全文获取类型
收费全文 | 11400篇 |
免费 | 646篇 |
国内免费 | 684篇 |
专业分类
电工技术 | 243篇 |
综合类 | 418篇 |
化学工业 | 807篇 |
金属工艺 | 433篇 |
机械仪表 | 736篇 |
建筑科学 | 1354篇 |
矿业工程 | 288篇 |
能源动力 | 1008篇 |
轻工业 | 394篇 |
水利工程 | 87篇 |
石油天然气 | 523篇 |
武器工业 | 98篇 |
无线电 | 1047篇 |
一般工业技术 | 814篇 |
冶金工业 | 932篇 |
原子能技术 | 57篇 |
自动化技术 | 3491篇 |
出版年
2024年 | 13篇 |
2023年 | 96篇 |
2022年 | 377篇 |
2021年 | 316篇 |
2020年 | 332篇 |
2019年 | 269篇 |
2018年 | 205篇 |
2017年 | 232篇 |
2016年 | 277篇 |
2015年 | 347篇 |
2014年 | 750篇 |
2013年 | 663篇 |
2012年 | 738篇 |
2011年 | 813篇 |
2010年 | 547篇 |
2009年 | 744篇 |
2008年 | 599篇 |
2007年 | 745篇 |
2006年 | 683篇 |
2005年 | 608篇 |
2004年 | 464篇 |
2003年 | 467篇 |
2002年 | 551篇 |
2001年 | 306篇 |
2000年 | 275篇 |
1999年 | 256篇 |
1998年 | 196篇 |
1997年 | 146篇 |
1996年 | 142篇 |
1995年 | 112篇 |
1994年 | 108篇 |
1993年 | 62篇 |
1992年 | 64篇 |
1991年 | 35篇 |
1990年 | 25篇 |
1989年 | 25篇 |
1988年 | 21篇 |
1987年 | 15篇 |
1986年 | 11篇 |
1985年 | 25篇 |
1984年 | 16篇 |
1983年 | 13篇 |
1982年 | 10篇 |
1981年 | 7篇 |
1980年 | 4篇 |
1979年 | 5篇 |
1978年 | 4篇 |
1977年 | 2篇 |
1974年 | 3篇 |
1973年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 156 毫秒
71.
Network Denial-of-Service (DoS) attacks that disable network services by flooding them with spurious packets are on the rise. Criminals with large networks (botnets) of compromised nodes (zombies) use the threat of DoS attacks to extort legitimate companies. To fight these threats and ensure network reliability, early detection of these attacks is critical. Many methods have been developed with limited success to date. This paper presents an approach that identifies change points in the time series of network packet arrival rates. The proposed process has two stages: (i) statistical analysis that finds the rate of increase of network traffic, and (ii) wavelet analysis of the network statistics that quickly detects the sudden increases in packet arrival rates characteristic of botnet attacks.Most intrusion detections are tested using data sets from special security testing configurations, which leads to unacceptable false positive rates being found when they are used in the real world. We test our approach using data from both network simulations and a large operational network. The true and false positive detection rates are determined for both data sets, and receiver operating curves use these rates to find optimal parameters for our approach. Evaluation using operational data proves the effectiveness of our approach. 相似文献
72.
Stephen M. Matyas 《Journal of Cryptology》1991,3(2):113-136
A method is presented for controlling cryptographic key usage based on control vectors. Each cryptographic key has an associated control vector that defines the permitted uses of the key within the cryptographic system. At key generation, the control vector is cryptographically coupled to the key by way of a special encryption process. Each encrypted key and control vector are stored and distributed within the cryptographic system as a single token. Decryption of a key requires respecification of the control vector. As part of the decryption process, the cryptographic hardware verifies that the requested use of the key is authorized by the control vector. This article focuses mainly on the use of control vectors in cryptosystems based on the Data Encryption Algorithm. 相似文献
73.
74.
Zongchang Zhao Fangwei Zhou Xiaodong Zhang Songping Li 《International Journal of Refrigeration》2003,26(3):2088
In this paper, a new solution cycle in the double absorption heat transformer is presented and the thermodynamic performance of this new cycle is simulated based on the thermodynamic properties of aqueous solution of lithium bromide. The results show that this new cycle is superior to the cycle being studied by some researchers. This new solution cycle has a wider range of operation in which the system maintains the high value of COP and has larger temperature lifts and operation stability. The relationship between the absorber and the absorbing evaporator is more independent and this makes the operation and control of the system more easier. 相似文献
75.
