首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   70065篇
  免费   3613篇
  国内免费   2384篇
电工技术   5608篇
技术理论   19篇
综合类   7878篇
化学工业   2395篇
金属工艺   832篇
机械仪表   2959篇
建筑科学   13098篇
矿业工程   3039篇
能源动力   1892篇
轻工业   1851篇
水利工程   4243篇
石油天然气   1760篇
武器工业   302篇
无线电   5779篇
一般工业技术   3438篇
冶金工业   4916篇
原子能技术   454篇
自动化技术   15599篇
  2024年   104篇
  2023年   449篇
  2022年   945篇
  2021年   1316篇
  2020年   1455篇
  2019年   989篇
  2018年   920篇
  2017年   1281篇
  2016年   1631篇
  2015年   1837篇
  2014年   5759篇
  2013年   4529篇
  2012年   5059篇
  2011年   5446篇
  2010年   4180篇
  2009年   4512篇
  2008年   4526篇
  2007年   5500篇
  2006年   4766篇
  2005年   4056篇
  2004年   3511篇
  2003年   3120篇
  2002年   2474篇
  2001年   1802篇
  2000年   1399篇
  1999年   1044篇
  1998年   715篇
  1997年   533篇
  1996年   423篇
  1995年   359篇
  1994年   266篇
  1993年   198篇
  1992年   134篇
  1991年   106篇
  1990年   68篇
  1989年   93篇
  1988年   72篇
  1987年   35篇
  1986年   68篇
  1985年   73篇
  1984年   74篇
  1983年   82篇
  1982年   24篇
  1981年   19篇
  1980年   11篇
  1979年   13篇
  1977年   14篇
  1975年   6篇
  1961年   7篇
  1959年   9篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
基于主动网络技术的网络管理   总被引:1,自引:0,他引:1  
本文主要介绍了主动网络技术的网络管理原理以及主动网络的几种执行体制,并描述了主动网络的基本工作过程。  相似文献   
992.
This study examined the perceived motivations and consequences of voluntary disclosure of Facebook active users using a survey administered to college students in a public‐speaking course. College‐age students who took the survey were motivated to use Facebook because they perceived their relationships improved with friends and family, although using Facebook could become negatively habit forming. The research suggests that users of Facebook use it more for disclosing to distant friends rather than to close friends, which is divergent from most early disclosure research that equates disclosure with intimacy. This research utilizes Communication Privacy Management Theory for the theoretical framework.  相似文献   
993.
Why would people use Short Message Service (SMS) to say something they would not say in person? There is a trend that SMS is becoming more and more popular because it facilitates more extended modes of communications. Using technology acceptance model, we hypothesize the attitude of SMS would be influenced by its perceived effectiveness for communications, perceived ease of use, and subjective norm. Besides the special aspects of communications, conflict avoidance and privacy protection will enforce the impact of perceived effectiveness of SMS for communication. We investigated 953 SMS users and the results support most of our hypotheses. Furthermore, our analyses also show there are differences between females and males on the influence mechanism behind their attitude towards SMS.  相似文献   
994.
Virtual worlds, as electronic environments where individuals can interact in a realistic manner in form of avatars, are increasingly used by gamers, consumers and employees. Therefore, they provide opportunities for reinventing business processes. Especially, effective knowledge management (KM) requires the use of appropriate information and communication technology (ICT) as well as social interaction. Emerging virtual worlds enable new ways to support knowledge and knowing processes because these virtual environments consider social aspects that are necessary for knowledge creating and knowledge sharing processes. Thus, collaboration in virtual worlds resembles real‐life activities. In this paper, we shed light on the use of Second Life (SL) as a KM platform in a real‐life setting. To explore the potential and current usage of virtual worlds for knowledge and knowing activities, we conducted a qualitative study at IBM. We interviewed IBM employees belonging to a special workgroup called ‘Web 2.0/virtual worlds’ in order to gain experience in generating and exchanging knowledge by virtually collaborating and interacting. Our results show that virtual worlds – if they are able to overcome problems like platform stability, user interface or security issues – bear the potential to serve as a KM platform. They facilitate global and simultaneous interaction, create a common context for collaboration, combine different tools for communication and enhance knowledge and knowing processes.  相似文献   
995.
