首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   73780篇
  免费   9854篇
  国内免费   3732篇
电工技术   5272篇
技术理论   4篇
综合类   5173篇
化学工业   14747篇
金属工艺   4055篇
机械仪表   3792篇
建筑科学   7198篇
矿业工程   2273篇
能源动力   1939篇
轻工业   7558篇
水利工程   1512篇
石油天然气   2206篇
武器工业   543篇
无线电   6367篇
一般工业技术   8799篇
冶金工业   3821篇
原子能技术   687篇
自动化技术   11420篇
  2024年   272篇
  2023年   1451篇
  2022年   2792篇
  2021年   4738篇
  2020年   2688篇
  2019年   2535篇
  2018年   2647篇
  2017年   3341篇
  2016年   4519篇
  2015年   5028篇
  2014年   5893篇
  2013年   5594篇
  2012年   4699篇
  2011年   4089篇
  2010年   3415篇
  2009年   3422篇
  2008年   3204篇
  2007年   4523篇
  2006年   4586篇
  2005年   3830篇
  2004年   2697篇
  2003年   2481篇
  2002年   1901篇
  2001年   1344篇
  2000年   1199篇
  1999年   775篇
  1998年   516篇
  1997年   434篇
  1996年   403篇
  1995年   321篇
  1994年   295篇
  1993年   201篇
  1992年   172篇
  1991年   143篇
  1990年   163篇
  1989年   142篇
  1988年   78篇
  1987年   70篇
  1986年   62篇
  1985年   67篇
  1984年   79篇
  1983年   49篇
  1982年   46篇
  1981年   42篇
  1980年   53篇
  1966年   26篇
  1965年   22篇
  1964年   37篇
  1962年   67篇
  1955年   22篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
971.
随着科学技术的发展,网络技术在人们日常生活中占据着越来越重要的作用,带给人们生活和工作很大便利与益处,然而,与此同时由于网络的安全问题日益突出,威胁着人们的财产安全以及人身安全,比如数据遭窃、木马病毒或者黑客入侵等,这给计算机网络安全防御系统带来了极大的挑战.所以如何在网络大环境下做好网络安全防御工作,保障人民财产安全是一个亟待解决的问题,也是当前困扰互联网技术人员的一个首要问题.本文就从计算机网络所受到的安全威胁入手展开对这一问题的探讨.  相似文献   
972.
A number of N,N′-diacylalkyldiamines were prepared from the reaction of acid chlorides with 1,8-diaminooctane and 1,12-diaminododecane and screened for anti-rust properties and antimicrobial activity in spent coolants of water-based cutting fluids. Aqueous solutions of N,N′-dihexanoyl-1,8-diaminooctane and N,N′-isobutyroyl-1,12-diaminododecane showed good anti-rust properties for water-based cutting fluids. Aqueous emulsions of N,N′-dibutyroyl-, dipentanoyl-, dihexanoyl- and dioctanoyl-1,12-diaminododecane showed good lubricities and antimicrobial activity for water-based cutting fluids.  相似文献   
973.
该文在分析网吧“零点断网”手工操作的复杂性和低效性基础上,提出并在华为S3xxx系列接入交换机实现了网吧“零点断网”自动控制策略,并分别以二层ACL和三层ACL作了说明。本法极大提高了“零点断网”的效率和精确性,具有极高的推广价值。  相似文献   
974.
信息时代的网络给人们带来便利的同时,.也带来很多问题.尤其是个人信息安全受到严重的威胁.本文首先对计算机网络个人信息的安全问题进行分析,找出个人信息安全问题,并针对性的提出个人信息保护策略,以期让网络个人信息得到最大限度的保护.  相似文献   
975.
