首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   28201篇
  免费   2901篇
  国内免费   2363篇
电工技术   2305篇
技术理论   18篇
综合类   3165篇
化学工业   385篇
金属工艺   61篇
机械仪表   375篇
建筑科学   2107篇
矿业工程   626篇
能源动力   381篇
轻工业   477篇
水利工程   571篇
石油天然气   171篇
武器工业   103篇
无线电   4733篇
一般工业技术   932篇
冶金工业   3099篇
原子能技术   44篇
自动化技术   13912篇
  2024年   60篇
  2023年   336篇
  2022年   586篇
  2021年   865篇
  2020年   927篇
  2019年   728篇
  2018年   672篇
  2017年   837篇
  2016年   931篇
  2015年   1071篇
  2014年   2378篇
  2013年   2024篇
  2012年   2331篇
  2011年   2653篇
  2010年   2019篇
  2009年   2036篇
  2008年   2023篇
  2007年   2131篇
  2006年   1857篇
  2005年   1595篇
  2004年   1263篇
  2003年   1124篇
  2002年   745篇
  2001年   567篇
  2000年   320篇
  1999年   186篇
  1998年   104篇
  1997年   75篇
  1996年   54篇
  1995年   42篇
  1994年   45篇
  1993年   33篇
  1992年   36篇
  1990年   33篇
  1989年   27篇
  1988年   30篇
  1985年   37篇
  1984年   34篇
  1983年   28篇
  1982年   25篇
  1966年   26篇
  1965年   28篇
  1964年   56篇
  1963年   46篇
  1961年   43篇
  1959年   31篇
  1957年   33篇
  1956年   25篇
  1955年   46篇
  1954年   28篇
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
11.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved.  相似文献   
12.
Abstract

Recently, a literature has emerged using empirical techniques to study the evolution of international cities over many centuries; however, few studies examine long-run change within cities. Conventional models and concepts are not always appropriate and data issues make long-run neighbourhood analysis particularly problematic. This paper addresses some of these points. First, it discusses why the analysis of long-run urban change is important for modern urban policy and considers the most important concepts. Second, it constructs a novel data set at the micro level, which allows consistent comparisons of London neighbourhoods in 1881 and 2001. Third, the paper models some of the key factors that affected long-run change, including the role of housing. There is evidence that the relative social positions of local urban areas persist over time but, nevertheless, at fine spatial scales, local areas still exhibit change, arising from aggregate population dynamics, from advances in technology, and also from the effects of shocks, such as wars. In general, where small areas are considered, long-run changes are likely to be greater, because individuals are more mobile over short than long distances. Finally, the paper considers the implications for policy.  相似文献   
13.
本文对运营商信息安全集中管控架构演进和信息安全管控策略面临的问题进行了深入分析,提出了信息安全集中管控架构的演进方向建议及对信息安全监控策略工作优化的若干意见。  相似文献   
14.
The autonomic nervous system (ANS) plays a crucial role both in acute and chronic psychological stress eliciting changes in many local and systemic physiological and biochemical processes. Salivary secretion is also regulated by ANS. In this study, we explored salivary proteome changes produced in thirty-eight University students by a test stress, which simulated an oral exam. Students underwent a relaxation phase followed by the stress test during which an electrocardiogram was recorded. To evaluate the effect of an olfactory stimulus, half of the students were exposed to a pleasant odor diffused in the room throughout the whole session. Saliva samples were collected after the relaxation phase (T0) and the stress test (T1). State anxiety was also evaluated at T0 and T1. Salivary proteins were separated by two-dimensional electrophoresis, and patterns at different times were compared. Spots differentially expressed were trypsin digested and identified by mass spectrometry. Western blot analysis was used to validate proteomic results. Anxiety scores and heart rate changes indicated that the fake exam induced anxiety. Significant changes of α-amylase, polymeric immunoglobulin receptor (PIGR), and immunoglobulin α chain (IGHA) secretion were observed after the stress test was performed in the two conditions. Moreover, the presence of pleasant odor reduced the acute social stress affecting salivary proteome changes. Therefore, saliva proteomic analysis was a useful approach to evaluate the rapid responses associated to an acute stress test also highlighting known biomarkers.  相似文献   
15.
