首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   48580篇
  免费   4393篇
  国内免费   2473篇
电工技术   10683篇
技术理论   2篇
综合类   3009篇
化学工业   4579篇
金属工艺   2919篇
机械仪表   1375篇
建筑科学   6066篇
矿业工程   1774篇
能源动力   1112篇
轻工业   1311篇
水利工程   2033篇
石油天然气   4508篇
武器工业   201篇
无线电   2973篇
一般工业技术   2505篇
冶金工业   1447篇
原子能技术   510篇
自动化技术   8439篇
  2024年   119篇
  2023年   387篇
  2022年   963篇
  2021年   1196篇
  2020年   1157篇
  2019年   916篇
  2018年   894篇
  2017年   1138篇
  2016年   1310篇
  2015年   1569篇
  2014年   3317篇
  2013年   2407篇
  2012年   3435篇
  2011年   3941篇
  2010年   2970篇
  2009年   3001篇
  2008年   2865篇
  2007年   3430篇
  2006年   3346篇
  2005年   2922篇
  2004年   2454篇
  2003年   2404篇
  2002年   1917篇
  2001年   1606篇
  2000年   1389篇
  1999年   1074篇
  1998年   735篇
  1997年   531篇
  1996年   458篇
  1995年   384篇
  1994年   266篇
  1993年   180篇
  1992年   149篇
  1991年   107篇
  1990年   82篇
  1989年   77篇
  1988年   71篇
  1987年   38篇
  1986年   31篇
  1985年   39篇
  1984年   41篇
  1983年   28篇
  1982年   23篇
  1981年   25篇
  1980年   11篇
  1979年   9篇
  1978年   10篇
  1977年   4篇
  1976年   6篇
  1951年   3篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
城市进程的加快同时也对燃气行业提出了更高的要求,如何有效地降低运行故障率成为行业内有待解决的问题。文章主要讲述了如何通过加强燃气表的三防防护工作,有效降低控制部分的运行故障率。其中通过列举一款智能表的材料优选、工艺防护和结构防护三方面进行的具体三防防护处理措施,以及投入市场使用后所取得的效果,从而验证了经过三防处理的燃气表在恶劣环境下稳定运行的寿命可以得到很大的提高。  相似文献   
992.
由于全台网是业务整合、信息整合,其规模越来越大,所以安全的问题也更加突出。致使安全生产播出成为电视台的生命线,是一切工作的重点。网络安全一般是指防范黑客攻击和病毒传播等造成的安全威胁,需要通过采用适合的安全技术手段,建立完善的网络安全体系。该文通过对电视台的网络系统进行描述,了解网络安全的重要性和必要性,从而得到一套适合电视台的网络安全系统策略和解决办法。  相似文献   
993.
对电子信息实施保护,使电子信息按允许的方式使用是企业和机构业务正常进行的重要需要.AD RMS支持对信息的受控发布与使用,本文介绍AD RMS信息授权保护的原理,阐述了支持AD RMS信息保护的应用程序的开发和调试方法.  相似文献   
994.
995.
Why would people use Short Message Service (SMS) to say something they would not say in person? There is a trend that SMS is becoming more and more popular because it facilitates more extended modes of communications. Using technology acceptance model, we hypothesize the attitude of SMS would be influenced by its perceived effectiveness for communications, perceived ease of use, and subjective norm. Besides the special aspects of communications, conflict avoidance and privacy protection will enforce the impact of perceived effectiveness of SMS for communication. We investigated 953 SMS users and the results support most of our hypotheses. Furthermore, our analyses also show there are differences between females and males on the influence mechanism behind their attitude towards SMS.  相似文献   
996.
Biometric cryptosystems and cancelable biometrics are both practical and promising schemes to enhance the security and privacy of biometric systems. Though a number of bio-crypto algorithms have been proposed, they have limited practical applicability because they lack of cancelability. Since biometrics are immutable, the users whose biometrics are stolen cannot use bio-crypto systems anymore. Cancelable biometric schemes are of cancelability; however, they are difficult to compromise the conflicts between the security and performance. By embedded a novel cancelable palmprint template, namely “two dimensional (2D) Palmprint Phasor”, the proposed palmprint cryptosystem overcomes the lack of cancelability in existing biometric cryptosystems. Besides, the authentication performance is enhanced when users have different tokens/keys. Furthermore, we develop a novel dual-key-binding cancelable palmprint cryptosystem to enhance the security and privacy of palmprint biometric. 2D Palmprint Phasor template is scrambled by the scrambling transformation based on the chaotic sequence that is generated by both the user's token/key and strong key extracted from palmprint. Dual-key-binding scrambling not only has more robustness to resist against chosen plain text attack, but also enhances the secure requirement of non-invertibility. 2D Palmprint Phasor algorithm and dual-key-binding scrambling both increase the difficulty of adversary's statistical analysis. The experimental results and security analysis confirm the efficiency of the proposed scheme.  相似文献   
997.
Architectural prototyping is the process of using executable code to investigate stakeholders’ software architecture concerns with respect to a system under development. Previous work has established this as a useful and cost-effective way of exploration and learning of the design space of a system and in addressing issues regarding quality attributes, architectural risks, and the problem of knowledge transfer and conformance. However, the actual industrial use of architectural prototyping has not been thoroughly researched so far. In this article, we report from three studies of architectural prototyping in practice. First, we report findings from an ethnographic study of practicing software architects. Secondly, we report from a focus group on architectural prototyping involving architects from four companies. And, thirdly, we report from a survey study of 20 practicing software architects and software developers. Our findings indicate that architectural prototyping plays an important and frequent role in resolving problems experimentally, but less so in exploring alternative solutions. Furthermore, architectural prototypes include end-user or business related functionality rather than purely architectural functionality. Based on these observations we provide recommendations for effective industrial architectural prototyping.  相似文献   
998.
999.
Software product-lines (SPLs) are software platforms that can be readily reconfigured for different project requirements. A key part of an SPL is a model that captures the rules for reconfiguring the software. SPLs commonly use feature models to capture SPL configuration rules. Each SPL configuration is represented as a selection of features from the feature model. Invalid SPL configurations can be created due to feature conflicts introduced via staged or parallel configuration or changes to the constraints in a feature model. When invalid configurations are created, a method is needed to automate the diagnosis of the errors and repair the feature selections.This paper provides two contributions to research on automated configuration of SPLs. First, it shows how configurations and feature models can be transformed into constraint satisfaction problems to automatically diagnose errors and repair invalid feature selections. Second, it presents empirical results from diagnosing configuration errors in feature models ranging in size from 100 to 5,000 features. The results of our experiments show that our CSP-based diagnostic technique can scale up to models with thousands of features.  相似文献   
1000.
Enterprise architecture (EA) models can be used in order to increase the general understanding of enterprise systems and to perform various kinds of analysis. This paper presents instantiated architectural models based on a metamodel for enterprise systems modifiability analysis, i.e. for assessing the cost of making changes to enterprise-wide systems. The instantiated architectural models detailed are based on 21 software change projects conducted at four large Nordic companies. Probabilistic relational models (PRMs) are used for formalizing the EA analysis approach. PRMs enable the combination of regular entity-relationship modeling aspects with means to perform enterprise architecture analysis under uncertainty. The modifiability metamodel employed in the analysis is validated with survey and workshop data (in total 110 experts were surveyed) and with the data collected in the 21 software change projects. Validation indicates that the modifiability metamodel contains the appropriate set of elements. It also indicates that the metamodel produces estimates within a 75% accuracy in 87% of the time and has a mean accuracy of 88% (when considering projects of 2000 man-hours or more).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号