首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   38853篇
  免费   6833篇
  国内免费   4212篇
电工技术   2570篇
综合类   4485篇
化学工业   3317篇
金属工艺   1044篇
机械仪表   2697篇
建筑科学   3213篇
矿业工程   1236篇
能源动力   860篇
轻工业   1241篇
水利工程   1256篇
石油天然气   1792篇
武器工业   1016篇
无线电   5011篇
一般工业技术   2905篇
冶金工业   1957篇
原子能技术   281篇
自动化技术   15017篇
  2024年   313篇
  2023年   837篇
  2022年   1587篇
  2021年   1607篇
  2020年   1647篇
  2019年   1378篇
  2018年   1228篇
  2017年   1487篇
  2016年   1776篇
  2015年   1857篇
  2014年   2519篇
  2013年   2287篇
  2012年   2994篇
  2011年   3218篇
  2010年   2485篇
  2009年   2474篇
  2008年   2391篇
  2007年   2686篇
  2006年   2414篇
  2005年   1993篇
  2004年   1631篇
  2003年   1466篇
  2002年   1243篇
  2001年   1049篇
  2000年   856篇
  1999年   670篇
  1998年   487篇
  1997年   374篇
  1996年   330篇
  1995年   261篇
  1994年   214篇
  1993年   134篇
  1992年   126篇
  1991年   83篇
  1990年   108篇
  1989年   61篇
  1988年   48篇
  1987年   40篇
  1986年   39篇
  1985年   147篇
  1984年   243篇
  1983年   289篇
  1982年   202篇
  1981年   308篇
  1980年   116篇
  1979年   41篇
  1978年   39篇
  1977年   18篇
  1975年   24篇
  1974年   22篇
排序方式: 共有10000条查询结果,搜索用时 531 毫秒
1.
Small object detection is challenging and far from satisfactory. Most general object detectors suffer from two critical issues with small objects: (1) Feature extractor based on classification network cannot express the characteristics of small objects reasonably due to insufficient appearance information of targets and a large amount of background interference around them. (2) The detector requires a much higher location accuracy for small objects than for general objects. This paper proposes an effective and efficient small object detector YOLSO to address the above problems. For feature representation, we analyze the drawbacks in previous backbones and present a Half-Space Shortcut(HSSC) module to build a background-aware backbone. Furthermore, a coarse-to-fine Feature Pyramid Enhancement(FPE) module is introduced for layer-wise aggregation at a granular level to enhance the semantic discriminability. For loss function, we propose an exponential L1 loss to promote the convergence of regression, and a focal IOU loss to focus on prime samples with high classification confidence and high IOU. Both of them significantly improves the location accuracy of small objects. The proposed YOLSO sets state-of-the-art results on two typical small object datasets, MOCOD and VeDAI, at a speed of over 200 FPS. In the meantime, it also outperforms the baseline YOLOv3 by a wide margin on the common COCO dataset.  相似文献   
2.
On-site hydrogen production through steam-methane reforming (SMR) from city gas or natural gas is believed to be a cost-effective way for hydrogen-based infrastructure due to high cost of hydrogen transportation. In recent years, there have been a lot of on-site hydrogen fueling stations under design or construction in China. This study introduces current developments and technology prospects of skid-mounted SMR hydrogen generator. Also, technical solutions and economic analysis are discussed based on China's first on-site hydrogen fueling station project in Foshan. The cost of hydrogen product from skid-mounted SMR hydrogen generator is about 23 CNY/kg with 3.24 CNY/Nm3 natural gas. If hydrogen price is 60 CNY/kg, IRR of on-site hydrogen fueling station project reaches to 10.8%. While natural gas price fall to 2.3 CNY/Nm3, the hydrogen cost can be reduced to 18 CNY/kg, and IRR can be raised to 13.1%. The conclusion is that skid-mounted SMR technology has matured and is developing towards more compact and intelligent design, and will be a promising way for hydrogen fueling infrastructures in near future.  相似文献   
3.
针对传统的电弧电路故障检测结果不准确的问题,设计用于电弧检测的SoC系统,并且在55nm工艺下进行流片验证。采用包含两种结构的模数转换器的片上电压源,设计了锁相环以及复位电路,精度最高可达8.67 bit。验证结果表明,本设计可提高电弧检测的准确性。  相似文献   
4.
《Ceramics International》2022,48(21):31995-32000
Among the existing material family of the correlated oxides, the rare earth nickelates (ReNiO3) exhibit broadly adjustable metal to insulator transition (MIT) properties that enables correlated electronic applications, such as thermistors, thermochromics, and logical devices. Nevertheless, how to accurately control the critical temperature (TMIT) of ReNiO3 via the co-occupation of the rare-earth elements is yet worthy to be further explored. Herein, we demonstrate the non-linearity in adjusting the TMIT of ReNiO3 towards lower temperatures via introducing Pr co-occupation within ReNiO3 (e.g., PrxNd1-xNiO3 and PrxSm1-xNiO3) as synthesized by KCl molten-salt assisted high oxygen pressure reaction approach. Although the TMIT is effectively reduced via Pr substitution, it does not strictly follow a linear relationship, in particular, when there is large difference in the ionic radius of the co-occupation rare-earth elements. Furthermore, the most significant deviation in TMIT from the expected linear relationship appears at an equal co-occupation ratio of the two different rare-earth elements, while the abruption in the variation of resistivity across TMIT is also reduced. The present work highlights the importance to use adjacent rare-earth elements with co-occupation ratio away from 1:1 for achieving more linear adjustment in designing the metal to insulator transition properties for ReNiO3.  相似文献   
5.
