全文获取类型
收费全文 | 84571篇 |
免费 | 5229篇 |
国内免费 | 3582篇 |
专业分类
电工技术 | 4416篇 |
技术理论 | 27篇 |
综合类 | 7070篇 |
化学工业 | 9570篇 |
金属工艺 | 3764篇 |
机械仪表 | 4883篇 |
建筑科学 | 10391篇 |
矿业工程 | 5211篇 |
能源动力 | 1979篇 |
轻工业 | 7689篇 |
水利工程 | 2082篇 |
石油天然气 | 3830篇 |
武器工业 | 2157篇 |
无线电 | 9548篇 |
一般工业技术 | 4104篇 |
冶金工业 | 3860篇 |
原子能技术 | 313篇 |
自动化技术 | 12488篇 |
出版年
2024年 | 118篇 |
2023年 | 761篇 |
2022年 | 1750篇 |
2021年 | 2234篇 |
2020年 | 2307篇 |
2019年 | 1344篇 |
2018年 | 1178篇 |
2017年 | 1878篇 |
2016年 | 2222篇 |
2015年 | 2571篇 |
2014年 | 6687篇 |
2013年 | 4622篇 |
2012年 | 6515篇 |
2011年 | 6862篇 |
2010年 | 5304篇 |
2009年 | 5438篇 |
2008年 | 4975篇 |
2007年 | 6035篇 |
2006年 | 5422篇 |
2005年 | 4724篇 |
2004年 | 4063篇 |
2003年 | 3622篇 |
2002年 | 2962篇 |
2001年 | 2437篇 |
2000年 | 1864篇 |
1999年 | 1430篇 |
1998年 | 952篇 |
1997年 | 699篇 |
1996年 | 583篇 |
1995年 | 472篇 |
1994年 | 334篇 |
1993年 | 245篇 |
1992年 | 183篇 |
1991年 | 130篇 |
1990年 | 115篇 |
1989年 | 82篇 |
1988年 | 61篇 |
1987年 | 33篇 |
1986年 | 38篇 |
1985年 | 24篇 |
1984年 | 25篇 |
1983年 | 11篇 |
1982年 | 12篇 |
1981年 | 13篇 |
1980年 | 13篇 |
1979年 | 6篇 |
1978年 | 3篇 |
1975年 | 3篇 |
1964年 | 3篇 |
1963年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved. 相似文献
22.
唐文军 《广东水利电力职业技术学院学报》2021,(1)
山西中部引黄工程24标西干29+089.4~29+278隧洞段地处煤层带,富含瓦斯、一氧化碳等有害气体,且围岩节理发育、变形严重。针对初期支护完成地段、掌子面及裸露洞段和IV类围岩地段提出瓦斯封堵专项施工方案。通过密切监测做好通风,并采用高分子材料马丽散对其注浆,可有效解决隧洞瓦斯封堵难题,为类似项目提供参考。 相似文献
23.
社会经济快速发展,科学技术不断进步,针对我国现代工业化工行业发展,所产生的新型化工技术应用,促进我国化工生产效率的提升。工业的发展不可避免地会带来污染物的产生,如果不能有效控制化工排放污染物,温室效应问题会更加严重。本文对绿色化工技术在精细化工中的有效应用进行研究,降低工业废气污染物排放量,维护生态环境平衡。 相似文献
24.
为了提升高校实验数据处理水平,高校实验室的相关建设工作已经步入正轨,但层出不穷的信息安全问题也向高校实验室计算机网络维护工作提出了新的挑战。文章从现阶段高校实验室计算机网络的相关建设工作出发,简要论述引发网络故障的具体原因,并对其诊断技术进行探讨。 相似文献
25.
本文结合HTH电路的复杂性等特征分析与实际应用现状,研究了HTH电路的具体检测技术方法并对当前热点技术进行对比分析,探讨了HTH电路检测方法的技术发展趋势。 相似文献
26.
本文对国内外的电视技术发展现状进行了充分的研究和分析,并对超高清电视系统的相关图像技术参数进行了分析和介绍。 相似文献
27.
