全文获取类型
收费全文 | 48580篇 |
免费 | 4393篇 |
国内免费 | 2473篇 |
专业分类
电工技术 | 10683篇 |
技术理论 | 2篇 |
综合类 | 3009篇 |
化学工业 | 4579篇 |
金属工艺 | 2919篇 |
机械仪表 | 1375篇 |
建筑科学 | 6066篇 |
矿业工程 | 1774篇 |
能源动力 | 1112篇 |
轻工业 | 1311篇 |
水利工程 | 2033篇 |
石油天然气 | 4508篇 |
武器工业 | 201篇 |
无线电 | 2973篇 |
一般工业技术 | 2505篇 |
冶金工业 | 1447篇 |
原子能技术 | 510篇 |
自动化技术 | 8439篇 |
出版年
2024年 | 119篇 |
2023年 | 387篇 |
2022年 | 963篇 |
2021年 | 1196篇 |
2020年 | 1157篇 |
2019年 | 916篇 |
2018年 | 894篇 |
2017年 | 1138篇 |
2016年 | 1310篇 |
2015年 | 1569篇 |
2014年 | 3317篇 |
2013年 | 2407篇 |
2012年 | 3435篇 |
2011年 | 3941篇 |
2010年 | 2970篇 |
2009年 | 3001篇 |
2008年 | 2865篇 |
2007年 | 3430篇 |
2006年 | 3346篇 |
2005年 | 2922篇 |
2004年 | 2454篇 |
2003年 | 2404篇 |
2002年 | 1917篇 |
2001年 | 1606篇 |
2000年 | 1389篇 |
1999年 | 1074篇 |
1998年 | 735篇 |
1997年 | 531篇 |
1996年 | 458篇 |
1995年 | 384篇 |
1994年 | 266篇 |
1993年 | 180篇 |
1992年 | 149篇 |
1991年 | 107篇 |
1990年 | 82篇 |
1989年 | 77篇 |
1988年 | 71篇 |
1987年 | 38篇 |
1986年 | 31篇 |
1985年 | 39篇 |
1984年 | 41篇 |
1983年 | 28篇 |
1982年 | 23篇 |
1981年 | 25篇 |
1980年 | 11篇 |
1979年 | 9篇 |
1978年 | 10篇 |
1977年 | 4篇 |
1976年 | 6篇 |
1951年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
城市进程的加快同时也对燃气行业提出了更高的要求,如何有效地降低运行故障率成为行业内有待解决的问题。文章主要讲述了如何通过加强燃气表的三防防护工作,有效降低控制部分的运行故障率。其中通过列举一款智能表的材料优选、工艺防护和结构防护三方面进行的具体三防防护处理措施,以及投入市场使用后所取得的效果,从而验证了经过三防处理的燃气表在恶劣环境下稳定运行的寿命可以得到很大的提高。 相似文献
992.
张磊 《数字社区&智能家居》2011,(21)
由于全台网是业务整合、信息整合,其规模越来越大,所以安全的问题也更加突出。致使安全生产播出成为电视台的生命线,是一切工作的重点。网络安全一般是指防范黑客攻击和病毒传播等造成的安全威胁,需要通过采用适合的安全技术手段,建立完善的网络安全体系。该文通过对电视台的网络系统进行描述,了解网络安全的重要性和必要性,从而得到一套适合电视台的网络安全系统策略和解决办法。 相似文献
993.
邱刚 《网络安全技术与应用》2011,(3):44-46,49
对电子信息实施保护,使电子信息按允许的方式使用是企业和机构业务正常进行的重要需要.AD RMS支持对信息的受控发布与使用,本文介绍AD RMS信息授权保护的原理,阐述了支持AD RMS信息保护的应用程序的开发和调试方法. 相似文献
994.
995.
Why would people use Short Message Service (SMS) to say something they would not say in person? There is a trend that SMS is becoming more and more popular because it facilitates more extended modes of communications. Using technology acceptance model, we hypothesize the attitude of SMS would be influenced by its perceived effectiveness for communications, perceived ease of use, and subjective norm. Besides the special aspects of communications, conflict avoidance and privacy protection will enforce the impact of perceived effectiveness of SMS for communication. We investigated 953 SMS users and the results support most of our hypotheses. Furthermore, our analyses also show there are differences between females and males on the influence mechanism behind their attitude towards SMS. 相似文献
996.
