全文获取类型
收费全文 | 28809篇 |
免费 | 2556篇 |
国内免费 | 1468篇 |
专业分类
电工技术 | 1820篇 |
技术理论 | 1篇 |
综合类 | 2024篇 |
化学工业 | 4770篇 |
金属工艺 | 1512篇 |
机械仪表 | 1869篇 |
建筑科学 | 2216篇 |
矿业工程 | 942篇 |
能源动力 | 784篇 |
轻工业 | 2527篇 |
水利工程 | 560篇 |
石油天然气 | 1858篇 |
武器工业 | 214篇 |
无线电 | 2865篇 |
一般工业技术 | 3059篇 |
冶金工业 | 1352篇 |
原子能技术 | 358篇 |
自动化技术 | 4102篇 |
出版年
2024年 | 153篇 |
2023年 | 539篇 |
2022年 | 957篇 |
2021年 | 1267篇 |
2020年 | 898篇 |
2019年 | 767篇 |
2018年 | 875篇 |
2017年 | 964篇 |
2016年 | 871篇 |
2015年 | 1158篇 |
2014年 | 1517篇 |
2013年 | 1841篇 |
2012年 | 1926篇 |
2011年 | 2185篇 |
2010年 | 1889篇 |
2009年 | 1800篇 |
2008年 | 1839篇 |
2007年 | 1644篇 |
2006年 | 1574篇 |
2005年 | 1406篇 |
2004年 | 947篇 |
2003年 | 770篇 |
2002年 | 728篇 |
2001年 | 639篇 |
2000年 | 625篇 |
1999年 | 591篇 |
1998年 | 466篇 |
1997年 | 420篇 |
1996年 | 355篇 |
1995年 | 290篇 |
1994年 | 266篇 |
1993年 | 175篇 |
1992年 | 151篇 |
1991年 | 87篇 |
1990年 | 67篇 |
1989年 | 40篇 |
1988年 | 48篇 |
1987年 | 28篇 |
1986年 | 15篇 |
1985年 | 8篇 |
1984年 | 13篇 |
1983年 | 8篇 |
1982年 | 8篇 |
1981年 | 7篇 |
1980年 | 6篇 |
1979年 | 2篇 |
1959年 | 2篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
CNGI 青海湖系统支撑青海湖区域的生态保护和多学科交叉融合的科研协作。针对青海湖基础设施种类众多的特点,我们发展了 IPv6 相关关键技术,应用于基础网络环境建设、数据传输、设备管理与状态监控等多个层面,并充分考虑了由此带来的安全隐患,制定了相应安全策略。这些技术可以支持多种传感器构成的 IPv6 网络,并支持 IPv6 的相关应用软件研发,促进大规模、跨领域复杂科学问题研究工作。 相似文献
102.
103.
104.
Qin Gao Dunxing Wang Fan Gao 《International journal of human-computer interaction》2013,29(12):922-938
The objective of this study was to investigate the impact of knowledge representations on problem-oriented learning in online learning environments. The study compared the impact of knowledge map representation with traditional hierarchical representation with regard to learning memory and problem-solving performance. Twenty-nine students participated in an experiment in which they studied online materials with the goal of solving two programming problems (simple and complex). It was found that participants who used the hierarchical representation read in the depth-first sequence, whereas participants who used the knowledge map representation read in a sequence reflecting the system running mechanism implied by the graphical representation. In addition, participants who used the knowledge map representation had better memory of the learning content, especially about relations between knowledge nodes. When solving the complex problem, participants who used the knowledge map representation made a deeper analysis of the problem and had better problem-solving performance. These results were not significant in the simple problem-solving task. 相似文献
105.
Professionals and end users of computers often experience being constantly surrounded by modern technology. One side effect of modern technology is termed technostress, which refers to the “negative impact on attitudes, thoughts, behaviors, or body physiology that is caused either directly or indirectly by technology” (Well and Rosen, 1997). Based on social cognitive theory, this study developed a conceptual model in which computer-related technostress was studied as consequences of computer self-efficacy and technology dependence. Results show that (a) employees with higher level of computer self-efficacy have lower level of computer-related technostress, (b) employees with higher level of technology dependence have higher level of computer-related technostress, and (c) employees under different individual situations may perceive different levels of technostress. Contributions of this research and implications for theory and managerial practice are also discussed. 相似文献
106.
This paper proposes a robust image hashing method in discrete Fourier domain that can be applied in such fields as image authentication and retrieval. In the pre-processing stage, image resizing and total variation based filtering are first used to regularize the input image. Then the secondary image is obtained by the rotation projection, and the robust frequency feature is extracted from the secondary image after discrete Fourier transform. More sampling points are chosen from the low- and middle-frequency component to represent the salient content of the image effectively, which is achieved by the non-uniform sampling. Finally, the intermediate sampling feature vectors are scrambled and quantized to produce the resulting binary hash securely. The security of the method depends entirely on the secret key. Experiments are conducted to show that the present method has satisfactory robustness against perceptual content-preserving manipulations and has also very low probability for collision of the hashes of distinct images. 相似文献
107.
Qin Li Chengqing Li Dongyang Long Wai Hong Chan Changji Wang 《Quantum Information Processing》2013,12(7):2427-2439
In this paper, an efficient arbitrated quantum signature scheme is proposed by combining quantum cryptographic techniques and some ideas in classical cryptography. In the presented scheme, the signatory and the receiver can share a long-term secret key with the arbitrator by utilizing the key together with a random number. While in previous quantum signature schemes, the key shared between the signatory and the arbitrator or between the receiver and the arbitrator could be used only once, and thus each time when a signatory needs to sign, the signatory and the receiver have to obtain a new key shared with the arbitrator through a quantum key distribution protocol. Detailed theoretical analysis shows that the proposed scheme is efficient and provably secure. 相似文献
108.
介绍Android系统及病毒特点,分析Android病毒的危害,针对流行的Android手机病毒案例浅析了相关的防范策略。 相似文献
109.
智能交通系统在我国的发展处于起步阶段,还面临诸多问题,如海量数据不能有效整合、偏远地区设备落后等。云计算技术将为智能交通系统带来新的发展空间,两者的结合是未来的发展趋势。通过研究云计算技术在智能交通系统中的应用,提出了基于云计算技术的智能交通系统平台(智能交通云),解决了交通信息共享、设备落后等问题。 相似文献
110.
摘要为了帮助医生对医学图像进行准确的定位和诊断,在显示感兴趣区域的同时保留其上下文信息,提出一种保留上下文环境体绘制方法.首先记录沿光线方向的首个等值面的空间位置;然后根据采样点到等值面的距离和采样点处的梯度构造衰减函数,将衰减函数作用于不透明度转换函数,以控制光线合成.对头、腹和脚部等CT数据的实验结果表明,该方法可以在保留组织轮廓清晰的前提下增强感兴趣区域显示. 相似文献