全文获取类型
收费全文 | 25642篇 |
免费 | 2652篇 |
国内免费 | 2746篇 |
专业分类
电工技术 | 690篇 |
综合类 | 2444篇 |
化学工业 | 377篇 |
金属工艺 | 177篇 |
机械仪表 | 938篇 |
建筑科学 | 7414篇 |
矿业工程 | 1243篇 |
能源动力 | 309篇 |
轻工业 | 127篇 |
水利工程 | 1947篇 |
石油天然气 | 67篇 |
武器工业 | 192篇 |
无线电 | 2006篇 |
一般工业技术 | 1178篇 |
冶金工业 | 228篇 |
原子能技术 | 38篇 |
自动化技术 | 11665篇 |
出版年
2024年 | 81篇 |
2023年 | 186篇 |
2022年 | 505篇 |
2021年 | 588篇 |
2020年 | 604篇 |
2019年 | 433篇 |
2018年 | 404篇 |
2017年 | 669篇 |
2016年 | 686篇 |
2015年 | 788篇 |
2014年 | 1589篇 |
2013年 | 1344篇 |
2012年 | 2083篇 |
2011年 | 2299篇 |
2010年 | 2093篇 |
2009年 | 2225篇 |
2008年 | 2301篇 |
2007年 | 2538篇 |
2006年 | 2205篇 |
2005年 | 1768篇 |
2004年 | 1498篇 |
2003年 | 1187篇 |
2002年 | 846篇 |
2001年 | 646篇 |
2000年 | 508篇 |
1999年 | 321篇 |
1998年 | 166篇 |
1997年 | 92篇 |
1996年 | 91篇 |
1995年 | 50篇 |
1994年 | 52篇 |
1993年 | 41篇 |
1992年 | 27篇 |
1991年 | 22篇 |
1990年 | 14篇 |
1989年 | 18篇 |
1988年 | 8篇 |
1987年 | 5篇 |
1986年 | 3篇 |
1985年 | 6篇 |
1984年 | 12篇 |
1983年 | 1篇 |
1982年 | 3篇 |
1981年 | 2篇 |
1980年 | 6篇 |
1979年 | 25篇 |
1978年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
《无线互联科技》2015,(24)
文章主要介绍了实现机票预订系统的管理过程,该设计的完成也切实的体现了系统管理实施的优点。首先让大家了解了该系统开发的背景、研究现状及其发展趋势,让读者清楚设计该系统的目的及意义。然后较为详细地叙述了系统设计的可行性分析、需求分析、概要设计和功能的实现,其中主要以技术可行性和功能需求为主要叙述对象。最后把系统测试的方法和设计该系统出现的问题及修改完善的方法加以说明让大家更好的了解设计的过程。系统的功能主要包括基本的查询系统、订票系统、退票系统;主要的工作处理包括机票预订处理和退票处理;信息资料查询主要是管理员对客户信息查询、用户对航班信息查询、机票预定查询和退票信息查询;这些功能都满足了客户对机票预订系统的使用需求和对信息检索的要求。 相似文献
2.
In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one bit secret information. Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource, it makes this protocol more convenient from an applied point of view. 相似文献
3.
The World robot summit disaster robotics category – achievements of the 2018 preliminary competition
Satoshi Tadokoro Tetsuya Kimura Masayuki Okugawa Katsuji Oogane Hiroki Igarashi Yoshikazu Ohtsubo 《Advanced Robotics》2019,33(17):854-875
The World Robot Summit is a robot Olympics and aims to be held in a different country every four years from 2020. The concept of the Plant Disaster Prevention challenge is daily inspections, checks, and emergency response in industrial plants, and in this competition, robots must carry out these types of missions in a mock-up plant. The concept of the Tunnel Disaster Response and Recovery challenge is emergency response to tunnel disasters, and is a simulation competition whereby teams compete to show their ability to deal with disasters, by collecting information and removing debris. The Standard Disaster Robotics challenge assesses, in the form of a contest, the standard performance levels of a robot that are necessary for disaster prevention and emergency response. The World Robot Summit Preliminary Competition was held at Tokyo Big Sight in October 2018, and 36 teams participated in the Disaster Robotics Category. UGVs and UAVs contended the merits of new technology for solving complex problems, using core technologies such as mobility, sensing, recognition, performing operations, human interface, autonomous intelligence etc., as well as system integration and implementation of strategies for completing missions, gaining high-level results. 相似文献
4.
