全文获取类型
收费全文 | 34459篇 |
免费 | 3725篇 |
国内免费 | 3666篇 |
专业分类
电工技术 | 2737篇 |
技术理论 | 7篇 |
综合类 | 2894篇 |
化学工业 | 585篇 |
金属工艺 | 182篇 |
机械仪表 | 1027篇 |
建筑科学 | 1287篇 |
矿业工程 | 640篇 |
能源动力 | 463篇 |
轻工业 | 427篇 |
水利工程 | 506篇 |
石油天然气 | 242篇 |
武器工业 | 177篇 |
无线电 | 7291篇 |
一般工业技术 | 743篇 |
冶金工业 | 339篇 |
原子能技术 | 88篇 |
自动化技术 | 22215篇 |
出版年
2024年 | 130篇 |
2023年 | 429篇 |
2022年 | 863篇 |
2021年 | 1199篇 |
2020年 | 1139篇 |
2019年 | 821篇 |
2018年 | 736篇 |
2017年 | 864篇 |
2016年 | 953篇 |
2015年 | 1141篇 |
2014年 | 2660篇 |
2013年 | 2213篇 |
2012年 | 2927篇 |
2011年 | 3439篇 |
2010年 | 2431篇 |
2009年 | 2322篇 |
2008年 | 2503篇 |
2007年 | 2794篇 |
2006年 | 2483篇 |
2005年 | 2164篇 |
2004年 | 1718篇 |
2003年 | 1576篇 |
2002年 | 1128篇 |
2001年 | 765篇 |
2000年 | 629篇 |
1999年 | 474篇 |
1998年 | 323篇 |
1997年 | 235篇 |
1996年 | 176篇 |
1995年 | 118篇 |
1994年 | 99篇 |
1993年 | 74篇 |
1992年 | 55篇 |
1991年 | 29篇 |
1990年 | 30篇 |
1989年 | 30篇 |
1988年 | 26篇 |
1987年 | 9篇 |
1986年 | 18篇 |
1985年 | 25篇 |
1984年 | 30篇 |
1983年 | 24篇 |
1982年 | 18篇 |
1981年 | 8篇 |
1980年 | 5篇 |
1979年 | 4篇 |
1977年 | 2篇 |
1957年 | 1篇 |
1956年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved. 相似文献
2.
本文对运营商信息安全集中管控架构演进和信息安全管控策略面临的问题进行了深入分析,提出了信息安全集中管控架构的演进方向建议及对信息安全监控策略工作优化的若干意见。 相似文献
3.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。 相似文献
4.
Online configuration of large-scale systems such as networks requires parameter optimization within a limited amount of time, especially when configuration is needed as a response to recover from a failure in the system. To quickly configure such systems in an online manner, we propose a Probabilistic Trans-Algorithmic Search (PTAS) framework which leverages multiple optimization search algorithms in an iterative manner. PTAS applies a search algorithm to determine how to best distribute available experiment budget among multiple optimization search algorithms. It allocates an experiment budget to each available search algorithm and observes its performance on the system-at-hand. PTAS then probabilistically reallocates the experiment budget for the next round proportional to each algorithm’s performance relative to the rest of the algorithms. This “roulette wheel” approach probabilistically favors the more successful algorithm in the next round. Following each round, the PTAS framework “transfers” the best result(s) among the individual algorithms, making our framework a trans-algorithmic one. PTAS thus aims to systematize how to “search for the best search” and hybridize a set of search algorithms to attain a better search. We use three individual search algorithms, i.e., Recursive Random Search (RRS) (Ye and Kalyanaraman, 2004), Simulated Annealing (SA) (Laarhoven and Aarts, 1987), and Genetic Algorithm (GA) (Goldberg, 1989), and compare PTAS against the performance of RRS, GA, and SA. We show the performance of PTAS on well-known benchmark objective functions including scenarios where the objective function changes in the middle of the optimization process. To illustrate applicability of our framework to automated network management, we apply PTAS on the problem of optimizing link weights of an intra-domain routing protocol on three different topologies obtained from the Rocketfuel dataset. We also apply PTAS on the problem of optimizing aggregate throughput of a wireless ad hoc network by tuning datarates of traffic sources. Our experiments show that PTAS successfully picks the best performing algorithm, RRS or GA, and allocates the time wisely. Further, our results show that PTAS’ performance is not transient and steadily improves as more time is available for search. 相似文献
5.