Traceable content protection based on chaos and neural networks   总被引:1,自引:0,他引:1  
In this paper, a media content encryption/decryption algorithm is designed based on a chaos system and neural networks, which generates random sequences with chaos, and encrypts or decrypts media contents with neural networks in a parallel way. In this scheme, different decryption keys can be used to recover the media content into different copies. That is, the decryption operation gets the content containing certain random sequence that can be used as the identification. With respect to this property, the scheme is used for secure content distribution. Taking the audio content for example, it is encrypted by a key at the sender side and decrypted by different keys at the receiver side. The differences between decryption keys lead to different decrypted audio copies. If one customer distributes his copy to other unauthorized customers, the chaotic sequence contained in the copy can tell the illegal customer. The performances, including security, imperceptibility and robustness, are analyzed, and some experimental results are given to show the scheme's practicability.  相似文献   
996.
Radio Frequency Identification (RFID) based systems have been used in different applications in the Architecture, Engineering, Construction, Owner and Operator (AECOO) industry. Applications are mainly designed for specific lifecycle stage of the facility and serve the needs of only one of the stakeholders. This would increase the cost and the labor for adding and removing tags and eliminate the chance of using shared resources. In this paper, the usage of tags permanently attached to components is proposed where the memory of the tags is used during the lifecycle by different stakeholders for data storage and handover. A Building Information Model (BIM) database is used for tackling the interoperability issues allowing different users to access and share the data. To securely and efficiently store data on RFID tags in ifcXML format, multi-level encryption together with role-based access control is applied on the data stored on RFID tags. Each user is assigned a certain role and can only access the part of data for which he has authorization according to a predefined role and the Access Control Policy. To explore the technical feasibility of the proposed approach, a case study considering both facilities management and emergency management has been implemented and tested at Concordia University.  相似文献   
997.
The current Internet was originally designed for “fixed” terminals and can hardly support mobility. It is necessary to develop new mobility management schemes for the future Internet. This paper proposes an Identifiers Separating and Mapping Scheme (ISMS), which is a candidate for the future Internet mobility management, and discusses the basic principles and detailed message flow. ISMS is a network-based mobility management scheme that takes advantage of the identity and location separation. The mobility entities in the core network are responsible for the location management. ISMS is designed to satisfy the requirements of faster handover, route optimism, advanced management, location privacy and security. The average handover delay of ISMS is on the order of milliseconds only, which is far smaller than that of Mobile IPv6. Analyses show that ISMS can reduce packet overhead on wireless channels. We build a prototype and perform some experiments. Results verify the feasibility of ISMS.  相似文献   
998.
随着Flash芯片容量的日益增长,如何设计低空间复杂度的Flash管理算法已经成为RAM空间受限的嵌入式存储系统的一个关键问题.本文根据文件在Flash介质上连续存放的特性,引入区段的概念,提出基于极大映射区段的地址映射算法,并使用简单的数据结构和高效的算法来维护映射中的区段,大大减小了Flash文件系统的RAM用量.最后,通过不同应用负载的实验验证了该算法的有效性.在部分应用负载下,可降低高达95%的RAM使用量.  相似文献   
999.
季震宇  赵雷 《计算机工程》2010,36(21):49-51
降载可以有效地解决数据流流速的突变所引发的系统的过载问题。为此,分析现有降载策略在实时性方面的不足,不仅考虑系统的处理能力,同时结合数据的处理延迟,提出基于延迟时间的降载策略(DSP)。实验结果表明,DSP可以有效地解决系统的过载,同时具有较高的实时性。  相似文献   
1000.
王平  李华旺  尹增山  孙宁 《计算机工程》2010,36(14):251-253
针对某型号小卫星在空间飞行可能面临的硬件和软件故障,设计星载计算机星务管理软件,分析其可靠性。该星载计算机采用双机冗余设计,使用双机通信保持主备份机切换时的系统运行状态,通过软件可靠性技术实现空间环境下部分硬件暂态错误的容错。空间飞行测试结果证明该星务管理软件安全可靠,使卫星完成了预定的任务。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号