全文获取类型
收费全文 | 20388篇 |
免费 | 2377篇 |
国内免费 | 1817篇 |
专业分类
电工技术 | 2173篇 |
技术理论 | 5篇 |
综合类 | 2087篇 |
化学工业 | 277篇 |
金属工艺 | 29篇 |
机械仪表 | 323篇 |
建筑科学 | 906篇 |
矿业工程 | 495篇 |
能源动力 | 331篇 |
轻工业 | 330篇 |
水利工程 | 399篇 |
石油天然气 | 149篇 |
武器工业 | 101篇 |
无线电 | 4364篇 |
一般工业技术 | 461篇 |
冶金工业 | 213篇 |
原子能技术 | 44篇 |
自动化技术 | 11895篇 |
出版年
2024年 | 83篇 |
2023年 | 240篇 |
2022年 | 448篇 |
2021年 | 617篇 |
2020年 | 636篇 |
2019年 | 454篇 |
2018年 | 398篇 |
2017年 | 545篇 |
2016年 | 611篇 |
2015年 | 705篇 |
2014年 | 1895篇 |
2013年 | 1441篇 |
2012年 | 1932篇 |
2011年 | 2104篇 |
2010年 | 1537篇 |
2009年 | 1559篇 |
2008年 | 1577篇 |
2007年 | 1724篇 |
2006年 | 1453篇 |
2005年 | 1216篇 |
2004年 | 947篇 |
2003年 | 834篇 |
2002年 | 504篇 |
2001年 | 347篇 |
2000年 | 248篇 |
1999年 | 134篇 |
1998年 | 82篇 |
1997年 | 53篇 |
1996年 | 46篇 |
1995年 | 28篇 |
1994年 | 26篇 |
1993年 | 16篇 |
1992年 | 17篇 |
1991年 | 10篇 |
1990年 | 8篇 |
1989年 | 8篇 |
1988年 | 6篇 |
1987年 | 2篇 |
1986年 | 5篇 |
1985年 | 20篇 |
1984年 | 17篇 |
1983年 | 16篇 |
1982年 | 12篇 |
1981年 | 5篇 |
1980年 | 3篇 |
1979年 | 3篇 |
1958年 | 1篇 |
1957年 | 1篇 |
1956年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 296 毫秒
981.
分析了采用Windows图形化终端后所存在的管理难度大、复杂度高、监控不到位等问题,提出了针对银行业的网点终端管控安全框架,强调从终端管理安全策略、标准入手,结合终端管控平台系统的建设,在流程规范的指导下完成相关的安全任务操作,实现终端安全管理的集约化、标准化、自动化.重点介绍了终端管控平台系统及其参考的建设方案.实践证明,新一代银行网点图形化终端管控平台可以对网点终端进行全方位的管理与监控,有效地支撑了银行业务创新能力. 相似文献
982.
根据精神专科医院的实际情况提出了以电子病历为核心,整合现有资源、统一集成、信息共享,服务患者的医院综合信息管理解决方案.也为未来实现医疗信息的区域共享打下基础. 相似文献
983.
984.
目前物流运输配送安全管理主要依靠GPS技术进行管理, 缺乏整体安全管理技术手段. 提出了一种物流物联网监控技术. 该技术实现了物联网传感器系统、视频监控系统、单兵可视通话指挥系统、司乘人员终端、通讯系统等技术的综合应用. 通过实际项目应用, 验证了该技术可以广泛应用于实现保障运输安全、提高运输效率、管理运输绩效、处理应急情况等. 相似文献
985.
986.
987.
Yufeng Wang Akihiro Nakao Athanasios V. VasilakosJianhua Ma 《Computer Communications》2011,34(3):241-249
This paper thoroughly investigates the evolutionary dynamics of soft security mechanism, namely, reciprocity-based incentive mechanism, in P2P systems based on Evolutionary Game Theory (EGT). By soft security mechanism, it means social control mechanisms to overcome peers’ selfish (rational) behaviors, and encourage cooperation in P2P systems. Specifically, there exist three strategies in P2P systems: always cooperative (ALLC), always defect (ALLD) and reciprocator (R). Instead of existing work which take it for granted that, like ALLC users, R users did not bear any information-seeking cost, we assume small reciprocation cost, and study generalized mutation-selection dynamics. Our contributions are threefold: firstly, we prove and illustrate that, in a well-mixed P2P structure, ALLD is the only strict Nash equilibrium; secondly, we infer the specific condition under which evolution dynamics exhibits rock-scissors-paper oscillation in a structured P2P population. That is, the population cycles from ALLD to R to ALLC and back to ALLD; finally, we theoretically illustrate that the intensity of selection plays an important role in the evolutionary dynamics of P2P incentive mechanism. That is, when the intensity of selection is relatively weak and reciprocation cost limits to zero, the time average can be mostly concentrated on reciprocator. In brief, considering the existence of reciprocation cost and the small mutation in P2P incentive mechanisms, unlike existing work, it is impossible to simply achieve the “absolute cooperative” in P2P incentive mechanisms. On the other hand, stochastic evolution in P2P incentive mechanism with finite population and network structure still favor reciprocation. 相似文献
988.
Yaoxue Zhang Yuezhi Zhou 《Computer Communications》2011,34(13):1539-1548
Recent advances of hardware, software, and networks have made the management and security issues increasingly challenging in PC usage. Due to the tight coupling of hardware and software, each one of the hundreds or thousands of PCs connected in a networked environment has to be managed and administrated individually, leading to a high Total Cost of Ownership (TCO). We argue that a centralized storage of software and data, while distributed computation in clients, i.e., transparent computing, can address these challenges potentially and reduce the complexity with reduced software maintenance time, improved system availability, and enhanced security.This paper presents a novel approach, named StoreVirt, to realize transparent computing, which separates computation and storage from inside a single physical machine to different machines with a storage virtualization mechanism. With virtualization, all the OSes, applications, and data of clients are centered on the servers and scheduled on demand to run on different clients in a “block-streaming” way. Therefore, due to the central storage of OSes and applications, the installation, maintenance, and management are also centralized, leaving the clients light-weighted. Further, due to timely patching and upgrading, the system security can be improved. Experimental and real-world experiences demonstrate that this approach is efficient and feasible for real usages. 相似文献
989.
990.
Loren Paul ReesAuthor VitaeJason K. DeaneAuthor Vitae Terry R. RakesAuthor VitaeWade H. BakerAuthor Vitae 《Decision Support Systems》2011,51(3):493-505
Security countermeasures help ensure the confidentiality, availability, and integrity of information systems by preventing or mitigating asset losses from Cybersecurity attacks. Due to uncertainty, the financial impact of threats attacking assets is often difficult to measure quantitatively, and thus it is difficult to prescribe which countermeasures to employ. In this research, we describe a decision support system for calculating the uncertain risk faced by an organization under cyber attack as a function of uncertain threat rates, countermeasure costs, and impacts on its assets. The system uses a genetic algorithm to search for the best combination of countermeasures, allowing the user to determine the preferred tradeoff between the cost of the portfolio and resulting risk. Data collected from manufacturing firms provide an example of results under realistic input conditions. 相似文献