Objectives: OpenMusic (OM) is a domain-specific visual programming language designed for computer-aided music composition. This language based on Common Lisp allows composers to develop functional processes generating or transforming musical data, and to execute them locally by demand-driven evaluations. As most historical computer-aided composition environments, OM relies on a transformational declarative paradigm, which is hard to conciliate with reactive data-flow (an evaluation scheme more adequate to the development of interactive systems). We propose to link these two evaluation paradigms in the same and consistent visual programming framework.Methods: We establish a denotational semantics of the visual language, which gives account for its demand-driven evaluation mechanism and the incremental construction of programs. We then extend this semantics to enable reactive computations in the functional graphs.Results: The resulting language merges data-driven executions with the existing demand-driven mechanism. A conservative implementation is proposed.Conclusions: We show that the incremental construction of programs and their data-driven and demand-driven evaluations can be smoothly integrated in the visual programming workflow. This integration allows for the propagation of changes in the programs, and the evaluation of graphically designed functional expressions as a response to external events, a first step in bridging the gap between computer-assisted composition environments and real-time musical systems.  相似文献   
976.
New trust, reputation and recommendation (TRR) models are continuously proposed. However, the existing models lack shared bases and goals. For this reason, in this work we define an innovative meta model to facilitate the definition and standardization of a generic TRR model. Following the meta model, researchers in the field will be able to define standard models, compare them with other models and reuse parts of them. A standardization is also needed to determine which properties should be present in a TRR model.In accordance with the objectives we were seeking, following our meta model, we have defined a pre-standardized TRR model for e-commerce, identified the fundamental concepts and the main features that contribute to form trust and reputation in that domain, respected the dependence on the context/role of trust and reputation, aggregated only homogeneous trust information; listed and shown how to defend from the main malicious attacks.  相似文献   
977.
In engineering, it is computationally prohibitive to directly employ costly models in optimization. Therefore, surrogate-based optimization is developed to replace the accurate models with cheap surrogates during optimization for efficiency. The two key issues of surrogate-based optimization are how to improve the surrogate accuracy by making the most of the available training samples, and how to sequentially augment the training set with certain infill strategy so as to gradually improve the surrogate accuracy and guarantee the convergence to the real global optimum of the accurate model. To address these two issues, a radial basis function neural network (RBFNN) based optimization method is proposed in this paper. First, a linear interpolation (LI) based RBFNN modelling method, LI-RBFNN, is developed, which can enhance the RBFNN accuracy by enforcing the gradient match between the surrogate and the trend observed from the training samples. Second, a hybrid infill strategy is proposed, which uses the surrogate prediction error based surrogate lower bound as the optimization objective to locate the promising region and meanwhile employs a linear interpolation-based sequential sampling approach to improve the surrogate accuracy globally. Finally, extensive tests are investigated and the effectiveness and efficiency of the proposed methods are demonstrated.  相似文献   
978.
俞莎 《数字社区&智能家居》2014,(4):2221-2222,2235
随着校园网的日益发展,IPv6网络在我国数字化校园网中广泛部署,其安全问题也日益突出。基于我院数字化校园网庞大的实验环境,该文从分析IPV6数字化校园网的安全特点入手,对IPV6技术在我院数字化校园建设中体现的安全问题进行了分析,阐述了保证IPv6对解决我院数字化校园网安全实现的一些策略。  相似文献   
979.
为了应对加入WTO后我国成品油销售面临的竞争,提出以低成本战略、企业再造战略、品牌营销战略、服务营销战略作为提升成品油销售企业竞争力的重要策略。  相似文献   
980.
The reduction of NO x with propene or propane in the presence of 1 or 4% O2 was studied at low conversions over a 7.4 wt% Cu-ZrO2 and a 3.2 wt% Cu-ZSM-5 catalyst. The rates of N2 production were compared in experiments using only NO or a mixture of NO and NO2 in the feed. They were also compared with the rates of NO2 reduction to NO under the same conditions, and of NO oxidation to NO2 in the absence of hydrocarbon. It was found that the reduction of NO2 to NO was very fast, consistent with literature data. The data were best explained by a reaction scheme in which the hydrocarbon was activated primarily by reaction with adsorbed NO2 to form an adsorbed oxidized N-containing hydrocarbon intermediate, the reaction of which with NO was the principal route to produce N2 under lean NO x conditions.On leave from State Key Laboratory of Catalysis, Dalian Institute of Chemical Physics, Chinese Academy of Sciences, Dalian 116023, PR China.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号