全文获取类型
收费全文 | 5871篇 |
免费 | 1131篇 |
国内免费 | 800篇 |
专业分类
电工技术 | 160篇 |
综合类 | 624篇 |
化学工业 | 209篇 |
金属工艺 | 79篇 |
机械仪表 | 71篇 |
建筑科学 | 181篇 |
矿业工程 | 52篇 |
能源动力 | 42篇 |
轻工业 | 13篇 |
水利工程 | 34篇 |
石油天然气 | 20篇 |
武器工业 | 376篇 |
无线电 | 2497篇 |
一般工业技术 | 221篇 |
冶金工业 | 46篇 |
原子能技术 | 13篇 |
自动化技术 | 3164篇 |
出版年
2024年 | 48篇 |
2023年 | 159篇 |
2022年 | 245篇 |
2021年 | 271篇 |
2020年 | 242篇 |
2019年 | 216篇 |
2018年 | 232篇 |
2017年 | 265篇 |
2016年 | 256篇 |
2015年 | 319篇 |
2014年 | 481篇 |
2013年 | 431篇 |
2012年 | 569篇 |
2011年 | 616篇 |
2010年 | 514篇 |
2009年 | 443篇 |
2008年 | 476篇 |
2007年 | 517篇 |
2006年 | 396篇 |
2005年 | 330篇 |
2004年 | 208篇 |
2003年 | 164篇 |
2002年 | 104篇 |
2001年 | 74篇 |
2000年 | 67篇 |
1999年 | 43篇 |
1998年 | 19篇 |
1997年 | 20篇 |
1996年 | 16篇 |
1995年 | 11篇 |
1994年 | 10篇 |
1993年 | 8篇 |
1992年 | 8篇 |
1991年 | 6篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1988年 | 5篇 |
1985年 | 1篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 2篇 |
排序方式: 共有7802条查询结果,搜索用时 15 毫秒
91.
雷达抗干扰性能评估指标分析与测试平台设计 总被引:1,自引:0,他引:1
复杂电磁环境下雷达抗干扰性能外场实验通常具有复杂度高、设备代价高昂的问题。通过分析雷达电磁环境组成和相关评估指标,在综合一系列雷达对抗想定的基础上,提出了雷达对抗性能测试系统设计方案。该系统利用高速DSP和ARM终端显示控制灵活实现雷达干扰样式选择和参数设置。有效地解决了雷达状态信息采集、回波信号实时模拟以及战场环境想定的显控终端控制。研究了多种性能评估指标的具体测试方法,分析了影响干扰效果的关键性因素。结合具体雷达设备进行了雷达抗干扰半实物仿真实验,实验和数据处理结果证明了测试方法的有效性和可行性。该方法为解决有限设备条件下雷达抗干扰性能评估、雷达系统改进提供了参考依据。 相似文献
92.
本文分析了当前IDC网络环境中存在的安全隐患及网络攻击的手段,针对IDC中心的网络实际情况,从理论上提出了网络安全设计的原则、安全防御的策略和措施,列举了解决网络安全问题的相关技术,探讨建立综合性的网络安全防御系统确保网络及信息的安全。 相似文献
93.
随着网络人数的不断增加,IPv6取代IPv4只是时间的问题,我们首先介绍了IPv6优于IPv4的特点,它之所以成为下一代网络发展的必然趋势的原因。其次介绍了在IPv6下,网络安全比现在存在哪些优势和技术,从而也带来了哪些新的安全隐患。最后我们举例说明在IPv6下如何实现网络入侵的流程。 相似文献
94.
As a practical extension of our previous work on certificateless threshold cryptosystem, this paper proposes the first direct certificateless threshold key encapsulation mechanism that inherits the same trust level of the original scheme and removes the length limitation of a traditional public key encryption. Security against threshold chosen-ciphertext attacks are proved in a random oracle model under a new assumption. It tolerates the Type I adversary that can replace public keys and the Type II adversary that has access to the system’s master key. The implied encapsulation scheme is very efficient when compared to the most efficient schemes in a traditional public key cryptosystem, and it is slightly more efficient in terms of key length and encapsulation speed when compared to the identity-based cryptosystems that have the same ciphertext overhead. Finally, we describe several potential modifications of our scheme. 相似文献
95.
