全文获取类型
收费全文 | 2274篇 |
免费 | 297篇 |
国内免费 | 255篇 |
专业分类
电工技术 | 208篇 |
综合类 | 257篇 |
化学工业 | 16篇 |
金属工艺 | 8篇 |
机械仪表 | 90篇 |
建筑科学 | 20篇 |
矿业工程 | 15篇 |
能源动力 | 8篇 |
轻工业 | 8篇 |
水利工程 | 30篇 |
石油天然气 | 9篇 |
武器工业 | 14篇 |
无线电 | 549篇 |
一般工业技术 | 47篇 |
冶金工业 | 44篇 |
原子能技术 | 9篇 |
自动化技术 | 1494篇 |
出版年
2024年 | 9篇 |
2023年 | 13篇 |
2022年 | 36篇 |
2021年 | 28篇 |
2020年 | 46篇 |
2019年 | 44篇 |
2018年 | 50篇 |
2017年 | 42篇 |
2016年 | 61篇 |
2015年 | 92篇 |
2014年 | 129篇 |
2013年 | 127篇 |
2012年 | 172篇 |
2011年 | 176篇 |
2010年 | 139篇 |
2009年 | 168篇 |
2008年 | 202篇 |
2007年 | 221篇 |
2006年 | 185篇 |
2005年 | 202篇 |
2004年 | 159篇 |
2003年 | 122篇 |
2002年 | 112篇 |
2001年 | 52篇 |
2000年 | 57篇 |
1999年 | 31篇 |
1998年 | 29篇 |
1997年 | 28篇 |
1996年 | 25篇 |
1995年 | 13篇 |
1994年 | 12篇 |
1993年 | 14篇 |
1992年 | 4篇 |
1991年 | 4篇 |
1990年 | 5篇 |
1989年 | 1篇 |
1988年 | 5篇 |
1986年 | 3篇 |
1984年 | 3篇 |
1982年 | 1篇 |
1975年 | 1篇 |
1966年 | 1篇 |
1961年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有2826条查询结果,搜索用时 109 毫秒
1.
Text messages are characterised by a casual language style, ‘textese’ (e.g., c u on thurs). This study investigated adolescents’ perceptions of the use of different levels of textese in digital messages which varied in their intended recipient (friend, teacher). Grade 8 students in Australia (N = 90, aged 13–14 years) each read six text messages purportedly written by a fellow student, and rated the extent to which they agreed (on a 7-point Likert scale) that the message writer was intelligent, paid attention to detail, used an appropriate writing style, and was friendly. Overall, participants rated message senders most favourably on all measures when they used no textese, and least favourably when they used high levels of textese. This pattern was even stronger when messages were addressed to teachers rather than same-aged friends. The findings suggest that adolescents are sensitive to both writing style and recipient when considering digital messages. 相似文献
2.
The healthcare system needs to track and monitor patients’ status and information. One of the most important requirements is that the patient is able to access the service anywhere at any time. Systems are being developed using the Internet to monitor patients’ status, and in some areas, especially rural areas and motorways, the Internet may not be available, even though the mobile network is available. In some cases, the network might be overloaded, so the patient information cannot be delivered to the hospital or medical centre. We propose a new method that uses the spare extension of the random access channel (RACH), which is carried by physical random access channel (PRACH) to send the patient information to the medical centre. We present the mathematical model of the channel and compare the results with another system from 3GPP to evaluate the results. The results show that the proposed method needs less time to transmit the patient’s information. 相似文献
3.
针对软件定义网络中,控制器无法保证下发的网络策略能够在转发设备上得到正确执行的安全问题,提出一种新的转发路径监控安全方案。首先以控制器的全局视图能力为基础,设计了基于OpenFlow协议的路径凭据交互处理机制;然后采用哈希链和消息验证码作为生成和处理转发路径凭据信息的关键技术;最后在此基础上,对Ryu控制器和Open vSwitch开源交换机进行深度优化,添加相应处理流程,建立轻量级的路径安全机制。测试结果表明,该机制能够有效保证数据转发路径安全,吞吐量消耗比SDN数据层可信转发方案(SDNsec)降低20%以上,更适用于路径复杂的网络环境,但时延和CPU使用率的浮动超过15%,有待进一步优化。 相似文献
4.
