全文获取类型
收费全文 | 181144篇 |
免费 | 15951篇 |
国内免费 | 8542篇 |
专业分类
电工技术 | 11511篇 |
技术理论 | 13篇 |
综合类 | 11750篇 |
化学工业 | 29677篇 |
金属工艺 | 10009篇 |
机械仪表 | 11335篇 |
建筑科学 | 13859篇 |
矿业工程 | 5497篇 |
能源动力 | 5382篇 |
轻工业 | 12704篇 |
水利工程 | 3322篇 |
石油天然气 | 10814篇 |
武器工业 | 1414篇 |
无线电 | 21780篇 |
一般工业技术 | 21774篇 |
冶金工业 | 8771篇 |
原子能技术 | 1943篇 |
自动化技术 | 24082篇 |
出版年
2024年 | 933篇 |
2023年 | 3517篇 |
2022年 | 6532篇 |
2021年 | 8699篇 |
2020年 | 6536篇 |
2019年 | 5173篇 |
2018年 | 5822篇 |
2017年 | 6508篇 |
2016年 | 5782篇 |
2015年 | 7698篇 |
2014年 | 9505篇 |
2013年 | 11397篇 |
2012年 | 12392篇 |
2011年 | 13020篇 |
2010年 | 11099篇 |
2009年 | 10457篇 |
2008年 | 9965篇 |
2007年 | 9194篇 |
2006年 | 9363篇 |
2005年 | 8011篇 |
2004年 | 5332篇 |
2003年 | 4490篇 |
2002年 | 4018篇 |
2001年 | 3611篇 |
2000年 | 3543篇 |
1999年 | 4161篇 |
1998年 | 3468篇 |
1997年 | 2935篇 |
1996年 | 2743篇 |
1995年 | 2216篇 |
1994年 | 1802篇 |
1993年 | 1298篇 |
1992年 | 1049篇 |
1991年 | 786篇 |
1990年 | 569篇 |
1989年 | 468篇 |
1988年 | 369篇 |
1987年 | 252篇 |
1986年 | 211篇 |
1985年 | 130篇 |
1984年 | 116篇 |
1983年 | 86篇 |
1982年 | 86篇 |
1981年 | 68篇 |
1980年 | 63篇 |
1979年 | 29篇 |
1978年 | 25篇 |
1977年 | 24篇 |
1976年 | 26篇 |
1975年 | 16篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
891.
892.
杨东霖 《网络安全技术与应用》2013,(4):55-56,32
如今随着大家对知识产权保护的重视,使得对于自己程序的加壳保护也变得越来越普遍。除此之外,这一技术也被广泛用于病毒和木马之中,使其不易被杀毒软件查杀。其中,PE文件的加壳尤为常见,若想对其进一步的研究,脱壳是必不可少的。本文首先介绍了PE文件结构和现阶段的加壳技术,其次阐述了脱壳原理和常见方法。 相似文献
893.
Oracle数据库应用是一门实践性很强的课程,本文首先阐述了课程改革的思路,并从课程内容设置、教学模式、教学方法、考核方式、课程资料建设等方面进行了深入的研究与实践,提高了课程的教学质量和教学效果。 相似文献
894.
杨立博 《网络安全技术与应用》2013,(8):129-130
近几年来随着计算机虚拟化技术的迅速发展,基于完全虚拟化技术的安全监控应运而生,它不仅能确保监控工具的有效性、牢固性,而且监控技术易于实现.本文将从安全监控架构中内核、内核可加戢模块两个方面存在的问题对基于完全虚拟化的安全监控技术进行探析. 相似文献
895.
Luzheng Bi Cuie Wang Xuerui Yang Mingtao Wang Yili Liu 《International journal of human-computer interaction》2013,29(2):139-145
Driver intention detection is an important component in human-centric driver assistance systems. This article proposes a novel method for detecting driver normal and emergency left- or right-lane-changing intentions by using driver models based on the queuing network cognitive architecture. Driver lane-changing and lane-keeping models are developed and used to simulate driver behavior data associated with 5 kinds of intentions (i.e., normal and emergency left- or right-lane-changing and lane-keeping intentions). The differences between 5 sets of simulated behavior data and the collected actual behavior data are computed, and the intention associated with the smallest difference is determined as the detection outcome. The experimental results from 14 drivers in a driving simulator show that the method can detect normal and emergency lane-changing intentions within 0.325 s and 0.268 s of the steering maneuver onset, respectively, with high accuracy (98.27% for normal lane changes and 90.98% for emergency lane changes) and low false alarm rate (0.294%). 相似文献
896.
The main contribution of this paper is to completely characterize the dynamic behavior of the discrete‐time double integrator with a saturated locally stabilizing linear state feedback law. In continuous‐time setting, any linear state feedback control law that locally stabilizes the double integrator also globally stabilizes the system in the presence of actuator saturation. In discrete‐time setting, the equivalent of the double integrator does not have the same property. In this paper, we completely characterize the global behavior of saturated locally stabilizing linear state feedback laws for the discrete‐time double integrator. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
897.
