首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5133篇
  免费   149篇
  国内免费   318篇
工业技术   5600篇
  2024年   7篇
  2023年   34篇
  2022年   60篇
  2021年   57篇
  2020年   54篇
  2019年   30篇
  2018年   37篇
  2017年   63篇
  2016年   98篇
  2015年   94篇
  2014年   351篇
  2013年   248篇
  2012年   322篇
  2011年   564篇
  2010年   359篇
  2009年   291篇
  2008年   357篇
  2007年   482篇
  2006年   417篇
  2005年   422篇
  2004年   289篇
  2003年   278篇
  2002年   225篇
  2001年   148篇
  2000年   97篇
  1999年   42篇
  1998年   35篇
  1997年   20篇
  1996年   18篇
  1995年   14篇
  1994年   18篇
  1993年   12篇
  1992年   3篇
  1991年   3篇
  1990年   5篇
  1989年   1篇
  1988年   2篇
  1987年   3篇
  1986年   4篇
  1985年   7篇
  1984年   7篇
  1983年   12篇
  1982年   5篇
  1981年   1篇
  1977年   1篇
  1975年   1篇
  1966年   1篇
  1965年   1篇
排序方式: 共有5600条查询结果,搜索用时 15 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
2.
The ability to detect gun and gun held in hand or other body parts is a typical human skill. The same problem presents an imperative task for computer vision system. Automatic observer independent detection of hand held gun or gun held in the other body part, whether it is visible or concealed, provides enhance security in vulnerable places and initiates appropriate action there. Compare to the automatic object detection systems, automatic detection of gun has very few successful attempts. In the present scope of this paper, we present an extensive survey on automatic detection of gun and define a taxonomy for this particular detection system. We also describe the inherent difficulties related with this problem. In this survey of published papers, we examine different approaches used in state-of-the-art attempts and compare performances of these approaches. Finally, this paper concludes pointing to the possible research gaps in related fields.  相似文献   
3.
在广电总局和省局指示精神的指导下,江苏有线三网融合枢纽中心建成了省中心集中汇聚,分中心独立管控的三级安播监管体系。本文从建设目标,网络结构,系统组成等方面介绍了江苏有线安播监管系统,提出了“播监控三维一体”,“省市县三位一体”的省级全覆盖式安播监管体系解决方案。  相似文献   
4.
Pc-WLEDs are considered to play a spectacular role in future generation light sources in view of their outstanding energy efficiency. In this regard, Eu3+ activated BaY2ZnO5 phosphor was prepared and investigated by XRD, PL and SEM analyses. Rietveld refinement analysis was carried out to confirm the structure of the synthesized phosphor. The prepared phosphor shows an intense red emission around 627 nm under excitation by near UV light. The 5D0-7F2 transition intensity of the prepared phosphor is three times higher compared to the commercial (Y,Gd)BO3:Eu3+ red phosphor. The CIE colour coordinates of BaY2ZnO5:Eu3+ (9mol%) phosphor corresponds to be (0.6169, 0.3742) and it has a high 97.9 % colour purity. The obtained results reveal the utility of BaY2ZnO5:Eu3+ phosphor as an efficient red component in WLEDs, anti-counterfeiting and fingerprint detection applications.  相似文献   
5.
We conceptualized security-related stress (SRS) and proposed a theoretical model linking SRS, discrete emotions, coping response, and information security policy (ISP) compliance. We used an experience sampling design, wherein 138 professionals completed surveys. We observed that SRS had a positive association with frustration and fatigue, and these negative emotions were associated with neutralization of ISP violations. Additionally, frustration and fatigue make employees more likely to follow through on their rationalizations of ISP violations by decreased ISP compliance. Our findings provide evidence that neutralization is not a completely stable phenomenon but can vary within individuals from one time point to another.  相似文献   
6.
