全文获取类型
收费全文 | 4845篇 |
免费 | 359篇 |
国内免费 | 302篇 |
专业分类
电工技术 | 60篇 |
综合类 | 150篇 |
化学工业 | 151篇 |
金属工艺 | 72篇 |
机械仪表 | 315篇 |
建筑科学 | 620篇 |
矿业工程 | 33篇 |
能源动力 | 65篇 |
轻工业 | 56篇 |
水利工程 | 24篇 |
石油天然气 | 26篇 |
武器工业 | 15篇 |
无线电 | 576篇 |
一般工业技术 | 158篇 |
冶金工业 | 57篇 |
原子能技术 | 22篇 |
自动化技术 | 3106篇 |
出版年
2024年 | 12篇 |
2023年 | 133篇 |
2022年 | 123篇 |
2021年 | 147篇 |
2020年 | 306篇 |
2019年 | 241篇 |
2018年 | 212篇 |
2017年 | 222篇 |
2016年 | 260篇 |
2015年 | 265篇 |
2014年 | 478篇 |
2013年 | 392篇 |
2012年 | 400篇 |
2011年 | 411篇 |
2010年 | 204篇 |
2009年 | 200篇 |
2008年 | 197篇 |
2007年 | 187篇 |
2006年 | 217篇 |
2005年 | 178篇 |
2004年 | 149篇 |
2003年 | 124篇 |
2002年 | 103篇 |
2001年 | 72篇 |
2000年 | 42篇 |
1999年 | 43篇 |
1998年 | 22篇 |
1997年 | 32篇 |
1996年 | 22篇 |
1995年 | 17篇 |
1994年 | 14篇 |
1993年 | 11篇 |
1992年 | 4篇 |
1991年 | 2篇 |
1990年 | 4篇 |
1989年 | 4篇 |
1988年 | 3篇 |
1986年 | 6篇 |
1985年 | 8篇 |
1984年 | 3篇 |
1983年 | 6篇 |
1982年 | 3篇 |
1981年 | 7篇 |
1980年 | 7篇 |
1979年 | 2篇 |
1978年 | 3篇 |
1977年 | 3篇 |
1975年 | 1篇 |
1973年 | 1篇 |
1963年 | 1篇 |
排序方式: 共有5506条查询结果,搜索用时 171 毫秒
31.
对无线网络安全方面的问题和无线网络的特点进行了概述,分析了无线网络的入侵检测模型进行了分析,提出了一个分分布式的无线网络入侵检测系统模型,并给出了具体的拓扑结构设计,通过实验,证明这个入侵检测系统的设计和实现具有很好的安全性,其安全保障具有一定的实用性,值得推广。 相似文献
32.
《Displays》2021
The three-dimensional virtual scene can provide users with a visual three-dimensional virtual environment, with various multimedia channels such as sound, video, force feedback equipment, etc., to bring users a completely immersive interactive experience. This paper introduces 3D imaging and virtual reality technology in the film and television industry cloud exhibition, and develops a virtual display platform. First of all, this paper divides the registration into two processes: camera calibration and joint calibration of the camera and laser scanner based on the calibration results. Camera calibration can determine the plane model of the calibration board in the camera coordinate system, and the joint calibration uses the RANSAC algorithm to extract the point cloud of the plane model of the calibration board, and then optimizes the distance between the points in the plane model point cloud and the corresponding plane in the camera coordinate system Find the optimal transformation between the two sets of data, and then calculate the registration relationship between the point cloud and the image. Secondly, this article conducts a demand analysis of the film and television industry cloud exhibition platform based on virtual reality technology, including the business goals set by the platform, platform system analysis, overall design, and system operating environment and configuration requirements. This model provides a feasible solution for the visual interaction of the cloud exhibition design of the film and television industry. 相似文献
33.
Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework is developed by means of a methodology based on a heuristic theory that incorporates knowledge generated by existing works as well as the experience of their implementation. The paper presents the design details of the framework, which consists of three stages: identification of data security requirements, management of data security risks and evaluation of data security performance in CCS. 相似文献
34.
35.
作为新型的劫持系统内核技术,Windows Bootkit具有较强的隐蔽性和免杀能力,引发了严峻的计算机安全问题。通过分析研究Windows Bootkit的实现方式,并结合可信计算检测原理,设计了一种基于可信计算技术的Windows Bootkit检测系统,应用结果表明,该系统能检测出各种形式的Windows Bootkit,可有效增强Windows操作系统下计算机的安全性。 相似文献
36.
关联规则是数据挖掘的重要方法。随着国内外云计算应用及研究的不断推进,云计算的安全性成为云计算的核心问题之一。通过进行用户的状态行为关联分析,提取信任信息,结合可信云的思想,提出一个云计算下基于信任的防御系统模型。 相似文献
37.
38.
Jack E. Pennington 《Applied Intelligence》1992,2(2):155-162
A popular conception of the evolution of remote manipulation is a progression from teleoperation to telerobotics and then to robotics. This is logical because in going from teleoperation to robotics there would appear to be a continuous decrease in manned workload, an increase in system complexity, and an increase in the amount of intelligence in the automated system. During the past 10 years NASA Langley Research Center (LaRC) has been involved in all three areas. The decision on which system is most suitable for a task depends not only on the task, but on the allocation of responsibility for intelligence or high level control. The operator may be responsible for all intelligence and control functions, they may be shared between the operator and the automated system, or they may be performed by an autonomous system. This paper discusses some of the experiences in each area in applications related to possible space tasks and some of the lessons learned. 相似文献
39.
云计算联盟的体系结构对云计算联盟的设计、实现和资源管理效率产生重要的影响。由于云计算联盟的构成和运行过程具有典型的复杂系统特性,基于涌现理论和复杂网络理论对云计算联盟的体系结构进行建模,提出了一种基于域和复杂网络理论的云计算联盟体系结构模型,并对该模型中资源的发布和发现机制进行了详细的研究。 相似文献
40.