全文获取类型
收费全文 | 32753篇 |
免费 | 3527篇 |
国内免费 | 1300篇 |
专业分类
电工技术 | 10439篇 |
技术理论 | 2篇 |
综合类 | 2171篇 |
化学工业 | 2780篇 |
金属工艺 | 1435篇 |
机械仪表 | 718篇 |
建筑科学 | 5071篇 |
矿业工程 | 1560篇 |
能源动力 | 785篇 |
轻工业 | 1208篇 |
水利工程 | 1849篇 |
石油天然气 | 1611篇 |
武器工业 | 128篇 |
无线电 | 2150篇 |
一般工业技术 | 1391篇 |
冶金工业 | 1122篇 |
原子能技术 | 371篇 |
自动化技术 | 2789篇 |
出版年
2024年 | 110篇 |
2023年 | 298篇 |
2022年 | 756篇 |
2021年 | 930篇 |
2020年 | 875篇 |
2019年 | 656篇 |
2018年 | 576篇 |
2017年 | 798篇 |
2016年 | 895篇 |
2015年 | 1089篇 |
2014年 | 2532篇 |
2013年 | 1608篇 |
2012年 | 2583篇 |
2011年 | 2841篇 |
2010年 | 2164篇 |
2009年 | 2220篇 |
2008年 | 1966篇 |
2007年 | 2375篇 |
2006年 | 2272篇 |
2005年 | 1873篇 |
2004年 | 1527篇 |
2003年 | 1449篇 |
2002年 | 1161篇 |
2001年 | 1022篇 |
2000年 | 860篇 |
1999年 | 623篇 |
1998年 | 379篇 |
1997年 | 266篇 |
1996年 | 226篇 |
1995年 | 207篇 |
1994年 | 113篇 |
1993年 | 67篇 |
1992年 | 51篇 |
1991年 | 39篇 |
1990年 | 28篇 |
1989年 | 25篇 |
1988年 | 34篇 |
1987年 | 12篇 |
1986年 | 16篇 |
1985年 | 12篇 |
1984年 | 21篇 |
1983年 | 4篇 |
1982年 | 3篇 |
1981年 | 9篇 |
1980年 | 2篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1963年 | 1篇 |
1954年 | 1篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 12 毫秒
21.
22.
在分析了数字版权研究现状和功能框架的基础上,设计了基于多重数字水印和密码的版权管理模型;该模型采用数字内容和许可证各自单独封装、独立分发的方式,使得只有购买了许可证的特定用户才能使用数字内容,实现了水印作品的许可交易;另外,内容服务器采用的对数字作品加载两次水印,对数字内容部分签名加密,未加密部分签名的方案,在有效保证数字内容安全传输的基础上又减少了计算量和存储量;分析表明该模型有显著的优点和很好的安全性。 相似文献
23.
谢建章 《数字社区&智能家居》2010,(6):1324-1325
军工企业涉密网络安全是军工涉密网络系统建设和使用中面临的重大课题.该文从用户终端安全的角度出发.阐述了统一安全防护的思路,并对其具体内容做了较为详细的论述。 相似文献
24.
Sharon Christensen William J. Caelli William D. Duncan 《Information & Communications Technology Law》2010,19(1):61-85
Critical, or national, information infrastructure protection, referred to as either CIIP or NIIP, has been highlighted as a critical factor in overall national security by the United States, the United Kingdom, India and the European Community. As nations move inexorably towards so-called ‘digital economies’, critical infrastructure depends on information systems to process, transfer, store and exchange information through the Internet. Electronic attacks such as denial of service attacks on critical information infrastructures challenge the law and raise concerns. A myriad of issues potentially plague the protection of critical information infrastructures owing to the lack of legal regulation aimed at ensuring the protection of critical information infrastructures. This paper will highlight the legal concerns that relate to the denial of service attacks on critical information infrastructures and provide an introductory overview of the law as it relates to CIIP in Australia. 相似文献
25.
郑霞 《数码设计:surface》2010,(1):159-161
从对香港理工大学设计年展的整体状况与作品分析,到与国际设计及内地设计教育的比较中,归纳了目前香港设计院校教育及设计的现状特点。立足本地,强调设计的人性化,以及对前沿国际设计的吸纳与开放性的学习都是本次年展中所折射出的主要特征。 相似文献
26.
