首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   32753篇
  免费   3527篇
  国内免费   1300篇
电工技术   10439篇
技术理论   2篇
综合类   2171篇
化学工业   2780篇
金属工艺   1435篇
机械仪表   718篇
建筑科学   5071篇
矿业工程   1560篇
能源动力   785篇
轻工业   1208篇
水利工程   1849篇
石油天然气   1611篇
武器工业   128篇
无线电   2150篇
一般工业技术   1391篇
冶金工业   1122篇
原子能技术   371篇
自动化技术   2789篇
  2024年   110篇
  2023年   298篇
  2022年   756篇
  2021年   930篇
  2020年   875篇
  2019年   656篇
  2018年   576篇
  2017年   798篇
  2016年   895篇
  2015年   1089篇
  2014年   2532篇
  2013年   1608篇
  2012年   2583篇
  2011年   2841篇
  2010年   2164篇
  2009年   2220篇
  2008年   1966篇
  2007年   2375篇
  2006年   2272篇
  2005年   1873篇
  2004年   1527篇
  2003年   1449篇
  2002年   1161篇
  2001年   1022篇
  2000年   860篇
  1999年   623篇
  1998年   379篇
  1997年   266篇
  1996年   226篇
  1995年   207篇
  1994年   113篇
  1993年   67篇
  1992年   51篇
  1991年   39篇
  1990年   28篇
  1989年   25篇
  1988年   34篇
  1987年   12篇
  1986年   16篇
  1985年   12篇
  1984年   21篇
  1983年   4篇
  1982年   3篇
  1981年   9篇
  1980年   2篇
  1976年   1篇
  1975年   1篇
  1963年   1篇
  1954年   1篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 12 毫秒
21.
核电站数字化反应堆保护系统停堆响应时间分析   总被引:2,自引:0,他引:2  
为了评价出核电站数字化反应堆保护系统停堆响应的最大时间,根据数字化反应堆保护系统结构,分析出保护系统的响应过程须经过AI输入、IO总线通讯、CPU运算、网络通讯、DO输出处理。并基于DCS定周期扫描的运行方式,得出了各处理过程所需最大响应时间的计算方法,DCS停堆响应时间的评价值就是各部分最大响应时间的累加。最后提出了可缩短响应时间的改进方法。  相似文献   
22.
在分析了数字版权研究现状和功能框架的基础上,设计了基于多重数字水印和密码的版权管理模型;该模型采用数字内容和许可证各自单独封装、独立分发的方式,使得只有购买了许可证的特定用户才能使用数字内容,实现了水印作品的许可交易;另外,内容服务器采用的对数字作品加载两次水印,对数字内容部分签名加密,未加密部分签名的方案,在有效保证数字内容安全传输的基础上又减少了计算量和存储量;分析表明该模型有显著的优点和很好的安全性。  相似文献   
23.
军工企业涉密网络安全是军工涉密网络系统建设和使用中面临的重大课题.该文从用户终端安全的角度出发.阐述了统一安全防护的思路,并对其具体内容做了较为详细的论述。  相似文献   
24.
Critical, or national, information infrastructure protection, referred to as either CIIP or NIIP, has been highlighted as a critical factor in overall national security by the United States, the United Kingdom, India and the European Community. As nations move inexorably towards so-called ‘digital economies’, critical infrastructure depends on information systems to process, transfer, store and exchange information through the Internet. Electronic attacks such as denial of service attacks on critical information infrastructures challenge the law and raise concerns. A myriad of issues potentially plague the protection of critical information infrastructures owing to the lack of legal regulation aimed at ensuring the protection of critical information infrastructures. This paper will highlight the legal concerns that relate to the denial of service attacks on critical information infrastructures and provide an introductory overview of the law as it relates to CIIP in Australia.  相似文献   
25.
从对香港理工大学设计年展的整体状况与作品分析,到与国际设计及内地设计教育的比较中,归纳了目前香港设计院校教育及设计的现状特点。立足本地,强调设计的人性化,以及对前沿国际设计的吸纳与开放性的学习都是本次年展中所折射出的主要特征。  相似文献   
26.
