全文获取类型
收费全文 | 299192篇 |
免费 | 26590篇 |
国内免费 | 14170篇 |
专业分类
电工技术 | 17495篇 |
技术理论 | 31篇 |
综合类 | 26737篇 |
化学工业 | 45658篇 |
金属工艺 | 11584篇 |
机械仪表 | 15866篇 |
建筑科学 | 36358篇 |
矿业工程 | 17895篇 |
能源动力 | 13742篇 |
轻工业 | 29090篇 |
水利工程 | 11436篇 |
石油天然气 | 26653篇 |
武器工业 | 3586篇 |
无线电 | 15775篇 |
一般工业技术 | 21074篇 |
冶金工业 | 15198篇 |
原子能技术 | 2767篇 |
自动化技术 | 29007篇 |
出版年
2024年 | 1324篇 |
2023年 | 4019篇 |
2022年 | 7834篇 |
2021年 | 10363篇 |
2020年 | 10204篇 |
2019年 | 8118篇 |
2018年 | 7611篇 |
2017年 | 8997篇 |
2016年 | 10842篇 |
2015年 | 11262篇 |
2014年 | 19934篇 |
2013年 | 18507篇 |
2012年 | 21753篇 |
2011年 | 23623篇 |
2010年 | 17106篇 |
2009年 | 17161篇 |
2008年 | 15416篇 |
2007年 | 19070篇 |
2006年 | 17726篇 |
2005年 | 15292篇 |
2004年 | 12750篇 |
2003年 | 11178篇 |
2002年 | 9192篇 |
2001年 | 7672篇 |
2000年 | 6561篇 |
1999年 | 5223篇 |
1998年 | 3882篇 |
1997年 | 3373篇 |
1996年 | 2709篇 |
1995年 | 2286篇 |
1994年 | 1918篇 |
1993年 | 1418篇 |
1992年 | 1138篇 |
1991年 | 843篇 |
1990年 | 703篇 |
1989年 | 643篇 |
1988年 | 352篇 |
1987年 | 291篇 |
1986年 | 255篇 |
1985年 | 263篇 |
1984年 | 215篇 |
1983年 | 162篇 |
1982年 | 108篇 |
1981年 | 174篇 |
1980年 | 135篇 |
1979年 | 55篇 |
1978年 | 26篇 |
1977年 | 26篇 |
1959年 | 28篇 |
1951年 | 37篇 |
排序方式: 共有10000条查询结果,搜索用时 14 毫秒
991.
本文主要介绍了电热水器的定时保温控制系统的设计.根据系统的特点,设计分为时钟定时部分、温度采集部分和电源控制部分.本设计的时钟设定及显示功能利用PIC16F877A芯片来完成,温度采集部分由温度传感器DS18B20来完成,电源控制部分由继电器来完成,同时利用PIC 16F877A的RB端口来控制电热水器开关及输入调整时间和温度. 相似文献
992.
随着企业生产规模的扩大,其所掌控的资产也越来越多。信息作为企业重要的资产,其安全性正得到越来越多的企业的关注,很多企业为了保证自身信息的安全与保密性,也制订了自身的信息安全策略。然而,很多企业的信息安全策略常常形同虚设,没有发挥其应有的作用,甚至存在着严重的漏洞,为企业的健康发展埋下了不小的隐患。笔者结合自身多年的工作经验,就企业信息安全策略实施过程中存在的问题进行分析,并针对性的提出几点对策,希望对相关人士能有所帮助。 相似文献
993.
针对单缓冲技术在过滤驱动透明加解密中存在的缺陷和不足,本文提出采用双缓冲机制,在内核态创建两个缓冲区,授权程序访问解密缓冲区数据,非授权程序访问非解密缓冲区数据,两者互不影响。首先对文件系统过滤驱动和双缓冲技术进行理论研究,然后提出了系统的设计思想,建立设计方案,进行实现和应用。通过测试结果表明,该系统对透明加解密系统性能和兼容性有很大提升。 相似文献
994.
本文力求全面剖析中小商业银行的等级保护咨询服务项目,帮助将要开展信息安全等级保护的咨询方和银行信息安全管理者明确等级保护的咨询服务所涵盖的内容及所能达到的目标。 相似文献
995.