5.
分析了乐滩灌区工程北干渠溯河隧洞段长约1.06 km穿合山煤矿采空区的地质情况.借鉴高速公路煤矿采空区的成功处理经验,通过科学分析,对采空区变形和区域内覆岩的稳定性做了评价,论述了输水线路穿采空区段采取全充填压力注浆法的工程处理方法. 相似文献
6.
在探讨了Web查询服务的典型模型后,论文阐述了服务器端会话追踪机制的实现方式,设计了基于服务器端会话追踪的Web查询服务的典型解决方案。该设计方案可以较为安全地保存和维护客户的上下文信息,可靠地跟踪用户查询所处的状态,有效地实现有状态的Web查询服务。 相似文献
7.
网络安全事件的关联分析方法的比较研究 总被引:2,自引:0,他引:2
随着当前攻击手段和技术的日益复杂化,一次入侵事件往往需要多个步骤才能完成,这些步骤都是彼此相关的。但是传统的入侵检测集中于检测底层的入侵或异常,所检测到的结果也仅仅是一次完整入侵的一部分,所以不能将不同的报警结合起来以发现入侵的逻辑步骤或者入侵背后的攻击策略。关联分析技术将不同分析器上产生的报警进行融合与关联分析,极大地减少了报警的数量,降低了入侵检测的误报率,并且适当的减少了入侵检测的漏报率。文中在对网络安全事件关联分析方法的系统结构进行分析后,着重介绍了当前比较流行的几种网络安全事件关联分析方法,最后对各种方法进行了比较研究。 相似文献
8.
Superconducting qubits are solid state electrical circuits fabricated using techniques borrowed from conventional integrated circuits. They are based on the Josephson tunnel junction, the only non-dissipative, strongly non-linear circuit element available at low temperature. In contrast to microscopic entities such as spins or atoms, they tend to be well coupled to other circuits, which make them appealling from the point of view of readout and gate implementation. Very recently, new designs of superconducting qubits based on multi-junction circuits have solved the problem of isolation from unwanted extrinsic electromagnetic perturbations. We discuss in this review how qubit decoherence is affected by the intrinsic noise of the junction and what can be done to improve it.
PACS: 03.67.-a, 03.65.Yz, 85.25.-j, 85.35.Gv 相似文献
9.
Chih-Ming Chen Hahn-Ming Lee Chia-Chen Tan 《Engineering Applications of Artificial Intelligence》2006,19(8):967-978
The explosion of on-line information has given rise to many manually constructed topic hierarchies (such as Yahoo!!). But with the current growth rate in the amount of information, manual classification in topic hierarchies results in an immense information bottleneck. Therefore, developing an automatic classifier is an urgent need. However, classifiers suffer from enormous dimensionality, since the dimensionality is determined by the number of distinct keywords in a document corpus. More seriously, most classifiers are either working slowly or they are constructed subjectively without any learning ability. In this paper, we address these problems with a fair feature-subset selection (FFSS) algorithm and an adaptive fuzzy learning network (AFLN) for classification. The FFSS algorithm is used to reduce the enormous dimensionality. It not only gives fair treatment to each category but also has ability to identify useful features, including both positive and negative features. On the other hand, the AFLN provides extremely fast learning ability to model the uncertain behavior for classification so as to correct the fuzzy matrix automatically. Experimental results show that both FFSS algorithm and the AFLN lead to a significant improvement in document classification, compared to alternative approaches. 相似文献
10.
IKE协议的安全性分析 总被引:1,自引:0,他引:1
在简略介绍IKE协议RFC2409工作机制的基础上,对协议现有的安全问题进行了分析,并针对协议阶段1中主模式与积极模式下身份保护存在的问题提出了协议修改建议,对阶段1中安全联盟建立的可靠性进行了探讨以加强协议抵御DoS攻击的能力。 相似文献