全文获取类型
收费全文 | 53168篇 |
免费 | 5783篇 |
国内免费 | 2563篇 |
专业分类
电工技术 | 13180篇 |
技术理论 | 2篇 |
综合类 | 4730篇 |
化学工业 | 5059篇 |
金属工艺 | 1857篇 |
机械仪表 | 2444篇 |
建筑科学 | 5765篇 |
矿业工程 | 1992篇 |
能源动力 | 1162篇 |
轻工业 | 1879篇 |
水利工程 | 2071篇 |
石油天然气 | 2151篇 |
武器工业 | 492篇 |
无线电 | 5208篇 |
一般工业技术 | 2665篇 |
冶金工业 | 1626篇 |
原子能技术 | 530篇 |
自动化技术 | 8701篇 |
出版年
2024年 | 184篇 |
2023年 | 509篇 |
2022年 | 1118篇 |
2021年 | 1425篇 |
2020年 | 1411篇 |
2019年 | 1112篇 |
2018年 | 1043篇 |
2017年 | 1413篇 |
2016年 | 1621篇 |
2015年 | 1884篇 |
2014年 | 3767篇 |
2013年 | 2836篇 |
2012年 | 4352篇 |
2011年 | 4559篇 |
2010年 | 3458篇 |
2009年 | 3435篇 |
2008年 | 3211篇 |
2007年 | 3863篇 |
2006年 | 3684篇 |
2005年 | 3140篇 |
2004年 | 2469篇 |
2003年 | 2353篇 |
2002年 | 1864篇 |
2001年 | 1484篇 |
2000年 | 1281篇 |
1999年 | 931篇 |
1998年 | 635篇 |
1997年 | 471篇 |
1996年 | 418篇 |
1995年 | 360篇 |
1994年 | 246篇 |
1993年 | 164篇 |
1992年 | 146篇 |
1991年 | 113篇 |
1990年 | 85篇 |
1989年 | 86篇 |
1988年 | 74篇 |
1987年 | 41篇 |
1986年 | 32篇 |
1985年 | 38篇 |
1984年 | 38篇 |
1983年 | 20篇 |
1982年 | 35篇 |
1981年 | 22篇 |
1980年 | 5篇 |
1979年 | 6篇 |
1978年 | 5篇 |
1977年 | 7篇 |
1964年 | 10篇 |
1963年 | 6篇 |
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
61.
谢建章 《数字社区&智能家居》2010,(6):1324-1325
军工企业涉密网络安全是军工涉密网络系统建设和使用中面临的重大课题.该文从用户终端安全的角度出发.阐述了统一安全防护的思路,并对其具体内容做了较为详细的论述。 相似文献
62.
Sharon Christensen William J. Caelli William D. Duncan 《Information & Communications Technology Law》2010,19(1):61-85
Critical, or national, information infrastructure protection, referred to as either CIIP or NIIP, has been highlighted as a critical factor in overall national security by the United States, the United Kingdom, India and the European Community. As nations move inexorably towards so-called ‘digital economies’, critical infrastructure depends on information systems to process, transfer, store and exchange information through the Internet. Electronic attacks such as denial of service attacks on critical information infrastructures challenge the law and raise concerns. A myriad of issues potentially plague the protection of critical information infrastructures owing to the lack of legal regulation aimed at ensuring the protection of critical information infrastructures. This paper will highlight the legal concerns that relate to the denial of service attacks on critical information infrastructures and provide an introductory overview of the law as it relates to CIIP in Australia. 相似文献
63.
郑霞 《数码设计:surface》2010,(1):159-161
从对香港理工大学设计年展的整体状况与作品分析,到与国际设计及内地设计教育的比较中,归纳了目前香港设计院校教育及设计的现状特点。立足本地,强调设计的人性化,以及对前沿国际设计的吸纳与开放性的学习都是本次年展中所折射出的主要特征。 相似文献
64.
65.
A stochastic differential equation involving both a Wiener process and fractional Brownian motion, with nonhomogeneous coefficients and random initial condition, is considered. The coefficients and initial condition depend on a parameter. The assumptions on the coefficients and the initial condition supplying continuous dependence of the solution on a parameter, with respect to the Besov space norm, are established. 相似文献
66.
In this paper, we shall establish sufficient conditions for the existence of mild solutions for nonlocal impulsive differential inclusions. On the basis of the fixed point theorems for multivalued maps and the technique of approximate solutions, new results are obtained. Examples are also provided to illustrate our results. 相似文献
67.
Since 1999, the National Commission for the Knowledge and Use of the Biodiversity (CONABIO) in Mexico has been developing and managing the “Operational program for the detection of hot-spots using remote sensing techniques”. This program uses images from the MODerate resolution Imaging Spectroradiometer (MODIS) onboard the Terra and Aqua satellites and from the Advanced Very High Resolution Radiometer of the National Oceanic and Atmospheric Administration (NOAA-AVHRR), which are operationally received through the Direct Readout station (DR) at CONABIO. This allows the near-real time monitoring of fire events in Mexico and Central America. In addition to the detection of active fires, the location of hot spots are classified with respect to vegetation types, accessibility, and risk to Nature Protection Areas (NPA). Besides the fast detection of fires, further analysis is necessary due to the considerable effects of forest fires on biodiversity and human life. This fire impact assessment is crucial to support the needs of resource managers and policy makers for adequate fire recovery and restoration actions. CONABIO attempts to meet these requirements, providing post-fire assessment products as part of the management system in particular for satellite-based burnt area mapping. This paper provides an overview of the main components of the operational system and will present an outlook to future activities and system improvements, especially the development of a burnt area product. A special focus will also be placed on the fire occurrence within NPAs of Mexico. 相似文献
68.
Wei-Hung Lin Yuh-Rau Wang Shi-Jinn Horng Tzong-Wann Kao Yi Pan 《Expert systems with applications》2009,36(9):11509-11516
This paper proposes a blind watermarking algorithm based on maximum wavelet coefficient quantization for copyright protection. The wavelet coefficients are grouped into different block size and blocks are randomly selected from different subbands. We add different energies to the maximum wavelet coefficient under the constraint that the maximum wavelet coefficient is always maximum in a block. The watermark is embedded the local maximum coefficient which can effectively resist attacks. Also, using the block-based watermarking, we can extract the watermark without using the original image or watermark. Experimental results show that the proposed method is quite robust under either non-geometry or geometry attacks. 相似文献
69.
70.
Marie-Nathalie Contou-Carrere Yiannis N. Kaznessis Prodromos Daoutidis 《Systems & Control Letters》2011,60(1):75-86
This paper addresses the model reduction problem for a class of stiff chemical Langevin equations that arise as models of biomolecular networks with fast and slow reactions and can be described as continuous Markov processes. Initially, a coordinate transformation is sought that allows the decoupling of fast and slow variables in the model equations. Necessary and sufficient conditions are derived for such a linear transformation to exist, along with an explicit change of variables which achieves the desired decoupling. For the systems for which this step is applicable, the method of adiabatic elimination is applied to determine a representation of the slow dynamics. Theoretical concepts and results are illustrated with simple examples. 相似文献