全文获取类型
收费全文 | 28201篇 |
免费 | 2901篇 |
国内免费 | 2363篇 |
专业分类
电工技术 | 2305篇 |
技术理论 | 18篇 |
综合类 | 3165篇 |
化学工业 | 385篇 |
金属工艺 | 61篇 |
机械仪表 | 375篇 |
建筑科学 | 2107篇 |
矿业工程 | 626篇 |
能源动力 | 381篇 |
轻工业 | 477篇 |
水利工程 | 571篇 |
石油天然气 | 171篇 |
武器工业 | 103篇 |
无线电 | 4733篇 |
一般工业技术 | 932篇 |
冶金工业 | 3099篇 |
原子能技术 | 44篇 |
自动化技术 | 13912篇 |
出版年
2024年 | 60篇 |
2023年 | 336篇 |
2022年 | 586篇 |
2021年 | 865篇 |
2020年 | 927篇 |
2019年 | 728篇 |
2018年 | 672篇 |
2017年 | 837篇 |
2016年 | 931篇 |
2015年 | 1071篇 |
2014年 | 2378篇 |
2013年 | 2024篇 |
2012年 | 2331篇 |
2011年 | 2653篇 |
2010年 | 2019篇 |
2009年 | 2036篇 |
2008年 | 2023篇 |
2007年 | 2131篇 |
2006年 | 1857篇 |
2005年 | 1595篇 |
2004年 | 1263篇 |
2003年 | 1124篇 |
2002年 | 745篇 |
2001年 | 567篇 |
2000年 | 320篇 |
1999年 | 186篇 |
1998年 | 104篇 |
1997年 | 75篇 |
1996年 | 54篇 |
1995年 | 42篇 |
1994年 | 45篇 |
1993年 | 33篇 |
1992年 | 36篇 |
1990年 | 33篇 |
1989年 | 27篇 |
1988年 | 30篇 |
1985年 | 37篇 |
1984年 | 34篇 |
1983年 | 28篇 |
1982年 | 25篇 |
1966年 | 26篇 |
1965年 | 28篇 |
1964年 | 56篇 |
1963年 | 46篇 |
1961年 | 43篇 |
1959年 | 31篇 |
1957年 | 33篇 |
1956年 | 25篇 |
1955年 | 46篇 |
1954年 | 28篇 |
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
11.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved. 相似文献
12.
AbstractRecently, a literature has emerged using empirical techniques to study the evolution of international cities over many centuries; however, few studies examine long-run change within cities. Conventional models and concepts are not always appropriate and data issues make long-run neighbourhood analysis particularly problematic. This paper addresses some of these points. First, it discusses why the analysis of long-run urban change is important for modern urban policy and considers the most important concepts. Second, it constructs a novel data set at the micro level, which allows consistent comparisons of London neighbourhoods in 1881 and 2001. Third, the paper models some of the key factors that affected long-run change, including the role of housing. There is evidence that the relative social positions of local urban areas persist over time but, nevertheless, at fine spatial scales, local areas still exhibit change, arising from aggregate population dynamics, from advances in technology, and also from the effects of shocks, such as wars. In general, where small areas are considered, long-run changes are likely to be greater, because individuals are more mobile over short than long distances. Finally, the paper considers the implications for policy. 相似文献
13.
本文对运营商信息安全集中管控架构演进和信息安全管控策略面临的问题进行了深入分析,提出了信息安全集中管控架构的演进方向建议及对信息安全监控策略工作优化的若干意见。 相似文献
14.
Lorenzo Zallocco Laura Giusti Maurizio Ronci Andrea Mussini Marco Trerotola Maria Rosa Mazzoni Antonio Lucacchini Laura Sebastiani 《International journal of molecular sciences》2021,22(9)
The autonomic nervous system (ANS) plays a crucial role both in acute and chronic psychological stress eliciting changes in many local and systemic physiological and biochemical processes. Salivary secretion is also regulated by ANS. In this study, we explored salivary proteome changes produced in thirty-eight University students by a test stress, which simulated an oral exam. Students underwent a relaxation phase followed by the stress test during which an electrocardiogram was recorded. To evaluate the effect of an olfactory stimulus, half of the students were exposed to a pleasant odor diffused in the room throughout the whole session. Saliva samples were collected after the relaxation phase (T0) and the stress test (T1). State anxiety was also evaluated at T0 and T1. Salivary proteins were separated by two-dimensional electrophoresis, and patterns at different times were compared. Spots differentially expressed were trypsin digested and identified by mass spectrometry. Western blot analysis was used to validate proteomic results. Anxiety scores and heart rate changes indicated that the fake exam induced anxiety. Significant changes of α-amylase, polymeric immunoglobulin receptor (PIGR), and immunoglobulin α chain (IGHA) secretion were observed after the stress test was performed in the two conditions. Moreover, the presence of pleasant odor reduced the acute social stress affecting salivary proteome changes. Therefore, saliva proteomic analysis was a useful approach to evaluate the rapid responses associated to an acute stress test also highlighting known biomarkers. 相似文献
15.
