全文获取类型
收费全文 | 50229篇 |
免费 | 4907篇 |
国内免费 | 3193篇 |
专业分类
电工技术 | 6431篇 |
技术理论 | 8篇 |
综合类 | 5319篇 |
化学工业 | 755篇 |
金属工艺 | 311篇 |
机械仪表 | 1727篇 |
建筑科学 | 1567篇 |
矿业工程 | 1087篇 |
能源动力 | 455篇 |
轻工业 | 607篇 |
水利工程 | 666篇 |
石油天然气 | 401篇 |
武器工业 | 450篇 |
无线电 | 15067篇 |
一般工业技术 | 1258篇 |
冶金工业 | 1041篇 |
原子能技术 | 118篇 |
自动化技术 | 21061篇 |
出版年
2024年 | 88篇 |
2023年 | 513篇 |
2022年 | 898篇 |
2021年 | 1280篇 |
2020年 | 1335篇 |
2019年 | 913篇 |
2018年 | 866篇 |
2017年 | 1226篇 |
2016年 | 1412篇 |
2015年 | 1798篇 |
2014年 | 3822篇 |
2013年 | 3030篇 |
2012年 | 4255篇 |
2011年 | 4452篇 |
2010年 | 3328篇 |
2009年 | 3206篇 |
2008年 | 3486篇 |
2007年 | 3842篇 |
2006年 | 3432篇 |
2005年 | 3058篇 |
2004年 | 2521篇 |
2003年 | 2433篇 |
2002年 | 1602篇 |
2001年 | 1274篇 |
2000年 | 938篇 |
1999年 | 731篇 |
1998年 | 462篇 |
1997年 | 405篇 |
1996年 | 363篇 |
1995年 | 296篇 |
1994年 | 238篇 |
1993年 | 140篇 |
1992年 | 102篇 |
1991年 | 58篇 |
1990年 | 44篇 |
1989年 | 57篇 |
1988年 | 39篇 |
1987年 | 15篇 |
1986年 | 18篇 |
1985年 | 38篇 |
1984年 | 42篇 |
1983年 | 27篇 |
1982年 | 34篇 |
1981年 | 17篇 |
1980年 | 13篇 |
1979年 | 17篇 |
1977年 | 14篇 |
1964年 | 13篇 |
1956年 | 13篇 |
1955年 | 14篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
One of the constant challenges faced by the Android community, when it comes to the safety of the end users, is the ability of applications to load code
dynamically. This mechanism may be used for both legitimate and malicious purposes. A particular problem is the fact that remote code is not analyzed
during the verification process because it doesn’t have to be present in the application package at the publishing time. Previous research has shown that
using this concept in an insecure way can cause serious consequences for the user and his device. Solving this problem has proved to be a big challenge
that many have tried to address in different ways. This paper deals with the problem of dynamic code loading on Android platform. For the purpose of this
paper, an application that demonstrates the abuse of the dynamic code loading concept has been developed and published in the Google Play Store. Also,
a proposal of the modified Android ecosystem that should address this problem and improve the security of the whole platform is given. 相似文献
22.
Lylia Alouache Nga Nguyen Makhlouf Aliouat Rachid Chelouah 《International Journal of Communication Systems》2020,33(15)
We propose in this paper a Hybrid Software‐Defined Networking‐based Geographical Routing Protocol (HSDN‐GRA) with a clustering approach. It takes into account three different criteria to select the best relay to send data: (1) the contact duration between vehicles, (2) the available load of each vehicle, (3) and the log of encountered communication errors embedded in each cluster head. The multi‐criteria strategy allows the selection of the most reliable vehicles by avoiding communication problems and ensuring connection availability. Once the hybrid control plane has found out the next eligible neighbor, the data plane will be in charge of dividing and sending data. To validate our approach, HSDN‐GRA has been modeled and implemented in JADE, a multi‐agent platform, to be compared to other multi‐agent based protocols. Simulation results show that HSDN‐GRA achieves good performance with respect to the average routing overhead, the packet drop rate, and the throughput. 相似文献
23.
针对宽带毫米波大规模MIMO系统信道估计精度低及实现复杂度较高的问题,在传统支撑检测方案的基础上提出一种基于Gauss-Seidel方法的串行支撑检测(GS-SSD)方案。该方案不使用共同支撑假设,参考串行干扰删除,将整体信道估计问题分解为一系列子问题,每个子问题仅考虑一个信道成分。同时,利用Gauss-Seidel方法近似高复杂度的矩阵求逆。仿真结果表明,相比于基于串行支撑检测(SSD)的方案, GS-SSD方案在将求逆复乘数降低一个数量级的同时可以取得接近SSD方案的信道估计性能。 相似文献
24.