带关键字搜索的公钥加密(PEKS)是一种有用的加密原语,它允许用户将在加密数据上搜索的功能委托给不可信的第三方服务器,而不影响原始数据的安全性和隐私性。但是,由于缺乏对于数据的加密以及解密能力,PEKS方案不能单独进行使用,必须与标准的公钥加密方案(PKE)相结合。因此,Baek等人在2006年引入了一种新的加密原语,称为结合PKE和PEKS的加密方案(PKE+PEKS),它同时提供了PKE和PEKS的功能。目前,已有文献提出了几种PKE+PEKS方案。然而,他们都没有考虑关键字猜测攻击的问题。本文提出一个新的高效且能够抵抗关键字猜测攻击的PKE+PEKS方案,与已有方案相比,该方案在性能上有很大的提升,并且在生成关键字和数据密文时,不需要使用双线性对,极大地降低了计算和存储成本。安全性分析表明,本文中所提出的方案能够满足密文隐私安全性、陷门不可区分性和抗关键字猜测攻击的安全性。效率分析表明,本分提出的方案更加高效。 相似文献
28.
Health information technology (IT) is a promising way to achieve safer medication management in the delivery of healthcare. However, human factors/ergonomics dictates that in order to make the complex, cognitive work of healthcare delivery safer, health IT must properly support human cognition. This means, for example, that new health IT must reduce, not increase, workload during safety-critical tasks. The present study was the first to quantitatively assess the short- and long-term impact of bar coded medication administration (BCMA) IT on nurses' mental workload as well as on perceived medication safety. One-hundred seventy registered nurses across 3 dissimilar clinical units at an academic, freestanding pediatric hospital in the Midwest US participated in surveys administered before, 3 months after, and 12 months after the hospital implemented BCMA. Nurses rated their external mental workload (interruptions, divided attention, being rushed) and internal mental workload (concentration, mental effort) during medication administration tasks as well as the likelihood of each of three medication safety events: medication administration errors, medication errors on the clinical unit, and clinical unit-level adverse drug events. Clinical unit differences were assessed. Findings generally confirmed the hypothesis that external but not internal mental workload was associated with the perceived likelihood of a medication safety event. Comparisons of mental workload from pre- to post-BCMA revealed statistically significant changes in the critical care unit only. Medication safety appeared to improve over the long term in the hematology/oncology unit only. In the critical care and medical/surgical units, medication safety exhibited short-term improvements that were eliminated over time. Changes in mental workload and medication safety, two classically microergonomic constructs, were deeply embedded in macroergonomic phenomena. These included the fit between the BCMA system and the nature of nursing work, the process of BCMA implementation, and BCMA interactions with concurrent changes occurring in the hospital. Findings raise questions about achieving sustainable performance improvement with health IT as well as the balance between micro- and macroergonomic approaches to studying technology change.Relevance to industryDesigners must consider how technology changes cognitive work, including mental workload. Hospitals and other implementers of technology must ensure that new technology fits its users, their tasks, and the context of use, which may entail tailoring implementation, for example, to specific clinical units. Evaluators must look over time to assess both changes in cognitive work and implementation issues. Healthcare practitioners must also recognize that new technology means a complex transformation to an already complex sociotechnical system, which calls for a macroergonomic approach to design and analysis. 相似文献
29.
Commercialization of technologies has attracted increasing attention over the past years due to its role in improving national competitiveness. Iran has not been an exception as the country's policy-makers have been actively engaged in crafting national policies to facilitate and promote commercialization of technologies. The popularity of the existing policies in this field, however, has not been properly researched. Our research, by following a survey study methodology, aims for the first time to address this gap. The study looks at popularity of governmental policies aimed at supporting commercialization of patented technologies in Iran, based on the careful study of 10 cases of successfully commercialized patented technologies in Iran. Our results indicate that the commercialization process of the studied patented technologies was very much affected by some company/technology-specific characteristics. The study shows that the two policy measures with the highest perceived popularity were the financial supports and the services offered by incubation centers. Our results also show that some of the existing supportive policy measures did not serve the intended purposes and some other measures need to be fine-tuned, as far as the studied cases are concerned, such as frequently held invention and innovation exhibitions and the government-supported media coverage. 相似文献
30.
通过对全县基层农技推广队伍的调整,分析了基层农技推广队伍的现状并找出现有的问题,进而有针对性地提出解决问题的办法。 相似文献