《Information Security Journal: A Global Perspective》2013,22(1):40-46
ABSTRACT Social engineering is a methodology that allows an attacker to bypass technical controls by attacking the human element in an organization. There are many techniques commonly used in social engineering including but not limited to Trojan and phishing email messages, impersonation, persuasion, bribery, shoulder surfing, and dumpster diving. Hackers rely on social engineering attacks to bypass technical controls by focusing on the human factors. Social engineers often exploit the natural tendency people have toward trusting others who seem likeable or credible, deferring to authority or need to acquiesce to social conformity. Mitigation of social engineering begins with good policy and awareness training, but there are a number of other approaches an organization can take to defend against this type of an attack. Social engineering attacks are likely to increase, and it is becoming increasingly important for organizations to address this issue. 相似文献
996.
《Information Security Journal: A Global Perspective》2013,22(4):183-192
ABSTRACT Insider threats pose significant challenges to any organization. Many solutions have been proposed in the past to detect insider threats. Unfortunately, given the complexity of the problem and the human factors involved, many solutions which have been proposed face strict constraints and limitations when it comes to the working environment. As a result, many past insider threat solutions have in practice failed in their implementations. In this work, we review some of the recent insider threat detection solutions and explore their benefits and limitations. We also discuss insider threat issues for emerging areas such as cloud computing, virtualization, and social networking. 相似文献
997.
Despite the fact that progress in face recognition algorithms over the last decades has been made, changing lighting conditions and different face orientation still remain as a challenging problem. A standard face recognition system identifies the person by comparing the input picture against pictures of all faces in a database and finding the best match. Usually face matching is carried out in two steps: during the first step detection of a face is done by finding exact position of it in a complex background (various lightning condition), and in the second step face identification is performed using gathered databases. In reality detected faces can appear in different position and they can be rotated, so these disturbances reduce quality of the recognition algorithms dramatically. In this paper to increase the identification accuracy we propose original geometric normalization of the face, based on extracted facial feature position such as eyes. For the eyes localization lbllowing methods has been used: color based method, mean eye template and SVM (Support Vector Machine) technique. Experimental investigation has shown that the best results for eye center detection can be achieved using SVM technique. The recognition rate increases statistically by 28% using face orientation normalization based on the eyes position. 相似文献
998.
A DC (data center) demands air-conditioning power as large as the 1/3-1/2 of total electricity consumption. Thus, energy saving of cooling power of DC yields considerable effect on both economic and environmental views. PV (Photovoltaic) and absorption refrigerator with CGS (cogeneration systems) or gas boiler are possible power saving options. The waste warm air from DC would be utilized for greenhouse heating when DC and greenhouse locate near in the suburbs. In this study, the authors develop an energy network model to assess the potential contribution of DC as a major electric power and chilled air consumer as well as the warm air supplier in a district to the energy efficiency improvement. The evaporation heat of LNG (liquefied natural gas) utilization is also considered as well as PV, CGS. This model is applied to the cases of the urban area in Tokyo which involves athletic center, shops and hospital and the suburbs including greenhouse and then compared. 相似文献
999.
To further improve the boiler ash ratio detection methods and resource utilization, through image processing technology for boiler ash ratio analysis, the article first studied the one-dimensional Otsu algorithm, and then for the one-dimensional Otsu algorithm, in order to improve the accuracy of the algorithm, then it puts forward a two-dimensional Otsu algorithm. Finally the two-dimensional Otsu algorithm combined with the one-dimensional Otsu algorithm and the improved Otsu algorithm. By analyzing the improved Otsu algorithm, this paper considers the pixel gray value, neighborhood information, excluding light, noise and the relative efficiency of one-dimensional Otsu algorithm higher accuracy. The relative dimensional Otsu algorithm operating efficiency has been greatly improved. Improved Otsu algorithm in dealing with boiler ash ratio detection has played a very good part in the ecological environment, economic development and some other important aspects. 相似文献
1000.
随着网络空间对抗形式的日趋严峻,网络空间安全、尤其是网络基础设施安全得到世界各国的普遍重视.网络空问安全呈现出从基于特征“辨伪”向基于身份“识真”的发展趋势.通过对网络空间安全的发展现状、防护需求、防护技术的研究,提出“以信任为基础,网络与安全一体化设计”的设计理念,并给出网络空间安全防护技术体系的架构设计,形成覆盖主机-网络-应用的纵深防护体系. 相似文献