Since 1999, the National Commission for the Knowledge and Use of the Biodiversity (CONABIO) in Mexico has been developing and managing the “Operational program for the detection of hot-spots using remote sensing techniques”. This program uses images from the MODerate resolution Imaging Spectroradiometer (MODIS) onboard the Terra and Aqua satellites and from the Advanced Very High Resolution Radiometer of the National Oceanic and Atmospheric Administration (NOAA-AVHRR), which are operationally received through the Direct Readout station (DR) at CONABIO. This allows the near-real time monitoring of fire events in Mexico and Central America. In addition to the detection of active fires, the location of hot spots are classified with respect to vegetation types, accessibility, and risk to Nature Protection Areas (NPA). Besides the fast detection of fires, further analysis is necessary due to the considerable effects of forest fires on biodiversity and human life. This fire impact assessment is crucial to support the needs of resource managers and policy makers for adequate fire recovery and restoration actions. CONABIO attempts to meet these requirements, providing post-fire assessment products as part of the management system in particular for satellite-based burnt area mapping. This paper provides an overview of the main components of the operational system and will present an outlook to future activities and system improvements, especially the development of a burnt area product. A special focus will also be placed on the fire occurrence within NPAs of Mexico.  相似文献   
27.
A blind watermarking method using maximum wavelet coefficient quantization   总被引:3,自引:0,他引:3  
This paper proposes a blind watermarking algorithm based on maximum wavelet coefficient quantization for copyright protection. The wavelet coefficients are grouped into different block size and blocks are randomly selected from different subbands. We add different energies to the maximum wavelet coefficient under the constraint that the maximum wavelet coefficient is always maximum in a block. The watermark is embedded the local maximum coefficient which can effectively resist attacks. Also, using the block-based watermarking, we can extract the watermark without using the original image or watermark. Experimental results show that the proposed method is quite robust under either non-geometry or geometry attacks.  相似文献   
28.
介绍了灵活利用RC的特性对CMOS数字IC的输入保护措施,并重点讨论了其应用电路及其参数的设计计算过程。此方法抑制噪声的效果非常好,可以广泛应用于理论及实践性教学、工程设计等方面。  相似文献   
29.
不锈钢活性炭滤器的氯腐蚀与防腐   总被引:1,自引:0,他引:1  
本文就活性炭在预处理中脱氯的不锈钢滤器的氯腐蚀机理进行了探讨,并提出了不锈钢活性炭脱氯滤器的防腐方法和措施。  相似文献   
30.
An assessment is provided of the current position regarding changes in UK or EEC civil law under which injured parties can obtain redress in respect of injuries caused by defective products. One effect of proposed systems of strict liability in tort will be to shift some of the burden of proof from the injured party on to the producer of the product claimed to have caused injury. It is argued that this is a just and logical change, given the unfairness and anomalies in present systems and the relative abilities of consumers and producers to avoid such incidents and to bear or to offset the cost of the consequences. Cases of apparent misuse of a product by a consumer may frequently be induced by the design of that product and could thus be prevented by more thoughtful design. In order that producers can ensure their own viability and satisfy the consumer market, their products must be safe, efficient, comfortable and satisfying to use, as well as durable, serviceable and realistically priced. One requirement for achieving this has been said to be the input of accident and ergonomics data early in the product development process; the present paper examines this proposition. Evidence is provided by research into the design and manufacture of consumer products for the UK market, carried out at Birmingham University. Examined in particular are the extent to which formal development processes and design safety review procedures are used, and the degree of utilisation of accident, ergonomics, user testing and market feedback data, identifying barriers to the widespread use of these. Safe and ergonomic design of products must aim to be seen as a positive business activity, rather than as a cost-centre. The benefits to a company of a comprehensive design safety programme will more than outweigh the costs given the pressures identified earlier.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号