全文获取类型
收费全文 | 15813篇 |
免费 | 1186篇 |
国内免费 | 1076篇 |
专业分类
电工技术 | 616篇 |
技术理论 | 14篇 |
综合类 | 1863篇 |
化学工业 | 200篇 |
金属工艺 | 88篇 |
机械仪表 | 441篇 |
建筑科学 | 3087篇 |
矿业工程 | 209篇 |
能源动力 | 118篇 |
轻工业 | 241篇 |
水利工程 | 189篇 |
石油天然气 | 61篇 |
武器工业 | 32篇 |
无线电 | 3040篇 |
一般工业技术 | 812篇 |
冶金工业 | 627篇 |
原子能技术 | 32篇 |
自动化技术 | 6405篇 |
出版年
2024年 | 52篇 |
2023年 | 242篇 |
2022年 | 442篇 |
2021年 | 598篇 |
2020年 | 667篇 |
2019年 | 399篇 |
2018年 | 361篇 |
2017年 | 505篇 |
2016年 | 512篇 |
2015年 | 552篇 |
2014年 | 1240篇 |
2013年 | 1202篇 |
2012年 | 1187篇 |
2011年 | 1226篇 |
2010年 | 852篇 |
2009年 | 770篇 |
2008年 | 811篇 |
2007年 | 893篇 |
2006年 | 841篇 |
2005年 | 715篇 |
2004年 | 682篇 |
2003年 | 662篇 |
2002年 | 638篇 |
2001年 | 583篇 |
2000年 | 532篇 |
1999年 | 348篇 |
1998年 | 175篇 |
1997年 | 86篇 |
1996年 | 47篇 |
1995年 | 34篇 |
1994年 | 12篇 |
1993年 | 11篇 |
1992年 | 8篇 |
1991年 | 6篇 |
1990年 | 17篇 |
1989年 | 9篇 |
1988年 | 12篇 |
1985年 | 9篇 |
1984年 | 8篇 |
1983年 | 8篇 |
1982年 | 11篇 |
1981年 | 6篇 |
1964年 | 8篇 |
1963年 | 9篇 |
1961年 | 9篇 |
1959年 | 6篇 |
1958年 | 7篇 |
1957年 | 12篇 |
1956年 | 8篇 |
1954年 | 6篇 |
排序方式: 共有10000条查询结果,搜索用时 171 毫秒
1.
目的 了解公众对网络食品药品谣言信息及虚假宣传甄别能力和行为态度,探索防范谣言传播、维护社会稳定的有效措施和途径。方法 采用随机抽样研究方法,对贵州省某少数民族自治州公众开展食品药品网络谣言及虚假宣传辨识能力、行为态度问卷调查。结果 当地公众食品药品网络谣言及虚假宣传辨识能力总体较低,经济发展落后地区的青少年人群对网络谣言及虚假宣传的辨识能力较弱。大部分公众处理网络食品药品安全信息较为理性,更愿意通过国家监管部门权威网站了解信息,基本具备了确认信息真实性的主观意识,但辟除谣言的行动能力不高。结论 地方党委政府及有关部门应加强食品药品网络谣言和虚假宣传治理,加大当地谣言及虚假宣传的监测和系统性分析研究,有针对性、预判性地进行治理和科普宣传。 相似文献
2.
In the Internet of Things (IoT), a huge amount of valuable data is generated by various IoT applications. As the IoT technologies become more complex, the attack methods are more diversified and can cause serious damages. Thus, establishing a secure IoT network based on user trust evaluation to defend against security threats and ensure the reliability of data source of collected data have become urgent issues, in this paper, a Data Fusion and transfer learning empowered granular Trust Evaluation mechanism (DFTE) is proposed to address the above challenges. Specifically, to meet the granularity demands of trust evaluation, time–space empowered fine/coarse grained trust evaluation models are built utilizing deep transfer learning algorithms based on data fusion. Moreover, to prevent privacy leakage and task sabotage, a dynamic reward and punishment mechanism is developed to encourage honest users by dynamically adjusting the scale of reward or punishment and accurately evaluating users’ trusts. The extensive experiments show that: (i) the proposed DFTE achieves high accuracy of trust evaluation under different granular demands through efficient data fusion; (ii) DFTE performs excellently in participation rate and data reliability. 相似文献
3.
PC2425破碎机是较为常用的锤式破碎机规格之一,主要用于石灰石的破碎,台时产量800~1 000 t,出料粒度≤70 mm,筛余5%,配套4 500~5 000 t水泥生产线。PC2425破碎机篦条为易损件,由于物料的冲击会导致篦条变形,但其原有的弓形架与篦条型式,更换时很难将篦条从弓形架中抽出,导致更换非常不便。此次改造,用户最初适量降低破碎机的出料粒度,以提高生料磨的产量及降低生料粉磨的电耗,虽然通过调整篦条与锤头的间距及篦条间隙可以达到降低出料粒度的要求。但是为了彻底解决篦条更换困难问题,重新设计了篦架结构。 相似文献
4.
5.
