全文获取类型
收费全文 | 30061篇 |
免费 | 2425篇 |
国内免费 | 2473篇 |
专业分类
电工技术 | 883篇 |
技术理论 | 2篇 |
综合类 | 1674篇 |
化学工业 | 718篇 |
金属工艺 | 633篇 |
机械仪表 | 1765篇 |
建筑科学 | 707篇 |
矿业工程 | 421篇 |
能源动力 | 375篇 |
轻工业 | 298篇 |
水利工程 | 159篇 |
石油天然气 | 232篇 |
武器工业 | 161篇 |
无线电 | 3885篇 |
一般工业技术 | 1073篇 |
冶金工业 | 540篇 |
原子能技术 | 219篇 |
自动化技术 | 21214篇 |
出版年
2024年 | 23篇 |
2023年 | 203篇 |
2022年 | 467篇 |
2021年 | 647篇 |
2020年 | 578篇 |
2019年 | 379篇 |
2018年 | 463篇 |
2017年 | 575篇 |
2016年 | 654篇 |
2015年 | 799篇 |
2014年 | 1684篇 |
2013年 | 1444篇 |
2012年 | 1843篇 |
2011年 | 2818篇 |
2010年 | 1808篇 |
2009年 | 1611篇 |
2008年 | 1877篇 |
2007年 | 2183篇 |
2006年 | 1975篇 |
2005年 | 1878篇 |
2004年 | 1568篇 |
2003年 | 1590篇 |
2002年 | 1309篇 |
2001年 | 994篇 |
2000年 | 888篇 |
1999年 | 834篇 |
1998年 | 794篇 |
1997年 | 594篇 |
1996年 | 491篇 |
1995年 | 369篇 |
1994年 | 277篇 |
1993年 | 252篇 |
1992年 | 188篇 |
1991年 | 141篇 |
1990年 | 106篇 |
1989年 | 86篇 |
1988年 | 115篇 |
1987年 | 47篇 |
1986年 | 68篇 |
1985年 | 80篇 |
1984年 | 72篇 |
1983年 | 55篇 |
1982年 | 30篇 |
1981年 | 31篇 |
1980年 | 14篇 |
1979年 | 16篇 |
1978年 | 6篇 |
1977年 | 10篇 |
1976年 | 9篇 |
1972年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
提出在县市级广电宽带数据网络的建设过程中,要着眼业务发展,突出高扩展性,构建基于标准、扩展灵活的主干网,实现网络建设的可持续性发展,并结合实际,从核心设备、端口、中继带宽、网络业务4个方面对扩展能力进行了阐述. 相似文献
32.
M. J. O’Sullivan C. G. Walker M. L. O’Sullivan T. D. Thompson A. B. Philpott 《Telecommunication Systems》2006,33(4):353-376
The problem of designing fibre-optic networks for local-access telecommunications generates (at least) three non-trivial subproblems.
In the first of these subproblems one must determine how many fibre-optic cables (fibres) are required at either end of a
street. In the next subproblem a minimum-cost network must be designed to support the fibres. The network must also provide
distinct paths from either end of the street to the central exchange(s). Finally, the fibre-optic cables must be placed in
protective covers. These covers are available in a number of different sizes, allowing some flexibility when covering each
section of the network. In this paper we describe a dynamic programming (DP) formulation for finding a minimum-cost (protective)
covering for the network (the third of the subproblems). This problem is a generalised set covering problem with side constraints
and is further complicated by the introduction of fixed and variable welding costs. The DP formulation selects covers along
each arc (in the network), but cannot exactly model the fixed costs and so does not guarantee optimality. We also describe
an integer programming (IP) formulation for assessing the quality of the DP solutions. The cost of the networks constructed
by the IP model is less than those designed using the DP model, but the saving is not significant for the problems examined
(less than 0.1%). This indicates that the DP model will generally give very good solutions. Furthermore, as the problem dimensions
grow, DP gives significantly better solution times than IP. 相似文献
33.
Christian Stephan Bernd 《AEUE-International Journal of Electronics and Communications》2006,60(1):20-24
Security for ad hoc network environments has received a lot of attention as of today. Previous work has mainly been focussing on secure routing, fairness issues, and malicious node detection. However, the issue of introducing and conserving trust relationships has received considerably less attention. In this article, we present a scalable method for the use of public key certificates and their revocation in mobile ad hoc networks (MANETs). With the LKN-ad hoc security framework (LKN-ASF) a certificate management protocol has been introduced, bringing PKI technology to MANETs. In addition a performance analysis of two different revocation approaches for MANETs will be presented. 相似文献
34.
通过对广州市电视台综合信息平台网络系统的应用现状及安全风险进行分析,提出基于网络层、系统层、用户层和安全策略管理全方位的网络信息安全体系. 相似文献
35.
在介绍宽带无线移动发展趋势所采用的新技术的基础上,论述了宽带无线移动通信网络优化及相关发展策略的一些问题。 相似文献
36.
With the creation of a pattern recognition system for metal transfer mode, this article has collected five kinds of spectrum signals in gas metal arc welding (MIG, MAG and CO2) and take them as training samples. These samples have been pretreated by computer, several key characteristic parameters of the spectrum signal have been creatively extracted, and a corresponding recognition function and a minimum-distance-classifier have been constructed. The results show that the pattern recognition of several kinds of metal transfer modes for the metal gas arc welding can be done successfully, and relative important parameters in welding process, such as the frequency of droplet transfer and the approximate diameter of each droplet, can also be obtained. 相似文献
37.
阀门产品具有种类、规格多,应用面广的特点。采用产品结构树形式作为系统数据存放结构,用VB套装数据、图形软件,Solidworks软件进行实体造型及参数化设计,3DMAX软件进行渲染、动画,采用ACCESS软件作为产品数据库。根据产品数据模式,建立一个实用的阀门图形与数据的计算机管理系统,帮助用户正确使用阀门产品,为计算机辅助设计提供支持。 相似文献
38.
本文描述数据访问组件MDAC(Microsoft Data Access Components)的结构与编程接口,分析了MDAC缓冲区溢出安全漏洞的原因,最后阐述了最新MDAC2.8的安全特征. 相似文献
39.
随着信息技术的高速发展和网络信息量的飞速膨胀,同时应有的安全防范措施相对薄弱,因此,非法入侵、对数据进行篡改和窃听等事件时有发生。本文就保证信息安全阐述了网络安全的必要性,论述了网络防火墙安全技术的功能、主要技术、配置、安全措施和防火墙设计思路等。 相似文献
40.
Peter V. Sushko Alexander L. ShlugerKatsuro Hayashi Masahiro HiranoHideo Hosono 《Thin solid films》2003,445(2):161-167
Recently it has been discovered that a nano-porous main group oxide 12CaO·7Al2O3 (C12A7) can be converted from a wide-gap insulator to a good transparent conductor. Using ab initio modelling we explain good conductivity of this material by very small barriers for hopping of localised electrons between neighbouring positive cages. We show that optical absorption of C12A7 in infrared region and at energies higher than 2.7 eV is due to inter-cage and intra-cage electron transitions, respectively. The proposed mechanisms can be useful in further search for conducting transparent media. 相似文献