殷彦斌  张宏亮 《机械制造》2020,58(2):10-13,19
为了预防自动扶梯发生安全事故,设计了一种基于人工智能的自动扶梯智能安防系统。这一系统利用视频数据采集平台采集乘客数据,应用机器视觉及人工智能技术对乘客的姿态与行为进行主动识别,针对乘客的危险行为给出异常报警,在出现危险状态时触发声光报警器,控制自动扶梯减速或停止运行。这一系统通过有线或无线网络将数据传输至云平台,监管部门可基于手机客户端进行实时监控。特种设备监督管理部门、检验机构、维护保养单位、产权单位等可通过这一系统掌握自动扶梯运行状况。应用所设计的自动扶梯智能安防系统,可以显著提高自动扶梯安全事故预防水平和应急处理能力。  相似文献   
7.
Around the globe, intermittent renewable energies in the form of wind and solar power are on the rise. Their subsidization can be seen as a market intervention, which may deter optimal investment. Thus, this study tests the effect of renewable energies on investment in conventional electricity generation technologies. We estimate a dynamic investment model for 14 European economies for the period 2004–2016 and find a non-negligible negative impact of intermittent renewables on investment in peak-load capacity (mainly gas), while base-load (particularly coal) plants are unaffected. However, the production flexibility of gas-fired plants represents a particularly vital function to balance the supply intermittency of wind and solar. Thus, dispatchable conventional power plants are still necessary to back the system under scarcity events, such as unfavorable weather conditions during high electricity demand. Policymakers should be aware of the adverse effects of RES on investment in peak-load plants and may consider a redesign of the current system, for example by introducing capacity markets.  相似文献   
8.
Manufacturers of automated systems and their components have been allocating an enormous amount of time and effort in R&D activities, which led to the availability of prototypes demonstrating new capabilities as well as the introduction of such systems to the market within different domains. Manufacturers need to make sure that the systems function in the intended way and according to specifications. This is not a trivial task as system complexity rises dramatically the more integrated and interconnected these systems become with the addition of automated functionality and features to them. This effort translates into an overhead on the V&V (verification and validation) process making it time-consuming and costly. In this paper, we present VALU3S, an ECSEL JU (joint undertaking) project that aims to evaluate the state-of-the-art V&V methods and tools, and design a multi-domain framework to create a clear structure around the components and elements needed to conduct the V&V process. The main expected benefit of the framework is to reduce time and cost needed to verify and validate automated systems with respect to safety, cyber-security, and privacy requirements. This is done through identification and classification of evaluation methods, tools, environments and concepts for V&V of automated systems with respect to the mentioned requirements. VALU3S will provide guidelines to the V&V community including engineers and researchers on how the V&V of automated systems could be improved considering the cost, time and effort of conducting V&V processes. To this end, VALU3S brings together a consortium with partners from 10 different countries, amounting to a mix of 25 industrial partners, 6 leading research institutes, and 10 universities to reach the project goal.  相似文献   
9.
化石能源的利用弊端下能源安全问题日趋复杂化,成为全球共同的挑战。能源体系的清洁、低碳化转型是破解能源安全问题的关键,这主要是由于能源转型促进了三大转变,加强了能源安全:发展模式由资源依赖转向技术依赖,为共享的能源安全奠定了基础;能源生产由矿物开采转向装备制造,创造了新的经济机遇;能源消费进入电气化时代,保障了可持续能源安全。在此背景下,中国必须坚定能源转型的基本路线,正确把握能源安全的新形势,推动落实全球能源安全的“三大转变”,为国际社会,尤其是其他发展中国家提供必要的、可行的能源转型中国方案。  相似文献   
10.
李荣先 《世界有色金属》2020,(3):114-114,116
随着社会的不断发展,矿产资源为我国带来了巨大的经济效益,并在社会经济发展中占有重要的地位。但在矿山资源开发的过程中,威胁人身安全的事故经常发生。因此,本文对探矿工程安全措施进行了研究和分析。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号