全文获取类型
收费全文 | 22253篇 |
免费 | 2468篇 |
国内免费 | 1236篇 |
专业分类
电工技术 | 2282篇 |
技术理论 | 7篇 |
综合类 | 2941篇 |
化学工业 | 829篇 |
金属工艺 | 116篇 |
机械仪表 | 315篇 |
建筑科学 | 4436篇 |
矿业工程 | 979篇 |
能源动力 | 918篇 |
轻工业 | 1539篇 |
水利工程 | 5047篇 |
石油天然气 | 795篇 |
武器工业 | 91篇 |
无线电 | 607篇 |
一般工业技术 | 1325篇 |
冶金工业 | 1168篇 |
原子能技术 | 168篇 |
自动化技术 | 2394篇 |
出版年
2024年 | 151篇 |
2023年 | 360篇 |
2022年 | 755篇 |
2021年 | 899篇 |
2020年 | 990篇 |
2019年 | 820篇 |
2018年 | 807篇 |
2017年 | 803篇 |
2016年 | 969篇 |
2015年 | 909篇 |
2014年 | 1686篇 |
2013年 | 1636篇 |
2012年 | 1834篇 |
2011年 | 1697篇 |
2010年 | 1328篇 |
2009年 | 1340篇 |
2008年 | 1232篇 |
2007年 | 1391篇 |
2006年 | 1338篇 |
2005年 | 981篇 |
2004年 | 865篇 |
2003年 | 665篇 |
2002年 | 557篇 |
2001年 | 414篇 |
2000年 | 337篇 |
1999年 | 264篇 |
1998年 | 185篇 |
1997年 | 146篇 |
1996年 | 111篇 |
1995年 | 83篇 |
1994年 | 78篇 |
1993年 | 62篇 |
1992年 | 51篇 |
1991年 | 32篇 |
1990年 | 34篇 |
1989年 | 29篇 |
1988年 | 22篇 |
1987年 | 13篇 |
1986年 | 12篇 |
1985年 | 7篇 |
1984年 | 9篇 |
1983年 | 8篇 |
1982年 | 8篇 |
1981年 | 4篇 |
1979年 | 5篇 |
1975年 | 4篇 |
1964年 | 3篇 |
1963年 | 4篇 |
1961年 | 5篇 |
1959年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
Members of health social networks may be susceptible to privacy leaks by the amount of information they leave behind. The threat to privacy increases when members of these networks reuse their pseudonyms in other social networks. The risk of re‐identifying users from such networks requires quantitative estimates to evaluate its magnitude. The estimates will enable managers and members of health social communities to take corrective measures. We introduce a new re‐identification attack, the social network attack, that takes advantage of the fact that users reuse their pseudonyms. To demonstrate the attack, we establish links between MedHelp and Twitter (two popular social networks) based on matching pseudonyms. We used Bayesian networks to model the re‐identification risk and used stylometric techniques to identify the strength of the links. On the basis of our model 7‐11. 8% of the MedHelp members in the sample population who reused their pseudonyms in Twitter were re‐identifiable compared with 1% who did not. The risk estimates were measured at the 5% risk threshold. Our model was able to re‐identify users with a sensitivity of 41% and specificity of 96%. The potential for re‐identification increases as more data is accumulated from these profiles, which makes the threat of re‐identification more serious. 相似文献
32.
33.
Kim-Choy Chung 《Behaviour & Information Technology》2014,33(7):743-756
This study investigates perceived risk and trust in relationship to the Diffusion of Innovation Theory [Rogers, E.M., 1962. Diffusion of innovations. Glencoe, IL: The Free Press; 1983. Diffusion of innovations. 3rd ed. New York: The Free Press] from a cultural perspective to understand the determinants of behavioural intent to adopt mobile commerce among the Y Generation in Kazakhstan. Surveys from 345 university-level students and subsequent structural equation modelling revealed perceived risk, trustworthiness and Rogers’ five innovation characteristics are important determinants. Perceived risk and trustworthiness are important determinants because of the high uncertainty avoidance characteristics of the Kazakh society. This study advances theory regarding culture- and generation-based characteristics to transition economies by verifying theoretical proposition regarding the behavioural intent towards mobile commerce adoption, resulting in a greater understanding of mobile commerce adoption among the Y Generation in transition economies. Marketing implications are discussed. 相似文献
34.