Jian An Xiaolin Gui Wendong Zhang Jinhua Jiang Jianwei Yang 《Journal of Network and Computer Applications》2013,36(2):799-810
Interaction and communication between humans with smart mobile devices are a new trend of development in Internet of Things (IoT). With the powerful sensing capability of smart device and human mobility, various services could be provided by building a trusted chain between service requesters and suppliers. The cognition of social relations between mobile nodes is the basis of final mobile-aware services. It involves many decision factors, such as time, space and activity patterns. Using social network theory, a new cognitive model for social relations of mobile nodes in IoT is proposed. Firstly, nodes' social relations are reasoned and quantified from multiple perspectives based on the summary of social characteristics of mobile nodes and the definition of different decision factors. Then the location factor, interconnection factor, service evaluation factor and feedback aggregation factor are defined to solve the shortcomings in existing quantitative models. Finally, the weight distribution is set up by information entropy and rough set theory for these decision factors; it can overcome the shortage of traditional methods, in which the weight is set up by subjective ways and hence their dynamic adaptability is poor. We compare our cognitive model to existing models using MIT dataset by defining a variety of test indicators, such as network overall density (NOD), the degree center potential (DCP), the network distribution index (EI), etc. Simulation results show that, the cognitive model has better internal structure and significant validity in network analysis, and thus can provide mobile-aware service effectively in dynamic environment. 相似文献
898.
Xiaogang Wang Ming Yang Junzhou Luo 《Journal of Network and Computer Applications》2013,36(6):1660-1670
Network watermarking schemes have been proposed to trace secret network attack flows transferred through stepping stones as well as anonymous channels. However, most existing network flow watermark detection techniques focus on a fixed sample size of network data to achieve the required accuracy. Irrespective of the uncertainty or information content of successive observations, such detection techniques will result in low efficiency of watermark detection. We herein propose a novel sequential watermark detection model (SWDM) supporting three sequential detectors for efficient traceback of network attack flows. By exploiting the sequential probability ratio test approach, we first propose the intuitive paired-intervals-based optimum watermark detector (POWD) and the single-interval-based optimum watermark detector (SOWD) under the assumption of known parameters of the observed attack flow. We then propose the sequential sign watermark detector (SSWD) that operates on two-level quantized observations for nonparametric watermark detection. Based on our SWDM model, a statistical analysis of sequential detectors, with no assumptions or limitations concerning the distribution of the timing of packets, proves their effectiveness despite traffic timing perturbations. The experiments using a large number of synthetically-generated SSH traffic flows demonstrate that there is a significant advantage in using our sequential watermark detectors based on the proposed SWDM model over the existing fixed sample size watermark detector (FSWD). Compared to the FSWD detector, the POWD detector achieves almost 28% savings in the average number of packets. Especially, given the required probability of detection errors, the SOWD detector and the SSWD detector can achieve almost 47% and 29% savings, respectively, in the average number of required packets, thus resulting in not only guaranteed rates of detection errors but also high efficiency of flow traceback. 相似文献
899.
Chao-Yang Lee Liang-Cheng Shiu Fu-Tian Lin Chu-Sing Yang 《Journal of Network and Computer Applications》2013,36(4):1186-1195
Topology control can enhance energy efficiency and prolong network lifetime for wireless sensor networks. Several studies that attempted to solve the topology control problem focused only on topology construction or maintenance. This work designs a novel distributed and reliable energy-efficient topology control (RETC) algorithm for topology construction and maintenance in real application environments. Particularly, many intermittent links and accidents may result in packet loss. A reliable topology can ensure connectivity and energy efficiency, prolonging network lifetime. Thus, in the topology construction phase, a reliable topology is generated to increase network reachable probability. In the topology maintenance phase, this work applies a novel dynamic topology maintenance scheme to balance energy consumption using a multi-level energy threshold. This topology maintenance scheme can trigger the topology construction algorithm to build a new network topology with high reachable probability when needed. Experimental results demonstrate the superiority of the RETC algorithm in terms of average energy consumption and network lifetime. 相似文献
900.
As social media services such as Twitter and Facebook are gaining popularity, the amount of information published from those services is explosively growing. Most of them use feeds to facilitate distribution of a huge volume of content they publish. In this context, many users subscribe to feeds to acquire up-to-date information through feed aggregation services, and recent real-time search engines also increasingly utilize feeds to promptly find recent web content when it is produced. Accordingly, it is necessary for such services to effectively fetch feeds for minimizing fetching delay, while at the same time maximizing the number of fetched entries. Fetching delay is a time lag between entry publication and retrieval, which is primarily incurred by finiteness of fetching resources. In this paper, we consider a polling-based approach among the methods applicable to fetching feeds, which bases on a specific schedule for visiting feeds. While the existing polling-based approaches have focused on the allocation of fetching resources to feeds in order to either reduce the fetching delay or increase the number of fetched entries, we propose a resource allocation policy that can optimize both objectives. Extensive experiments have been carried out to evaluate the proposed model, in comparison with the existing alternative methods. 相似文献