结合西气东输管道工程燃气轮机驱动压缩机组设备订货及验收中对性能试验项目的确定、工厂试验及见证过程,介绍了燃压机组性能试验项目所涉及的主要内容、执行标准、需要达到的技术指标,各种性能试验的基本情况,买方参加工厂试验见证中需要重点处理好的问题等。以期为我国其他大型长输天然气管道机组订货及试验见证工作提供借鉴。 相似文献
76.
Optimum thermoeconomic and thermodynamic performance characteristics of an irreversible three-heat-source heat pump 总被引:1,自引:0,他引:1
The coefficient of performance and specific heating load of an irreversible three-heat-source heat pump are given by using a general cycle model affected by the finite-rate heat transfer, heat leak and internal irreversibility of the cyclic working fluid. The heat pumping load divided by the total cost per unit time is taken as a new objective function and used to investigate the performance of the heat pump. The thermoeconomic and thermodynamic performance characteristics of the heat pump are discussed in detail. Some important performance parameters such as the thermoeconomic objective function and coefficient of performance are optimized. The optimally operating regions of the heat pump and the bounds of several performance parameters are determined. Finally, it is pointed out that the Carnot heat pump may be taken as a special case of a three-heat-source heat pump and consequently its optimal performance can be directly derived from the results obtained here. 相似文献
77.
Effects of circumferential pick spacing on boom type roadheader cutting head performance 总被引:4,自引:0,他引:4
E. Mustafa Eyyuboglu Naci Bolukbasi 《Tunnelling and Underground Space Technology incorporating Trenchless Technology Research》2005,20(5):418-425
Effects of equal and unequal circumferential pick spacing on the performance of boom type roadheaders having cylindrical cutting heads are investigated. For this purpose, two experimental cutting heads with equal and unequal circumferential spacing are designed and manufactured. The cutting head with unequal circumferential spacing is specifically designed to prevent tool-holder overlap at the nose section. Manufacturing difficulties associated with equal circumferential pick spacing due to tool-holder overlap are discussed with solid modeling and practical applications. The heads are tested at Park Cayirhan Coal Mine in Turkey and their cutting performances are analysed. Although better cutting performance for equal circumferential spacing are predicted by force–balance analysis, in situ measurements of instantaneous (net) traversing speed and cutting rate, pick consumption rate and machine vibration show that no significant difference exists between the performances of the two cutting heads. 相似文献
78.
Mihir Bellare Adriana Palacio 《Applicable Algebra in Engineering, Communication and Computing》2006,16(6):379-396
Key-insulated encryption schemes use a combination of key splitting and key evolution to protect against key exposure. Existing
schemes, however scale poorly, having cost proportional to the number t of time periods that may be compromised by the adversary, and thus are practical only for small values of t. Yet in practice t might be large.
This paper presents a strongly key-insulated encryption scheme with optimal threshold. In our scheme, t need not be known in advance and can be as large as one less than the total number of periods, yet the cost of the scheme
is not impacted. This brings key-insulated encryption closer to practice. Our scheme is based on the Boneh-Franklin identity-based
encryption (IBE) scheme [9], and exploits algebraic properties of the latter.
Another contribution of this paper is to show that (not strongly) key-insulated encryption with optimal threshold and allowing
random-access key updates (which our scheme and all others known allow) is equivalent to a restricted form of IBE. This means
that the connection between key-insulated encryption and IBE is not accidental.
Supported in part by NSF grants CCR-0098123, ANR-0129617 and CCR-0208842, and by an IBM Faculty Partnership Development Award.
Supported in part by an NSF graduate fellowship. 相似文献
79.
Evaluate the performance of a stochastic-flow network with cost attribute in terms of minimal cuts 总被引:2,自引:0,他引:2
This paper proposes a performance index to measure the quality level of a stochastic-flow network in which each node has a designated capacity, which will have different lower levels due to various partial and complete failures. The performance index is the probability that the maximum flow of the network equals the demand d without exceeding the budget b. A simple algorithm in terms of minimal cuts is first proposed to generate all upper boundary points for (d, b), and then the probability that the maximum flow is less than or equal to d can be calculated in terms of such points. The upper boundary point for (d, b) is a maximal vector representing the capacity of each arc such that the maximum flow of the network under the budget b is d. The performance index can be calculated by repeating the proposed algorithm to obtain all upper boundary point for (d−1, b). A benchmark example is shown to illustrate the solution procedure. 相似文献
80.
欢喜岭重交通道路沥青SHRP性能研究 总被引:1,自引:1,他引:0
应用Superpave沥青胶结料试验动态剪切试验、压力老化试验和弯曲梁流变试验评定欢喜岭重交通道路沥青的抗永久变形、抗低温开裂和抗疲劳开裂性能,确定欢喜岭重交沥青最高和最低路面设计温度及PG等级,表明欢喜岭重交沥青满足我国广阔地域的使用要求。 相似文献