全文获取类型
收费全文 | 84219篇 |
免费 | 6927篇 |
国内免费 | 4094篇 |
专业分类
电工技术 | 6208篇 |
技术理论 | 21篇 |
综合类 | 14415篇 |
化学工业 | 6532篇 |
金属工艺 | 3447篇 |
机械仪表 | 5432篇 |
建筑科学 | 15132篇 |
矿业工程 | 4678篇 |
能源动力 | 2035篇 |
轻工业 | 3560篇 |
水利工程 | 5174篇 |
石油天然气 | 3524篇 |
武器工业 | 660篇 |
无线电 | 5458篇 |
一般工业技术 | 6292篇 |
冶金工业 | 3521篇 |
原子能技术 | 591篇 |
自动化技术 | 8560篇 |
出版年
2024年 | 283篇 |
2023年 | 689篇 |
2022年 | 1517篇 |
2021年 | 1728篇 |
2020年 | 1748篇 |
2019年 | 1473篇 |
2018年 | 1355篇 |
2017年 | 1972篇 |
2016年 | 2287篇 |
2015年 | 2853篇 |
2014年 | 6179篇 |
2013年 | 4595篇 |
2012年 | 5929篇 |
2011年 | 6498篇 |
2010年 | 5186篇 |
2009年 | 5690篇 |
2008年 | 5077篇 |
2007年 | 6515篇 |
2006年 | 6093篇 |
2005年 | 5099篇 |
2004年 | 4204篇 |
2003年 | 3555篇 |
2002年 | 2879篇 |
2001年 | 2372篇 |
2000年 | 2027篇 |
1999年 | 1532篇 |
1998年 | 1019篇 |
1997年 | 833篇 |
1996年 | 737篇 |
1995年 | 630篇 |
1994年 | 522篇 |
1993年 | 403篇 |
1992年 | 360篇 |
1991年 | 233篇 |
1990年 | 210篇 |
1989年 | 218篇 |
1988年 | 163篇 |
1987年 | 101篇 |
1986年 | 82篇 |
1985年 | 61篇 |
1984年 | 53篇 |
1983年 | 41篇 |
1982年 | 18篇 |
1981年 | 42篇 |
1980年 | 29篇 |
1979年 | 34篇 |
1978年 | 13篇 |
1975年 | 13篇 |
1973年 | 9篇 |
1959年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 10 毫秒
91.
计算机网络技术的高速发展大幅提高了人们的工作效率和信息获取量,但是提供便利的同时也隐藏着安全隐患。各地保密部门始终高度重视涉密文件、机密数据及个人隐私的安全防护,以防患于未然。因此针对堵截涉密信息泄露扩散的最佳时机研制出监测涉密文档监控系统。系统可通过安装在外网客户端上的监控程序,对客户机上文档的编辑工作进行监控,将编辑的文档标题自动发送给监视控制台或保密局等主管单位,并对编辑的文档自动进行涉密分析,一旦发现该文档可能包含有涉密信息,即刻屏蔽该机的网络连接,并立即报警。 相似文献
92.
杨福宇 《单片机与嵌入式系统应用》2017,17(1)
1553B是飞机电传系统的通信协议,由于硬件上抗干扰仅考虑了系统内部自生的干扰,实际环境要严重得多;因为只按奇偶位作校验,所以错字漏检的概率比较大;由于回传状态字内容不全面,在漏检错字时会发生假冒错;由于指令字出错不易纠正,最好情况下靠2次重传,丢帧可能性大.漏检错帧和丢帧多会使多重冗余的表决机制失效,也会使网络管理类指令失效,成为潜伏的故障.通过定量分析,确定了一些情况下的失效率,例如假定取CAN,Profesafe同样的误码率ber=0.01时,除去最大值/最小值再取均值时的4冗余系统因错字漏检引起的每小时失效可达2×10-1次. 相似文献
93.
物联网技术在现今实际应用中是极为普遍的,所谓物联网技术就是以互联网为载体来进行物与物之间信息交换的过程,以及通过互联网将任何物体与物体联系在一起的一种网络,也就是说,物联网实际上就是物物相连的互联网. 相似文献
94.