Michael Nones 《国际水》2017,42(3):324-332
The implementation of the EU Floods Directive by water authorities across Europe has generated a lack of consistency in the present situation, especially regarding the scales adopted, the hydrological scenarios and the elements represented on flood hazard and risk maps. From the EU-funded project HYTECH, this article presents a general overview of Floods Directive implementation in eight European countries, highlighting the differences between them, with particular attention to flood hazard maps. For the implementation cycle that started at the beginning of 2016, a minimization of such differences is necessary in order to manage flood risk in a better and more integrated way. 相似文献
35.
Saadia Drissi Hicham Medromi 《通讯和计算机》2014,(1):52-58
The cloud computing introduces several changes in technology that have resulted a new ways for cloud providers to deliver their services to cloud consumers mainly in term of security risk assessment, thus, adapting a current risk assessment tools to cloud computing is a very difficult task due to its several characteristics that challenge the effectiveness of risk assessment approaches. Consequently, there is a need of risk assessment approach adapted to cloud computing. With such an approach, the cloud consumers can be guaranteed the effectiveness of data security and the cloud providers can win the trust of their cloud consumers. This paper requires the formalization of risk assessment method for conventional system as fundamental steps towards the development of flexible risk assessment approach regarding cloud consumers. 相似文献
36.
电力是现代社会生活、生产的重要能源之一。在电力行业不断发展进步的今天,由于其预算管理已无法满足时代要求,风险管理存在诸多漏洞,导致电力企业的发展受到一定的阻碍。这就需要我们充分分析电力企业的财务预算管理与风险管理的关系,并妥善处理二者间的问题,从而规避企业财务风险。 相似文献
37.
结合实践探讨了在现有生产软件的中小型企业中,如何将软件测试与软件开发相结合,使软件测试管理的质量得以提升。介绍了一些目前常用的软件测试工具及测试管理工具,对软件测试管理中应注意到的80:20问题进行阐述分析,提出对测试管理中可能存在的风险可采取一些方法来应对。实践证明,使用全程软件测试管理对解决测试管理工作中存在的问题有很大帮助。 相似文献
38.
研究了由风险中性制造商和风险规避零售商构成的供应链创新投资问题。通过运用条件风险价值(CVaR)对企业的风险偏好进行测度,构建了分散供应链和集中供应链两种情况下的企业决策模型,并根据数值实验对模型作了进一步的分析。研究结果表明:零售商越担心风险,其对创新的投入越少,并会减少销售量以应对市场风险,从而使得供应链的整体收益下降;分散供应链下的创新投入、销售量和供应链的期望收益低于集中供应链下的创新投入、销售量和供应链的期望收益。施行收益共享契约后,分散供应链下的创新投入和销售量达到了集中供应链下的决策水平,制造商和零售商的期望收益均得到提高。 相似文献
39.
40.
地域通信网作为一种复杂网络系统,具有复杂性、模糊性和多变性等特性,对其脆弱性评估指标赋权时,如果主观性较强,就容易出现与实际数据不相符的现象。针对这一情况,提出将熵值模糊综合评判法应用于地域通信网脆弱性评估。依据地域通信网的实际情况,建立层次化的脆弱性指标体系,在此基础上建立模糊集合及隶属度矩阵。运用熵值法对评价指标进行赋权,依次得到各层指标模糊评价,求得评估结果的数值。该方法充分保证了评估指标权重的客观性,能够更准确、方便地描述地域通信网的脆弱性。 相似文献