首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   36811篇
  免费   3992篇
  国内免费   1520篇
电工技术   12786篇
技术理论   2篇
综合类   2480篇
化学工业   2880篇
金属工艺   1479篇
机械仪表   860篇
建筑科学   5461篇
矿业工程   1756篇
能源动力   899篇
轻工业   1242篇
水利工程   1985篇
石油天然气   1661篇
武器工业   139篇
无线电   2463篇
一般工业技术   1446篇
冶金工业   1233篇
原子能技术   374篇
自动化技术   3177篇
  2024年   123篇
  2023年   339篇
  2022年   840篇
  2021年   1039篇
  2020年   1004篇
  2019年   752篇
  2018年   664篇
  2017年   898篇
  2016年   1020篇
  2015年   1271篇
  2014年   2872篇
  2013年   1839篇
  2012年   2996篇
  2011年   3192篇
  2010年   2481篇
  2009年   2563篇
  2008年   2252篇
  2007年   2704篇
  2006年   2537篇
  2005年   2078篇
  2004年   1693篇
  2003年   1582篇
  2002年   1259篇
  2001年   1101篇
  2000年   926篇
  1999年   658篇
  1998年   407篇
  1997年   282篇
  1996年   247篇
  1995年   226篇
  1994年   124篇
  1993年   72篇
  1992年   61篇
  1991年   40篇
  1990年   31篇
  1989年   26篇
  1988年   35篇
  1987年   12篇
  1986年   16篇
  1985年   12篇
  1984年   21篇
  1983年   4篇
  1982年   3篇
  1981年   9篇
  1980年   2篇
  1979年   2篇
  1978年   2篇
  1963年   1篇
  1954年   2篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
军工企业涉密网络安全是军工涉密网络系统建设和使用中面临的重大课题.该文从用户终端安全的角度出发.阐述了统一安全防护的思路,并对其具体内容做了较为详细的论述。  相似文献   
32.
Critical, or national, information infrastructure protection, referred to as either CIIP or NIIP, has been highlighted as a critical factor in overall national security by the United States, the United Kingdom, India and the European Community. As nations move inexorably towards so-called ‘digital economies’, critical infrastructure depends on information systems to process, transfer, store and exchange information through the Internet. Electronic attacks such as denial of service attacks on critical information infrastructures challenge the law and raise concerns. A myriad of issues potentially plague the protection of critical information infrastructures owing to the lack of legal regulation aimed at ensuring the protection of critical information infrastructures. This paper will highlight the legal concerns that relate to the denial of service attacks on critical information infrastructures and provide an introductory overview of the law as it relates to CIIP in Australia.  相似文献   
33.
从对香港理工大学设计年展的整体状况与作品分析,到与国际设计及内地设计教育的比较中,归纳了目前香港设计院校教育及设计的现状特点。立足本地,强调设计的人性化,以及对前沿国际设计的吸纳与开放性的学习都是本次年展中所折射出的主要特征。  相似文献   
34.
Since 1999, the National Commission for the Knowledge and Use of the Biodiversity (CONABIO) in Mexico has been developing and managing the “Operational program for the detection of hot-spots using remote sensing techniques”. This program uses images from the MODerate resolution Imaging Spectroradiometer (MODIS) onboard the Terra and Aqua satellites and from the Advanced Very High Resolution Radiometer of the National Oceanic and Atmospheric Administration (NOAA-AVHRR), which are operationally received through the Direct Readout station (DR) at CONABIO. This allows the near-real time monitoring of fire events in Mexico and Central America. In addition to the detection of active fires, the location of hot spots are classified with respect to vegetation types, accessibility, and risk to Nature Protection Areas (NPA). Besides the fast detection of fires, further analysis is necessary due to the considerable effects of forest fires on biodiversity and human life. This fire impact assessment is crucial to support the needs of resource managers and policy makers for adequate fire recovery and restoration actions. CONABIO attempts to meet these requirements, providing post-fire assessment products as part of the management system in particular for satellite-based burnt area mapping. This paper provides an overview of the main components of the operational system and will present an outlook to future activities and system improvements, especially the development of a burnt area product. A special focus will also be placed on the fire occurrence within NPAs of Mexico.  相似文献   
35.
A blind watermarking method using maximum wavelet coefficient quantization   总被引:3,自引:0,他引:3  
This paper proposes a blind watermarking algorithm based on maximum wavelet coefficient quantization for copyright protection. The wavelet coefficients are grouped into different block size and blocks are randomly selected from different subbands. We add different energies to the maximum wavelet coefficient under the constraint that the maximum wavelet coefficient is always maximum in a block. The watermark is embedded the local maximum coefficient which can effectively resist attacks. Also, using the block-based watermarking, we can extract the watermark without using the original image or watermark. Experimental results show that the proposed method is quite robust under either non-geometry or geometry attacks.  相似文献   
36.
基于动态逻辑许可证的PDF版权管理系统   总被引:1,自引:1,他引:0       下载免费PDF全文
王景艳  钟勇  朱珍 《计算机工程》2009,35(11):169-171
电子文档版权管理是数字版权管理的重要研究领域,提出一种PDF电子文档版权保护方案,该方案的权限管理基于一种具有强大表达力、灵活性和开放权限管理能力的动态逻辑许可证,具有详细的文档权限控制方法,并通过内容级的PDF文档加密方法增强文档的安全性。对系统模型、实现结构和方法进行说明,并与相关方法进行对比和应用示例。  相似文献   
37.
介绍了灵活利用RC的特性对CMOS数字IC的输入保护措施,并重点讨论了其应用电路及其参数的设计计算过程。此方法抑制噪声的效果非常好,可以广泛应用于理论及实践性教学、工程设计等方面。  相似文献   
38.
本文介绍了DCS系统供电及接地有关问题,以及如何解决。  相似文献   
39.
不锈钢活性炭滤器的氯腐蚀与防腐   总被引:1,自引:0,他引:1  
本文就活性炭在预处理中脱氯的不锈钢滤器的氯腐蚀机理进行了探讨,并提出了不锈钢活性炭脱氯滤器的防腐方法和措施。  相似文献   
40.
An assessment is provided of the current position regarding changes in UK or EEC civil law under which injured parties can obtain redress in respect of injuries caused by defective products. One effect of proposed systems of strict liability in tort will be to shift some of the burden of proof from the injured party on to the producer of the product claimed to have caused injury. It is argued that this is a just and logical change, given the unfairness and anomalies in present systems and the relative abilities of consumers and producers to avoid such incidents and to bear or to offset the cost of the consequences. Cases of apparent misuse of a product by a consumer may frequently be induced by the design of that product and could thus be prevented by more thoughtful design. In order that producers can ensure their own viability and satisfy the consumer market, their products must be safe, efficient, comfortable and satisfying to use, as well as durable, serviceable and realistically priced. One requirement for achieving this has been said to be the input of accident and ergonomics data early in the product development process; the present paper examines this proposition. Evidence is provided by research into the design and manufacture of consumer products for the UK market, carried out at Birmingham University. Examined in particular are the extent to which formal development processes and design safety review procedures are used, and the degree of utilisation of accident, ergonomics, user testing and market feedback data, identifying barriers to the widespread use of these. Safe and ergonomic design of products must aim to be seen as a positive business activity, rather than as a cost-centre. The benefits to a company of a comprehensive design safety programme will more than outweigh the costs given the pressures identified earlier.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号