全文获取类型
收费全文 | 70065篇 |
免费 | 3613篇 |
国内免费 | 2384篇 |
专业分类
电工技术 | 5608篇 |
技术理论 | 19篇 |
综合类 | 7878篇 |
化学工业 | 2395篇 |
金属工艺 | 832篇 |
机械仪表 | 2959篇 |
建筑科学 | 13098篇 |
矿业工程 | 3039篇 |
能源动力 | 1892篇 |
轻工业 | 1851篇 |
水利工程 | 4243篇 |
石油天然气 | 1760篇 |
武器工业 | 302篇 |
无线电 | 5779篇 |
一般工业技术 | 3438篇 |
冶金工业 | 4916篇 |
原子能技术 | 454篇 |
自动化技术 | 15599篇 |
出版年
2024年 | 104篇 |
2023年 | 449篇 |
2022年 | 945篇 |
2021年 | 1316篇 |
2020年 | 1455篇 |
2019年 | 989篇 |
2018年 | 920篇 |
2017年 | 1281篇 |
2016年 | 1631篇 |
2015年 | 1837篇 |
2014年 | 5759篇 |
2013年 | 4529篇 |
2012年 | 5059篇 |
2011年 | 5446篇 |
2010年 | 4180篇 |
2009年 | 4512篇 |
2008年 | 4526篇 |
2007年 | 5500篇 |
2006年 | 4766篇 |
2005年 | 4056篇 |
2004年 | 3511篇 |
2003年 | 3120篇 |
2002年 | 2474篇 |
2001年 | 1802篇 |
2000年 | 1399篇 |
1999年 | 1044篇 |
1998年 | 715篇 |
1997年 | 533篇 |
1996年 | 423篇 |
1995年 | 359篇 |
1994年 | 266篇 |
1993年 | 198篇 |
1992年 | 134篇 |
1991年 | 106篇 |
1990年 | 68篇 |
1989年 | 93篇 |
1988年 | 72篇 |
1987年 | 35篇 |
1986年 | 68篇 |
1985年 | 73篇 |
1984年 | 74篇 |
1983年 | 82篇 |
1982年 | 24篇 |
1981年 | 19篇 |
1980年 | 11篇 |
1979年 | 13篇 |
1977年 | 14篇 |
1975年 | 6篇 |
1961年 | 7篇 |
1959年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
基于主动网络技术的网络管理 总被引:1,自引:0,他引:1
张君枫 《网络安全技术与应用》2011,(8):12-14
本文主要介绍了主动网络技术的网络管理原理以及主动网络的几种执行体制,并描述了主动网络的基本工作过程。 相似文献
992.
This study examined the perceived motivations and consequences of voluntary disclosure of Facebook active users using a survey administered to college students in a public‐speaking course. College‐age students who took the survey were motivated to use Facebook because they perceived their relationships improved with friends and family, although using Facebook could become negatively habit forming. The research suggests that users of Facebook use it more for disclosing to distant friends rather than to close friends, which is divergent from most early disclosure research that equates disclosure with intimacy. This research utilizes Communication Privacy Management Theory for the theoretical framework. 相似文献
993.
Why would people use Short Message Service (SMS) to say something they would not say in person? There is a trend that SMS is becoming more and more popular because it facilitates more extended modes of communications. Using technology acceptance model, we hypothesize the attitude of SMS would be influenced by its perceived effectiveness for communications, perceived ease of use, and subjective norm. Besides the special aspects of communications, conflict avoidance and privacy protection will enforce the impact of perceived effectiveness of SMS for communication. We investigated 953 SMS users and the results support most of our hypotheses. Furthermore, our analyses also show there are differences between females and males on the influence mechanism behind their attitude towards SMS. 相似文献
994.
