全文获取类型
收费全文 | 9585篇 |
免费 | 392篇 |
国内免费 | 442篇 |
专业分类
电工技术 | 464篇 |
综合类 | 1057篇 |
化学工业 | 476篇 |
金属工艺 | 314篇 |
机械仪表 | 541篇 |
建筑科学 | 545篇 |
矿业工程 | 166篇 |
能源动力 | 453篇 |
轻工业 | 268篇 |
水利工程 | 50篇 |
石油天然气 | 107篇 |
武器工业 | 70篇 |
无线电 | 1489篇 |
一般工业技术 | 1020篇 |
冶金工业 | 294篇 |
原子能技术 | 88篇 |
自动化技术 | 3017篇 |
出版年
2024年 | 27篇 |
2023年 | 64篇 |
2022年 | 133篇 |
2021年 | 202篇 |
2020年 | 186篇 |
2019年 | 120篇 |
2018年 | 146篇 |
2017年 | 189篇 |
2016年 | 219篇 |
2015年 | 258篇 |
2014年 | 572篇 |
2013年 | 596篇 |
2012年 | 614篇 |
2011年 | 768篇 |
2010年 | 524篇 |
2009年 | 618篇 |
2008年 | 607篇 |
2007年 | 699篇 |
2006年 | 590篇 |
2005年 | 498篇 |
2004年 | 537篇 |
2003年 | 482篇 |
2002年 | 426篇 |
2001年 | 305篇 |
2000年 | 222篇 |
1999年 | 161篇 |
1998年 | 113篇 |
1997年 | 88篇 |
1996年 | 91篇 |
1995年 | 73篇 |
1994年 | 64篇 |
1993年 | 36篇 |
1992年 | 33篇 |
1991年 | 29篇 |
1990年 | 23篇 |
1989年 | 14篇 |
1988年 | 18篇 |
1987年 | 13篇 |
1986年 | 7篇 |
1985年 | 4篇 |
1984年 | 8篇 |
1983年 | 3篇 |
1981年 | 3篇 |
1979年 | 3篇 |
1971年 | 3篇 |
1965年 | 4篇 |
1963年 | 3篇 |
1961年 | 5篇 |
1959年 | 3篇 |
1954年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
51.
利用Struts2、Java、JDBC等相关标准和技术,构建以Web方式提供服务的B2C通用电子商务平台,从而为商家和顾客之间提供了一个经济的、方便的、兼容的、可扩展的、安全的电子商务综合平台。以此方案为依据,建立了一个应用实例系统,实现了基于Struts2服务的包括用户管理、商品展示、购物车、订单生成过程、电子订货过程。在开发过程中,采用面向对象的分析与设计方法。 相似文献
52.
Hyunkyu Park Sojung Kim Yujin Jeong Tim Minshall 《Creativity & Innovation Management》2021,30(1):96-115
Drawing on the mixed methods of qualitative research and agent‐based simulation, this study examines: (a) how end‐users use digital platforms to become customer–entrepreneurs undertaking commercial activities on platforms; and (b) how platform providers can convert this customer entrepreneurship into a revenue stream. Considering that end‐users have traditionally been defined as passive and uncharged actors in platform business models, an in‐depth understanding of their commercial activities and the viable revenue model to monetize this emerging customer practice is warranted. Our qualitative study reveals that customer–entrepreneurs make substantial use of platform offerings to advertise their products; communicate with end‐consumers; and accept payments. These commercial activities are largely exercised for free on platforms, even though they could otherwise serve as a source of revenue. On this point, our simulation results identify two pricing models achieving the generation of nearly identical revenues over time. First, platform providers may charge both advertising and transaction fees, which maximize the survival of professional customer–entrepreneurs. Second, platform businesses may levy advertising fees only, which maximizes the survival of informal customer–entrepreneurs operating on a micro‐scale and part‐time basis. This study offers theoretical, methodological, and managerial implications for platform studies. 相似文献
53.