A log statement is one of the key tactics for a developer to record and monitor important run-time behaviors of our system in a development phase and a maintenance phase. It composes of a message for stating log contents, and a log level (eg, debug or warn) to denote the severity of a message and controlling its visibility at run time. In spite of its usefulness, a developer does not tend to deeply consider which log level is appropriate in writing source code, which causes the system to be unmaintainable. To address this issue, this paper proposes an automatic approach to validating the appropriateness of the log level in consideration of the semantic and syntactic features and recommending a proper alternative log level. We first build the semantic feature vector to quantify the semantic similarity among application log messages using the word vector space, and the syntactic feature vector to capture the application context that surrounds the log statement. Based on the feature vectors and machine learning techniques, the log level is automatically validated, and an alternative log level is recommended if the log level is invalid. For the evaluation, we collected 22 open-source projects from three application domains, and obtained the 77% of precision and 75% of recall in validating the log levels. Also, our approach showed 6% higher accuracy than that of the developer group who has 7 to 8 years of work experience, and 72% of the developers accepted our recommendation. 相似文献
5.
对武器中火控系统应用惯性技术的原因、特点进行了简要的介绍,并对火控系统中的基准设备的配置方案进行了简单的介绍。 相似文献
6.
提出一种基于GSM短消息的远程监测系统,应用于没有供电及有线通信条件下的天然气长输管道野外阀门井内管道压力和燃气泄漏情况的远程监测。在确定系统总体设计的基础上,设计了以GSM模块、单片机为核心的硬件系统和以数据采集、发送及处理为主的软件系统,充分考虑了野外供电和现场电气防爆问题。 相似文献
7.
This paper deals with the issue of preparation of the aiming angles with the use of tabular firing tables and needed determination of the ballistic elements μB (ballistic wind wB Wxm WzB, ballistic (virtual) temperature τB, ballistic density ρB) from the standardized met messages. The weighting factors are used for the calculation of ballistic elementsμB that are incorporated into the trajectory calculations characteristics of weapon and ammunition. Two different methodologies practically used in the praxis are analysed and compared. For the comparison of the two methodologies the reference height of trajectory determined from the weighting factor functions is employed. On the basis of the analyses conducted, the potential for further increase in accuracy of these aiming angles preparation methods is pointed out. 相似文献
8.
9.
Co-Drive on-board traffic information system is a complementary tool providing a dynamic management of transportation infrastructure and traffic as well as the diffusion of accurate real-time information about the road environment and motorists’ driving behaviour. The aim of this study was to examine drivers’ acceptability of Co-Drive by investigating the impact of traffic information provided via on-board display devices on motorists’ beliefs and behaviour. 相似文献
10.
Olaf Ostwald 《Cryptologia》2017,41(5):395-421
“Breaking German Army Ciphers” is the title of a Cryptologia article from 2005, describing the lucky survival of several hundred authentic Enigma messages of World War II, and an account of a ciphertext-only cryptanalysis of a large number of these messages, leaving only a few (mostly short messages) unbroken. After reviewing the work done, and investigating the reasons for both lucky breaks and close misses, the modern ciphertext-only attack on Enigma messages is improved, especially on genuine ones with short lengths and/or many garbles. The difficulties of a proper measure for the candidate’s closeness to a plaintext are clarified. The influence on the decryption process of an empty plugboard and one with only a few correct plugs is examined. The method is extended by a partial exhaustion of the plugboard combined with an optimized hillclimbing strategy. The newly designed software succeeds in breaking formerly unbroken messages. 相似文献