首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   22237篇
  免费   2611篇
  国内免费   1848篇
电工技术   2241篇
技术理论   5篇
综合类   2255篇
化学工业   735篇
金属工艺   33篇
机械仪表   341篇
建筑科学   1149篇
矿业工程   507篇
能源动力   338篇
轻工业   367篇
水利工程   417篇
石油天然气   152篇
武器工业   366篇
无线电   4649篇
一般工业技术   526篇
冶金工业   298篇
原子能技术   49篇
自动化技术   12268篇
  2024年   52篇
  2023年   265篇
  2022年   508篇
  2021年   703篇
  2020年   693篇
  2019年   501篇
  2018年   443篇
  2017年   586篇
  2016年   666篇
  2015年   766篇
  2014年   2033篇
  2013年   1531篇
  2012年   2048篇
  2011年   2236篇
  2010年   1624篇
  2009年   1685篇
  2008年   1704篇
  2007年   1870篇
  2006年   1573篇
  2005年   1298篇
  2004年   1020篇
  2003年   878篇
  2002年   554篇
  2001年   378篇
  2000年   281篇
  1999年   161篇
  1998年   94篇
  1997年   61篇
  1996年   56篇
  1995年   40篇
  1994年   43篇
  1993年   32篇
  1992年   28篇
  1991年   28篇
  1990年   28篇
  1989年   19篇
  1988年   14篇
  1987年   10篇
  1986年   22篇
  1985年   29篇
  1984年   28篇
  1983年   17篇
  1982年   17篇
  1981年   10篇
  1979年   7篇
  1964年   5篇
  1962年   6篇
  1957年   4篇
  1956年   4篇
  1955年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
The need for feature selection and dimension reduction is felt as a fundamental step in security assessment of large power systems in which the number of features representing the state of power grids dramatically increases. These large amounts of attributes are not proper to be used for computational intelligence (CI) techniques as inputs, because it may lead to a time consuming procedure with insufficient results and they are not suitable for on-line purposes and updates.This paper proposes a combined method for an online voltage security assessment in which the dimension of the token data from phasor measurement units (PMUs) is reduced by principal component analysis (PCA). Then, the features with different stability indices are put into several categories and feature selection is done by correlation analysis in each category. These selected features are then given to decision trees (DTs) for classification and security assessment of power systems.The method is applied to 39-bus test system and a part of Iran power grid. It is seen from the results that the DTs with reduced data have simpler splitting rules, better performance in saving time, reasonable DT error and they are more suitable for constant updates.  相似文献   
32.
Nowadays, despite the ever increasing need of people for staying “connected” at any time and everywhere, in many areas of the world data connection is extremely expensive or even absent. The Global System for Mobile Communication (GSM) network virtually covers all the populated areas of the world and on average, the entire world population have a handheld device capable of accessing at least the GSM services. Therefore, it makes sense to consider the Short Message Service (SMS) as the most popular wireless data service for such devices. In this work, we exploit the SMS as mechanism for data transfer, especially in scenarios where there is no other network coverage than GSM, such as in rural areas and developing regions. In particular, we propose a framework, based on the SMS as transport facility, which enables secure end-to-end data communication in a ubiquitous and pervasive manner. Moreover, we investigated how, by using compression techniques, the overall processing and transmission efforts needed for secure data communication can be effectively reduced, with the obvious consequences also in terms of energy consumption on the involved devices. Finally, we successfully tested the effectiveness of the proposed framework within the context of a proof of concept implementation.  相似文献   
33.