Wei Zhou Qun Li Yi‐fan Zhu Hua He 《International Journal of Satellite Communications and Networking》2019,37(6):561-570
This study is extended to construct the network model, the node model, and the link model of complex communication network for satellite navigation system (CCN‐SNS) based on the hierarchical architecture. Firstly, a method called snapshots was proposed to describe the dynamic topology for CCN‐SNS; secondly, another method was put forward to model the different nodes of the CCN‐SNS; thirdly, the different links between every two different nodes were modeled. Therefore, based on the OPNET tools, a simulation for the CCN‐SNS, which contains the models that proposed earlier used to analyze the navigation accuracy and network transmission performance, was performed. 相似文献
25.
采用“区块链技术+不对称加密+生物识别+身份认证”应用模式,依托智能手机客户端设计与开发一套铁路旅客身份认证系统.基于Ethereum开发平台,应用truffle开发框架,实现铁路旅客身份认证系统智能合约的编写与部署.系统针对传统铁路身份认证模式的不足,将旅客身份数据分布式存储,弱化中心化服务器的压力,提升旅客身份数据的安全性和鲁棒性;进行生物信息认证确保旅客对身份信息的所有权;利用非对称加密技术在保护旅客隐私、实现实名制的前提下增强数据的透明性.基于区块链应用模式的铁路旅客身份认证系统能够让用户身份实现本地存储、信息摘要链上校验,实现铁路旅客身份信息数据访问的细粒度控制,保障铁路旅客身份信息安全,提升铁路旅客的乘车体验. 相似文献
26.
This study develops a crisis self‐efficacy index to provide a tool for crisis communication researchers and practitioners to understand behavioural aspects of crisis response better. Evaluations of public's crisis self‐efficacy using this index inform strategic message development to protect the public and minimize crisis damages by identifying the public/s most in need of self‐efficacy enhancing interventions. The index also provides practitioners a useful longitudinal index to evaluate progress in crisis preparedness programs and track changes in efficacy. A four‐stage survey index development process using structural equation modelling identifies four underlying constructs of crisis self‐efficacy: action, preventive, achievement and uncertainty management. 相似文献
27.
Mari Lee Mifsud 《Review of Communication》2019,19(2):77-93
ABSTRACTThis special issue of Review of Communication presents new offerings of the study of communication, forging present and future humanities. This Introduction engages the six essays in this special issue—which extend and intersect across categories of the humanistic study of communication: communication philosophy and ethics, rhetorical theory, history, pedagogy, criticism, and digital humanities—to explore their contributions in defense of the humanities. Taken together, these essays explore the study of communication as (1) a resource for inquiring and exchanging with concepts, practices, and embodiments of difference, the other, and the posthuman; (2) a means of examining the ontological, epistemological, technological, existential, performative, and ethical implications of our communicative being, our being constituted by symbolic action and mediated exchange in ever-present yet always variant material and affective environments, spaces, and places; (3) a discipline emerging from rhetoric, one of the original liberal arts, yet developing in transdisciplinary ways, transforming the binary of humanities and sciences; (4) a tool for decolonizing knowledge(s); (5) a tool for exploring, critiquing, engaging, and creating with the new media of our digital lives together; (6) a long-standing yet ever inventive method and mode for public humanities; and (7) a praxis of resistance. These essays bring to light what studying communication offers the humanities: a plural, public, reflexive, and ever inventive enterprise for examining being human together on this planet. 相似文献
28.
Meaning making by leadership in a crisis is required to reduce uncertainty. We used analytic criteria for meaning making suggested by crisis management literature to investigate public leaders’ quotations in news coverage of a health crisis. The quotations were examined in terms of the five frame functions, which include offering a credible explanation of what happened, offering guidance, instilling hope, showing empathy, and suggesting that leaders are in control. The Middle East respiratory syndrome outbreak in South Korea was examined. As a result, the most salient frame function identified was displaying they are in control of the emergency, followed by offering guidance and explaining what happened. The salience of leaders’ meaning making disappeared in coverage by a liberal newspaper. 相似文献
29.
To solve the problem of complex,cumbersome and error-prone configuration of security devices caused by the heterogeneous configuration modes in complex networks,a dynamic template-based scheme for translating and configuring policy was proposed.In detail,considering the code’s features,the code-based template for translating policies was constructed to configure the command line conversion,and the keyword comparison method was used to ensure the accuracy of policy configuration.Experiments show that the scalability and the accuracy of the proposed scheme. 相似文献
30.