Most real-world vehicle nodes can be structured into an interconnected network of vehicles. Through structuring these services and vehicle device interactions into multiple types, such internet of vehicles becomes multidimensional heterogeneous overlay networks. The heterogeneousness of the overlays makes it difficult for the overlay networks to coordinate with each other to improve their performance. Therefore, it poses an interesting but critical challenge to the effective analysis of heterogeneous virtual vehicular networks. A variety of virtual vehicular networks can be easily deployed onto the native network by applying the concept of SDN (Software Defined Networking). These virtual networks reflect their heterogeneousness due to their different performance goals, and they compete for the same physical resources of the underlying network, so that a sub-optimal performance of the virtual networks may be achieved. Therefore, we propose a Deep Reinforcement Learning (DRL) approach to make the virtual networks cooperate with each other through the SDN controller. A cooperative solution based on the asymmetric Nash bargaining is proposed for co-existing virtual networks to improve their performance. Moreover, the Markov Chain model and DRL resolution are introduced to leverage the heterogeneous performance goals of virtual networks. The implementation of the approach is introduced, and simulation results confirm the performance improvement of the latency sensitive, loss-rate sensitive and throughput sensitive heterogeneous vehicular networks using our cooperative solution. 相似文献
6.
Fog computing has emerged to support the requirements of IoT applications that could not be met by today’s solutions. Different initiatives have been presented to drive the development of fog, and much work has been done to improve certain aspects. However, an in-depth analysis of the different solutions, detailing how they can be integrated and applied to meet specific requirements, is still required. In this work, we present a unified architectural model and a new taxonomy, by comparing a large number of solutions. Finally, we draw some conclusions and guidelines for the development of IoT applications based on fog. 相似文献
7.
The recent trend of integration among new network services such as the long-term evolution (LTE) based on internet protocol (IP) needs reputable analyses and prediction information on the internet traffic. The IP along with increased internet traffics due to expanding new service platforms such as smartphones will reflect policies such as network QoS according to new services. The establishment of monitoring methods and analysis plans is thus required for the development of internet traffics that will analyze their status and predict their future. The paper with the speed of Internet traffic model is developed for monitoring the state of the experiment and verified. The problem is that the proposed service Internet service provider (ISP) to resolve the conflict between the occurrences can be considerably Internet traffic and that the state of data may be helpful in understanding. The paper advancement policy to reflect the network traffic volume of Internet services and users irradiation with increased traffic due to the development and management of the analysis was carried out experimental measurements. 相似文献
8.
带关键字搜索的公钥加密(PEKS)是一种有用的加密原语,它允许用户将在加密数据上搜索的功能委托给不可信的第三方服务器,而不影响原始数据的安全性和隐私性。但是,由于缺乏对于数据的加密以及解密能力,PEKS方案不能单独进行使用,必须与标准的公钥加密方案(PKE)相结合。因此,Baek等人在2006年引入了一种新的加密原语,称为结合PKE和PEKS的加密方案(PKE+PEKS),它同时提供了PKE和PEKS的功能。目前,已有文献提出了几种PKE+PEKS方案。然而,他们都没有考虑关键字猜测攻击的问题。本文提出一个新的高效且能够抵抗关键字猜测攻击的PKE+PEKS方案,与已有方案相比,该方案在性能上有很大的提升,并且在生成关键字和数据密文时,不需要使用双线性对,极大地降低了计算和存储成本。安全性分析表明,本文中所提出的方案能够满足密文隐私安全性、陷门不可区分性和抗关键字猜测攻击的安全性。效率分析表明,本分提出的方案更加高效。 相似文献
9.
Few jurisdictions have translated internationally agreed social impact assessment (SIA) principles into statutory provisions. Governments and regulatory bodies tend to provide developers with high-level frameworks, or require that social impacts be ‘considered’, without specifying how this is to be done. In Australia, this lack of clarity leaves all parties uncertain about requirements for SIA. The New South Wales (NSW) Government’s 2017 release of the SIA guideline for State-significant mining, petroleum and extractive industry development represents an attempt to clarify requirements and provide guidance. In this paper, we describe the process of bringing this guideline to fruition from the perspective of being directly involved in its development, and highlight the challenges involved in integrating leading-practice principles into the state’s pre-existing policy framework. While the guideline represents a significant advance in policy-based SIA guidance, some aspects leave room for improvement. The real test of the guideline’s impact will lie in its influence on SIA practice in NSW, and ultimately in social outcomes for communities affected by resources projects. 相似文献
10.
随着教育信息化技术的发展,线上线下混合式教学模式已成为一种趋势。为了解决非全日制研究生课堂教学召集困难、效果不佳等问题,提出了基于“互联网+虚拟仿真技术”的线上线下混合式教学模式。本文以控制工程专业学位研究生为例,结合《现代电气控制技术》课程,探讨了线上线下混合式教学实现途径、师生互动方法、项目驱动案例教学法以及电气控制系统虚拟仿真实验平台的构建方法,切实提升非全日制研究生的培养质量。 相似文献