首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5130篇
  免费   149篇
  国内免费   318篇
工业技术   5597篇
  2024年   7篇
  2023年   34篇
  2022年   60篇
  2021年   57篇
  2020年   54篇
  2019年   30篇
  2018年   37篇
  2017年   63篇
  2016年   98篇
  2015年   94篇
  2014年   351篇
  2013年   248篇
  2012年   322篇
  2011年   564篇
  2010年   356篇
  2009年   291篇
  2008年   357篇
  2007年   482篇
  2006年   417篇
  2005年   422篇
  2004年   289篇
  2003年   278篇
  2002年   225篇
  2001年   148篇
  2000年   97篇
  1999年   42篇
  1998年   35篇
  1997年   20篇
  1996年   18篇
  1995年   14篇
  1994年   18篇
  1993年   12篇
  1992年   3篇
  1991年   3篇
  1990年   5篇
  1989年   1篇
  1988年   2篇
  1987年   3篇
  1986年   4篇
  1985年   7篇
  1984年   7篇
  1983年   12篇
  1982年   5篇
  1981年   1篇
  1977年   1篇
  1975年   1篇
  1966年   1篇
  1965年   1篇
排序方式: 共有5597条查询结果,搜索用时 15 毫秒
1.
Pc-WLEDs are considered to play a spectacular role in future generation light sources in view of their outstanding energy efficiency. In this regard, Eu3+ activated BaY2ZnO5 phosphor was prepared and investigated by XRD, PL and SEM analyses. Rietveld refinement analysis was carried out to confirm the structure of the synthesized phosphor. The prepared phosphor shows an intense red emission around 627 nm under excitation by near UV light. The 5D0-7F2 transition intensity of the prepared phosphor is three times higher compared to the commercial (Y,Gd)BO3:Eu3+ red phosphor. The CIE colour coordinates of BaY2ZnO5:Eu3+ (9mol%) phosphor corresponds to be (0.6169, 0.3742) and it has a high 97.9 % colour purity. The obtained results reveal the utility of BaY2ZnO5:Eu3+ phosphor as an efficient red component in WLEDs, anti-counterfeiting and fingerprint detection applications.  相似文献   
2.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
3.
The following work treat the prediction of the production rate and purity level of hydrogen produced by an alkaline electrolyzer fed by a renewable source in a hybrid energy system HES in the locality of Adrar in the south of Algeria. This work is made for different renewable energy penetration rate from 0% to 60% of conventional power (Genset generator). The cell electrolyzer model permits to predict the production rate of hydrogen with accuracy, according to operating parameters, climatic conditions and the load of the site of Adrar. The study permits to introduce a model of hydrogen purity level based on the operating parameters and the power supplying the alkaline electrolyzer. It also shows that the great influence of the intermittent energy supplying the electrolyzer on the production rate and purity level of hydrogen. The prediction of production rate and purity level by the models allow to obtain a distribution and storage of hydrogen produced according to predetermined selection criteria imposed by the operator.In the process of electrolysis, the oxygen is considered as by-product of the hydrogen production. The amount and purity level were estimated jointly.An HES-H2 production program under MATLAB®/SIMULINK® has been developed to simulate the hourly evolution of the production rate and purity level of hydrogen and oxygen produced by an electrolyzer for different penetration rate of renewable energies in an HES.  相似文献   
4.
Software updates are an important topic for increasingly software dependent and automated automotive systems. Besides ongoing technical developments, there are also regulatory requirements in development for such systems. We present here an overview of the automotive domain and the particular requirements on update systems, identify potentially suitable update frameworks and evaluate them based on automotive requirements. A focus is on a holistic view of requirements, considering safety, security, and availability.  相似文献   
5.