Ways of increasing the production of wheat, the most widely grown cereal crop, will need to be found to meet the increasing demand caused by human population growth in the coming decades. This increase must occur despite the decrease in yield gains now being reported in some regions, increased price volatility and the expected increase in the frequency of adverse weather events that can reduce yields. However, if and how the frequency of adverse weather events will change over Europe, the most important wheat-growing area, has not yet been analysed. Here, we show that the accumulated probability of 11 adverse weather events with the potential to significantly reduce yield will increase markedly across all of Europe. We found that by the end of the century, the exposure of the key European wheat-growing areas, where most wheat production is currently concentrated, may increase more than twofold. However, if we consider the entire arable land area of Europe, a greater than threefold increase in risk was predicted. Therefore, shifting wheat production to new producing regions to reduce the risk might not be possible as the risk of adverse events beyond the key wheat-growing areas increases even more. Furthermore, we found a marked increase in wheat exposure to high temperatures, severe droughts and field inaccessibility compared with other types of adverse events. Our results also showed the limitations of some of the presently debated adaptation options and demonstrated the need for development of region-specific strategies. Other regions of the world could be affected by adverse weather events in the future in a way different from that considered here for Europe. This observation emphasizes the importance of conducting similar analyses for other major wheat regions.  相似文献   
34.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved.  相似文献   
35.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。  相似文献   
36.
李敏 《电子测试》2020,(10):91-93
一个完整枪支(弹药)库室的安全防范由管理要求、物防要求、技防要求及人防要求完美的结合而成,其中技防要求是需要根据枪支(弹药)库室现场实体情况采取的一项电子技术手段,是起到安全预报警的最佳方式。本文就枪支(弹药)库室安全防范在技防要求方面按现行GA 1016-2012标准在检测中存在的问题做一些探讨、建议,以期为需要枪支(弹药)库室的建设单位、施工单位提供参考。  相似文献   
37.
针对配网柜体采用的传统机械锁具管理难度大、破解容易以及可追踪性差,无法满足现代电网快速发展的多样化需求等问题。该文研制了一种基于配电物联网架构的无源高可靠性智能电子锁。其内嵌安全芯片,采用近场通信(Near Field Communication,NFC)技术完成通信及取能,无需机械钥匙开锁,无需维护更换锁具电池,并配套开发了能够实时监测锁具状态、储存开锁信息的智能锁管理系统以及配合开锁APP使用的电子钥匙,分析了智能锁具的硬件设计及系统的应用流程。最后,通过实践应用表明,该套锁具系统在运维便捷、信息安全和科学管理方面具有明显效用。  相似文献   
38.
由于我台倒班方式,造成了技术管理分散,不利于人才的培养和电台健康的发展。为进一步提高电台安全播出管理水平,推进电台的自动化建设,充分利用现代化手段,对中控机房进行了改造。新模式的成功实施,能极大地提高我台安全传输发射水平。  相似文献   
39.
For many of the developing world's poorest farmers and food-insecure people, roots, tubers, bananas and plantain crops (RTBs) serve as a critical source of food, nutrition and cash income. RTBs have been particularly important in areas where local agri-food systems are under stress. Under such circumstances, growers, processors and traders often see opportunities to improve food security or increase their incomes with those crops due to shifting tastes and preferences for food and non-food products. Since the early 1990s, cassava output surged in sub-Saharan Africa, while potato production expanded rapidly in Asia. RTBs are consumed by over three billion people in developing countries with a market value of US$ 339 billion. This paper analyses the major changes in production, utilisation and trade of RTBs over the last six decades, assesses estimates of their future trajectory and offers recommendations so that they might achieve their full potential.  相似文献   
40.
Emerging studies advocate that firms shall completely outsource their information security for cost and technical advantages. However, the risk of information leakage in outsourcing to managed security service providers (MSSPs) is overlooked and poses a confidentiality threat. We develop analytical models to describe several strategies for firms to consider when they decide to outsource to MSSPs. Based on our results, we suggest partial outsourcing as an alternative strategy when the firm faces information leakage risk. Besides, we suggest that in-house information security strategy is the optimal solution when the risk of being attacked is low regardless of the risk of information leakage. We then extend scenarios to the competitive environment where firms that are in the same market are highly likely to choose the same strategy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号