首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11400篇
  免费   646篇
  国内免费   684篇
电工技术   243篇
综合类   418篇
化学工业   807篇
金属工艺   433篇
机械仪表   736篇
建筑科学   1354篇
矿业工程   288篇
能源动力   1008篇
轻工业   394篇
水利工程   87篇
石油天然气   523篇
武器工业   98篇
无线电   1047篇
一般工业技术   814篇
冶金工业   932篇
原子能技术   57篇
自动化技术   3491篇
  2024年   13篇
  2023年   96篇
  2022年   377篇
  2021年   316篇
  2020年   332篇
  2019年   269篇
  2018年   205篇
  2017年   232篇
  2016年   277篇
  2015年   347篇
  2014年   750篇
  2013年   663篇
  2012年   738篇
  2011年   813篇
  2010年   547篇
  2009年   744篇
  2008年   599篇
  2007年   745篇
  2006年   683篇
  2005年   608篇
  2004年   464篇
  2003年   467篇
  2002年   551篇
  2001年   306篇
  2000年   275篇
  1999年   256篇
  1998年   196篇
  1997年   146篇
  1996年   142篇
  1995年   112篇
  1994年   108篇
  1993年   62篇
  1992年   64篇
  1991年   35篇
  1990年   25篇
  1989年   25篇
  1988年   21篇
  1987年   15篇
  1986年   11篇
  1985年   25篇
  1984年   16篇
  1983年   13篇
  1982年   10篇
  1981年   7篇
  1980年   4篇
  1979年   5篇
  1978年   4篇
  1977年   2篇
  1974年   3篇
  1973年   3篇
排序方式: 共有10000条查询结果,搜索用时 156 毫秒
71.
Glenn  Richard R.  Suresh   《Computers & Security》2006,25(8):600-615
Network Denial-of-Service (DoS) attacks that disable network services by flooding them with spurious packets are on the rise. Criminals with large networks (botnets) of compromised nodes (zombies) use the threat of DoS attacks to extort legitimate companies. To fight these threats and ensure network reliability, early detection of these attacks is critical. Many methods have been developed with limited success to date. This paper presents an approach that identifies change points in the time series of network packet arrival rates. The proposed process has two stages: (i) statistical analysis that finds the rate of increase of network traffic, and (ii) wavelet analysis of the network statistics that quickly detects the sudden increases in packet arrival rates characteristic of botnet attacks.Most intrusion detections are tested using data sets from special security testing configurations, which leads to unacceptable false positive rates being found when they are used in the real world. We test our approach using data from both network simulations and a large operational network. The true and false positive detection rates are determined for both data sets, and receiver operating curves use these rates to find optimal parameters for our approach. Evaluation using operational data proves the effectiveness of our approach.  相似文献   
72.
A method is presented for controlling cryptographic key usage based on control vectors. Each cryptographic key has an associated control vector that defines the permitted uses of the key within the cryptographic system. At key generation, the control vector is cryptographically coupled to the key by way of a special encryption process. Each encrypted key and control vector are stored and distributed within the cryptographic system as a single token. Decryption of a key requires respecification of the control vector. As part of the decryption process, the cryptographic hardware verifies that the requested use of the key is authorized by the control vector. This article focuses mainly on the use of control vectors in cryptosystems based on the Data Encryption Algorithm.  相似文献   
73.
空调表冷器性能微机测试系统设计与软件开发   总被引:4,自引:0,他引:4  
李阳春  陈光明  王剑锋 《制冷》2003,22(2):8-10
介绍了一套用于空调表冷器性能测试的试验装置及配套软件,重点叙述了系统的总体构成、程序的设计思想以及数据采样和处理等功能模块。微机测试技术以及配套软件的使用大大减少了测试人员的工作量,并在一定程度上提高了测试的精度。  相似文献   
74.
In this paper, a new solution cycle in the double absorption heat transformer is presented and the thermodynamic performance of this new cycle is simulated based on the thermodynamic properties of aqueous solution of lithium bromide. The results show that this new cycle is superior to the cycle being studied by some researchers. This new solution cycle has a wider range of operation in which the system maintains the high value of COP and has larger temperature lifts and operation stability. The relationship between the absorber and the absorbing evaporator is more independent and this makes the operation and control of the system more easier.  相似文献   
75.
