全文获取类型
收费全文 | 20471篇 |
免费 | 2443篇 |
国内免费 | 1797篇 |
专业分类
电工技术 | 2169篇 |
技术理论 | 5篇 |
综合类 | 2097篇 |
化学工业 | 313篇 |
金属工艺 | 34篇 |
机械仪表 | 325篇 |
建筑科学 | 906篇 |
矿业工程 | 497篇 |
能源动力 | 328篇 |
轻工业 | 333篇 |
水利工程 | 400篇 |
石油天然气 | 150篇 |
武器工业 | 100篇 |
无线电 | 4372篇 |
一般工业技术 | 462篇 |
冶金工业 | 215篇 |
原子能技术 | 44篇 |
自动化技术 | 11961篇 |
出版年
2024年 | 52篇 |
2023年 | 243篇 |
2022年 | 450篇 |
2021年 | 622篇 |
2020年 | 642篇 |
2019年 | 461篇 |
2018年 | 403篇 |
2017年 | 549篇 |
2016年 | 618篇 |
2015年 | 710篇 |
2014年 | 1906篇 |
2013年 | 1445篇 |
2012年 | 1937篇 |
2011年 | 2110篇 |
2010年 | 1544篇 |
2009年 | 1564篇 |
2008年 | 1586篇 |
2007年 | 1730篇 |
2006年 | 1459篇 |
2005年 | 1224篇 |
2004年 | 952篇 |
2003年 | 844篇 |
2002年 | 508篇 |
2001年 | 351篇 |
2000年 | 253篇 |
1999年 | 133篇 |
1998年 | 86篇 |
1997年 | 53篇 |
1996年 | 48篇 |
1995年 | 29篇 |
1994年 | 27篇 |
1993年 | 16篇 |
1992年 | 19篇 |
1991年 | 11篇 |
1990年 | 9篇 |
1989年 | 9篇 |
1988年 | 6篇 |
1987年 | 5篇 |
1986年 | 5篇 |
1985年 | 23篇 |
1984年 | 20篇 |
1983年 | 16篇 |
1982年 | 12篇 |
1981年 | 5篇 |
1980年 | 3篇 |
1979年 | 3篇 |
1958年 | 1篇 |
1957年 | 1篇 |
1956年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
11.
Joanna Paliszkiewicz 《Journal of Computer Information Systems》2019,59(3):211-217
ABSTRACTThe purpose of this study was to examine the influence of trust variables (trust: competence, trust: benevolence, trust: integrity) on leadership regarding the organization’s information security policy (ISP) compliance. An instrument with four constructs was used to collect data from 474 non-management subjects from various organizations in the USA. Collected data were analyzed through multiple regression procedure. Results revealed that all trust variables (trust: competence, trust: benevolence, trust: integrity) were influential in predicting the leadership regarding the organization’s ISP compliance. The findings are discussed and implications for practice are outlined. Conclusion, limitations, and recommendations for future research are drawn. 相似文献
12.
在现有的时间银行系统中,时间币的发行功能和结算功能完全集中到一个中心节点上。这种极度中心化的功能结构,不仅存在容易发生中心节点单点失效、数据容易被篡改等信息安全问题,还存在着时间币的发行和流通缺乏透明度以及时间币的结算依赖中心化的结算机构等问题。针对这些问题,提出了一种基于区块链技术的解决方法。首先,将时间币的发行功能和结算功能从中心节点上分离出来;然后,利用具有分布式去中心化、集体维护和不可篡改等特性的区块链技术,将分离出来的发行功能逐步去中心化,将分离出来的结算功能去中心化,形成公益时间链(PWTB);最终,PWTB利用区块链技术以去中心化的方式将时间银行系统由单个节点维护账本变成由集体维护一个分布式的共享账本,使时间币的发行和流通公开透明,时间币的结算不依赖某个中心化的节点。安全分析表明所设计的PWTB能够实现安全的信息传输与存储,以及数据的共享。 相似文献
13.
针对我国水资源紧缺、水生态损害、水环境污染等相关水问题,以提升全民爱水惜水节水护水的意识和能力为目标,从水素养概念出发,通过扎根理论质性研究方法对公民水素养评价的表征因素进行筛选和提炼,最终得出包含水知识、水态度、水行为为主范畴的10个表征因素并运用解释结构模型(ISM)深入剖析各因素之间的内在联系。在此基础上建立了3级多层次递阶结构模型,进一步精确描述系统各要素两两之间的直接关系。结果表明:公民水素养评价的表征因素自上而下形成了表象层、中间层和根源层等3个层级,可直观、清晰地反映表征因素之间的递阶、层级关系;水态度在各表征因素中具有调节作用以及各表征因素之间存在内在逻辑关系。研究成果为提高公民水素养水平提供一定的科学依据和政策参考。 相似文献
14.
