首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   22237篇
  免费   2611篇
  国内免费   1848篇
电工技术   2241篇
技术理论   5篇
综合类   2255篇
化学工业   735篇
金属工艺   33篇
机械仪表   341篇
建筑科学   1149篇
矿业工程   507篇
能源动力   338篇
轻工业   367篇
水利工程   417篇
石油天然气   152篇
武器工业   366篇
无线电   4649篇
一般工业技术   526篇
冶金工业   298篇
原子能技术   49篇
自动化技术   12268篇
  2024年   52篇
  2023年   265篇
  2022年   508篇
  2021年   703篇
  2020年   693篇
  2019年   501篇
  2018年   443篇
  2017年   586篇
  2016年   666篇
  2015年   766篇
  2014年   2033篇
  2013年   1531篇
  2012年   2048篇
  2011年   2236篇
  2010年   1624篇
  2009年   1685篇
  2008年   1704篇
  2007年   1870篇
  2006年   1573篇
  2005年   1298篇
  2004年   1020篇
  2003年   878篇
  2002年   554篇
  2001年   378篇
  2000年   281篇
  1999年   161篇
  1998年   94篇
  1997年   61篇
  1996年   56篇
  1995年   40篇
  1994年   43篇
  1993年   32篇
  1992年   28篇
  1991年   28篇
  1990年   28篇
  1989年   19篇
  1988年   14篇
  1987年   10篇
  1986年   22篇
  1985年   29篇
  1984年   28篇
  1983年   17篇
  1982年   17篇
  1981年   10篇
  1979年   7篇
  1964年   5篇
  1962年   6篇
  1957年   4篇
  1956年   4篇
  1955年   6篇
排序方式: 共有10000条查询结果,搜索用时 22 毫秒
991.
Four principles are identified that account for most delusion formation. The most important of these is transference--transference to the world at large. The second is the defense against pseudohomosexual impulses as described by Freud (and generally misunderstood). The third is the learning within the family of bizarre meanings of concepts which are assumed erroneously to be the meanings other people use. The fourth is the need to have a more or less consistent understanding of one's life and experiences. Therapeutic implications are drawn. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
992.
In this paper, a new multimedia joint encryption and fingerprinting (JEF) scheme embedded into the advanced access content system (AACS) is proposed for multimedia transmission over networks. AACS is selected because it has been jointly developed by many famous companies and has been considered as the leading technology in content access control and multimedia distribution. In this framework, many attack points exist and can be exploited to defeat it. Furthermore, multiple attack points can be combined to form multi-point collusion attacks, which also endanger the proposed system. In this paper, we address the security concerns toward AACS-compatible JEF system in its entirety and propose solutions to cope with some security threats. The contributions of this paper include: (i) applying multimedia encryption at different points to resist some attacks points; (ii) proposing rewritable fingerprint embedding (RFE) to deal with some multi-point collusion attacks; (iii) designing a perceptual security spectrum metric (PSSM) to evaluate the degree of security when multiple encryptions are applied. The feasibility of the proposed AACS-compatible JEF method is further demonstrated through simulation results.  相似文献   
993.
论述了湖北省缺电是由于能源(煤、石油、天然气等)短缺造成的,而核电是安全、环保、经济的能源,要扭转湖北能源紧张的局面,必须加快核电站建设。  相似文献   
994.
We give a careful, fixed-size parameter analysis of a standard (Blum and Micali in SIAM J. Comput. 13(4):850–864, 1984; Goldreich and Levin in Proceedings of 21st ACM Symposium on Theory of Computing, pp. 25–32, 1989) way to form a pseudo-random generator from a one-way function and then pseudo-random functions from said generator (Goldreich et al. in J. Assoc. Comput. Mach. 33(4):792–807, 1986) While the analysis is done in the model of exact security, we improve known bounds also asymptotically when many bits are output each round and we find all auxiliary parameters efficiently, giving a uniform result. These optimizations makes the analysis effective even for security parameters/key-sizes supported by typical block ciphers and hash functions. This enables us to construct very practical pseudo-random generators with strong properties based on plausible assumptions.  相似文献   
995.
通过分析施工安全工作的现状,介绍了施工安全的必要性,从理论和技术方面提出了整改意见和加强措施,对确保施工安全和提高施工效益有指导和借鉴作用。  相似文献   
996.
997.
Although the Internet may be beneficial to clinical practice, its potential for misuse cannot be overlooked. The current probe identified Internet Web sites that contained information that violated the test security of psychological assessment instruments. Five individuals, using multiple search engines, conducted Internet searches to evaluate samples of Web sites. Sites were classified into 1 of 3 levels according to the degree of threat they posed to test security. A small number (2-5%) appeared to be a direct threat to test security. The findings are discussed and recommendations for promoting more ethical use of the Internet are made. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
998.
The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, drought entropy was used to determine the weights of the three critical indices. Conventional simulation results regarding the risk load of water security during drought periods were often regarded as precise. However, neither the simulation process nor the DRI gives any consideration to uncertainties in drought events. Therefore, the Dempster-Shafer (D-S) evidence theory and the evidential reasoning algorithm were introduced, and the DRI values were calculated with consideration of uncertainties of the three indices. The drought entropy and evidential reasoning algorithm were used in a case study of the Haihe River Basin to assess water security risks during drought periods. The results of the new DRI values in two scenarios were compared and analyzed. It is shown that the values of the DRI in the D-S evidence algorithm increase slightly from the original results of Zhang et al. (2005), and the results of risk assessment of water security during drought periods are reasonable according to the situation in the study area. This study can serve as a reference for further practical application and planning in the Haihe River Basin, and other relevant or similar studies.  相似文献   
999.
某工程混凝土结构裂缝事故分析与处理   总被引:1,自引:1,他引:0  
王兴菊  赵然杭 《混凝土》2001,(10):56-58
近几年来,混凝土结构的持量问题普遍表现为裂缝问题,且有日趋增多的趋势,已严重影响了正常的工作和生产。本文介绍了某建筑物梁开裂的认识,检测情况,原因分析和处理情况,并由此对加强工程制裁量管理,提出了建议。  相似文献   
1000.
史贝贝  王超  王兴春 《兵工自动化》2008,27(1):31-32,45
确定防空兵优选战斗部署方案时需考虑抗击率、安全率、损失率及实施难度4个因素。由此建立未确知测度的防空兵战斗部署方案优选模型,其步骤包括确定单因素/多因素未确知测度,并采用置信度识别准则对有序分割类进行识别、排序与优选。实例证明,该模型是解决因素多、难量化,评估空间有序分割等问题的有效方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号