结合西气东输管道工程燃气轮机驱动压缩机组设备订货及验收中对性能试验项目的确定、工厂试验及见证过程,介绍了燃压机组性能试验项目所涉及的主要内容、执行标准、需要达到的技术指标,各种性能试验的基本情况,买方参加工厂试验见证中需要重点处理好的问题等。以期为我国其他大型长输天然气管道机组订货及试验见证工作提供借鉴。  相似文献   
76.
Suzhi Wu  Guoxing Lin  Jincan Chen   《Renewable Energy》2005,30(15):2257-2271
The coefficient of performance and specific heating load of an irreversible three-heat-source heat pump are given by using a general cycle model affected by the finite-rate heat transfer, heat leak and internal irreversibility of the cyclic working fluid. The heat pumping load divided by the total cost per unit time is taken as a new objective function and used to investigate the performance of the heat pump. The thermoeconomic and thermodynamic performance characteristics of the heat pump are discussed in detail. Some important performance parameters such as the thermoeconomic objective function and coefficient of performance are optimized. The optimally operating regions of the heat pump and the bounds of several performance parameters are determined. Finally, it is pointed out that the Carnot heat pump may be taken as a special case of a three-heat-source heat pump and consequently its optimal performance can be directly derived from the results obtained here.  相似文献   
77.
Effects of equal and unequal circumferential pick spacing on the performance of boom type roadheaders having cylindrical cutting heads are investigated. For this purpose, two experimental cutting heads with equal and unequal circumferential spacing are designed and manufactured. The cutting head with unequal circumferential spacing is specifically designed to prevent tool-holder overlap at the nose section. Manufacturing difficulties associated with equal circumferential pick spacing due to tool-holder overlap are discussed with solid modeling and practical applications. The heads are tested at Park Cayirhan Coal Mine in Turkey and their cutting performances are analysed. Although better cutting performance for equal circumferential spacing are predicted by force–balance analysis, in situ measurements of instantaneous (net) traversing speed and cutting rate, pick consumption rate and machine vibration show that no significant difference exists between the performances of the two cutting heads.  相似文献   
78.
Key-insulated encryption schemes use a combination of key splitting and key evolution to protect against key exposure. Existing schemes, however scale poorly, having cost proportional to the number t of time periods that may be compromised by the adversary, and thus are practical only for small values of t. Yet in practice t might be large. This paper presents a strongly key-insulated encryption scheme with optimal threshold. In our scheme, t need not be known in advance and can be as large as one less than the total number of periods, yet the cost of the scheme is not impacted. This brings key-insulated encryption closer to practice. Our scheme is based on the Boneh-Franklin identity-based encryption (IBE) scheme [9], and exploits algebraic properties of the latter. Another contribution of this paper is to show that (not strongly) key-insulated encryption with optimal threshold and allowing random-access key updates (which our scheme and all others known allow) is equivalent to a restricted form of IBE. This means that the connection between key-insulated encryption and IBE is not accidental. Supported in part by NSF grants CCR-0098123, ANR-0129617 and CCR-0208842, and by an IBM Faculty Partnership Development Award. Supported in part by an NSF graduate fellowship.  相似文献   
79.
This paper proposes a performance index to measure the quality level of a stochastic-flow network in which each node has a designated capacity, which will have different lower levels due to various partial and complete failures. The performance index is the probability that the maximum flow of the network equals the demand d without exceeding the budget b. A simple algorithm in terms of minimal cuts is first proposed to generate all upper boundary points for (d, b), and then the probability that the maximum flow is less than or equal to d can be calculated in terms of such points. The upper boundary point for (d, b) is a maximal vector representing the capacity of each arc such that the maximum flow of the network under the budget b is d. The performance index can be calculated by repeating the proposed algorithm to obtain all upper boundary point for (d−1, b). A benchmark example is shown to illustrate the solution procedure.  相似文献   
80.
欢喜岭重交通道路沥青SHRP性能研究   总被引:1,自引:1,他引:0  
应用Superpave沥青胶结料试验动态剪切试验、压力老化试验和弯曲梁流变试验评定欢喜岭重交通道路沥青的抗永久变形、抗低温开裂和抗疲劳开裂性能,确定欢喜岭重交沥青最高和最低路面设计温度及PG等级,表明欢喜岭重交沥青满足我国广阔地域的使用要求。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号