李原园  李云玲  何君 《水利学报》2021,52(11):1340-1346,1354
进入新发展阶段,中国水资源安全保障需要以“节水优先、空间均衡、系统治理、两手发力”治水思路为指导,厘清问题、研判趋势、优化对策,支撑新阶段水利高质量发展。本文在全面分析我国水资源安全保障存在的突出问题与面临形势基础上,阐述了新发展阶段中国水资源安全保障的基本思路与战略路径,从保证资源安全、构建国家水网、强化供水保障、建设美丽河湖、改善水环境质量等方面提出了战略对策和需要进一步回答的重大问题,以期为完善新发展阶段中国水资源安全保障战略,全面提高国家水资源安全保障能力提供有力支撑。  相似文献   
16.
肖凯  王蒙  唐新余  蒋同海 《计算机应用》2019,39(7):2156-2161
在现有的时间银行系统中,时间币的发行功能和结算功能完全集中到一个中心节点上。这种极度中心化的功能结构,不仅存在容易发生中心节点单点失效、数据容易被篡改等信息安全问题,还存在着时间币的发行和流通缺乏透明度以及时间币的结算依赖中心化的结算机构等问题。针对这些问题,提出了一种基于区块链技术的解决方法。首先,将时间币的发行功能和结算功能从中心节点上分离出来;然后,利用具有分布式去中心化、集体维护和不可篡改等特性的区块链技术,将分离出来的发行功能逐步去中心化,将分离出来的结算功能去中心化,形成公益时间链(PWTB);最终,PWTB利用区块链技术以去中心化的方式将时间银行系统由单个节点维护账本变成由集体维护一个分布式的共享账本,使时间币的发行和流通公开透明,时间币的结算不依赖某个中心化的节点。安全分析表明所设计的PWTB能够实现安全的信息传输与存储,以及数据的共享。  相似文献   
17.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。  相似文献   
18.
The need for feature selection and dimension reduction is felt as a fundamental step in security assessment of large power systems in which the number of features representing the state of power grids dramatically increases. These large amounts of attributes are not proper to be used for computational intelligence (CI) techniques as inputs, because it may lead to a time consuming procedure with insufficient results and they are not suitable for on-line purposes and updates.This paper proposes a combined method for an online voltage security assessment in which the dimension of the token data from phasor measurement units (PMUs) is reduced by principal component analysis (PCA). Then, the features with different stability indices are put into several categories and feature selection is done by correlation analysis in each category. These selected features are then given to decision trees (DTs) for classification and security assessment of power systems.The method is applied to 39-bus test system and a part of Iran power grid. It is seen from the results that the DTs with reduced data have simpler splitting rules, better performance in saving time, reasonable DT error and they are more suitable for constant updates.  相似文献   
19.
This paper examines what influences trust in mobile social commerce environment. Drawing on trust-based acceptance model (i.e. cognitive and emotional trust) and online review features (i.e. profile photo, linguistic style, and reported experience), we examine how these factors affect trust in mobile social commerce. Hypotheses were tested using survey data. The results of our model showed that there are significant influences of profile photo, reported experience, cognitive, and emotional trust towards trust in ms-commerce. This work contributes to existing literature by examining the roles of previous trust in mobile payments and online reviews on trust in mobile social commerce.  相似文献   
20.
随着大数据和云计算的技术的深入应用,人工智能时代的机器学习和深度学习更需要日益增长的数据,因此数据安全与隐私保护变得更加迫切。本文介绍人工智能的定义以及特征,探究数据安全和隐私保护现状,分析数据安全和隐私保护面临的诸多问题,并提出在人工智能时代对数据安全和隐私保护的措施。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号