全文获取类型
收费全文 | 38047篇 |
免费 | 2731篇 |
国内免费 | 2048篇 |
专业分类
电工技术 | 4878篇 |
技术理论 | 5篇 |
综合类 | 3147篇 |
化学工业 | 1110篇 |
金属工艺 | 1224篇 |
机械仪表 | 4017篇 |
建筑科学 | 1144篇 |
矿业工程 | 1740篇 |
能源动力 | 511篇 |
轻工业 | 923篇 |
水利工程 | 625篇 |
石油天然气 | 358篇 |
武器工业 | 180篇 |
无线电 | 5331篇 |
一般工业技术 | 933篇 |
冶金工业 | 1134篇 |
原子能技术 | 97篇 |
自动化技术 | 15469篇 |
出版年
2024年 | 50篇 |
2023年 | 270篇 |
2022年 | 515篇 |
2021年 | 740篇 |
2020年 | 807篇 |
2019年 | 537篇 |
2018年 | 492篇 |
2017年 | 752篇 |
2016年 | 870篇 |
2015年 | 1030篇 |
2014年 | 2886篇 |
2013年 | 2048篇 |
2012年 | 3144篇 |
2011年 | 3658篇 |
2010年 | 3015篇 |
2009年 | 3204篇 |
2008年 | 2835篇 |
2007年 | 3225篇 |
2006年 | 3003篇 |
2005年 | 2453篇 |
2004年 | 1809篇 |
2003年 | 1836篇 |
2002年 | 1235篇 |
2001年 | 803篇 |
2000年 | 578篇 |
1999年 | 359篇 |
1998年 | 198篇 |
1997年 | 120篇 |
1996年 | 91篇 |
1995年 | 46篇 |
1994年 | 45篇 |
1993年 | 21篇 |
1992年 | 21篇 |
1991年 | 13篇 |
1990年 | 8篇 |
1989年 | 10篇 |
1988年 | 6篇 |
1987年 | 2篇 |
1986年 | 5篇 |
1985年 | 20篇 |
1984年 | 17篇 |
1983年 | 16篇 |
1982年 | 12篇 |
1981年 | 5篇 |
1980年 | 3篇 |
1979年 | 3篇 |
1958年 | 1篇 |
1957年 | 1篇 |
1956年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 78 毫秒
31.
针对配网柜体采用的传统机械锁具管理难度大、破解容易以及可追踪性差,无法满足现代电网快速发展的多样化需求等问题。该文研制了一种基于配电物联网架构的无源高可靠性智能电子锁。其内嵌安全芯片,采用近场通信(Near Field Communication,NFC)技术完成通信及取能,无需机械钥匙开锁,无需维护更换锁具电池,并配套开发了能够实时监测锁具状态、储存开锁信息的智能锁管理系统以及配合开锁APP使用的电子钥匙,分析了智能锁具的硬件设计及系统的应用流程。最后,通过实践应用表明,该套锁具系统在运维便捷、信息安全和科学管理方面具有明显效用。 相似文献
32.
Several three-party password authenticated key exchange (3-PAKE) protocols have recently been proposed for heterogeneous wireless sensor networks (HWSN). These are efficient and designed to address security concerns in ad-hoc sensor network applications for a global Internet of Things framework, where a user may request access to sensitive information collected by resource-constrained sensors in clusters managed by gateway nodes. In this paper we first analyze three recently proposed 3-PAKE protocols and discuss their vulnerabilities. Then, based on Radio Frequency Identification technologies we propose a novel 3-PAKE protocol for HWSN applications, with two extensions for additional security features, that is provably secure, efficient and flexible. 相似文献
33.
随着物联网(IoT)的快速发展,越来越多的IoT节点设备被部署,但伴随而来的安全问题也不可忽视。IoT的网络层节点设备主要通过无线传感网进行通信,其相较于互联网更开放也更容易受到拒绝服务等网络攻击。针对无线传感网面临的网络层安全问题,提出了一种基于序列模型的网络入侵检测系统,对网络层入侵进行检测和报警,具有较高的识别率以及较低的误报率。另外,针对无线传感网节点设备面临的节点主机设备的安全问题,在考虑节点开销的基础上,提出了一种基于简单序列模型的主机入侵检测系统。实验结果表明,针对无线传感网的网络层以及主机层的两个入侵检测系统的准确率都达到了99%以上,误报率在1%左右,达到了工业需求,这两个系统可以全面有效地保护无线传感网安全。 相似文献
34.
35.
张皓博 《重庆电力高等专科学校学报》2015,(3):5-6,17
以可编程控制器课程为例,介绍"任务驱动"教学法在教学过程中的具体应用,并探讨了实施过程中存在的问题与解决方法。 相似文献
36.
Nowadays, despite the ever increasing need of people for staying “connected” at any time and everywhere, in many areas of the world data connection is extremely expensive or even absent. The Global System for Mobile Communication (GSM) network virtually covers all the populated areas of the world and on average, the entire world population have a handheld device capable of accessing at least the GSM services. Therefore, it makes sense to consider the Short Message Service (SMS) as the most popular wireless data service for such devices. In this work, we exploit the SMS as mechanism for data transfer, especially in scenarios where there is no other network coverage than GSM, such as in rural areas and developing regions. In particular, we propose a framework, based on the SMS as transport facility, which enables secure end-to-end data communication in a ubiquitous and pervasive manner. Moreover, we investigated how, by using compression techniques, the overall processing and transmission efforts needed for secure data communication can be effectively reduced, with the obvious consequences also in terms of energy consumption on the involved devices. Finally, we successfully tested the effectiveness of the proposed framework within the context of a proof of concept implementation. 相似文献
37.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。 相似文献
38.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved. 相似文献
39.
李凡 《自动化技术与应用》2015,34(5)
本文根据攀钢发电厂除灰系统的控制性能要求,采用“上位机+PLC”组成的控制系统实现对除灰系统的控制.该控制系统具有抗干扰能力强、可靠性高、操作简便、扩展方便等优点. 相似文献
40.
The need for feature selection and dimension reduction is felt as a fundamental step in security assessment of large power systems in which the number of features representing the state of power grids dramatically increases. These large amounts of attributes are not proper to be used for computational intelligence (CI) techniques as inputs, because it may lead to a time consuming procedure with insufficient results and they are not suitable for on-line purposes and updates.This paper proposes a combined method for an online voltage security assessment in which the dimension of the token data from phasor measurement units (PMUs) is reduced by principal component analysis (PCA). Then, the features with different stability indices are put into several categories and feature selection is done by correlation analysis in each category. These selected features are then given to decision trees (DTs) for classification and security assessment of power systems.The method is applied to 39-bus test system and a part of Iran power grid. It is seen from the results that the DTs with reduced data have simpler splitting rules, better performance in saving time, reasonable DT error and they are more suitable for constant updates. 相似文献