首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   299192篇
  免费   26590篇
  国内免费   14170篇
电工技术   17495篇
技术理论   31篇
综合类   26737篇
化学工业   45658篇
金属工艺   11584篇
机械仪表   15866篇
建筑科学   36358篇
矿业工程   17895篇
能源动力   13742篇
轻工业   29090篇
水利工程   11436篇
石油天然气   26653篇
武器工业   3586篇
无线电   15775篇
一般工业技术   21074篇
冶金工业   15198篇
原子能技术   2767篇
自动化技术   29007篇
  2024年   1324篇
  2023年   4019篇
  2022年   7834篇
  2021年   10363篇
  2020年   10204篇
  2019年   8118篇
  2018年   7611篇
  2017年   8997篇
  2016年   10842篇
  2015年   11262篇
  2014年   19934篇
  2013年   18507篇
  2012年   21753篇
  2011年   23623篇
  2010年   17106篇
  2009年   17161篇
  2008年   15416篇
  2007年   19070篇
  2006年   17726篇
  2005年   15292篇
  2004年   12750篇
  2003年   11178篇
  2002年   9192篇
  2001年   7672篇
  2000年   6561篇
  1999年   5223篇
  1998年   3882篇
  1997年   3373篇
  1996年   2709篇
  1995年   2286篇
  1994年   1918篇
  1993年   1418篇
  1992年   1138篇
  1991年   843篇
  1990年   703篇
  1989年   643篇
  1988年   352篇
  1987年   291篇
  1986年   255篇
  1985年   263篇
  1984年   215篇
  1983年   162篇
  1982年   108篇
  1981年   174篇
  1980年   135篇
  1979年   55篇
  1978年   26篇
  1977年   26篇
  1959年   28篇
  1951年   37篇
排序方式: 共有10000条查询结果,搜索用时 14 毫秒
991.
本文主要介绍了电热水器的定时保温控制系统的设计.根据系统的特点,设计分为时钟定时部分、温度采集部分和电源控制部分.本设计的时钟设定及显示功能利用PIC16F877A芯片来完成,温度采集部分由温度传感器DS18B20来完成,电源控制部分由继电器来完成,同时利用PIC 16F877A的RB端口来控制电热水器开关及输入调整时间和温度.  相似文献   
992.
随着企业生产规模的扩大,其所掌控的资产也越来越多。信息作为企业重要的资产,其安全性正得到越来越多的企业的关注,很多企业为了保证自身信息的安全与保密性,也制订了自身的信息安全策略。然而,很多企业的信息安全策略常常形同虚设,没有发挥其应有的作用,甚至存在着严重的漏洞,为企业的健康发展埋下了不小的隐患。笔者结合自身多年的工作经验,就企业信息安全策略实施过程中存在的问题进行分析,并针对性的提出几点对策,希望对相关人士能有所帮助。  相似文献   
993.
针对单缓冲技术在过滤驱动透明加解密中存在的缺陷和不足,本文提出采用双缓冲机制,在内核态创建两个缓冲区,授权程序访问解密缓冲区数据,非授权程序访问非解密缓冲区数据,两者互不影响。首先对文件系统过滤驱动和双缓冲技术进行理论研究,然后提出了系统的设计思想,建立设计方案,进行实现和应用。通过测试结果表明,该系统对透明加解密系统性能和兼容性有很大提升。  相似文献   
994.
本文力求全面剖析中小商业银行的等级保护咨询服务项目,帮助将要开展信息安全等级保护的咨询方和银行信息安全管理者明确等级保护的咨询服务所涵盖的内容及所能达到的目标。  相似文献   
995.