Continuous wavelet analysis for the detection of green attack damage due to mountain pine beetle infestation 总被引:10,自引:0,他引:10
Mountain pine beetle (Dendroctonus ponderosae Hopkins) is the most destructive insect infesting mature pine forests in North America and has devastated millions of hectares of forest in western Canada. Past studies have demonstrated the use of multispectral imagery for remote identification and mapping of visible or red attack damage in forests. This study aims to detect pre-visual or green attack damage in lodgepole pine needles by means of hyperspectral measurements, particularly via continuous wavelet analysis. Field measurements of lodgepole pine stands were conducted at two sites located northwest of Edmonton, Alberta, Canada. In June and August of 2007, reflectance spectra (350-2500 nm) were collected for 16 pairs of trees. Each of the 16 tree pairs included one control tree (healthy), and one stressed tree (girdled to simulate the effects of beetle infestation). In addition, during the period of June through October 2008, spectra were collected from 15 pairs of control- and beetle-infested trees. Spectra derived from these 31 tree pairs were subjected to a continuous wavelet transform, generating a scalogram that compiles the wavelet power as a function of wavelength location and scale of decomposition. Linear relationships were then explored between the wavelet scalograms and chemical properties or class labels (control and non-control) of the sample populations in order to isolate the most useful distinguishing spectral features that related to infested or girdled trees vs. control trees.A deficit in water content is observed in infested trees while an additional deficit in chlorophyll content is seen for girdled trees. The measurable water deficit of infested and girdled tree samples was detectable from the wavelet analysis of the reflectance spectra providing a novel method for the detection of green attack. The spectral features distinguishing control and infested trees are predominantly located between 950 and 1390 nm from scales 1 to 8. Of those, five features between 1318 to 1322 nm at scale 7 are consistently found in the July and August 2008 datasets. These features are located at longer wavelengths than those investigated in previous studies (below 1100 nm) and provide new insights into the potential remote detection of green attack. Spectral features that distinguish control and girdled trees were mostly observed between 1550 and 2370 nm from scales 1 to 5. The differing response of girdled and infested trees appears to indicate that the girdling process does not provide a perfect simulation of the effects caused by beetle infestation.It remains to be determined if the location of the 1318-1322 nm features, near the edge of a strong atmospheric water absorption band, will be sufficiently separable for use in airborne detection of green attack. A plot comparing needle water content and wavelet power at 1320 nm reveals considerable overlap between data derived from both infested and control samples, though the groups are statistically separable. This obstacle may preclude a high accuracy separation of healthy and infected single individuals, but establishing threshold identification levels may provide an economical, efficient and expeditious method for discriminating between healthy and infested tree populations. 相似文献
96.
邱波 《网络安全技术与应用》2011,(12):29-31
本文通过对黑客起源及其文化的认识来分析黑客技术的发展,同时也针对当前一些主要的黑客攻击手段提出了防御的对策。 相似文献
97.
98.
构造一个具有最大代数免疫度的奇数元布尔函数等价于在某一已知矩阵中寻找一个可逆子矩阵。如何在这一矩阵中有效地寻找可逆子矩阵仍然是一个难题。针对上述问题研究矩阵的性质,简化矩阵的刻画方式,给出构造最大代数免疫度的奇数元布尔函数的构造方法。构造时只需对低维数的向量进行操作,避免了子矩阵可逆性的判断,能够有效地构造具有最大代数免疫度的奇数元布尔函数。 相似文献
99.
缓冲区溢出攻击是网络安全的重大威胁,事先检测是否存在Shellcode是对抗缓冲区溢出攻击的有效手段。从Shellcode构成和特征出发,分类研究各种Sheltcode静态检测技术,分析比较它们的优缺点,在此基础上提出了一种检测方案并实现了一个原型系统。 相似文献
100.
为更好地解决Web应用的安全问题,提出了基于Webdecoy的攻击行为特征提取模型.以具体的业务系统为基础,通过嵌入监控代码跟踪对业务系统的访问并获取探测攻击信息,并对获取信息进行归一化处理和属性划分,根据属性的动态比较得到攻击请求的相似性结构.最后对探测行为进行检测评估,对恶意行为给出报警,并通过实验结果验证了该模型的有效性. 相似文献