Wireless Body Area Networks (WBANs) are envisaged to play crucial role in psychological, medical and non-medical applications. This paper presents iM-SIMPLE; a reliable, and power efficient routing protocol with high throughput for WBAN. We deploy sensor nodes on human body to measure the physiological parameters such as blood pressure, temperature, glucose, lactic acid, EMG, acceleration, pressure, and position. Data from sensors is forwarded to intermediate node, from where it is transmitted to sink. An end user can access the required information available at sink via internet. To minimize energy consumption of the network, we utilize multi-hop mode of communication. A cost function is introduced to select the forwarder; node with high residual energy and least distance to sink has minimum cost function value and is selected. Residual energy parameter balances the energy consumption among the sensor nodes, and least distance improves packet delivery to sink because of reduced less path loss. We formulate the minimum energy consumption and high throughput problems as an Integer Linear Program. In order to support mobility, we also consider two body postures. Simulation results confirm the performance advantage of iM-SIMPLE compared to contemporary schemes in terms of maximizing stability period and throughput of the network. 相似文献
6.
无源光网络(Passive Optical Network,PON)作为当今接入网的主要技术解决方案,具有带宽使用效率高、传输距离远、抗干扰能力强等特点.通过研究PON技术的发展动态,本文首先归纳了各种PON技术的产生背景和应用特点,整理出各技术间的连接关系及主要标准;其次介绍了PON技术的帧结构,并对带宽、波长、传输模式等PON技术的主要参数进行了汇总;然后将国内外研究热点进行划分,围绕媒体访问控制协议、帧结构、动态带宽分配算法、节能机制等关键技术,阐述了其研究现状及在PON中的重要作用;最后对PON技术的发展趋势进行了展望. 相似文献
7.
《Energy Policy》2015
This article sounds the alarm that a significant build-out of efficient lighting and renewable energy technologies may be endangered by shortages of rare earths and rare earth permanent magnets. At the moment, China is the predominant supplier of both and its recent rare earth industrial policies combined with its own growing demand for rare earths have caused widespread concern. To diversify supplies, new mining—outside of China—is needed. But what many observers of the “rare earth problem” overlook is that China also dominates in (1) the processing of rare earths, particularly the less abundant heavy rare earths, and (2) the supply chains for permanent magnets. Heavy rare earths and permanent magnets are critical for many renewable energy technologies, and it will require decades to develop new non-Chinese deposits, processing capacity, and supply chains. This article clarifies several misconceptions, evaluates frequently proposed solutions, and urges policy makers outside of China to undertake measures to avert a crisis, such as greater support for research and development and for the cultivation of intellectual capital. 相似文献
8.
The influence of network density on the strain hardening behaviour of amorphous polymers is studied. The network density of polystyrene is altered by blending with poly(2,6-dimethyl-1,4-phenylene-oxide) and by cross-linking during polymerisation. The network density is derived from the rubber-plateau modulus determined by dynamic mechanical thermal analysis. Subsequently uniaxial compression tests are performed to obtain the intrinsic deformation behaviour and, in particular, the strain hardening modulus. At room temperature, the strain hardening modulus proves to be proportional to the network density, irrespective of the nature of the network, i.e. physical entanglements or chemical cross-links. With increasing temperature, the strain hardening modulus is observed to decrease. This decrease appears to be related to the influence of thermal mobility of the chains, determined by the distance to the glass-transition temperature (T−Tg). 相似文献
9.
基于ISO/IEC17799标准建立了一个综合的信息系统风险分析框架,并运用模糊多准则决策(FMCDM)方法计算信息安全风险,根据风险等级矩阵(RLM)对信息资产风险进行级别划分,最终建立评估信息资产相关风险的完整模型。 相似文献
10.
主要对各国3G许可证与使用技术标准的抽绑政策.各国对2G/3G网络漫游的管制规定。以及3G网络之间共享的种类及实施方式等方面做了详尽的讲解,并进行比较和分析。 相似文献