首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6997篇
  免费   644篇
  国内免费   605篇
电工技术   114篇
技术理论   1篇
综合类   346篇
化学工业   230篇
金属工艺   199篇
机械仪表   200篇
建筑科学   2245篇
矿业工程   193篇
能源动力   225篇
轻工业   229篇
水利工程   89篇
石油天然气   110篇
武器工业   33篇
无线电   780篇
一般工业技术   230篇
冶金工业   1010篇
原子能技术   43篇
自动化技术   1969篇
  2024年   13篇
  2023年   89篇
  2022年   349篇
  2021年   285篇
  2020年   318篇
  2019年   238篇
  2018年   160篇
  2017年   162篇
  2016年   224篇
  2015年   247篇
  2014年   574篇
  2013年   492篇
  2012年   456篇
  2011年   488篇
  2010年   373篇
  2009年   552篇
  2008年   381篇
  2007年   461篇
  2006年   405篇
  2005年   335篇
  2004年   266篇
  2003年   287篇
  2002年   392篇
  2001年   130篇
  2000年   117篇
  1999年   115篇
  1998年   61篇
  1997年   46篇
  1996年   49篇
  1995年   32篇
  1994年   21篇
  1993年   16篇
  1992年   14篇
  1991年   11篇
  1990年   9篇
  1989年   17篇
  1988年   10篇
  1987年   7篇
  1986年   10篇
  1985年   7篇
  1984年   6篇
  1983年   5篇
  1982年   4篇
  1981年   3篇
  1980年   4篇
  1979年   3篇
  1958年   1篇
  1954年   1篇
排序方式: 共有8246条查询结果,搜索用时 0 毫秒
11.
介绍用后台SQL Server的存储过程实现先进先出的批次管理。  相似文献   
12.
在PKI体系中,私钥集中存放或私钥托管方式的安全性和方便性依赖于管理员的可信性或者需要一个各行业都能使用和接受的具有权威性的第三方托管机构。借鉴密钥托管的思想,设计了一个私钥管理方案。将加密的私钥和加密私钥的密钥分离,使得KMC和KEC都不能单独解密出私钥。与其他私钥管理方案相比,该方案安全性不依赖于管理员或第三方托管机构的可信性,更加方便和安全。  相似文献   
13.
移动自组网安全技术研究   总被引:1,自引:0,他引:1  
移动Ad Hoc网络由于其动态拓扑和无线通信等特点,容易受到安全威胁.将现有的移动Ad Hoc网络的网络安全技术分为入侵检测与防范、安全路由协议技术、架构模型技术、密钥技术和其他技术.其中,入侵检测与防范主要基于移动Ad Hoc网络的特点,在一定教学模型的基础上对于网络节点的行为进行分析和监测,以保证整个移动网络的网络安全.安全路由协议技术包括全新的安全路由协议技术和现有路由协议的安全化改进技术.密钥技术主要是基于移动Ad Hoc网络的特点对现有密钥技术进行改造.对上述移动Ad Hoc网络的网络安全技术分别进行了介绍和分析.  相似文献   
14.
The historical competition between public power and private power shows that retail customers have chosen the former to reduce costs and improve customer service. Research also shows that publicly owned utilities employ cost-minimizing algorithms, and that federal and state regulators favor the interests of investors over those of customers, undermining their obligation to protect consumer welfare. Institutional options matter and should be strongly encouraged.  相似文献   
15.
