首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21378篇
  免费   1362篇
  国内免费   800篇
电工技术   331篇
技术理论   1篇
综合类   1551篇
化学工业   7401篇
金属工艺   530篇
机械仪表   331篇
建筑科学   1639篇
矿业工程   648篇
能源动力   176篇
轻工业   2873篇
水利工程   155篇
石油天然气   2393篇
武器工业   136篇
无线电   584篇
一般工业技术   1305篇
冶金工业   597篇
原子能技术   168篇
自动化技术   2721篇
  2024年   53篇
  2023年   128篇
  2022年   330篇
  2021年   368篇
  2020年   359篇
  2019年   281篇
  2018年   300篇
  2017年   466篇
  2016年   535篇
  2015年   558篇
  2014年   958篇
  2013年   958篇
  2012年   1346篇
  2011年   1435篇
  2010年   1006篇
  2009年   1131篇
  2008年   1027篇
  2007年   1579篇
  2006年   1545篇
  2005年   1531篇
  2004年   1297篇
  2003年   1183篇
  2002年   1015篇
  2001年   911篇
  2000年   715篇
  1999年   615篇
  1998年   474篇
  1997年   318篇
  1996年   253篇
  1995年   245篇
  1994年   180篇
  1993年   123篇
  1992年   93篇
  1991年   65篇
  1990年   55篇
  1989年   46篇
  1988年   15篇
  1987年   18篇
  1986年   9篇
  1985年   2篇
  1984年   3篇
  1983年   2篇
  1982年   1篇
  1981年   2篇
  1980年   2篇
  1979年   1篇
  1977年   1篇
  1976年   1篇
  1957年   1篇
排序方式: 共有10000条查询结果,搜索用时 250 毫秒
91.
Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various security issues. This paper proposes a method called Private Key Consignment to solve the problem of how to protect the data carried by mobile agents. It exploits new functionalities and mechanism provided by the trusted computing technology, and adopts both public key and symmetric key cryptographic means for data and key protection. The most notable feature of this method is that it protects the private key of the agent by consigning it to a tamper proof hardware, thus, enabling convenient and secure use of the private key. It provides a new scheme of mobile agents' data protection.  相似文献   
92.
The popularity of grid services has widened their application to numerous domains and increased the utilization of computational resources. In order to create more incentives for the resources owners to lease their resources and prevent users from wasting the resources, the introduction of a market-oriented grid is inevitable. However, the issues for the negotiation between service provider and consumer over the supply and demand of resources can be complex, with highly interdependent issues. In this research, a simulated automated negotiation mechanism including a co-evolutionary mechanism and a modified game theory approach is proposed, to assist them in reaching an agreement over the conflicting issues. In the proposed architecture, the co-evolution process is able to reduce the multiple dimensional search space into a two-dimension search space and identify the appropriate negotiation strategies for the negotiating agents to form a payoff matrix which can be used for the game theory related stage of their interaction. The multiple stage negotiation process is introduced to improve the negotiation result. In this paper, an application which requires a large amount of computational resources to process the data generated from mobile devises is used to demonstrate that the proposed system is able to resolve the conflicts and obtain a valid solution.  相似文献   
93.
Verifiable Distributed Oblivious Transfer and Mobile Agent Security   总被引:1,自引:0,他引:1  
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting mobile agents not only is possible, but also can be implemented efficiently. This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399 and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003. Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases, and wireless networks. On the theoretical side, he is interested in cryptography and game theory. Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS) at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998 and 2001).  相似文献   
94.
Tributyltin (TBT) released into seawater from ship hulls is a stable marine pollutant and obviously remains in marine environments. We isolated a TBT resistant marine Pseudoalteromonas sp. TBT1 from sediment of a ship’s ballast water. The isolate (109.3 ± 0.2 colony-forming units mL−1) adsorbed TBT in proportion to the concentrations of TBTCl externally added up to 3 mM, where the number of TBT adsorbed by a single cell was estimated to be 108.2. The value was reduced to about one-fifth when the lysozyme-treated cells were used. The surface of ethanol treated cells became rough, but the capacity of TBT adsorption was the same as that for native cells. These results indicate that the function of the cell surface, rather than that structure, plays an important role to the adsorption of TBT. The adsorption state of TBT seems to be multi-layer when the number of more than 106.8 TBT molecules is adsorbed by a single cell.  相似文献   
95.