Manufacturing companies not only strive to deliver flawless products but also monitor product failures in the field to identify potential quality issues. When product failures occur, quality engineers must identify the root cause to improve any affected product and process. This root-cause analysis can be supported by feature selection methods that identify relevant product attributes, such as manufacturing dates with an increased number of product failures. In this paper, we present different methods for feature selection and evaluate their ability to identify relevant product attributes in a root-cause analysis. First, we compile a list of feature selection methods. Then, we summarize the properties of product attributes in warranty case data and discuss these properties regarding the challenges they pose for machine learning algorithms. Next, we simulate datasets of warranty cases, which emulate these product properties. Finally, we compare the feature selection methods based on these simulated datasets. In the end, the univariate filter information gain is determined to be a suitable method for a wide range of applications. The comparison based on simulated data provides a more general result than other publications, which only focus on a single use case. Due to the generic nature of the simulated datasets, the results can be applied to various root-cause analysis processes in different quality management applications and provide a guideline for readers who wish to explore machine learning methods for their analysis of quality data.  相似文献   
6.
The effect of the emergency perception of bystanders of cyberbullying victims on helping behaviors is often neglected in research on cyberbullying. In this study, we explored the influence of this cognitive factor on cyber-bystanders’ helping tendencies as well as elucidated possible underlying processes. The results of two studies were reported. In Study 1, 150 undergraduates read a true case of a girl experiencing cyberbullying. The results indicated that when the participants perceived the victim’s situation to be more critical (i.e., higher emergency perception), their helping tendencies were stronger, partly through increased state empathy followed by feelings of responsibility to help. In Study 2, we randomly assigned 300 undergraduates to two groups. The low emergency group read the same cyberbullying case as Study 1, whereas the cyberbullying case read by the high emergency group contained additional emergency information of the victim. The results indicated that the high emergency group expressed stronger helping tendencies than did the low emergency group. This effect was caused by a stronger perception that the victim was in an emergency situation, which not only strengthened the participants’ helping tendencies directly but also indirectly through increasing their state empathy and feelings of responsibility to help.  相似文献   
7.
Cannabidiol (CBD), the major nonpsychoactive Cannabis constituent, has been proposed for the treatment of a wide panel of neurological and neuropsychiatric disorders, including anxiety, schizophrenia, epilepsy and drug addiction due to the ability of its versatile scaffold to interact with diverse molecular targets that are not restricted to the endocannabinoid system. Albeit the molecular mechanisms responsible for the therapeutic effects of CBD have yet to be fully elucidated, many efforts have been devoted in the last decades to shed light on its complex pharmacological profile. In particular, an ever-increasing number of molecular targets linked to those disorders have been identified for this phytocannabinoid, along with the modulatory effects of CBD on their cascade signaling. In this view, here we will try to provide a comprehensive and up-to-date overview of the molecular basis underlying the therapeutic effects of CBD involved in the treatment of neurological and neuropsychiatric disorders.  相似文献   
8.
Osteosarcoma (OS) is a rare condition with very poor prognosis in a metastatic setting. Basic research has enabled a better understanding of OS pathogenesis and the discovery of new potential therapeutic targets. Phase I and II clinical trials are already ongoing, with some promising results for these patients. This article reviews OS pathogenesis and new potential therapeutic targets.  相似文献   
9.
Xanthohumol (XH) is an important prenylated flavonoid that is found within the inflorescence of Humulus lupulus L. (Hop plant). XH is an important ingredient in beer and is considered a significant bioactive agent due to its diverse medicinal applications, which include anti-inflammatory, antimicrobial, antioxidant, immunomodulatory, antiviral, antifungal, antigenotoxic, antiangiogenic, and antimalarial effects as well as strong anticancer activity towards various types of cancer cells. XH acts as a wide ranging chemopreventive and anticancer agent, and its isomer, 8-prenylnaringenin, is a phytoestrogen with strong estrogenic activity. The present review focuses on the bioactivity of XH on various types of cancers and its pharmacokinetics. In this paper, we first highlight, in brief, the history and use of hops and then the chemistry and structure–activity relationship of XH. Lastly, we focus on its prominent effects and mechanisms of action on various cancers and its possible use in cancer prevention and treatment. Considering the limited number of available reviews on this subject, our goal is to provide a complete and detailed understanding of the anticancer effects of XH against different cancers.  相似文献   
10.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号