首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   24190篇
  免费   2534篇
  国内免费   1890篇
电工技术   2390篇
技术理论   6篇
综合类   2860篇
化学工业   619篇
金属工艺   97篇
机械仪表   400篇
建筑科学   1732篇
矿业工程   807篇
能源动力   469篇
轻工业   509篇
水利工程   751篇
石油天然气   268篇
武器工业   122篇
无线电   4575篇
一般工业技术   537篇
冶金工业   398篇
原子能技术   51篇
自动化技术   12023篇
  2024年   90篇
  2023年   247篇
  2022年   509篇
  2021年   705篇
  2020年   698篇
  2019年   485篇
  2018年   439篇
  2017年   597篇
  2016年   676篇
  2015年   776篇
  2014年   2361篇
  2013年   1685篇
  2012年   2228篇
  2011年   2456篇
  2010年   1826篇
  2009年   1856篇
  2008年   1789篇
  2007年   2034篇
  2006年   1680篇
  2005年   1403篇
  2004年   1087篇
  2003年   981篇
  2002年   608篇
  2001年   424篇
  2000年   311篇
  1999年   188篇
  1998年   104篇
  1997年   72篇
  1996年   58篇
  1995年   36篇
  1994年   34篇
  1993年   17篇
  1992年   20篇
  1991年   12篇
  1990年   10篇
  1989年   9篇
  1988年   8篇
  1987年   2篇
  1986年   6篇
  1985年   20篇
  1984年   17篇
  1983年   16篇
  1982年   12篇
  1981年   5篇
  1980年   3篇
  1979年   3篇
  1958年   1篇
  1957年   1篇
  1956年   1篇
  1955年   1篇
排序方式: 共有10000条查询结果,搜索用时 818 毫秒
101.
根据我国专利法的原则,在对我国催化重整和芳烃生产专利检索过程和结果进行分析的基础上,阐述了对目前我国催化重整工艺专利市场的几点看法并提出对策。  相似文献   
102.
王洪君 《信息技术》2002,(12):80-82,84
网络安全问题已经成为网络发展中急需解决的问题。已经引起人们的重视。给出了网络安全的概念,网络所面临的威胁,提出了解决网络安全的相关技术。  相似文献   
103.
The most efficient approach to a fair exchange is to use an off-line trusted third party (TTP for short) who gets involved only when a dispute between two parties occurs. However, exchanged secrets that are not protected properly may be exposed to the TTP when one of these two parties asks the TTP to mediate the dispute. The first work to protect exchanged secrets from TTP’s misuse was proposed by Franklin and Reiter in 1997. They provided an on-line semi-trusted third party instead of an off-line third party for a fair exchange. Their schemes forced the TTP to take part in the protocol for all the cases, and thus, deemed to be impractical.The present paper, introduces several models, including single and multiple TTPs, to focus the attention not only on security properties, but also on reliability functions. In the single TTP mode, our new scheme can protect the exchanged data through an efficient exchange protocol, whereas in the multiple TTP mode, we proposed an approach to balance the security level with the reliability of the system.  相似文献   
104.
Most organizations have measures to protect their network infrastructure from intruders. With the growth AND AVAILABILITY of wireless, some intruders now are aiming their attacks there. The potential for damage from these types of attacks is significant due to their nature. However, there is another type of wireless attack on organizational resources that also poses a significant vulnerability. That is electromagnetic radiation, also called radio frequency emissions (RFE), from unprotected systems and networks.  相似文献   
105.
This study presents results of a survey of self-proclaimed computer hackers about their perceptions in regards to illegal hacking. Results show that hackers continue to engage in illegal hacking activities despite the perception of severe judicial punishment. A closer look shows that hackers perceive a high utility value from hacking, little informal sanctions, and a low likelihood of punishment. These perceptions coupled with a high level of moral disengagement partially explain the hacker's illegal behavior.  相似文献   
106.
塌方是隧洞施工过程中经常遇到的难题,本文针对引红济石工程1#支洞在施工过程中出现的两次塌方原因进行分析,总结出隧洞施工过程中避免塌方的主要方法和策略,具有普遍的借鉴意义。  相似文献   
107.
Interaction systems are a formal model for component-based systems. Combining components via connectors to form more complex systems may give rise to deadlock situations. We present here a polynomial time reduction from 3-SAT to the question whether an interaction system contains deadlocks.  相似文献   
108.
109.
Early warning systems (EWS) tend to focus on the identification of slow onset disasters such famine and epidemic disease. Since hazardous environmental conditions often precede disastrous outcomes by many months, effective monitoring via satellite and in situ observations can successfully guide mitigation activities. Accurate short term forecasts of NDVI could increase lead times, making early warning earlier. This paper presents a simple empirical model for making 1 to 4 month NDVI projections. These statistical projections are based on parameterized satellite rainfall estimates (RFE) and relative humidity demand (RHD). A quasi-global, 1 month ahead, 1° study demonstrates reasonable accuracies in many semi-arid regions. In Africa, a 0.1° cross-validated skill assessment quantifies the technique's applicability at 1 to 4 month forecast intervals. These results suggest that useful projections can be made over many semi-arid, food insecure regions of Africa, with plausible extensions to drought prone areas of Asia, Australia and South America.  相似文献   
110.
XSLT is a very popular and flexible language for transforming XML documents which provides a powerful implementation of a tree‐oriented transformation language for transmuting instances of XML using a single vocabulary into a desired output. In this paper, we propose a processing model that enables the XSLT processor to encrypt and decrypt XML documents. The details of the implementation are presented. Our model supports a more general encryption scope than previous models. The implementation and experimental results demonstrate the practicality of the proposed model. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号