全文获取类型
收费全文 | 73780篇 |
免费 | 9854篇 |
国内免费 | 3732篇 |
专业分类
电工技术 | 5272篇 |
技术理论 | 4篇 |
综合类 | 5173篇 |
化学工业 | 14747篇 |
金属工艺 | 4055篇 |
机械仪表 | 3792篇 |
建筑科学 | 7198篇 |
矿业工程 | 2273篇 |
能源动力 | 1939篇 |
轻工业 | 7558篇 |
水利工程 | 1512篇 |
石油天然气 | 2206篇 |
武器工业 | 543篇 |
无线电 | 6367篇 |
一般工业技术 | 8799篇 |
冶金工业 | 3821篇 |
原子能技术 | 687篇 |
自动化技术 | 11420篇 |
出版年
2024年 | 272篇 |
2023年 | 1451篇 |
2022年 | 2792篇 |
2021年 | 4738篇 |
2020年 | 2688篇 |
2019年 | 2535篇 |
2018年 | 2647篇 |
2017年 | 3341篇 |
2016年 | 4519篇 |
2015年 | 5028篇 |
2014年 | 5893篇 |
2013年 | 5594篇 |
2012年 | 4699篇 |
2011年 | 4089篇 |
2010年 | 3415篇 |
2009年 | 3422篇 |
2008年 | 3204篇 |
2007年 | 4523篇 |
2006年 | 4586篇 |
2005年 | 3830篇 |
2004年 | 2697篇 |
2003年 | 2481篇 |
2002年 | 1901篇 |
2001年 | 1344篇 |
2000年 | 1199篇 |
1999年 | 775篇 |
1998年 | 516篇 |
1997年 | 434篇 |
1996年 | 403篇 |
1995年 | 321篇 |
1994年 | 295篇 |
1993年 | 201篇 |
1992年 | 172篇 |
1991年 | 143篇 |
1990年 | 163篇 |
1989年 | 142篇 |
1988年 | 78篇 |
1987年 | 70篇 |
1986年 | 62篇 |
1985年 | 67篇 |
1984年 | 79篇 |
1983年 | 49篇 |
1982年 | 46篇 |
1981年 | 42篇 |
1980年 | 53篇 |
1966年 | 26篇 |
1965年 | 22篇 |
1964年 | 37篇 |
1962年 | 67篇 |
1955年 | 22篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
971.
祝永健 《网络安全技术与应用》2014,(10):119-120
随着科学技术的发展,网络技术在人们日常生活中占据着越来越重要的作用,带给人们生活和工作很大便利与益处,然而,与此同时由于网络的安全问题日益突出,威胁着人们的财产安全以及人身安全,比如数据遭窃、木马病毒或者黑客入侵等,这给计算机网络安全防御系统带来了极大的挑战.所以如何在网络大环境下做好网络安全防御工作,保障人民财产安全是一个亟待解决的问题,也是当前困扰互联网技术人员的一个首要问题.本文就从计算机网络所受到的安全威胁入手展开对这一问题的探讨. 相似文献
972.
S. Watanabe T. Fujita M. Sakamoto T. Kuramochi H. Kawahara 《Journal of the American Oil Chemists' Society》1993,70(9):927-929
A number of N,N′-diacylalkyldiamines were prepared from the reaction of acid chlorides with 1,8-diaminooctane and 1,12-diaminododecane
and screened for anti-rust properties and antimicrobial activity in spent coolants of water-based cutting fluids. Aqueous
solutions of N,N′-dihexanoyl-1,8-diaminooctane and N,N′-isobutyroyl-1,12-diaminododecane showed good anti-rust properties
for water-based cutting fluids. Aqueous emulsions of N,N′-dibutyroyl-, dipentanoyl-, dihexanoyl- and dioctanoyl-1,12-diaminododecane
showed good lubricities and antimicrobial activity for water-based cutting fluids. 相似文献
973.
李文超 《网络安全技术与应用》2014,(6):160-161
该文在分析网吧“零点断网”手工操作的复杂性和低效性基础上,提出并在华为S3xxx系列接入交换机实现了网吧“零点断网”自动控制策略,并分别以二层ACL和三层ACL作了说明。本法极大提高了“零点断网”的效率和精确性,具有极高的推广价值。 相似文献
974.
郑木德 《网络安全技术与应用》2014,(5):160-160
信息时代的网络给人们带来便利的同时,.也带来很多问题.尤其是个人信息安全受到严重的威胁.本文首先对计算机网络个人信息的安全问题进行分析,找出个人信息安全问题,并针对性的提出个人信息保护策略,以期让网络个人信息得到最大限度的保护. 相似文献
975.
