,最后用仿真实验验证了该设计方案的可行性与合理性.  相似文献   
5.
随着招投标过程信息化的快速发展,越来越多的招标、评标、中标信息统一集中在相应交易中心平台网站上进行公示,使采用大数据手段分析建设工程信息成为了可能。采用Web Scraper插件爬取网页内容简便、高效、准确。大数据的介入能很大程度遏制非法围标、串标行为,保证公共资源交易过程的公平、公正,有效打击权力寻租。同时大数据分析以定量、可视化的成果展示了建设工程的市场行为趋势,为政府的宏观调控提供更精确的数据性指导性意见。  相似文献   
6.
The paper suggests a new methodology for secure cyber–physical systems design. The proposed methodology consists of two main cycles. The main goal of the first cycle is in design of the system model, while the second one is about development of the system prototype. The key idea of the methodology is in providing of the most rational solutions that are improving the security of cyber–physical systems. Such solutions are called alternatives and built according to functional requirements and non-functional limitations to the system. Each cycle of the methodology consists of the verification process and seven stages that are associated with the used cyber–physical system model. The objective of the verification process is in checking of constructed models and prototypes in terms of their correctness and compatibility. The model represents cyber–physical systems as sets of building blocks with network between them, takes elements internal structure into account and allows direct and reverse transformations. The novelty of the suggested methodology is in the combination of design, development and verification techniques within a single approach. To provide an example of the design methodology application, in this paper it is used to improve the semi-natural model of the railway infrastructure.  相似文献   
7.
首先分析了虚拟化给传统信息安全带来的挑战,然后分别从边界防护、病毒防护、补丁管理以及虚拟化基础设施保护四个方面,阐述了在虚拟化环境下如何进行安全防护。  相似文献   
8.
Thermal sprayed aluminum and zinc provide long-term (> 20 years to first maintenance) corrosion control coatings. However, this application is usually more expensive than painting or galvanizing if thermal spraying (metallizing) is not integrated into the design and fabrication phases of new construction and repair projects. Aluminum and zinc metallized coatings are tough enough to withstand fabrication, transportation, and assembly operations. The improved capabilities and productivity of metallizing equipment for aluminum and zinc spraying are a major factor in their current cost competitiveness. The net result is that the cost difference between metallizing, paint, and galvanizing is getting closer every day. Even though the initial application cost of metallizing may be higher, the life cycle cost (LCC) and average equivalent annual costs (AEAC) are lower than paint coating systems. Metallizing LCCs, when properly engineered into the construction schedule, are equal to or less than paint coating LCCs. This article summarizes some metallizing considerations for installing improved corrosion control coating systems in new construction and in maintenance and repair of infrastructure. Editor’s Note: The following constants have been used to convert between English and Metric dimensions: 1ft2-0.0929 m2; 1lb/ft2-4.89 kg/m2; 1 mil=0.025mm. Presented at the 5th National Thermal Spray Conference (NTSC-93), Infrastructure Maintenance and Repair Session, 10 June 1993, Anaheim, CA.  相似文献   
9.
《Information & Management》2014,51(8):1031-1042
Customer relationship management (CRM) has become one of the most influential technologies in the world, and companies are increasingly implementing it to create value. However, despite significant investment in CRM technology infrastructure, empirical research offers inconsistent support for its positive impact on performance. This study develops and tests a research model analyzing the process through which CRM technology infrastructure translates into organizational performance, drawing on the resource-based view (RBV) and the knowledge-based view (KBV) of the firm. Based on an international sample of 125 hotels, the results suggest that organizational commitment and knowledge management fully mediate this process.  相似文献   
10.
为了使各个设施的整体利用效果最佳, 结合空间位置影响力查询技术, 提出了基于RKNN的选址算法。针对空间对象对空间位置的贡献具有多重性, 建立了一种新的空间位置影响力的度量模型, 该模型更加符合实际应用情况; 然后, 利用该模型计算选址方案中各个设施的影响力, 并引入均衡系数评价选址方案的合理性, 均衡系数越小, 方案越合理。实际应用表明基于RKNN的选址算法使村镇基础设施的选址更加合理、有效。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号