全文获取类型
收费全文 | 574篇 |
免费 | 111篇 |
国内免费 | 72篇 |
专业分类
电工技术 | 47篇 |
综合类 | 44篇 |
化学工业 | 10篇 |
金属工艺 | 10篇 |
机械仪表 | 16篇 |
建筑科学 | 4篇 |
矿业工程 | 2篇 |
能源动力 | 7篇 |
轻工业 | 17篇 |
水利工程 | 1篇 |
武器工业 | 2篇 |
无线电 | 334篇 |
一般工业技术 | 22篇 |
冶金工业 | 8篇 |
原子能技术 | 3篇 |
自动化技术 | 230篇 |
出版年
2024年 | 5篇 |
2023年 | 14篇 |
2022年 | 35篇 |
2021年 | 50篇 |
2020年 | 57篇 |
2019年 | 56篇 |
2018年 | 58篇 |
2017年 | 63篇 |
2016年 | 59篇 |
2015年 | 41篇 |
2014年 | 43篇 |
2013年 | 35篇 |
2012年 | 36篇 |
2011年 | 31篇 |
2010年 | 21篇 |
2009年 | 14篇 |
2008年 | 21篇 |
2007年 | 21篇 |
2006年 | 21篇 |
2005年 | 7篇 |
2004年 | 11篇 |
2003年 | 11篇 |
2002年 | 17篇 |
2001年 | 8篇 |
2000年 | 9篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1975年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有757条查询结果,搜索用时 875 毫秒
691.
阐述了在Delphi环境下开发自定义预览报表的设计方法,即利用Delphi 提供的Quickrep和QRpreview控件,通过设定预览报表的尺寸大小和缩放比例等来生成预览报表。编程实现自定义预览报表的具体步骤包括创建预览报表、使用预览控制元件、在OnMouseDown事件中编写程序代码等。自定义预览报表改变了Delphi缺省的预览报表格式,是Delphi中实现特殊格式报表的有效补充。 相似文献
692.
程序设计语言FORTRAN90研究与应用 总被引:1,自引:0,他引:1
FORTRAN90标准较以往的版本有了重大改进,它吸收了其它编程语言(如:C及Pascal)的优点,并创建了许多新特性。如:用简明有效的符号形式处理数组及使用用户自定义类型数据。前者使对许多数学问题处理的程序代码变得极为简单,且由于其数值的特性与计算机硬件资源匹配更好,使FORTRAN语言成为大型计算机理更有效的语言;后者使编程人员能够按照问题所需要的数据类型来编程。 相似文献
693.
Software‐defined networking (SDN) creates a platform to dynamically configure the networks for on‐demand services. SDN can easily control the data plane and the control plane by implementing the decoupling concept. SDN controller will regulate the traffic flow and creates the new flow label based on the packet dump received from the OpenFlow virtual switches. SDN governs both data information and control information toward the destination based on flow label, but it does not contain security measure to restrict the malicious traffic. The malicious denial‐of‐service (DoS) attack traffic is generated inside the SDN environment; it leads to the service unavailability. This paper is mainly focused on the detection of DoS attacks and also mitigates the malicious traffic by dynamically configuring the firewall. The SDN with dynamic access control list properties is emulated by mininet, and the experimental results exemplify the service unavailable gap between acceptance and rejection ratio of the packets. 相似文献
694.
在基于数据库的应用系统中,存在着许多数据间的关系,一部分可以通过数据库本身的机制来实现,如主外码引用关系,而另一部分关系是数据库无法维护的,如"进销存"计算关系,目前都是程序员编写代码去实现所需要的这部分关系,而基于代码的实现不利于计算关系的变更和扩展,需要有一种好的便于后期维护的实现方法. 相似文献
695.
696.
697.
698.
Ward Douglas Maurer 《Science of Computer Programming》2008,72(3):220-239
We here extend our earlier work on the theory of computer instructions to consider instructions which are only partially defined. For every such instruction, we assume that it is defined whenever a certain Boolean expression is true; we refer to such a Boolean expression as a guard, following Dijkstra. This is a special case of a more general function on the set of states of a computer, representing an expression in a programming language. Many constructs for instructions now generalize to partially defined instructions; in particular, we define the notion of conditional input and output regions, as well as the relevant region of a more general expression. Fundamental theorems about instructions generalize to theorems about guards and about partially defined instructions. We also define the parallel execution of such instructions, which is useful in validating a generalized instruction commutativity criterion. 相似文献
699.
Yannis E. Ioannidis 《Algorithmica》1986,1(1):361-385
A virtual relation (or view) can be defined with a recursive Horn clause that is a function of one or more base relations. In general, the number of times such a Horn clause must be applied in order to retrieve all the tuples in the virtual relation depends on the contents of the base relations of the definition. However, there exist Horn clauses for which there is an upper bound on the number of applications necessary to form the virtual relation, independent of the contents of the base relations. Considering a restricted class of recursive Horn clauses, we give necessary and sufficient conditions for members of the class to have this bound.This research was supported by the National Science Foundation under Grant ECS-8300463. 相似文献
700.
《工程(英文)》2021,7(8):1087-1100
Communication-dependent and software-based distributed energy resources (DERs) are extensively integrated into modern microgrids, providing extensive benefits such as increased distributed controllability, scalability, and observability. However, malicious cyber-attackers can exploit various potential vulnerabilities. In this study, a programmable adaptive security scanning (PASS) approach is presented to protect DER inverters against various power-bot attacks. Specifically, three different types of attacks, namely controller manipulation, replay, and injection attacks, are considered. This approach employs both software-defined networking technique and a novel coordinated detection method capable of enabling programmable and scalable networked microgrids (NMs) in an ultra-resilient, time-saving, and autonomous manner. The coordinated detection method efficiently identifies the location and type of power-bot attacks without disrupting normal NM operations. Extensive simulation results validate the efficacy and practicality of the PASS for securing NMs. 相似文献