Recently, the Tactile Internet (TI) becomes a new era of the Internet. The TI provides ultra-reliable, ultra-responsive and intelligent network connectivity for delivering real-time control and physical haptic experiences from a remote location. The TI provides a different feeling to human–machine interaction by implementing the real-time interactive systems. In this review article, we discuss a generalized authentication model which can be used to perform authentication procedure among different communicating parties in order to secure remote surgery in the TI environment. By using the proposed authentication model, an authentication protocol can be designed so that an authenticated surgeon can use the robot/robotic arms to perform the surgery securely as well as remotely. Since the application is very critical, the important instructions provided by the surgeon to the robot/robotic arms must not be leaked in between the communication during the surgical procedure. To deal with this emerging research area, a secure mutual user authentication mechanism should be provided between a remote surgeon and the robot/robotic arms so that they can communicate securely using the established session key among them. Further, several security issues and challenges for such kind of communication are also discussed in this article. Finally, we discuss few points that need to be considered as future research works that are related to authentication for securing remote surgery in the TI environment.  相似文献   
6.
化石能源的利用弊端下能源安全问题日趋复杂化,成为全球共同的挑战。能源体系的清洁、低碳化转型是破解能源安全问题的关键,这主要是由于能源转型促进了三大转变,加强了能源安全:发展模式由资源依赖转向技术依赖,为共享的能源安全奠定了基础;能源生产由矿物开采转向装备制造,创造了新的经济机遇;能源消费进入电气化时代,保障了可持续能源安全。在此背景下,中国必须坚定能源转型的基本路线,正确把握能源安全的新形势,推动落实全球能源安全的“三大转变”,为国际社会,尤其是其他发展中国家提供必要的、可行的能源转型中国方案。  相似文献   
7.
张天红  姜彭  张超  李马  刘晨  吕苏环 《现代矿业》2018,34(9):177-179
针对深部矿山安全生产管理面临的一系列问题,结合《金属非金属矿山安全标准化规范地下矿山实施指南》(AQT 2050.2-2016)的要求,提出了从采场检测到远程控制的一体化解决方案,特别是针对矿山井下采场、穿脉道等区域的安全检测难点,提出了基于无线技术的检测思路,理论分析可行、实践应用前景较好。通过采用基于矿山物联网异构技术条件下的无线传感检测技术思路,构建了深部矿山一体化安全管理及控制平台体系,可有效满足深部矿山安全生产管理需求,推进智慧矿山建设进程。  相似文献   
8.
李荣先 《世界有色金属》2020,(3):114-114,116
随着社会的不断发展,矿产资源为我国带来了巨大的经济效益,并在社会经济发展中占有重要的地位。但在矿山资源开发的过程中,威胁人身安全的事故经常发生。因此,本文对探矿工程安全措施进行了研究和分析。  相似文献   
9.
As social media continues to transform firm–customer interactions, firms must leverage customer reactions to generate actionable insights, especially in contexts (e.g., crisis events) where customer reactions are critical. Using the justice theory, we categorize customer reactions of two firms, Home Depot and Target, during the time-frame of a security hack to understand key themes/topics. We then map the themes/topics to customer sentiments in those reactions. We found that customers associate justice with simple procedures than the experience of dealing with the firm. In addition, it is critical for firms to carefully assess and control customer sentiments on social media during crisis events.  相似文献   
10.
A directional control method (DCM) for power flows on a set of interface lines between two regions of power system considering static voltage stability margin is developed in this paper. A surface approximation approach is firstly used to obtain the relationship between the interface flow solution and the generation direction of generator (the portion of generation variation in each participating generator to satisfy the desired power increase on the interface and the system loss). Then, an optimization model is built to determine the optimum dispatching scheme of generators. This method not only can control the total power on the interface to satisfy the power demand but also can realize the directional control of power on each interface line based on the needs of operation. The proposed DCM is further extended to determine the optimum dispatching scheme of generators for maximizing the interface flow margin (IFM), which is the active power margin of the key transmission lines between two regions of power system constrained by static voltage stability. A modified continuation power flow (MCPF) is used to show and evaluate the impacts of the DCM on the IFM. The New England 39-bus system and the IEEE 300-bus system have been employed to verify the effectiveness of the DCM.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号