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Biometric cryptosystems and cancelable biometrics are both practical and promising schemes to enhance the security and privacy of biometric systems. Though a number of bio-crypto algorithms have been proposed, they have limited practical applicability because they lack of cancelability. Since biometrics are immutable, the users whose biometrics are stolen cannot use bio-crypto systems anymore. Cancelable biometric schemes are of cancelability; however, they are difficult to compromise the conflicts between the security and performance. By embedded a novel cancelable palmprint template, namely “two dimensional (2D) Palmprint Phasor”, the proposed palmprint cryptosystem overcomes the lack of cancelability in existing biometric cryptosystems. Besides, the authentication performance is enhanced when users have different tokens/keys. Furthermore, we develop a novel dual-key-binding cancelable palmprint cryptosystem to enhance the security and privacy of palmprint biometric. 2D Palmprint Phasor template is scrambled by the scrambling transformation based on the chaotic sequence that is generated by both the user's token/key and strong key extracted from palmprint. Dual-key-binding scrambling not only has more robustness to resist against chosen plain text attack, but also enhances the secure requirement of non-invertibility. 2D Palmprint Phasor algorithm and dual-key-binding scrambling both increase the difficulty of adversary's statistical analysis. The experimental results and security analysis confirm the efficiency of the proposed scheme. 相似文献
997.
Henrik Bærbak Christensen Author Vitae Klaus Marius Hansen Author Vitae 《Journal of Systems and Software》2010,83(1):133-142
Architectural prototyping is the process of using executable code to investigate stakeholders’ software architecture concerns with respect to a system under development. Previous work has established this as a useful and cost-effective way of exploration and learning of the design space of a system and in addressing issues regarding quality attributes, architectural risks, and the problem of knowledge transfer and conformance. However, the actual industrial use of architectural prototyping has not been thoroughly researched so far. In this article, we report from three studies of architectural prototyping in practice. First, we report findings from an ethnographic study of practicing software architects. Secondly, we report from a focus group on architectural prototyping involving architects from four companies. And, thirdly, we report from a survey study of 20 practicing software architects and software developers. Our findings indicate that architectural prototyping plays an important and frequent role in resolving problems experimentally, but less so in exploring alternative solutions. Furthermore, architectural prototypes include end-user or business related functionality rather than purely architectural functionality. Based on these observations we provide recommendations for effective industrial architectural prototyping. 相似文献
998.
999.
J. White Author Vitae D. Benavides Author Vitae 《Journal of Systems and Software》2010,83(7):1094-1107
Software product-lines (SPLs) are software platforms that can be readily reconfigured for different project requirements. A key part of an SPL is a model that captures the rules for reconfiguring the software. SPLs commonly use feature models to capture SPL configuration rules. Each SPL configuration is represented as a selection of features from the feature model. Invalid SPL configurations can be created due to feature conflicts introduced via staged or parallel configuration or changes to the constraints in a feature model. When invalid configurations are created, a method is needed to automate the diagnosis of the errors and repair the feature selections.This paper provides two contributions to research on automated configuration of SPLs. First, it shows how configurations and feature models can be transformed into constraint satisfaction problems to automatically diagnose errors and repair invalid feature selections. Second, it presents empirical results from diagnosing configuration errors in feature models ranging in size from 100 to 5,000 features. The results of our experiments show that our CSP-based diagnostic technique can scale up to models with thousands of features. 相似文献
1000.
Robert Lagerström Author Vitae Pontus Johnson Author VitaeAuthor Vitae 《Journal of Systems and Software》2010,83(8):1387-1403
Enterprise architecture (EA) models can be used in order to increase the general understanding of enterprise systems and to perform various kinds of analysis. This paper presents instantiated architectural models based on a metamodel for enterprise systems modifiability analysis, i.e. for assessing the cost of making changes to enterprise-wide systems. The instantiated architectural models detailed are based on 21 software change projects conducted at four large Nordic companies. Probabilistic relational models (PRMs) are used for formalizing the EA analysis approach. PRMs enable the combination of regular entity-relationship modeling aspects with means to perform enterprise architecture analysis under uncertainty. The modifiability metamodel employed in the analysis is validated with survey and workshop data (in total 110 experts were surveyed) and with the data collected in the 21 software change projects. Validation indicates that the modifiability metamodel contains the appropriate set of elements. It also indicates that the metamodel produces estimates within a 75% accuracy in 87% of the time and has a mean accuracy of 88% (when considering projects of 2000 man-hours or more). 相似文献