When the Transformer proposed by Google in 2017, it was first used for machine translation tasks and achieved the state of the art at that time. Although the current neural machine translation model can generate high quality translation results, there are still mistranslations and omissions in the translation of key information of long sentences. On the other hand, the most important part in traditional translation tasks is the translation of key information. In the translation results, as long as the key information is translated accurately and completely, even if other parts of the results are translated incorrect, the final translation results’ quality can still be guaranteed. In order to solve the problem of mistranslation and missed translation effectively, and improve the accuracy and completeness of long sentence translation in machine translation, this paper proposes a key information fused neural machine translation model based on Transformer. The model proposed in this paper extracts the keywords of the source language text separately as the input of the encoder. After the same encoding as the source language text, it is fused with the output of the source language text encoded by the encoder, then the key information is processed and input into the decoder. With incorporating keyword information from the source language sentence, the model’s performance in the task of translating long sentences is very reliable. In order to verify the effectiveness of the method of fusion of key information proposed in this paper, a series of experiments were carried out on the verification set. The experimental results show that the Bilingual Evaluation Understudy (BLEU) score of the model proposed in this paper on the Workshop on Machine Translation (WMT) 2017 test dataset is higher than the BLEU score of Transformer proposed by Google on the WMT2017 test dataset. The experimental results show the advantages of the model proposed in this paper.  相似文献   
16.
Japan's educational system has some major problems. The most important among these concerns is the basic concept of the educational process and the goal of education. The old concept of public educational systems has become outdated in today's Japanese society, although this concept had supported social and spiritual faith, economic success and selfless devotion to one's country for more than 100 years. Now, Japanese people need a new concept of the educational process and the goal of education for the twenty-first century. The paper proposes a value chain of educational and learning systems aimed at building a network consisting of multiple fields for fostering future human resources.  相似文献   
17.
政务信息资源中心框架设计及关键技术研究   总被引:1,自引:0,他引:1  
目前国内有关政务信息资源共享的研究及应用还停留在网络互联互通、信息资源整合、点对点数据交换阶段,并没有达到"协同工作"的要求.鉴于此,提出了政务信息资源中心的概念,实现政务信息资源的统一获取、统一管理、规则化和规模化服务.结合工作实践,对其组成、总体框架、技术架构进行了设计,并就实现时需要解决的关键技术进行了研究.  相似文献   
18.
Design of DL-based certificateless digital signatures   总被引:1,自引:0,他引:1  
Public-key cryptosystems without requiring digital certificates are very attractive in wireless communications due to limitations imposed by communication bandwidth and computational resource of the mobile wireless communication devices. To eliminate public-key digital certificate, Shamir introduced the concept of the identity-based (ID-based) cryptosystem. The main advantage of the ID-based cryptosystem is that instead of using a random integer as each user’s public key as in the traditional public-key systems, the user’s real identity, such as user’s name or email address, becomes the user’s public key. However, all identity-based signature (IBS) schemes have the inherent key escrow problem, that is private key generator (PKG) knows the private key of each user. As a result, the PKG is able to sign any message on the users’ behalf. This nature violates the “non-repudiation” requirement of digital signatures. To solve the key escrow problem of the IBS while still taking advantage of the benefits of the IBS, certificateless digital signature (CDS) was introduced. In this paper, we propose a generalized approach to construct CDS schemes. In our proposed CDS scheme, the user’s private key is known only to the user himself, therefore, it can eliminate the key escrow problem from the PKG. The proposed construction can be applied to all Discrete Logarithm (DL)-based signature schemes to convert a digital signature scheme into a CDS scheme. The proposed CDS scheme is secure against adaptive chosen-message attack in the random oracle model. In addition, it is also efficient in signature generation and verification.  相似文献   
19.
Most existing solutions to group security in Mobile Ad Hoc Networks (MANETs) rely on a multicast Core Based Tree (CBT) for key distribution. Such solutions, although suitable for systems with low mobility and static characteristics, are unsuitable for dynamic and sparse groups with changing neighborhoods. In this paper, we propose an entirely decentralized key generation mechanism, employing a central trusted entity only during initialization. Using our approach, keys can be established between group members with absolutely no prior communication. The solution relies on threshold cryptography and introduces a novel concept of Node-Group-Key (NGK) mapping. We have provided an extensive analytical model for the computations involved and communication costs and have also provided a lie detection mechanism. Simulation results show appreciable performance improvement and enhanced robustness.  相似文献   
20.
对重催I/A'S系统三冲量控制回路的探讨   总被引:1,自引:0,他引:1  
本文主要对广州石油化工总厂重油催化裂化装置的复杂回路——三冲量控制在I/A'S系统的实现进行探讨和实施。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号