《Journal of Visual Languages and Computing》2014,25(4):363-375
Objectives: OpenMusic (OM) is a domain-specific visual programming language designed for computer-aided music composition. This language based on Common Lisp allows composers to develop functional processes generating or transforming musical data, and to execute them locally by demand-driven evaluations. As most historical computer-aided composition environments, OM relies on a transformational declarative paradigm, which is hard to conciliate with reactive data-flow (an evaluation scheme more adequate to the development of interactive systems). We propose to link these two evaluation paradigms in the same and consistent visual programming framework.Methods: We establish a denotational semantics of the visual language, which gives account for its demand-driven evaluation mechanism and the incremental construction of programs. We then extend this semantics to enable reactive computations in the functional graphs.Results: The resulting language merges data-driven executions with the existing demand-driven mechanism. A conservative implementation is proposed.Conclusions: We show that the incremental construction of programs and their data-driven and demand-driven evaluations can be smoothly integrated in the visual programming workflow. This integration allows for the propagation of changes in the programs, and the evaluation of graphically designed functional expressions as a response to external events, a first step in bridging the gap between computer-assisted composition environments and real-time musical systems. 相似文献
976.
《Journal of Visual Languages and Computing》2014,25(6):850-857
New trust, reputation and recommendation (TRR) models are continuously proposed. However, the existing models lack shared bases and goals. For this reason, in this work we define an innovative meta model to facilitate the definition and standardization of a generic TRR model. Following the meta model, researchers in the field will be able to define standard models, compare them with other models and reuse parts of them. A standardization is also needed to determine which properties should be present in a TRR model.In accordance with the objectives we were seeking, following our meta model, we have defined a pre-standardized TRR model for e-commerce, identified the fundamental concepts and the main features that contribute to form trust and reputation in that domain, respected the dependence on the context/role of trust and reputation, aggregated only homogeneous trust information; listed and shown how to defend from the main malicious attacks. 相似文献
977.
In engineering, it is computationally prohibitive to directly employ costly models in optimization. Therefore, surrogate-based optimization is developed to replace the accurate models with cheap surrogates during optimization for efficiency. The two key issues of surrogate-based optimization are how to improve the surrogate accuracy by making the most of the available training samples, and how to sequentially augment the training set with certain infill strategy so as to gradually improve the surrogate accuracy and guarantee the convergence to the real global optimum of the accurate model. To address these two issues, a radial basis function neural network (RBFNN) based optimization method is proposed in this paper. First, a linear interpolation (LI) based RBFNN modelling method, LI-RBFNN, is developed, which can enhance the RBFNN accuracy by enforcing the gradient match between the surrogate and the trend observed from the training samples. Second, a hybrid infill strategy is proposed, which uses the surrogate prediction error based surrogate lower bound as the optimization objective to locate the promising region and meanwhile employs a linear interpolation-based sequential sampling approach to improve the surrogate accuracy globally. Finally, extensive tests are investigated and the effectiveness and efficiency of the proposed methods are demonstrated. 相似文献
978.
俞莎 《数字社区&智能家居》2014,(4):2221-2222,2235
随着校园网的日益发展,IPv6网络在我国数字化校园网中广泛部署,其安全问题也日益突出。基于我院数字化校园网庞大的实验环境,该文从分析IPV6数字化校园网的安全特点入手,对IPV6技术在我院数字化校园建设中体现的安全问题进行了分析,阐述了保证IPv6对解决我院数字化校园网安全实现的一些策略。 相似文献
979.
980.
The reduction of NO
x
with propene or propane in the presence of 1 or 4% O2 was studied at low conversions over a 7.4 wt% Cu-ZrO2 and a 3.2 wt% Cu-ZSM-5 catalyst. The rates of N2 production were compared in experiments using only NO or a mixture of NO and NO2 in the feed. They were also compared with the rates of NO2 reduction to NO under the same conditions, and of NO oxidation to NO2 in the absence of hydrocarbon. It was found that the reduction of NO2 to NO was very fast, consistent with literature data. The data were best explained by a reaction scheme in which the hydrocarbon was activated primarily by reaction with adsorbed NO2 to form an adsorbed oxidized N-containing hydrocarbon intermediate, the reaction of which with NO was the principal route to produce N2 under lean NO
x
conditions.On leave from State Key Laboratory of Catalysis, Dalian Institute of Chemical Physics, Chinese Academy of Sciences, Dalian 116023, PR China. 相似文献