全文获取类型
收费全文 | 6169篇 |
免费 | 257篇 |
国内免费 | 256篇 |
专业分类
电工技术 | 166篇 |
综合类 | 400篇 |
化学工业 | 118篇 |
金属工艺 | 202篇 |
机械仪表 | 522篇 |
建筑科学 | 327篇 |
矿业工程 | 139篇 |
能源动力 | 56篇 |
轻工业 | 144篇 |
水利工程 | 84篇 |
石油天然气 | 50篇 |
武器工业 | 33篇 |
无线电 | 799篇 |
一般工业技术 | 241篇 |
冶金工业 | 37篇 |
原子能技术 | 18篇 |
自动化技术 | 3346篇 |
出版年
2024年 | 15篇 |
2023年 | 92篇 |
2022年 | 88篇 |
2021年 | 146篇 |
2020年 | 133篇 |
2019年 | 106篇 |
2018年 | 69篇 |
2017年 | 100篇 |
2016年 | 136篇 |
2015年 | 180篇 |
2014年 | 294篇 |
2013年 | 287篇 |
2012年 | 395篇 |
2011年 | 405篇 |
2010年 | 362篇 |
2009年 | 427篇 |
2008年 | 378篇 |
2007年 | 414篇 |
2006年 | 462篇 |
2005年 | 433篇 |
2004年 | 314篇 |
2003年 | 347篇 |
2002年 | 305篇 |
2001年 | 189篇 |
2000年 | 202篇 |
1999年 | 116篇 |
1998年 | 76篇 |
1997年 | 34篇 |
1996年 | 26篇 |
1995年 | 27篇 |
1994年 | 17篇 |
1993年 | 18篇 |
1992年 | 18篇 |
1991年 | 8篇 |
1990年 | 9篇 |
1989年 | 9篇 |
1988年 | 4篇 |
1987年 | 1篇 |
1986年 | 5篇 |
1985年 | 6篇 |
1984年 | 5篇 |
1983年 | 6篇 |
1982年 | 8篇 |
1981年 | 5篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1976年 | 2篇 |
排序方式: 共有6682条查询结果,搜索用时 15 毫秒
91.
92.
93.
Yang Yang Shigeo Hirose Paulo Debenest Michele Guarnieri Norimitsu Izumi Koichi Suzumori 《Advanced Robotics》2016,30(21):1415-1429
To avert potential crisis from Japan’s aging infrastructure and declining birth rate, the Japanese Government is planning to introduce robotic technology for the inspection of social infrastructure (such as pipes, dams, and bridges). Recording underwater positions is a difficult task for human divers who undertake conventional dam inspections. This study presents the Anchor Diver 5.2 system for efficient and effectual dam inspection. Anchor Diver 5.2 is based on an extended-tether-maneuvered remotely operated vehicle (ROV) equipped with cameras. The ROV is lowered into water by a hoist system from a boat and implements a visual survey of the concrete underwater structure. To improve the visibility of the ROV in murky and cloudy water, a novel concept named Water Loupe is proposed. In addition, a simple boat-fixing method is proposed to provide a stable base on the water surface, and the underwater position of the ROV, which cannot be accessed by global positioning systems, is recorded using a feasible localization method. Finally, the developed system was evaluated in field experiments conducted in the Amagase Dam, Japan, and its merits and problems are discussed. 相似文献
94.
利用MicrosoftVisualC作为集成开发程序,开发一个具有信息录入、信息查询、排序、信息修改等基本功能,学生信息管理系统。 相似文献
95.
C语言指针的有些错误在程序编译阶段难以发现,且现行教材主要从概念、理论上对指针错误进行讲述,存在不足.分析了带有此类错误的示例程序,并在VISUAL C++6.0进行调试,展示此类指针错误的错误现象,分析其产生的原因,提出正确使用指针的方法,以达到预防此类指针错误发生的目的. 相似文献
96.
This study investigated the effect of moving from small offices to a landscape environment for 19 Visual Display Unit (VDU) operators at Alcatel Denmark AS. The operators reported significantly improved lighting condition and glare situation. Further, visual discomfort was also significantly reduced on a Visual Analogue Scale (VAS). There was no significant correlation between lighting condition and visual discomfort neither in the small offices nor in the office landscape. However, visual discomfort correlated significantly with glare in small offices i.e. more glare is related to more visual discomfort. This correlation disappeared after the lighting system in the office landscape had been improved. There was also a significant correlation between glare and itching of the eyes as well as blurred vision in the small offices, i.e. more glare more visual symptoms. Experience of pain was found to reduce the subjective assessment of work capacity during VDU tasks. There was a significant correlation between visual discomfort and reduced work capacity in small offices and in the office landscape. When moving from the small offices to the office landscape, there was a significant reduction in headache as well as back pain. No significant changes in pain intensity in the neck, shoulder, forearm, and wrist/hand were observed.The pain levels in different body areas were significantly correlated with subjective assessment of reduced work capacity in small offices and in the office landscape.By careful design and construction of an office landscape with regard to lighting and visual conditions, transfer from small offices may be acceptable from a visual-ergonomic point of view. 相似文献
97.
98.
Identity based broadcast encryption allows a centralized transmitter to send encrypted messages to a set of identities S, so that only the users with identity in S can decrypt these ciphertexts using their respective private key. Recently [Information Processing Letters 109 (2009)], an identity-based broadcast encryption scheme was proposed (Ren and Gu, 2009) [1], and it was claimed to be fully chosen-ciphertext secure without random oracles. However, by giving a concrete attack, we indicate that this scheme is even not chosen-plaintext secure. 相似文献
99.
Security under man-in-the-middle attacks is extremely important when protocols are executed on asynchronous networks, as the Internet. Focusing on interactive proof systems, one would like also to achieve unconditional soundness, so that proving a false statement is not possible even for a computationally unbounded adversarial prover. Motivated by such requirements, in this paper we address the problem of designing constant-round protocols in the plain model that enjoy simultaneously non-malleability (i.e., security against man-in-the-middle attacks) and unconditional soundness (i.e., they are proof systems).We first give a construction of a constant-round one-many (i.e., one honest prover, many honest verifiers) concurrent non-malleable zero-knowledge proof (in contrast to argument) system for every NP language in the plain model. We then give a construction of a constant-round concurrent non-malleable witness-indistinguishable proof system for every NP language. Compared with previous results, our constructions are the first constant-round proof systems that in the plain model guarantee simultaneously security against some non-trivial concurrent man-in-the-middle attacks and against unbounded malicious provers. 相似文献
100.
Hui-Feng HuangAuthor Vitae 《Journal of Systems and Software》2011,84(1):113-119
The protection of patients’ health information is a very important issue in the information age. Health Insurance Portability and Accountability Act (HIPAA) of privacy and security regulations are two crucial provisions in the protection of healthcare privacy, especially electronic medical information. For the quality and efficiency of the electronic services, it is necessary to construct better performance for the user and the trusted party. Based on elliptic curve cryptography (ECC) and complying with HIPAA regulations, this article presents an efficient key management scheme to facilitate inter-operations among the applied cryptographic mechanisms. In addition, the proposed scheme can achieve the complete functionality which includes: (1) a dictionary of key tables is not required for users and other units; (2) users can freely choose their own passwords; (3) users can freely update their passwords after the registration phase; (4) the computational cost is very low for users and the trusted center or server; (5) users are able to access their individual medical information through the authorization process; (6) case of consent exceptions intended to facilitate emergency applications or other possible exceptions can also be dealt with easier. 相似文献