Julia Mueller Katja Hutter Johann Fueller Kurt Matzler 《Information Systems Journal》2011,21(6):479-501
Virtual worlds, as electronic environments where individuals can interact in a realistic manner in form of avatars, are increasingly used by gamers, consumers and employees. Therefore, they provide opportunities for reinventing business processes. Especially, effective knowledge management (KM) requires the use of appropriate information and communication technology (ICT) as well as social interaction. Emerging virtual worlds enable new ways to support knowledge and knowing processes because these virtual environments consider social aspects that are necessary for knowledge creating and knowledge sharing processes. Thus, collaboration in virtual worlds resembles real‐life activities. In this paper, we shed light on the use of Second Life (SL) as a KM platform in a real‐life setting. To explore the potential and current usage of virtual worlds for knowledge and knowing activities, we conducted a qualitative study at IBM. We interviewed IBM employees belonging to a special workgroup called ‘Web 2.0/virtual worlds’ in order to gain experience in generating and exchanging knowledge by virtually collaborating and interacting. Our results show that virtual worlds – if they are able to overcome problems like platform stability, user interface or security issues – bear the potential to serve as a KM platform. They facilitate global and simultaneous interaction, create a common context for collaboration, combine different tools for communication and enhance knowledge and knowing processes. 相似文献
995.
Traceable content protection based on chaos and neural networks 总被引:1,自引:0,他引:1
In this paper, a media content encryption/decryption algorithm is designed based on a chaos system and neural networks, which generates random sequences with chaos, and encrypts or decrypts media contents with neural networks in a parallel way. In this scheme, different decryption keys can be used to recover the media content into different copies. That is, the decryption operation gets the content containing certain random sequence that can be used as the identification. With respect to this property, the scheme is used for secure content distribution. Taking the audio content for example, it is encrypted by a key at the sender side and decrypted by different keys at the receiver side. The differences between decryption keys lead to different decrypted audio copies. If one customer distributes his copy to other unauthorized customers, the chaotic sequence contained in the copy can tell the illegal customer. The performances, including security, imperceptibility and robustness, are analyzed, and some experimental results are given to show the scheme's practicability. 相似文献
996.
Radio Frequency Identification (RFID) based systems have been used in different applications in the Architecture, Engineering, Construction, Owner and Operator (AECOO) industry. Applications are mainly designed for specific lifecycle stage of the facility and serve the needs of only one of the stakeholders. This would increase the cost and the labor for adding and removing tags and eliminate the chance of using shared resources. In this paper, the usage of tags permanently attached to components is proposed where the memory of the tags is used during the lifecycle by different stakeholders for data storage and handover. A Building Information Model (BIM) database is used for tackling the interoperability issues allowing different users to access and share the data. To securely and efficiently store data on RFID tags in ifcXML format, multi-level encryption together with role-based access control is applied on the data stored on RFID tags. Each user is assigned a certain role and can only access the part of data for which he has authorization according to a predefined role and the Access Control Policy. To explore the technical feasibility of the proposed approach, a case study considering both facilities management and emergency management has been implemented and tested at Concordia University. 相似文献
997.
The current Internet was originally designed for “fixed” terminals and can hardly support mobility. It is necessary to develop new mobility management schemes for the future Internet. This paper proposes an Identifiers Separating and Mapping Scheme (ISMS), which is a candidate for the future Internet mobility management, and discusses the basic principles and detailed message flow. ISMS is a network-based mobility management scheme that takes advantage of the identity and location separation. The mobility entities in the core network are responsible for the location management. ISMS is designed to satisfy the requirements of faster handover, route optimism, advanced management, location privacy and security. The average handover delay of ISMS is on the order of milliseconds only, which is far smaller than that of Mobile IPv6. Analyses show that ISMS can reduce packet overhead on wireless channels. We build a prototype and perform some experiments. Results verify the feasibility of ISMS. 相似文献
998.
随着Flash芯片容量的日益增长,如何设计低空间复杂度的Flash管理算法已经成为RAM空间受限的嵌入式存储系统的一个关键问题.本文根据文件在Flash介质上连续存放的特性,引入区段的概念,提出基于极大映射区段的地址映射算法,并使用简单的数据结构和高效的算法来维护映射中的区段,大大减小了Flash文件系统的RAM用量.最后,通过不同应用负载的实验验证了该算法的有效性.在部分应用负载下,可降低高达95%的RAM使用量. 相似文献
999.
1000.