翟立宏 《电子制作.电脑维护与应用》2013,(11):44
H.261是ITU-T于1990年制定的一个视频编码标准,设计目的是能够在带宽为64kbps的倍数的综合业务数字网上传输质量可接受的视频信号,是最早的运动图像压缩标准,本文对H.261的视频编码标准关键技术研究。 相似文献
95.
For a positive integer d, an L(d,1)-labeling f of a graph G is an assignment of integers to the vertices of G such that |f(u)−f(v)|?d if uv∈E(G), and |f(u)−f(v)|?1 if u and u are at distance two. The span of an L(d,1)-labeling f of a graph is the absolute difference between the maximum and minimum integers used by f. The L(d,1)-labeling number of G, denoted by λd,1(G), is the minimum span over all L(d,1)-labelings of G. An L′(d,1)-labeling of a graph G is an L(d,1)-labeling of G which assigns different labels to different vertices. Denote by the L′(d,1)-labeling number of G. Georges et al. [Discrete Math. 135 (1994) 103-111] established relationship between the L(2,1)-labeling number of a graph G and the path covering number of Gc, the complement of G. In this paper we first generalize the concept of the path covering of a graph to the t-group path covering. Then we establish the relationship between the L′(d,1)-labeling number of a graph G and the (d−1)-group path covering number of Gc. Using this result, we prove that and for bipartite graphs G can be computed in polynomial time. 相似文献
96.
B. Farhadinia 《Information Sciences》2011,181(7):1348-1357
The main aims of this study are to derive the fuzzy Euler-Lagrange conditions for both fuzzy unconstrained and constrained variational problems based on the concepts of differentiability and integrability of a fuzzy mapping that may be parameterized by the left and right-hand functions of its α-level sets. 相似文献
97.
Vidroha Debroy Author VitaeW. Eric WongAuthor Vitae 《Journal of Systems and Software》2011,84(4):587-602
Test set size in terms of the number of test cases is an important consideration when testing software systems. Using too few test cases might result in poor fault detection and using too many might be very expensive and suffer from redundancy. We define the failure rate of a program as the fraction of test cases in an available test pool that result in execution failure on that program. This paper investigates the relationship between failure rates and the number of test cases required to detect the faults. Our experiments based on 11 sets of C programs suggest that an accurate estimation of failure rates of potential fault(s) in a program can provide a reliable estimate of adequate test set size with respect to fault detection and should therefore be one of the factors kept in mind during test set construction. Furthermore, the model proposed herein is fairly robust to incorrect estimations in failure rates and can still provide good predictive quality. Experiments are also performed to observe the relationship between multiple faults present in the same program using the concept of a failure rate. When predicting the effectiveness against a program with multiple faults, results indicate that not knowing the number of faults in the program is not a significant concern, as the predictive quality is typically not affected adversely. 相似文献
98.
We investigate asymptotic behavior of the C0-semigroup T(t) associated with the mono-tubular heat exchanger equation with output feedback by a perturbation method. It is shown that T(t) is bounded if a constraint is satisfied by the parameters and the spatial distribution function. Further, applying the Arendt-Batty-Lyubich-Vu theorem, a criterion is established to judge strong stability of T(t). 相似文献
99.
This paper deals with the stability radii of implicit dynamic equations on time scales when the structured perturbations act on both the coefficient of derivative and the right-hand side. Formulas of the stability radii are derived as a unification and generalization of some previous results. A special case where the real stability radius and the complex stability radius are equal is studied. Examples are derived to illustrate results. 相似文献
100.
R. H. R. Harper 《Computer Supported Cooperative Work (CSCW)》2000,9(2):239-264
Ethnography is now one of the key approaches usedwithin the CSCW community to specify the role ofcomputer based systems in work practice. Yet whatethnography involves as a program of inquiries is onlydiscussed in a piecemeal way in the literature. Thispaper attempts to make up for that absence bydescribing one fieldwork program (or programme)developed over a number of projects in whichethnography has been allied with computer systems andwork practice design. The discussions will be ofinterest to both expert practitioners of ethnographyand novices. 相似文献