首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   53168篇
  免费   5783篇
  国内免费   2563篇
电工技术   13180篇
技术理论   2篇
综合类   4730篇
化学工业   5059篇
金属工艺   1857篇
机械仪表   2444篇
建筑科学   5765篇
矿业工程   1992篇
能源动力   1162篇
轻工业   1879篇
水利工程   2071篇
石油天然气   2151篇
武器工业   492篇
无线电   5208篇
一般工业技术   2665篇
冶金工业   1626篇
原子能技术   530篇
自动化技术   8701篇
  2024年   184篇
  2023年   509篇
  2022年   1118篇
  2021年   1425篇
  2020年   1411篇
  2019年   1112篇
  2018年   1043篇
  2017年   1413篇
  2016年   1621篇
  2015年   1884篇
  2014年   3767篇
  2013年   2836篇
  2012年   4352篇
  2011年   4559篇
  2010年   3458篇
  2009年   3435篇
  2008年   3211篇
  2007年   3863篇
  2006年   3684篇
  2005年   3140篇
  2004年   2469篇
  2003年   2353篇
  2002年   1864篇
  2001年   1484篇
  2000年   1281篇
  1999年   931篇
  1998年   635篇
  1997年   471篇
  1996年   418篇
  1995年   360篇
  1994年   246篇
  1993年   164篇
  1992年   146篇
  1991年   113篇
  1990年   85篇
  1989年   86篇
  1988年   74篇
  1987年   41篇
  1986年   32篇
  1985年   38篇
  1984年   38篇
  1983年   20篇
  1982年   35篇
  1981年   22篇
  1980年   5篇
  1979年   6篇
  1978年   5篇
  1977年   7篇
  1964年   10篇
  1963年   6篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
61.
军工企业涉密网络安全是军工涉密网络系统建设和使用中面临的重大课题.该文从用户终端安全的角度出发.阐述了统一安全防护的思路,并对其具体内容做了较为详细的论述。  相似文献   
62.
Critical, or national, information infrastructure protection, referred to as either CIIP or NIIP, has been highlighted as a critical factor in overall national security by the United States, the United Kingdom, India and the European Community. As nations move inexorably towards so-called ‘digital economies’, critical infrastructure depends on information systems to process, transfer, store and exchange information through the Internet. Electronic attacks such as denial of service attacks on critical information infrastructures challenge the law and raise concerns. A myriad of issues potentially plague the protection of critical information infrastructures owing to the lack of legal regulation aimed at ensuring the protection of critical information infrastructures. This paper will highlight the legal concerns that relate to the denial of service attacks on critical information infrastructures and provide an introductory overview of the law as it relates to CIIP in Australia.  相似文献   
63.
从对香港理工大学设计年展的整体状况与作品分析,到与国际设计及内地设计教育的比较中,归纳了目前香港设计院校教育及设计的现状特点。立足本地,强调设计的人性化,以及对前沿国际设计的吸纳与开放性的学习都是本次年展中所折射出的主要特征。  相似文献   
64.
65.
A stochastic differential equation involving both a Wiener process and fractional Brownian motion, with nonhomogeneous coefficients and random initial condition, is considered. The coefficients and initial condition depend on a parameter. The assumptions on the coefficients and the initial condition supplying continuous dependence of the solution on a parameter, with respect to the Besov space norm, are established.  相似文献   
66.
In this paper, we shall establish sufficient conditions for the existence of mild solutions for nonlocal impulsive differential inclusions. On the basis of the fixed point theorems for multivalued maps and the technique of approximate solutions, new results are obtained. Examples are also provided to illustrate our results.  相似文献   
67.
Since 1999, the National Commission for the Knowledge and Use of the Biodiversity (CONABIO) in Mexico has been developing and managing the “Operational program for the detection of hot-spots using remote sensing techniques”. This program uses images from the MODerate resolution Imaging Spectroradiometer (MODIS) onboard the Terra and Aqua satellites and from the Advanced Very High Resolution Radiometer of the National Oceanic and Atmospheric Administration (NOAA-AVHRR), which are operationally received through the Direct Readout station (DR) at CONABIO. This allows the near-real time monitoring of fire events in Mexico and Central America. In addition to the detection of active fires, the location of hot spots are classified with respect to vegetation types, accessibility, and risk to Nature Protection Areas (NPA). Besides the fast detection of fires, further analysis is necessary due to the considerable effects of forest fires on biodiversity and human life. This fire impact assessment is crucial to support the needs of resource managers and policy makers for adequate fire recovery and restoration actions. CONABIO attempts to meet these requirements, providing post-fire assessment products as part of the management system in particular for satellite-based burnt area mapping. This paper provides an overview of the main components of the operational system and will present an outlook to future activities and system improvements, especially the development of a burnt area product. A special focus will also be placed on the fire occurrence within NPAs of Mexico.  相似文献   
68.
A blind watermarking method using maximum wavelet coefficient quantization   总被引:3,自引:0,他引:3  
This paper proposes a blind watermarking algorithm based on maximum wavelet coefficient quantization for copyright protection. The wavelet coefficients are grouped into different block size and blocks are randomly selected from different subbands. We add different energies to the maximum wavelet coefficient under the constraint that the maximum wavelet coefficient is always maximum in a block. The watermark is embedded the local maximum coefficient which can effectively resist attacks. Also, using the block-based watermarking, we can extract the watermark without using the original image or watermark. Experimental results show that the proposed method is quite robust under either non-geometry or geometry attacks.  相似文献   
69.
基于动态逻辑许可证的PDF版权管理系统   总被引:1,自引:1,他引:0       下载免费PDF全文
王景艳  钟勇  朱珍 《计算机工程》2009,35(11):169-171
电子文档版权管理是数字版权管理的重要研究领域,提出一种PDF电子文档版权保护方案,该方案的权限管理基于一种具有强大表达力、灵活性和开放权限管理能力的动态逻辑许可证,具有详细的文档权限控制方法,并通过内容级的PDF文档加密方法增强文档的安全性。对系统模型、实现结构和方法进行说明,并与相关方法进行对比和应用示例。  相似文献   
70.
This paper addresses the model reduction problem for a class of stiff chemical Langevin equations that arise as models of biomolecular networks with fast and slow reactions and can be described as continuous Markov processes. Initially, a coordinate transformation is sought that allows the decoupling of fast and slow variables in the model equations. Necessary and sufficient conditions are derived for such a linear transformation to exist, along with an explicit change of variables which achieves the desired decoupling. For the systems for which this step is applicable, the method of adiabatic elimination is applied to determine a representation of the slow dynamics. Theoretical concepts and results are illustrated with simple examples.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号