Host cardinality estimation is an important research field in network
management and network security. The host cardinality estimation algorithm based on
the linear estimator array is a common method. Existing algorithms do not take memory
footprint into account when selecting the number of estimators used by each host. This
paper analyzes the relationship between memory occupancy and estimation accuracy and
compares the effects of different parameters on algorithm accuracy. The cardinality
estimating algorithm is a kind of random algorithm, and there is a deviation between the
estimated results and the actual cardinalities. The deviation is affected by some
systematical factors, such as the random parameters inherent in linear estimator and the
random functions used to map a host to different linear estimators. These random factors
cannot be reduced by merging multiple estimators, and existing algorithms cannot
remove the deviation caused by such factors. In this paper, we regard the estimation
deviation as a random variable and proposed a sampling method, recorded as the linear
estimator array step sampling algorithm (L2S), to reduce the influence of the random
deviation. L2S improves the accuracy of the estimated cardinalities by evaluating and
remove the expected value of random deviation. The cardinality estimation algorithm
based on the estimator array is a computationally intensive algorithm, which takes a lot of
time when processing high-speed network data in a serial environment. To solve this
problem, a method is proposed to port the cardinality estimating algorithm based on the
estimator array to the Graphics Processing Unit (GPU). Experiments on real-world highspeed network traffic show that L2S can reduce the absolute bias by more than 22% on
average, and the extra time is less than 61 milliseconds on average. 相似文献
15.
分析了国内外物联网安全政策、技术、标准、产业等形势,重点强调了当前我国物联网发展中存在的安全风险,包括大连接环境下的设备风险、物联网网络本身安全风险以及物联网上承载的各类应用安全风险,提出了打造以密码为核心的物联网安全体系,加速新技术在物联网安全的应用,以新基建为契机建立物联网领域安全设备泛在化部署新体系,以多层次立体式理念确保物联网安全,呼吁供给侧需求侧建立安全协同新机制,共同促进物联网产业安全可持续发展。 相似文献
16.
17.
Miroslav Trnka Petr Hlavinka Mikhail A. Semenov 《Journal of the Royal Society Interface》2015,12(112)
Ways of increasing the production of wheat, the most widely grown cereal crop, will need to be found to meet the increasing demand caused by human population growth in the coming decades. This increase must occur despite the decrease in yield gains now being reported in some regions, increased price volatility and the expected increase in the frequency of adverse weather events that can reduce yields. However, if and how the frequency of adverse weather events will change over Europe, the most important wheat-growing area, has not yet been analysed. Here, we show that the accumulated probability of 11 adverse weather events with the potential to significantly reduce yield will increase markedly across all of Europe. We found that by the end of the century, the exposure of the key European wheat-growing areas, where most wheat production is currently concentrated, may increase more than twofold. However, if we consider the entire arable land area of Europe, a greater than threefold increase in risk was predicted. Therefore, shifting wheat production to new producing regions to reduce the risk might not be possible as the risk of adverse events beyond the key wheat-growing areas increases even more. Furthermore, we found a marked increase in wheat exposure to high temperatures, severe droughts and field inaccessibility compared with other types of adverse events. Our results also showed the limitations of some of the presently debated adaptation options and demonstrated the need for development of region-specific strategies. Other regions of the world could be affected by adverse weather events in the future in a way different from that considered here for Europe. This observation emphasizes the importance of conducting similar analyses for other major wheat regions. 相似文献
18.
《Energy Policy》2015
This article sounds the alarm that a significant build-out of efficient lighting and renewable energy technologies may be endangered by shortages of rare earths and rare earth permanent magnets. At the moment, China is the predominant supplier of both and its recent rare earth industrial policies combined with its own growing demand for rare earths have caused widespread concern. To diversify supplies, new mining—outside of China—is needed. But what many observers of the “rare earth problem” overlook is that China also dominates in (1) the processing of rare earths, particularly the less abundant heavy rare earths, and (2) the supply chains for permanent magnets. Heavy rare earths and permanent magnets are critical for many renewable energy technologies, and it will require decades to develop new non-Chinese deposits, processing capacity, and supply chains. This article clarifies several misconceptions, evaluates frequently proposed solutions, and urges policy makers outside of China to undertake measures to avert a crisis, such as greater support for research and development and for the cultivation of intellectual capital. 相似文献
19.
20.
随着大数据和云计算的技术的深入应用,人工智能时代的机器学习和深度学习更需要日益增长的数据,因此数据安全与隐私保护变得更加迫切。本文介绍人工智能的定义以及特征,探究数据安全和隐私保护现状,分析数据安全和隐私保护面临的诸多问题,并提出在人工智能时代对数据安全和隐私保护的措施。 相似文献