全文获取类型
收费全文 | 21378篇 |
免费 | 1362篇 |
国内免费 | 800篇 |
专业分类
电工技术 | 331篇 |
技术理论 | 1篇 |
综合类 | 1551篇 |
化学工业 | 7401篇 |
金属工艺 | 530篇 |
机械仪表 | 331篇 |
建筑科学 | 1639篇 |
矿业工程 | 648篇 |
能源动力 | 176篇 |
轻工业 | 2873篇 |
水利工程 | 155篇 |
石油天然气 | 2393篇 |
武器工业 | 136篇 |
无线电 | 584篇 |
一般工业技术 | 1305篇 |
冶金工业 | 597篇 |
原子能技术 | 168篇 |
自动化技术 | 2721篇 |
出版年
2024年 | 53篇 |
2023年 | 128篇 |
2022年 | 330篇 |
2021年 | 368篇 |
2020年 | 359篇 |
2019年 | 281篇 |
2018年 | 300篇 |
2017年 | 466篇 |
2016年 | 535篇 |
2015年 | 558篇 |
2014年 | 958篇 |
2013年 | 958篇 |
2012年 | 1346篇 |
2011年 | 1435篇 |
2010年 | 1006篇 |
2009年 | 1131篇 |
2008年 | 1027篇 |
2007年 | 1579篇 |
2006年 | 1545篇 |
2005年 | 1531篇 |
2004年 | 1297篇 |
2003年 | 1183篇 |
2002年 | 1015篇 |
2001年 | 911篇 |
2000年 | 715篇 |
1999年 | 615篇 |
1998年 | 474篇 |
1997年 | 318篇 |
1996年 | 253篇 |
1995年 | 245篇 |
1994年 | 180篇 |
1993年 | 123篇 |
1992年 | 93篇 |
1991年 | 65篇 |
1990年 | 55篇 |
1989年 | 46篇 |
1988年 | 15篇 |
1987年 | 18篇 |
1986年 | 9篇 |
1985年 | 2篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1957年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 250 毫秒
91.
XIAN He-qun FENG Deng-guo 《通讯和计算机》2007,4(3):44-51
Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various security issues. This paper proposes a method called Private Key Consignment to solve the problem of how to protect the data carried by mobile agents. It exploits new functionalities and mechanism provided by the trusted computing technology, and adopts both public key and symmetric key cryptographic means for data and key protection. The most notable feature of this method is that it protects the private key of the agent by consigning it to a tamper proof hardware, thus, enabling convenient and secure use of the private key. It provides a new scheme of mobile agents' data protection. 相似文献
92.
Kuo-Ming Chao Muhammad Younas Nick Godwin Pen-Choug Sun 《International Journal of Wireless Information Networks》2006,13(2):141-150
The popularity of grid services has widened their application to numerous domains and increased the utilization of computational resources. In order to create more incentives for the resources owners to lease their resources and prevent users from wasting the resources, the introduction of a market-oriented grid is inevitable. However, the issues for the negotiation between service provider and consumer over the supply and demand of resources can be complex, with highly interdependent issues. In this research, a simulated automated negotiation mechanism including a co-evolutionary mechanism and a modified game theory approach is proposed, to assist them in reaching an agreement over the conflicting issues. In the proposed architecture, the co-evolution process is able to reduce the multiple dimensional search space into a two-dimension search space and identify the appropriate negotiation strategies for the negotiating agents to form a payoff matrix which can be used for the game theory related stage of their interaction. The multiple stage negotiation process is introduced to improve the negotiation result. In this paper, an application which requires a large amount of computational resources to process the data generated from mobile devises is used to demonstrate that the proposed system is able to resolve the conflicts and obtain a valid solution. 相似文献
93.
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer
(OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a
new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel
technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the
design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general
portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is
the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting
mobile agents not only is possible, but also can be implemented efficiently.
This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval
Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399
and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper
was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003.
Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position
at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical
Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases,
and wireless networks. On the theoretical side, he is interested in cryptography and game theory.
Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile
computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS)
at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received
his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998
and 2001). 相似文献
94.
