首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15494篇
  免费   1002篇
  国内免费   247篇
电工技术   155篇
技术理论   3篇
综合类   862篇
化学工业   1031篇
金属工艺   27篇
机械仪表   155篇
建筑科学   880篇
矿业工程   44篇
能源动力   154篇
轻工业   10943篇
水利工程   176篇
石油天然气   140篇
武器工业   9篇
无线电   284篇
一般工业技术   985篇
冶金工业   188篇
原子能技术   23篇
自动化技术   684篇
  2024年   173篇
  2023年   447篇
  2022年   584篇
  2021年   844篇
  2020年   885篇
  2019年   807篇
  2018年   743篇
  2017年   692篇
  2016年   726篇
  2015年   646篇
  2014年   913篇
  2013年   1249篇
  2012年   965篇
  2011年   921篇
  2010年   611篇
  2009年   556篇
  2008年   451篇
  2007年   692篇
  2006年   689篇
  2005年   566篇
  2004年   446篇
  2003年   406篇
  2002年   330篇
  2001年   202篇
  2000年   235篇
  1999年   182篇
  1998年   118篇
  1997年   107篇
  1996年   83篇
  1995年   76篇
  1994年   61篇
  1993年   57篇
  1992年   52篇
  1991年   35篇
  1990年   26篇
  1989年   19篇
  1988年   15篇
  1987年   22篇
  1986年   24篇
  1985年   22篇
  1984年   16篇
  1983年   4篇
  1982年   11篇
  1981年   2篇
  1980年   6篇
  1966年   2篇
  1964年   4篇
  1959年   3篇
  1958年   3篇
  1955年   4篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
81.
广大消费者越来越关注食品安全问题.聚氯乙烯食品接触材料通常情况下不稳定,需加入热稳定剂使其不易见热分解,而这些热稳定剂有可能迁移入食品中,致使使用者出现毒物反应.本文依据检验工作实践,对PVC食品接触材料中稀土热稳定剂检验方法进行了探讨,并提出了需注意的问题.  相似文献   
82.
This paper presents a Danish study of mitigation directed at nature protection in environmental impact assessment (EIA) of infrastructure projects. The study is based on a document analysis of EIA reports, a workshop held with EIA professionals, and a study of two cases. The paper takes a point of departure in the mitigation hierarchy as a central conceptual framework, identifies which mitigation measures have been suggested in the EIA reports, and compares this to the mitigation hierarchy. Further, the paper explores the dynamics behind which mitigation measures are chosen and later implemented. The findings point to a discrepancy between the prevention principle embedded in the mitigation hierarchy and the actual EIA practice with increased use of nature compensation. Further, the research reveals significant variation in the design of mitigation measures, e.g. in the level of detail used in describing them and the level of clarity as to aims and actions.  相似文献   
83.
通过对面皮传统手工制作工艺的调查分析,提出了面皮工业化生产的工艺和方法,进而对面皮作为方便快餐食品的开发进行了论述。利用先前开发的面皮机和小麦淀粉厂的有关设备,进行了中试试验,在此基础上提出了有关工艺和经济技术指标。  相似文献   
84.
程向前 《计算机教育》2011,(14):28-32,37
针对非计算机专业的普通高校学生开设计算机网络技术与应用课程的改革与实践,提出有别于计算机专业的计算机网络课程的教学重点——以企业信息基础为核心构建知识体系结构。  相似文献   
85.
针对海洋食品对虾生产加工的特点,设计与开发了对虾生产加工中微生物生长智能通用预测平台,为海洋食品的安全生产与加工提供分析手段。  相似文献   
86.
The risk analysis of critical infrastructures such as the electric power supply or telecommunications is complicated by the fact that such infrastructures are mutually dependent. We propose a modular approach to the modelling and analysis of risk scenarios with dependencies. Our approach may be used to deduce the risk level of an overall system from previous risk analyses of its constituent systems. A custom made assumption-guarantee style is put forward as a means to describe risk scenarios with external dependencies. We also define a set of deduction rules facilitating various kinds of reasoning, including the analysis of mutual dependencies between risk scenarios expressed in the assumption-guarantee style.  相似文献   
87.
采用ASP.NET+SQL SEVER数据库结合的解决方案来完成对系统前台功能模块和后台管理模块的操作口。采用人机对话的操作方式,全面实现网上餐饮服务。对用户输入的数据,系统进行严格的数据检验,尽可能排除人为的错误.尽可能的维护系统的稳定和安全可靠日。在采用了新技术新方法的基础上为用户提供了最方便的平台。  相似文献   
88.
Critical, or national, information infrastructure protection, referred to as either CIIP or NIIP, has been highlighted as a critical factor in overall national security by the United States, the United Kingdom, India and the European Community. As nations move inexorably towards so-called ‘digital economies’, critical infrastructure depends on information systems to process, transfer, store and exchange information through the Internet. Electronic attacks such as denial of service attacks on critical information infrastructures challenge the law and raise concerns. A myriad of issues potentially plague the protection of critical information infrastructures owing to the lack of legal regulation aimed at ensuring the protection of critical information infrastructures. This paper will highlight the legal concerns that relate to the denial of service attacks on critical information infrastructures and provide an introductory overview of the law as it relates to CIIP in Australia.  相似文献   
89.
信任模型是整个网络安全体系的基础,决定了在网络上采用信任的形式与采用该形式带来的信任风险,并提供了建立和管理信任关系的框架。可见,对于信任模型的研究在网络安全中非常重要。文章着重分析了基于PKI的各类信任模型的信任机制、认证过程及其存在优缺点,指出了各类信任模型对网络信息安全产生影响的主要原因。通过总结与对比,指出了PKI信任模型的设计策略与发展趋势。  相似文献   
90.
Massimo Ficco  Stefano Russo 《Software》2009,39(13):1095-1125
Location‐aware computing is a form of context‐aware mobile computing that refers to the ability of providing users with services that depend on their position. Locating the user terminal, often called positioning, is essential in this form of computing. Towards this aim, several technologies exist, ranging from personal area networking, to indoor, outdoor, and up to geographic area systems. Developers of location‐aware software applications have to face with a number of design choices, that typically depend on the chosen technology. This work addresses the problem of easing the development of pull location‐aware applications, by allowing uniform access to multiple heterogeneous positioning systems. Towards this aim, the paper proposes an approach to structure location‐aware mobile computing systems in a way independent of positioning technologies. The approach consists in structuring the system into a layered architecture, that provides application developers with a standard Java Application Programming Interface (JSR‐179 API), and encapsulates location data management and technology‐specific positioning subsystems into lower layers with clear interfaces. In order to demonstrate the proposed approach we present the development of HyLocSys. It is an open hybrid software architecture designed to support indoor/outdoor applications, which allows the uniform (combined or separate) use of several positioning technologies. HyLocSys uses a hybrid data model, which allows the integration of different location information representations (using symbolic and geometric coordinates). Moreover, it allows support to handset‐ and infrastructure‐based positioning approaches while respecting the privacy of the user. The paper presents a prototypal implementation of HyLocSys for heterogeneous scenarios. It has been implemented and tested on several platforms and mobile devices. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号