首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   38833篇
  免费   4366篇
  国内免费   2707篇
电工技术   2780篇
技术理论   6篇
综合类   3545篇
化学工业   1007篇
金属工艺   164篇
机械仪表   876篇
建筑科学   8945篇
矿业工程   633篇
能源动力   440篇
轻工业   453篇
水利工程   481篇
石油天然气   343篇
武器工业   503篇
无线电   6605篇
一般工业技术   897篇
冶金工业   393篇
原子能技术   74篇
自动化技术   17761篇
  2024年   204篇
  2023年   669篇
  2022年   1106篇
  2021年   1351篇
  2020年   1412篇
  2019年   1027篇
  2018年   766篇
  2017年   896篇
  2016年   951篇
  2015年   1198篇
  2014年   3109篇
  2013年   2342篇
  2012年   3169篇
  2011年   3496篇
  2010年   2631篇
  2009年   2834篇
  2008年   2925篇
  2007年   3163篇
  2006年   2651篇
  2005年   2249篇
  2004年   1826篇
  2003年   1554篇
  2002年   1017篇
  2001年   771篇
  2000年   636篇
  1999年   430篇
  1998年   253篇
  1997年   175篇
  1996年   137篇
  1995年   130篇
  1994年   108篇
  1993年   84篇
  1992年   87篇
  1991年   76篇
  1990年   58篇
  1989年   51篇
  1988年   54篇
  1987年   29篇
  1986年   37篇
  1985年   57篇
  1984年   54篇
  1983年   26篇
  1982年   22篇
  1981年   11篇
  1980年   6篇
  1979年   11篇
  1965年   5篇
  1964年   5篇
  1962年   6篇
  1955年   7篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
141.
针对近几年安阳市城区规模的不断扩大和安东新区的开发启动以及房地产市场的迅速发展,根据相关标准,结合安阳市城市发展的实际需要,提出了安阳市民用建筑有线电视管道工程设计及施工规范。  相似文献   
142.
尹岩  孙超  蒋赛百 《山西建筑》2007,33(33):54-55
对全球化进程中建筑趋同的原因进行了分析,探讨了全球化对中国建筑的影响,并对我国当代建筑创作问题提出了见解,以使人们对建筑全球化的趋同有一个较为清晰的认识。  相似文献   
143.
A new evaluation model for SK combinator expressions is presented and used as a basis for the design of a novel processor. The resulting machine architecture resembles a dataflow ring, but executions are constrained to be fully lazy. An automatic dynamic load sharing mechanism for a distributed multiprocessor architecture is suggested, and initial simulation results are presented.  相似文献   
144.
The most efficient approach to a fair exchange is to use an off-line trusted third party (TTP for short) who gets involved only when a dispute between two parties occurs. However, exchanged secrets that are not protected properly may be exposed to the TTP when one of these two parties asks the TTP to mediate the dispute. The first work to protect exchanged secrets from TTP’s misuse was proposed by Franklin and Reiter in 1997. They provided an on-line semi-trusted third party instead of an off-line third party for a fair exchange. Their schemes forced the TTP to take part in the protocol for all the cases, and thus, deemed to be impractical.The present paper, introduces several models, including single and multiple TTPs, to focus the attention not only on security properties, but also on reliability functions. In the single TTP mode, our new scheme can protect the exchanged data through an efficient exchange protocol, whereas in the multiple TTP mode, we proposed an approach to balance the security level with the reliability of the system.  相似文献   
145.
Most organizations have measures to protect their network infrastructure from intruders. With the growth AND AVAILABILITY of wireless, some intruders now are aiming their attacks there. The potential for damage from these types of attacks is significant due to their nature. However, there is another type of wireless attack on organizational resources that also poses a significant vulnerability. That is electromagnetic radiation, also called radio frequency emissions (RFE), from unprotected systems and networks.  相似文献   
146.
This study presents results of a survey of self-proclaimed computer hackers about their perceptions in regards to illegal hacking. Results show that hackers continue to engage in illegal hacking activities despite the perception of severe judicial punishment. A closer look shows that hackers perceive a high utility value from hacking, little informal sanctions, and a low likelihood of punishment. These perceptions coupled with a high level of moral disengagement partially explain the hacker's illegal behavior.  相似文献   
147.
Development and implementation of a NURBS curve motion interpolator   总被引:4,自引:0,他引:4  
This paper deals with the issues of development and implementation of a real-time NURBS interpolator for a six-axis robot. Using an open-architecture controller system as a testbed, a real-time NURBS curve interpolator was developed, implemented and tested. Sample runs were conducted with the resulting trajectories measured in real-time during robot motion. The resulting trajectories are analyzed, discussed and compared with those from a commonly used point-to-point approximation technique. The real-time NURBS curve interpolator's feasibility, advantages and related issues are also discussed.  相似文献   
148.
Interaction systems are a formal model for component-based systems. Combining components via connectors to form more complex systems may give rise to deadlock situations. We present here a polynomial time reduction from 3-SAT to the question whether an interaction system contains deadlocks.  相似文献   
149.
A whole‐program MATLAB to C translation system is presented. The paper outlines the motivation for the problem, discusses the system's architecture, its features and limitations. The translator's operation is explained using an example input program. Details are given on how the system implements and specializes some of the language's built‐in primitives. Finally, the paper reports measurements evaluating the execution time and memory usage of the translated sources, and the compilation time required for the translations. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
150.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号