进入新发展阶段,中国水资源安全保障需要以“节水优先、空间均衡、系统治理、两手发力”治水思路为指导,厘清问题、研判趋势、优化对策,支撑新阶段水利高质量发展。本文在全面分析我国水资源安全保障存在的突出问题与面临形势基础上,阐述了新发展阶段中国水资源安全保障的基本思路与战略路径,从保证资源安全、构建国家水网、强化供水保障、建设美丽河湖、改善水环境质量等方面提出了战略对策和需要进一步回答的重大问题,以期为完善新发展阶段中国水资源安全保障战略,全面提高国家水资源安全保障能力提供有力支撑。 相似文献
16.
在现有的时间银行系统中,时间币的发行功能和结算功能完全集中到一个中心节点上。这种极度中心化的功能结构,不仅存在容易发生中心节点单点失效、数据容易被篡改等信息安全问题,还存在着时间币的发行和流通缺乏透明度以及时间币的结算依赖中心化的结算机构等问题。针对这些问题,提出了一种基于区块链技术的解决方法。首先,将时间币的发行功能和结算功能从中心节点上分离出来;然后,利用具有分布式去中心化、集体维护和不可篡改等特性的区块链技术,将分离出来的发行功能逐步去中心化,将分离出来的结算功能去中心化,形成公益时间链(PWTB);最终,PWTB利用区块链技术以去中心化的方式将时间银行系统由单个节点维护账本变成由集体维护一个分布式的共享账本,使时间币的发行和流通公开透明,时间币的结算不依赖某个中心化的节点。安全分析表明所设计的PWTB能够实现安全的信息传输与存储,以及数据的共享。 相似文献
17.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。 相似文献
18.
The need for feature selection and dimension reduction is felt as a fundamental step in security assessment of large power systems in which the number of features representing the state of power grids dramatically increases. These large amounts of attributes are not proper to be used for computational intelligence (CI) techniques as inputs, because it may lead to a time consuming procedure with insufficient results and they are not suitable for on-line purposes and updates.This paper proposes a combined method for an online voltage security assessment in which the dimension of the token data from phasor measurement units (PMUs) is reduced by principal component analysis (PCA). Then, the features with different stability indices are put into several categories and feature selection is done by correlation analysis in each category. These selected features are then given to decision trees (DTs) for classification and security assessment of power systems.The method is applied to 39-bus test system and a part of Iran power grid. It is seen from the results that the DTs with reduced data have simpler splitting rules, better performance in saving time, reasonable DT error and they are more suitable for constant updates. 相似文献
19.
Lai-Ying Leong Teck-Soon Hew Keng-Boon Ooi Alain Yee Loong Chong Voon-Hsien Lee 《Information & Management》2021,58(2):103416
This paper examines what influences trust in mobile social commerce environment. Drawing on trust-based acceptance model (i.e. cognitive and emotional trust) and online review features (i.e. profile photo, linguistic style, and reported experience), we examine how these factors affect trust in mobile social commerce. Hypotheses were tested using survey data. The results of our model showed that there are significant influences of profile photo, reported experience, cognitive, and emotional trust towards trust in ms-commerce. This work contributes to existing literature by examining the roles of previous trust in mobile payments and online reviews on trust in mobile social commerce. 相似文献
20.
随着大数据和云计算的技术的深入应用,人工智能时代的机器学习和深度学习更需要日益增长的数据,因此数据安全与隐私保护变得更加迫切。本文介绍人工智能的定义以及特征,探究数据安全和隐私保护现状,分析数据安全和隐私保护面临的诸多问题,并提出在人工智能时代对数据安全和隐私保护的措施。 相似文献