全文获取类型
收费全文 | 72206篇 |
免费 | 7840篇 |
国内免费 | 6452篇 |
专业分类
电工技术 | 4730篇 |
技术理论 | 6篇 |
综合类 | 7712篇 |
化学工业 | 7912篇 |
金属工艺 | 4439篇 |
机械仪表 | 5930篇 |
建筑科学 | 4897篇 |
矿业工程 | 2873篇 |
能源动力 | 1523篇 |
轻工业 | 3360篇 |
水利工程 | 1488篇 |
石油天然气 | 3025篇 |
武器工业 | 763篇 |
无线电 | 9758篇 |
一般工业技术 | 5258篇 |
冶金工业 | 2011篇 |
原子能技术 | 315篇 |
自动化技术 | 20498篇 |
出版年
2024年 | 639篇 |
2023年 | 1735篇 |
2022年 | 3012篇 |
2021年 | 3172篇 |
2020年 | 2746篇 |
2019年 | 2122篇 |
2018年 | 1913篇 |
2017年 | 2248篇 |
2016年 | 2423篇 |
2015年 | 2587篇 |
2014年 | 4719篇 |
2013年 | 3937篇 |
2012年 | 5269篇 |
2011年 | 5758篇 |
2010年 | 4378篇 |
2009年 | 4670篇 |
2008年 | 4350篇 |
2007年 | 5258篇 |
2006年 | 4691篇 |
2005年 | 4000篇 |
2004年 | 3160篇 |
2003年 | 2941篇 |
2002年 | 2225篇 |
2001年 | 1751篇 |
2000年 | 1464篇 |
1999年 | 1087篇 |
1998年 | 861篇 |
1997年 | 642篇 |
1996年 | 556篇 |
1995年 | 465篇 |
1994年 | 407篇 |
1993年 | 263篇 |
1992年 | 201篇 |
1991年 | 187篇 |
1990年 | 131篇 |
1989年 | 107篇 |
1988年 | 88篇 |
1987年 | 38篇 |
1986年 | 36篇 |
1985年 | 52篇 |
1984年 | 39篇 |
1983年 | 32篇 |
1982年 | 29篇 |
1981年 | 19篇 |
1980年 | 27篇 |
1979年 | 12篇 |
1977年 | 5篇 |
1976年 | 7篇 |
1959年 | 5篇 |
1951年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
2.
3.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved. 相似文献
4.
本文对运营商信息安全集中管控架构演进和信息安全管控策略面临的问题进行了深入分析,提出了信息安全集中管控架构的演进方向建议及对信息安全监控策略工作优化的若干意见。 相似文献
5.
Computer-Supported Collaborative Learning (CSCL) is concerned with how Information and Communication Technology (ICT) might facilitate learning in groups which can be co-located or distributed over a network of computers such as Internet. CSCL supports effective learning by means of communication of ideas and information among learners, collaborative access of essential documents, and feedback from instructors and peers on learning activities. As the cloud technologies are increasingly becoming popular and collaborative learning is evolving, new directions for development of collaborative learning tools deployed on cloud are proposed. Development of such learning tools requires access to substantial data stored in the cloud. Ensuring efficient access to such data is hindered by the high latencies of wide-area networks underlying the cloud infrastructures. To improve learners’ experience by accelerating data access, important files can be replicated so a group of learners can access data from nearby locations. Since a cloud environment is highly dynamic, resource availability, network latency, and learner requests may change. In this paper, we present the advantages of collaborative learning and focus on the importance of data replication in the design of such a dynamic cloud-based system that a collaborative learning portal uses. To this end, we introduce a highly distributed replication technique that determines optimal data locations to improve access performance by minimizing replication overhead (access and update). The problem is formulated using dynamic programming. Experimental results demonstrate the usefulness of the proposed collaborative learning system used by institutions in geographically distributed locations. 相似文献
6.
Optimization of tool path planning using metaheuristic algorithms such as ant colony systems (ACS) and particle swarm optimization (PSO) provides a feasible approach to reduce geometrical machining errors in 5-axis flank machining of ruled surfaces. The optimal solutions of these algorithms exhibit an unsatisfactory quality in a high-dimensional search space. In this study, various algorithms derived from the electromagnetism-like mechanism (EM) were applied. The test results of representative surfaces showed that all EM-based methods yield more effective optimal solutions than does PSO, despite a longer search time. A new EM-MSS (electromagnetism-like mechanism with move solution screening) algorithm produces the most favorable results by ensuring the continuous improvement of new searches. Incorporating an SPSA (simultaneous perturbation stochastic approximation) technique further improves the search results with effective initial solutions. This work enhances the practical values of tool path planning by providing a satisfactory machining quality. 相似文献
7.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。 相似文献
8.
9.
The eutectic 80Au/20Sn solder alloy is widely used in high power electronics and optoelectronics packaging. In this study, low cycle fatigue behavior of a eutectic 80Au/20Sn solder alloy is reported. The 80Au/20Sn solder shows a quasi-static fracture characteristic at high strain rates, and then gradually transforms from a transgranular fracture (dominated by fatigue damage) to intergranular fracture (dominated by creep damage) at low strain rates with increasing temperature. Coffin-Manson and Morrow models are proposed to evaluate the low cycle fatigue behavior of the 80Au/20Sn solder. Besides, the 80Au/20Sn solder has enhanced fatigue resistance compared to the 63Sn/37Pb solder. 相似文献
10.
Flotation has been used in industry for more than a half century as the primary technique for upgrading phosphate. While the flotation of phosphate was inefficient when oleic acid was used alone as a collector, therefore a mixed collector of oleic acid (HOl), linoleic acid (LA) and linolenic acid (LNA) was employed to improve the recovery of phosphate flotation. The batch flotation results showed that the optimal composition of the mixed collector was 54 wt.% HOl, 36 wt.% LA and 10 wt.% LNA. Additionally, the effect of pH on the mixed collector application was studied while considering the surface tension, contact angle and micro-flotation. The results showed that the mixed collector should be used at a pH of 9.5. Above a pH of 9.5, the adsorption of fatty acids dimers on the apatite surface hindered phosphate flotation. The influence of the mixed collector assembly on apatite flotation was also investigated. It was demonstrated that due to its low critical micelle concentration, a sufficiently hydrophobic apatite surface could be generated at a collector concentration of 60 mg/L. In addition, zeta potential experiments suggested that collector adsorption was governed by chemisorption. FTIR and XPS spectra studies further indicated that the chemical reaction involved the carboxyl groups of fatty acids and Ca species at the apatite surface for each fatty acid in the mixed collector. 相似文献