首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15271篇
  免费   1610篇
  国内免费   1054篇
电工技术   1504篇
技术理论   2篇
综合类   1554篇
化学工业   774篇
金属工艺   222篇
机械仪表   808篇
建筑科学   1547篇
矿业工程   665篇
能源动力   481篇
轻工业   469篇
水利工程   1455篇
石油天然气   519篇
武器工业   126篇
无线电   1788篇
一般工业技术   1100篇
冶金工业   726篇
原子能技术   398篇
自动化技术   3797篇
  2024年   46篇
  2023年   145篇
  2022年   320篇
  2021年   389篇
  2020年   460篇
  2019年   372篇
  2018年   351篇
  2017年   486篇
  2016年   620篇
  2015年   605篇
  2014年   1029篇
  2013年   1019篇
  2012年   1220篇
  2011年   1257篇
  2010年   941篇
  2009年   975篇
  2008年   952篇
  2007年   1045篇
  2006年   1015篇
  2005年   835篇
  2004年   648篇
  2003年   625篇
  2002年   499篇
  2001年   401篇
  2000年   329篇
  1999年   277篇
  1998年   168篇
  1997年   131篇
  1996年   114篇
  1995年   106篇
  1994年   111篇
  1993年   68篇
  1992年   67篇
  1991年   47篇
  1990年   23篇
  1989年   34篇
  1988年   25篇
  1987年   13篇
  1986年   16篇
  1985年   14篇
  1984年   13篇
  1983年   7篇
  1982年   6篇
  1980年   7篇
  1979年   8篇
  1966年   9篇
  1964年   20篇
  1962年   7篇
  1958年   6篇
  1955年   5篇
排序方式: 共有10000条查询结果,搜索用时 390 毫秒
1.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability.  相似文献   
2.
The charge sources, as well as the charging mechanism of the contact electrification (CE) of polymers, are still debatable. Since CE is accompanied by destruction, it is considered that “hard contacting” via ball milling can induce covalent bond scission and produce naked-activated-charge sources. Regarding “soft contacting” via nano-scale sliding, which does not induce covalent bond scission, a frontier-electron, “f-electron, of the naked-activated-charge source is crucial to electron transfer among the naked-activated-charge sources. Here, we configure naked-activated-charge-source models, naked-activated-mechano-anion, and naked-activated-mechano-cation, which are produced by mechanical energy induced heterogeneous covalent bond scission, as well as naked-activated-mechano-radicals that are produced by homogeneous covalent bond scission. Regarding “soft contacting” among naked-activated-charge sources in a vacuum, f-electron can be transferred from a donor to an acceptor if the energy level of the donor is higher than that of the acceptor. The net amount of the normalized transferred-f-electrons is obtained by adopting settings in which the average energy level of the naked-activated-charge sources (as the donors) is higher than that of the sources employed as acceptors. Thus, the surfaces comprising the donors and acceptors will exhibit positive and negative net surface charges, respectively. We conclude that net surface charges depend on the average energy level of naked-activated-charge sources. Further, we observe that the alignment of polyethylene (PE)-polyvinyl chloride (PVC)-polytetrafluoroethylene (PTFE) to the average energy level is identical to that of the triboelectric series.  相似文献   
3.
介绍了尿素装置中3起液位仪表失真案例,分析了故障现象和设备工况,确定失真原因,采取了相应的处理措施,解决了仪表故障。  相似文献   
4.
黄浦江为感潮河流,低潮位重现期的确定对黄浦江航道的设计具有重要意义。为了准确估计黄浦江低潮位的重现期,以黄浦江下游吴淞口站年最低潮位序列为例,在对样本进行三性审查的基础上,分别采用传统的数理统计方法和时变矩方法进行水文频率分析。结果表明:吴淞口站年最低潮位序列在1996年发生了变异;还现修正后的序列服从位置参数线性时变的GEV模型,低潮位存在缓慢的上升趋势;一致性条件下百年一遇低潮位约为0.261 m,在非一致性条件下其重现期增大为150 a。非一致性条件下的重现期增大说明黄浦江现有的航道设计标准偏安全,航道通航保证率提高。  相似文献   
5.
This paper examines what influences trust in mobile social commerce environment. Drawing on trust-based acceptance model (i.e. cognitive and emotional trust) and online review features (i.e. profile photo, linguistic style, and reported experience), we examine how these factors affect trust in mobile social commerce. Hypotheses were tested using survey data. The results of our model showed that there are significant influences of profile photo, reported experience, cognitive, and emotional trust towards trust in ms-commerce. This work contributes to existing literature by examining the roles of previous trust in mobile payments and online reviews on trust in mobile social commerce.  相似文献   
6.
In this study, we have proposed an automated classification approach to identify meaningful patterns in wind field data. Utilizing an extensive simulated wind database, we have demonstrated that the proposed approach can identify low‐level jets, near‐uniform profiles, and other patterns in a reliable manner. We have studied the dependence of these wind profile patterns on locations (eg, offshore vs onshore), seasons, and diurnal cycles. Furthermore, we have found that the probability distributions of some of the patterns depend on the underlying planetary boundary layer schemes in a significant way. The future potential of the proposed approach in wind resource assessment and, more generally, in mesoscale model parameterization improvement is touched upon in this paper.  相似文献   
7.
Risk allocation decisions are of critical importance in project management. The present study proposes an explanation for how risk allocation in a contract motivates a contractor to cooperate with a project owner. Theories of risk allocation and trust were used to motivate the research. Using a survey methodology, we collected data concerning 124 construction projects in China. We found that risk allocation influenced the contractor’s role behavior through the contractor’s feeling of being trusted but not the contractor’s trust in the owner. Feeling of being trusted partially mediated the effect of risk allocation on the contractor’s in-role (i.e., contractual) behavior and fully mediated the effect on extra-role behavior. The study introduces a social and psychological view of the impacts of risk allocation to the project and engineering management literature. We contribute to theory by arguing and demonstrating the mediating effect of trust on the relationship between risk allocation and contractor behavior. From a practical standpoint, we conclude that contractual risk allocation has a significant impact on building a trusting relationship between owners and contractors and that contractors who feel trusted perform both contractually mandated actions and actions external to the contract more diligently, resulting in the likelihood of improved outcomes for both parties.  相似文献   
8.
北斗三星无源定位技术   总被引:6,自引:2,他引:4  
介绍了北斗双星定位系统的特点、功能、系统组成和工作原理,说明了北斗有源定位方式在应用方面的局限性。针对北斗有源定位方式不能无线电静默,和人们对具有无线电隐蔽性的卫星定位的需求,详细介绍一种北斗三星无源定位技术:包括工作原理、实现方法、定位精度分析和目前达到的定位精度。阐述了北斗三星无源定位技术的优点和应用形势。  相似文献   
9.
文章介绍了3种宽带数字储频的基本结构,分析了宽带数字储频的一个重要指标——量化噪声,根据输出信号频谱的杂散电平比较了三种结构的优劣。  相似文献   
10.
以分析企业中层管理人员培训的现状为突破口,阐述了中层管理人员培训需求分析的思路和方法。在此基础上对培训内容进行整体设计,指出针对此类培训应采用的培训方式和评估方法。以期对企业中层管理人员的培训起到一些启发和借鉴作用。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号