首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   42543篇
  免费   5268篇
  国内免费   4112篇
工业技术   51923篇
  2024年   89篇
  2023年   600篇
  2022年   1015篇
  2021年   1205篇
  2020年   1280篇
  2019年   1198篇
  2018年   1225篇
  2017年   1439篇
  2016年   1517篇
  2015年   1603篇
  2014年   2374篇
  2013年   2620篇
  2012年   3053篇
  2011年   3238篇
  2010年   2516篇
  2009年   2686篇
  2008年   2830篇
  2007年   3189篇
  2006年   2828篇
  2005年   2520篇
  2004年   2120篇
  2003年   1768篇
  2002年   1448篇
  2001年   1211篇
  2000年   1046篇
  1999年   856篇
  1998年   683篇
  1997年   611篇
  1996年   551篇
  1995年   517篇
  1994年   427篇
  1993年   317篇
  1992年   272篇
  1991年   230篇
  1990年   207篇
  1989年   178篇
  1988年   117篇
  1987年   69篇
  1986年   37篇
  1985年   44篇
  1984年   30篇
  1983年   43篇
  1982年   32篇
  1981年   12篇
  1980年   15篇
  1979年   11篇
  1978年   6篇
  1977年   6篇
  1976年   9篇
  1975年   5篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
2.
3.
A recent development in tactile technology enables an improvement in the appreciation of the visual arts for people with visual impairment (PVI). The tactile sense, in conjunction with, or a possibly as an alternative to, the auditory sense, would allow PVIs to approach artwork in a more self‐driven and engaging way that would be difficult to achieve with just an auditory stimulus. Tactile colour pictograms (TCPs), which are raised geometric patterns, are ideographic characters that are designed to enable PVIs to identify colours and interpret information by touch. In this article, three TCPs are introduced to code colours in the Munsell colour system. Each colour pattern consists of a basic cell size of 10 mm × 10 mm to represent the patterns consistently in terms of regular shape. Each TCP consists of basic geometric patterns that are combined to create primary, secondary, and tertiary colour pictograms of shapes indicating colour hue, intensity and lightness. Each TCP represents 29 colours including six hues; they were then further expanded to represent 53 colours. Two of them did not increase the cell size, the other increased the cell size 1.5 times for some colours, such as yellow‐orange, yellow, blue, and blue‐purple. Our proposed TCPs use a slightly larger cell size compared to most tactile patterns currently used to indicate colour, but code for more colours. With user experience and identification tests, conducted with 23 visually impaired adults, the effectiveness of the TCPs suggests that they were helpful for the participants.  相似文献   
4.
5.
郭昊 《中国矿业》2021,30(S1):463-466
Riemann-Liouville分数阶微积分算子是一类带有一个函数的分数阶微积分算子的特殊情形,以Riemann-Liouville分数阶微积分算子的积分中值定理和微分中值定理为基础,我们得到了一类带有一个函数的分数阶微积分算子的积分中值定理和微分中值定理,并给出其在计算方面的一些应用。  相似文献   
6.
高性能集群的作业调度通常使用作业调度系统来实现,准确填写作业运行时间能在很大程度上提升作业调度效率。现有的研究通常使用机器学习的预测方式,在预测精度和实用性上还存在一定的提升空间。为了进一步提高集群作业运行时间预测的准确率,考虑先对集群作业日志进行聚类,将作业类别信息添加到作业特征中,再使用基于注意力机制的NR-Transformer网络对作业日志数据建模和预测。在数据处理上,根据与预测目标的相关性、特征的完整性和数据的有效性,从历史日志数据集中筛选出7维特征,并按作业运行时间的长度将其划分为多个作业集,再对各作业集分别进行训练和预测。实验结果表明,相比于传统机器学习和BP神经网络,时序神经网络结构有更好的预测性能,其中NR-Transformer在各作业集上都有较好的性能。  相似文献   
7.
磨矿动力学是描述被磨物料的磨碎速率与磨矿时间之间关系规律的一种数学模型,对分析物料在磨矿过程中的粒级及能量变化具有重要作用。为充分发挥磨矿动力学在磨矿过程中的作用,论文在分析国内外研究现状的基础上,系统介绍了两种典型的磨矿动力学模型:m阶磨矿动力学模型和磨矿总体平衡动力学模型,分析了模型中各参数的含义;以磨矿总体平衡动力学模型为重点,分析了破碎速率函数和破碎分布函数的求解方式,包括零阶产出率法、奥-勒理论简算法、卡普尔G-H算法以及经验公式法等;从物料性质、磨矿介质及配比、磨矿方式及参数、化学添加剂等几个方面分析了影响磨矿动力学模型的因素;指出了磨矿动力学模型在矿物加工工程领域的应用现状并对其未来的研究方向提出展望。研究表明磨矿动力学在矿物加工领域具有广泛而重要的应用,为进一步改善磨矿工艺提供了理论依据。  相似文献   
8.
The deterministic and probabilistic prediction of ship motion is important for safe navigation and stable real-time operational control of ships at sea. However, the volatility and randomness of ship motion, the non-adaptive nature of single predictors and the poor coverage of quantile regression pose serious challenges to uncertainty prediction, making research in this field limited. In this paper, a multi-predictor integration model based on hybrid data preprocessing, reinforcement learning and improved quantile regression neural network (QRNN) is proposed to explore the deterministic and probabilistic prediction of ship pitch motion. To validate the performance of the proposed multi-predictor integrated prediction model, an experimental study is conducted with three sets of actual ship longitudinal motions during sea trials in the South China Sea. The experimental results indicate that the root mean square errors (RMSEs) of the proposed model of deterministic prediction are 0.0254°, 0.0359°, and 0.0188°, respectively. Taking series #2 as an example, the prediction interval coverage probabilities (PICPs) of the proposed model of probability predictions at 90%, 95%, and 99% confidence levels (CLs) are 0.9400, 0.9800, and 1.0000, respectively. This study signifies that the proposed model can provide trusted deterministic predictions and can effectively quantify the uncertainty of ship pitch motion, which has the potential to provide practical support for ship early warning systems.  相似文献   
9.
In the present investigation, systematic grinding experiments were conducted in a laboratory ball mill to determine the breakage properties of low-grade PGE bearing chromite ore. The population balance modeling technique was used to study the breakage parameters such as primary breakage distribution (Bi, j) and the specific rates of breakage (Si). The breakage and selection function values were determined for six feed sizes. The results stated that the breakage follows the first-order grinding kinetics for all the feed sizes. It was observed that the coarser feed sizes exhibit higher selection function values than the finer feed size. Further, an artificial neural network was used to predict breakage characteristics of low-grade PGE bearing chromite ore. The predicted results obtained from the neural network modeling were close to the experimental results with a correlation of determination R2 = 0.99 for both product size and selection function.  相似文献   
10.
Evaluating the efficiency of healthcare services accurately can help in analyzing the rationality of inputs and outputs in such services. Considering the consistency and equity of assessment criteria, this study conducts the stochastic multicriteria acceptability analysis (SMAA-2) with a directional distance function to evaluate the efficiency of healthcare services in 31 provincial administrative regions of mainland China, as observed in 2018. We use SMAA-DDF to explore all the projection directions to the efficient frontier instead of a certain projection direction. We measure the maximum and average efficiencies for each of the 31 provincial healthcare services. Our empirical findings show that only seven provinces achieve optimal healthcare service efficiency; the eastern area performed the best, followed by the central, western, and northeast areas. Furthermore, the path along the projection directions is provided to help inefficient provinces improve their efficiency and obtain the best possible positions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号