ABSTRACT

Social engineering is a methodology that allows an attacker to bypass technical controls by attacking the human element in an organization. There are many techniques commonly used in social engineering including but not limited to Trojan and phishing email messages, impersonation, persuasion, bribery, shoulder surfing, and dumpster diving. Hackers rely on social engineering attacks to bypass technical controls by focusing on the human factors. Social engineers often exploit the natural tendency people have toward trusting others who seem likeable or credible, deferring to authority or need to acquiesce to social conformity. Mitigation of social engineering begins with good policy and awareness training, but there are a number of other approaches an organization can take to defend against this type of an attack. Social engineering attacks are likely to increase, and it is becoming increasingly important for organizations to address this issue.  相似文献   
996.
ABSTRACT

Insider threats pose significant challenges to any organization. Many solutions have been proposed in the past to detect insider threats. Unfortunately, given the complexity of the problem and the human factors involved, many solutions which have been proposed face strict constraints and limitations when it comes to the working environment. As a result, many past insider threat solutions have in practice failed in their implementations. In this work, we review some of the recent insider threat detection solutions and explore their benefits and limitations. We also discuss insider threat issues for emerging areas such as cloud computing, virtualization, and social networking.  相似文献   
997.
Despite the fact that progress in face recognition algorithms over the last decades has been made, changing lighting conditions and different face orientation still remain as a challenging problem. A standard face recognition system identifies the person by comparing the input picture against pictures of all faces in a database and finding the best match. Usually face matching is carried out in two steps: during the first step detection of a face is done by finding exact position of it in a complex background (various lightning condition), and in the second step face identification is performed using gathered databases. In reality detected faces can appear in different position and they can be rotated, so these disturbances reduce quality of the recognition algorithms dramatically. In this paper to increase the identification accuracy we propose original geometric normalization of the face, based on extracted facial feature position such as eyes. For the eyes localization lbllowing methods has been used: color based method, mean eye template and SVM (Support Vector Machine) technique. Experimental investigation has shown that the best results for eye center detection can be achieved using SVM technique. The recognition rate increases statistically by 28% using face orientation normalization based on the eyes position.  相似文献   
998.
A DC (data center) demands air-conditioning power as large as the 1/3-1/2 of total electricity consumption. Thus, energy saving of cooling power of DC yields considerable effect on both economic and environmental views. PV (Photovoltaic) and absorption refrigerator with CGS (cogeneration systems) or gas boiler are possible power saving options. The waste warm air from DC would be utilized for greenhouse heating when DC and greenhouse locate near in the suburbs. In this study, the authors develop an energy network model to assess the potential contribution of DC as a major electric power and chilled air consumer as well as the warm air supplier in a district to the energy efficiency improvement. The evaporation heat of LNG (liquefied natural gas) utilization is also considered as well as PV, CGS. This model is applied to the cases of the urban area in Tokyo which involves athletic center, shops and hospital and the suburbs including greenhouse and then compared.  相似文献   
999.
To further improve the boiler ash ratio detection methods and resource utilization, through image processing technology for boiler ash ratio analysis, the article first studied the one-dimensional Otsu algorithm, and then for the one-dimensional Otsu algorithm, in order to improve the accuracy of the algorithm, then it puts forward a two-dimensional Otsu algorithm. Finally the two-dimensional Otsu algorithm combined with the one-dimensional Otsu algorithm and the improved Otsu algorithm. By analyzing the improved Otsu algorithm, this paper considers the pixel gray value, neighborhood information, excluding light, noise and the relative efficiency of one-dimensional Otsu algorithm higher accuracy. The relative dimensional Otsu algorithm operating efficiency has been greatly improved. Improved Otsu algorithm in dealing with boiler ash ratio detection has played a very good part in the ecological environment, economic development and some other important aspects.  相似文献   
1000.
随着网络空间对抗形式的日趋严峻,网络空间安全、尤其是网络基础设施安全得到世界各国的普遍重视.网络空问安全呈现出从基于特征“辨伪”向基于身份“识真”的发展趋势.通过对网络空间安全的发展现状、防护需求、防护技术的研究,提出“以信任为基础,网络与安全一体化设计”的设计理念,并给出网络空间安全防护技术体系的架构设计,形成覆盖主机-网络-应用的纵深防护体系.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号