吸水膨胀型膨润土/交联聚丙烯酰胺颗粒堵剂   总被引:9,自引:0,他引:9  
栾守杰 《油田化学》2003,20(3):230-231
使丙烯酰胺、少量N,N-亚甲基双丙烯酰胺在钙膨润土存在下进行水溶液引发接枝共聚合,聚合产物经造粒、粉碎、筛分,得到粒径0.5~1.0mm的颗粒堵剂。根据颗粒堵剂吸水量大小确定丙烯酰胺与膨润土最佳质量比为7:1,引发剂最佳用量为500g/t,交联剂最佳用量为300g/t,吸水量与这3个参数之间的关系曲线都经过最大值,颗粒堵剂在去离子水中的吸水量为560~650mL/g。该堵剂已大规模生产,在胜利、中原油田许多采油厂已用于调剖、堵水和调驱施工,在青海、江苏、大港、冀东等油田也已开始使用。在胜利东辛采油厂的一个井组,连续3个月在3口井注入该堵剂共27t,使井口压力上升3MPa,产油量大幅度增加。表l参l。  相似文献   
96.
原油破乳脱钙复合剂的研制   总被引:2,自引:0,他引:2  
介绍了原油破乳脱钙复合剂的筛选方法。所用的破乳剂有PY、UD 10、2 0 40、SDX、SL、硬脂酸 三乙醇胺 ,所用的脱钙剂有KL 1、KL 2、KL 3、KL 4、YH、EA、SJ、LP。首先将一定量的破乳剂与原油混合 ,振荡、静置 ,按油水分层情况及脱水率 ,筛选出较优的破乳剂。然后 ,在已加入破乳剂的原油中加入一定量的脱钙剂水溶液 ,振荡、静置 ,用燃烧瓶法处理油样 ,用原子吸收分光光度计测其钙含量 ,并与未经处理的原油对比。根据脱钙率 ,筛选出较优的脱钙剂。经过对破乳剂和脱钙剂的种类、用量、pH值等条件的选择 ,配出了针对俄罗斯原油、布伦特原油、扎非罗原油破乳、脱钙效果最好的复合剂PY YH、PY EA ,其脱钙率大于 80 %,脱水率大于98%,可直接用于炼厂的原油破乳脱钙工艺中。  相似文献   
97.
催化裂化大油气管线阻焦剂的研究与开发   总被引:1,自引:0,他引:1  
介绍了阻焦剂的阻聚分散机理,测定了不同组分的阻焦剂对不同性质原料的阻焦效果,并考察了不同加入浓度对阻焦率以及催化裂化产品分布的影响。试验结果表明:加入50—100μg/g的阻焦剂,可使催化裂化大油气管线阻焦率达到53.7%—63.8%,同时对产品分布及产品性质无不良影响,具有技术经济可行性。  相似文献   
98.
Intelligent multisensor surveillance systems consist of several types of sensors, which are installed on fixed and mobile devices. These components provide a huge quantity of information that has to be contrasted, correlated and integrated in order to recognize and react on special situations. These systems work in highly dynamic environments, with severe security and robustness requirements. All these characteristics imply the need for distributed solutions. In these solutions, scattered components can decide and act with some degree of autonomy (for instance, if they become isolated), or cooperate and coordinate for a complete tracking of special situations. In order to cope with these requirements and to better structure the solution, we have decided to design surveillance system control as a multiagent system. This is done by applying an agent-orientated methodology, which is assessed with concrete scenarios.  相似文献   
99.
随着单井蒸汽吞吐周期的增加,加剧了油层纵向和平面上的非均质性。汽驱井组油层存在高渗透带或孔道,注入蒸汽上升,从稠油顶部跨越,会出现越顶现象,造成提早汽窜,注蒸汽驱的波及效率进一步降低。针对此问题,开发了稠油注汽井用高温调剖封窜剂。室内研究结果表明,研制的高温调副封窜剂HD、HT具有较好的高温成胶性能和强度。现场应用孤东油田的9口井,有效8口,有效率88.9%,累计增油726.8t。  相似文献   
100.
选用无毒、无害、易生物降解的清洗、加油、灭菌材料进行优化配伍,研制出集去污、滋润、防霉等多功能的环保型皮革清洗保养剂;对各种皮革制品的水洗清洁法及保养工艺进行了科学的研究.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号