全文获取类型
收费全文 | 40534篇 |
免费 | 5504篇 |
国内免费 | 3212篇 |
专业分类
电工技术 | 3184篇 |
技术理论 | 7篇 |
综合类 | 5813篇 |
化学工业 | 1125篇 |
金属工艺 | 1030篇 |
机械仪表 | 2136篇 |
建筑科学 | 2566篇 |
矿业工程 | 1036篇 |
能源动力 | 869篇 |
轻工业 | 530篇 |
水利工程 | 1316篇 |
石油天然气 | 794篇 |
武器工业 | 809篇 |
无线电 | 5936篇 |
一般工业技术 | 3718篇 |
冶金工业 | 1486篇 |
原子能技术 | 208篇 |
自动化技术 | 16687篇 |
出版年
2025年 | 8篇 |
2024年 | 690篇 |
2023年 | 651篇 |
2022年 | 984篇 |
2021年 | 1213篇 |
2020年 | 1333篇 |
2019年 | 1057篇 |
2018年 | 920篇 |
2017年 | 1164篇 |
2016年 | 1337篇 |
2015年 | 1452篇 |
2014年 | 2647篇 |
2013年 | 2606篇 |
2012年 | 3039篇 |
2011年 | 3079篇 |
2010年 | 2369篇 |
2009年 | 2593篇 |
2008年 | 2751篇 |
2007年 | 2932篇 |
2006年 | 2772篇 |
2005年 | 2428篇 |
2004年 | 2096篇 |
2003年 | 1856篇 |
2002年 | 1323篇 |
2001年 | 1160篇 |
2000年 | 965篇 |
1999年 | 700篇 |
1998年 | 525篇 |
1997年 | 438篇 |
1996年 | 393篇 |
1995年 | 305篇 |
1994年 | 268篇 |
1993年 | 232篇 |
1992年 | 182篇 |
1991年 | 139篇 |
1990年 | 111篇 |
1989年 | 116篇 |
1988年 | 83篇 |
1987年 | 42篇 |
1986年 | 31篇 |
1985年 | 31篇 |
1984年 | 44篇 |
1983年 | 30篇 |
1982年 | 19篇 |
1981年 | 17篇 |
1980年 | 18篇 |
1979年 | 19篇 |
1977年 | 9篇 |
1965年 | 9篇 |
1961年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
Paul G. Skokowski 《Minds and Machines》1994,4(3):333-344
I examine whether it is possible for content relevant to a computer's behavior to be carried without an explicit internal representation. I consider three approaches. First, an example of a chess playing computer carrying emergent content is offered from Dennett. Next I examine Cummins response to this example. Cummins says Dennett's computer executes a rule which is inexplicitly represented. Cummins describes a process wherein a computer interprets explicit rules in its program, implements them to form a chess-playing device, then this device executes the rules in a way that exhibits them inexplicitly. Though this approach is intriguing, I argue that the chess-playing device cannot exist as imagined. The processes of interpretation and implementation produce explicit representations of the content claimed to be inexplicit. Finally, the Chinese Room argument is examined and shown not to save the notion of inexplicit information. This means the strategy of attributing inexplicit content to a computer which is executing a rule, fails.I wish to thank Fred Dretske, JOhn Perry, and an anonymous reviewer for helpful comments and suggestions. Earlier versions of this paper were read at the American Philosophical Association Pacific Division Meeting in San Francisco in March, 1993, and at the 7th International Conference on Computing and Philosophy in Orlando in August, 1992. 相似文献
72.
通过分析我国智能交通系统建设现状和存在问题,结合目前道路交通管理信息采集与服务需求,设计了基于物联网技术的道路交通信息采集与服务框架,以公安交通指挥平台为核心,集成各类交通信息采集与服务系统,实现交通路况信息全天候采集和智能分析、交通信息服务和出行诱导,以及区域交通流协调组织等功能。基于该框架体系,分别从交通流信息采集、交通信息发布与诱导服务、交通信号协调控制、公交优先等方面,对比分析了基于ITS技术的传统应用与基于物联网技术的新型应用的优缺点。结论:物联网技术应用将有利于突破现有ITS应用模式的弊端,提高交通信息采集精度,提升公众出行服务水平。 相似文献
73.
针对不完备信息系统的知识获取,提出了一种基于相容度的变精度粗糙集模型,该模型是变精度粗糙集模型在不完备信息系统中的拓展.定义了这种模型上的知识约简,并给出了求约简的一个启发式算法.最后通过实例分析说明了算法的有效性. 相似文献
74.
强调CIS理论的核心是MI,BI,指出房地产业运用的对策应是:强化MI的宣传和研究;遵循以人为本的原则塑造BI;VI设计要紧密围绕MI,BI展开. 相似文献
75.
ZHANG HuanGuo YAN Fei FU JianMing XU MingDi YANG Yang HE Fan & ZHAN Jing School of Computer Wuhan University Wuhan China Key Laboratory of Aerospace Information Security Trusted Computing Ministry of Education 《中国科学:信息科学(英文版)》2010,(3):434-453
Trusted computing has become a new trend in the area of international information security, and the products of trusted computing platform begin to be used in application. Users will not use the products of information security, unless it goes through the testing and evaluation. Here we concentrate on the testing and evaluation problem of trusted computing platform, begin with constructing proper formalization model of trusted computing platform for testing, and establish a mathematical chain of trust model... 相似文献
76.
John A Pritchard 《Computer Communications》1986,9(6):303-316
An outline is given of the information services used in the National Computing Centre. An update is provided of a previous paper describing the local area network implemented in 1981. Three IT landmarks are highlighted, these include the introduction of word processing, the local area network and a digital PABX. The implications and subsequent developments are described. The facilities available on the local area network are discussed. The use of three electronic mail services are also considered, along with the use of facsimile. 相似文献
77.
信息化的安全标准是整个安全体系的不可或缺的一部分,占主要地位,这也是政府部门便于统一控制的必要的手段.本文是在信息化安全标准的整体之上,更好地说明安全标准的一个发展趋势. 相似文献
78.
Information is the core of Air traffic con-trol system (ATCS).In this paper,objective information theory is extended to depict,model and measure the information exemplified in ATCS.The sextuple model is presented with information ontology,state occurrence time,state set,carrier,reflection time,and reflection set.The metric system is given to quantitively measure the information with extensity,detailedness,continuity,richness,containability,delay,pervasiveness,authenticity,and adaptability.The results show that the proposed method is potential to find out actual indexes in ATCS for flight safety. 相似文献
79.
研究了冶金企业数据信息对内对外的安全性:数据信息对外的安全性通过防火墙和虚拟专用网技术(VPN)实现,对内的信息安全通过数据加密和数字签名技术来保证。文中重点研究了数据加密技术和数字签名技术,并给出了混合加密和数字签名联合使用的实现策略,该策略已在数家冶金企业中实施并得到检验。 相似文献
80.
Demarcating distribution area of goods is often guided by the rule of thumb by business proprietors.However,this method seems to be unsuitable when the demand points increase to a certain large extent.The present work attempted to convert the problem of distribution area demarcation into a localized problem of warehouseing and networking,and tried to establish district-based planning mode based on location based heuristic (LBH).Two methods were used in this study:1) the manual method to construct the mathematical model and conduct simulation;2) the automatic method using TransCAD software of geographical information system (GIS) for simulation.By comparing the effects of the two methods,the research provides theoretical support for business proprietors to demarcate the distribution area rationally with the application of GIS system.The results show that GIS has very good graphics construction function to replace complex text,and the automatic demarcating mode with human-machine interaction provides a good business decision-making support. 相似文献