Since 1999, the National Commission for the Knowledge and Use of the Biodiversity (CONABIO) in Mexico has been developing and managing the “Operational program for the detection of hot-spots using remote sensing techniques”. This program uses images from the MODerate resolution Imaging Spectroradiometer (MODIS) onboard the Terra and Aqua satellites and from the Advanced Very High Resolution Radiometer of the National Oceanic and Atmospheric Administration (NOAA-AVHRR), which are operationally received through the Direct Readout station (DR) at CONABIO. This allows the near-real time monitoring of fire events in Mexico and Central America. In addition to the detection of active fires, the location of hot spots are classified with respect to vegetation types, accessibility, and risk to Nature Protection Areas (NPA). Besides the fast detection of fires, further analysis is necessary due to the considerable effects of forest fires on biodiversity and human life. This fire impact assessment is crucial to support the needs of resource managers and policy makers for adequate fire recovery and restoration actions. CONABIO attempts to meet these requirements, providing post-fire assessment products as part of the management system in particular for satellite-based burnt area mapping. This paper provides an overview of the main components of the operational system and will present an outlook to future activities and system improvements, especially the development of a burnt area product. A special focus will also be placed on the fire occurrence within NPAs of Mexico. 相似文献
27.
Wei-Hung Lin Yuh-Rau Wang Shi-Jinn Horng Tzong-Wann Kao Yi Pan 《Expert systems with applications》2009,36(9):11509-11516
This paper proposes a blind watermarking algorithm based on maximum wavelet coefficient quantization for copyright protection. The wavelet coefficients are grouped into different block size and blocks are randomly selected from different subbands. We add different energies to the maximum wavelet coefficient under the constraint that the maximum wavelet coefficient is always maximum in a block. The watermark is embedded the local maximum coefficient which can effectively resist attacks. Also, using the block-based watermarking, we can extract the watermark without using the original image or watermark. Experimental results show that the proposed method is quite robust under either non-geometry or geometry attacks. 相似文献
28.
介绍了灵活利用RC的特性对CMOS数字IC的输入保护措施,并重点讨论了其应用电路及其参数的设计计算过程。此方法抑制噪声的效果非常好,可以广泛应用于理论及实践性教学、工程设计等方面。 相似文献
29.
不锈钢活性炭滤器的氯腐蚀与防腐 总被引:1,自引:0,他引:1
本文就活性炭在预处理中脱氯的不锈钢滤器的氯腐蚀机理进行了探讨,并提出了不锈钢活性炭脱氯滤器的防腐方法和措施。 相似文献
30.
Wilson JR 《Applied ergonomics》1983,14(2):109-116
An assessment is provided of the current position regarding changes in UK or EEC civil law under which injured parties can obtain redress in respect of injuries caused by defective products. One effect of proposed systems of strict liability in tort will be to shift some of the burden of proof from the injured party on to the producer of the product claimed to have caused injury. It is argued that this is a just and logical change, given the unfairness and anomalies in present systems and the relative abilities of consumers and producers to avoid such incidents and to bear or to offset the cost of the consequences. Cases of apparent misuse of a product by a consumer may frequently be induced by the design of that product and could thus be prevented by more thoughtful design. In order that producers can ensure their own viability and satisfy the consumer market, their products must be safe, efficient, comfortable and satisfying to use, as well as durable, serviceable and realistically priced. One requirement for achieving this has been said to be the input of accident and ergonomics data early in the product development process; the present paper examines this proposition. Evidence is provided by research into the design and manufacture of consumer products for the UK market, carried out at Birmingham University. Examined in particular are the extent to which formal development processes and design safety review procedures are used, and the degree of utilisation of accident, ergonomics, user testing and market feedback data, identifying barriers to the widespread use of these. Safe and ergonomic design of products must aim to be seen as a positive business activity, rather than as a cost-centre. The benefits to a company of a comprehensive design safety programme will more than outweigh the costs given the pressures identified earlier. 相似文献