Haruo Mimura Ryusei Sato Yu Sasaki Yuichi Furuyama Akira Taniike Kazutoshi Yoshida Akira Kitamura 《International journal of molecular sciences》2008,9(10):1989-2002
Tributyltin (TBT) released into seawater from ship hulls is a stable marine pollutant and obviously remains in marine environments. We isolated a TBT resistant marine Pseudoalteromonas sp. TBT1 from sediment of a ship’s ballast water. The isolate (109.3 ± 0.2 colony-forming units mL−1) adsorbed TBT in proportion to the concentrations of TBTCl externally added up to 3 mM, where the number of TBT adsorbed by a single cell was estimated to be 108.2. The value was reduced to about one-fifth when the lysozyme-treated cells were used. The surface of ethanol treated cells became rough, but the capacity of TBT adsorption was the same as that for native cells. These results indicate that the function of the cell surface, rather than that structure, plays an important role to the adsorption of TBT. The adsorption state of TBT seems to be multi-layer when the number of more than 106.8 TBT molecules is adsorbed by a single cell. 相似文献
95.
吸水膨胀型膨润土/交联聚丙烯酰胺颗粒堵剂 总被引:9,自引:0,他引:9
使丙烯酰胺、少量N,N-亚甲基双丙烯酰胺在钙膨润土存在下进行水溶液引发接枝共聚合,聚合产物经造粒、粉碎、筛分,得到粒径0.5~1.0mm的颗粒堵剂。根据颗粒堵剂吸水量大小确定丙烯酰胺与膨润土最佳质量比为7:1,引发剂最佳用量为500g/t,交联剂最佳用量为300g/t,吸水量与这3个参数之间的关系曲线都经过最大值,颗粒堵剂在去离子水中的吸水量为560~650mL/g。该堵剂已大规模生产,在胜利、中原油田许多采油厂已用于调剖、堵水和调驱施工,在青海、江苏、大港、冀东等油田也已开始使用。在胜利东辛采油厂的一个井组,连续3个月在3口井注入该堵剂共27t,使井口压力上升3MPa,产油量大幅度增加。表l参l。 相似文献
96.
原油破乳脱钙复合剂的研制 总被引:2,自引:0,他引:2
介绍了原油破乳脱钙复合剂的筛选方法。所用的破乳剂有PY、UD 10、2 0 40、SDX、SL、硬脂酸 三乙醇胺 ,所用的脱钙剂有KL 1、KL 2、KL 3、KL 4、YH、EA、SJ、LP。首先将一定量的破乳剂与原油混合 ,振荡、静置 ,按油水分层情况及脱水率 ,筛选出较优的破乳剂。然后 ,在已加入破乳剂的原油中加入一定量的脱钙剂水溶液 ,振荡、静置 ,用燃烧瓶法处理油样 ,用原子吸收分光光度计测其钙含量 ,并与未经处理的原油对比。根据脱钙率 ,筛选出较优的脱钙剂。经过对破乳剂和脱钙剂的种类、用量、pH值等条件的选择 ,配出了针对俄罗斯原油、布伦特原油、扎非罗原油破乳、脱钙效果最好的复合剂PY YH、PY EA ,其脱钙率大于 80 %,脱水率大于98%,可直接用于炼厂的原油破乳脱钙工艺中。 相似文献
97.
98.
Intelligent multisensor surveillance systems consist of several types of sensors, which are installed on fixed and mobile devices. These components provide a huge quantity of information that has to be contrasted, correlated and integrated in order to recognize and react on special situations. These systems work in highly dynamic environments, with severe security and robustness requirements. All these characteristics imply the need for distributed solutions. In these solutions, scattered components can decide and act with some degree of autonomy (for instance, if they become isolated), or cooperate and coordinate for a complete tracking of special situations. In order to cope with these requirements and to better structure the solution, we have decided to design surveillance system control as a multiagent system. This is done by applying an agent-orientated methodology, which is assessed with concrete scenarios. 相似文献
99.
随着单井蒸汽吞吐周期的增加,加剧了油层纵向和平面上的非均质性。汽驱井组油层存在高渗透带或孔道,注入蒸汽上升,从稠油顶部跨越,会出现越顶现象,造成提早汽窜,注蒸汽驱的波及效率进一步降低。针对此问题,开发了稠油注汽井用高温调剖封窜剂。室内研究结果表明,研制的高温调副封窜剂HD、HT具有较好的高温成胶性能和强度。现场应用孤东油田的9口井,有效8口,有效率88.9%,累计增油726.8t。 相似文献
100.