Fairly exchanging digital content is an everyday problem. It has been shown that fair exchange cannot be achieved without a trusted third party (called the Arbiter). Yet, even with a trusted party, it is still non-trivial to come up with an efficient solution, especially one that can be used in a p2p file sharing system with a high volume of data exchanged.We provide an efficient optimistic fair exchange mechanism for bartering digital files, where receiving a payment in return for a file (buying) is also considered fair. The exchange is optimistic, removing the need for the Arbiter’s involvement unless a dispute occurs. While the previous solutions employ costly cryptographic primitives for every file or block exchanged, our protocol employs them only once per peer, therefore achieving an O(n) efficiency improvement when n blocks are exchanged between two peers. Our protocol uses very efficient cryptography, making it perfectly suitable for a p-2-p file sharing system where tens of peers exchange thousands of blocks and they do not know beforehand which ones they will end up exchanging. Therefore, our system yields up to one-to-two orders of magnitude improvement in terms of both computation and communication (40 s vs. 42 min, 1.6 MB vs. 200 MB). Thus, for the first time, a provably secure (and privacy-respecting when payments are made using e-cash) fair exchange protocol can be used in real bartering applications (e.g., BitTorrent) [14] without sacrificing performance. 相似文献
54.
随着电子商务的发展,如何实现对网络用户的身份认证成为了一个非常迫切的问题,目前广泛采用的是基于PKI的认证技术,而在PKI认证体系中,认证中心CA是核心部分。本文提出了一个基于门限ECC的PKI/CA的设计,本方案在传统的CA方案上引入了入侵容忍机制,结合椭圆曲线密码体制和门限密码方案,提高了CA系统的可靠性和安全性。 相似文献
55.
尽管已有广泛领域应用,但工作流系统在处理业务流程不确定的和动态的参数规格表时存在局限性。为此,本文提出基于扩展染色petri网的CPWF-net以及定义变迁行为和原子过程作为CPWF-net工作流模式结构的支持。这些工作流模式是从微观上进行处理,并可应用于动态不稳定的与时间和数据相关的环境中。本文通过CPWF-net执行程序检测工作流错误或异常执行状态,评估动态业务流程的整体执行时间,证实所提方法的有效性。 相似文献
56.
针对SOA业务恢复的服务选择问题,本文提出了一种QoS近似全局最优的服务选择算法GALSA:首先利用GA算法将全局QoS约束分解为最优的局部QoS约束,然后利用LSA算法选取出满足局部QoS约束的最优服务。算法不仅能作用于服务重构的服务选择过程中,而且在单个服务节点失效时亦能选取出满足全局QoS约束的服务进行替换。理论分析与实验结果说明了算法的可行性和有效性。 相似文献
57.
58.
赵勋 《计算机光盘软件与应用》2012,(3):3+11
本文主要介绍RFDI技术定义及系统工作原理,并重点关注RFID技术在智能交通领域的实际应用方式。同时RFID技术也成功解决了车辆自动识别和信息采集问题,为智能交通管理和服务系统的建立提供了强大的信息支撑和保障。 相似文献
59.
本文通过介绍Applet的体系结构和其生命周期以及如何创建和执行Applet程序,介绍了电子相册的制作过程。 相似文献
60.
《The Electricity Journal》2021,34(9):107029
This study addresses the question of how the electricity grid can best be priced, in the context of disruptive technologies, increasing decentralisation of the power sector and new business models. The emergence of business models can affect the design of tariffs, but at the same time, tariff design can trigger new business models as they can nudge adoption towards certain technologies. Network tariffs have traditionally been established using a cost accounting method. Due to its cost structure, network tariffs are second best constructs, as marginal cost pricing does not lead to cost recovery. Second best solutions, in all probability, will overcompensate some inputs which in turn will be overused (the Averch-Johnson effect). New distributed energy technologies that perform better in these overcompensated inputs will therefore see a higher penetration in the market. Penetration of some technologies over others in a previously monolithic vertically integrated power sector will open up new customer needs and therefore business opportunities. Each resulting business opportunity would make use of the grid differently from which it was originally conceived, and at one extreme, they can bypass it altogether. We provide a framework of analysis that leads to the pricing of the services provided by the electricity grid for each new business opportunity. 相似文献