全文获取类型
收费全文 | 2578篇 |
免费 | 447篇 |
国内免费 | 222篇 |
专业分类
电工技术 | 175篇 |
综合类 | 377篇 |
化学工业 | 161篇 |
金属工艺 | 57篇 |
机械仪表 | 89篇 |
建筑科学 | 51篇 |
矿业工程 | 22篇 |
能源动力 | 123篇 |
轻工业 | 7篇 |
水利工程 | 62篇 |
石油天然气 | 8篇 |
武器工业 | 16篇 |
无线电 | 598篇 |
一般工业技术 | 188篇 |
冶金工业 | 30篇 |
原子能技术 | 10篇 |
自动化技术 | 1273篇 |
出版年
2024年 | 58篇 |
2023年 | 157篇 |
2022年 | 197篇 |
2021年 | 183篇 |
2020年 | 167篇 |
2019年 | 126篇 |
2018年 | 89篇 |
2017年 | 185篇 |
2016年 | 128篇 |
2015年 | 116篇 |
2014年 | 227篇 |
2013年 | 195篇 |
2012年 | 282篇 |
2011年 | 256篇 |
2010年 | 203篇 |
2009年 | 235篇 |
2008年 | 117篇 |
2007年 | 74篇 |
2006年 | 39篇 |
2005年 | 37篇 |
2004年 | 10篇 |
2003年 | 14篇 |
2002年 | 19篇 |
2001年 | 19篇 |
2000年 | 3篇 |
1999年 | 21篇 |
1998年 | 8篇 |
1997年 | 4篇 |
1996年 | 7篇 |
1995年 | 4篇 |
1994年 | 3篇 |
1993年 | 4篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1988年 | 5篇 |
1987年 | 14篇 |
1986年 | 15篇 |
1985年 | 4篇 |
1984年 | 2篇 |
1982年 | 2篇 |
1980年 | 2篇 |
1979年 | 2篇 |
1978年 | 2篇 |
排序方式: 共有3247条查询结果,搜索用时 0 毫秒
1.
An Intermediate Bulk Container (IBC) was punctured during its handling, releasing oil onto soil at an environmentally-sensitive region of Australia. The telehandler did not pierce the plastic of the IBC directly (as was expected) but rather one of the tynes had caught on the underside of the metal base plate, despite numerous controls being in place at time of spill, revealing a previously unreported mechanism for a fluid spill from handling of petroleum hydrocarbons. The diverse investigation team used a root cause analysis (RCA) technique to identify the underlying cause: the inspection process was inadequate with contributing factors of not using a spotter and design of IBC did not anticipate conditions. Engineering controls were put in place as part of the change management process to help prevent spills from occurring from piercing from telehandler tynes on the current project site. 相似文献
2.
《Mathematics and computers in simulation》2006,71(2):121-130
An information criterion-based model selection method is proposed for monitoring unit root and multiple structural changes. In this method, a battery of possible models is considered by changing the integration order (I(0) or I(1)) and the combinations of change points. Next, the best model is selected from among alternative models via a modified Bayesian information criterion (BIC). Accordingly, on the basis of the selected model, the process that generates the observed time series is determined. The BIC is modified in order to adjust the frequency count of incorrectly selecting stationary models via the conventional BIC. The simulation results of monitoring unit root and structural change suggest that the proposed method outperforms the conventional hypothesis testing method in terms of detection accuracy and detection speed. Furthermore, the empirical results suggest that the proposed method exhibits better performances with regard to detection stability and forecastability. 相似文献
3.
针对二进制分辨矩阵无法处理连续型数据,提出一种基于邻域的改进二进制分辨矩阵及其属性约简方法。实验结果表明,与先数据离散化,后属性约简的方法相比,利用文中方法提取出的特征属性的分类能力更高。 相似文献
4.
By analysis of the basic properties of entanglement swapping of high-dimensional Bell states,a universal and general deterministic secure quantum communication(DSQC)protocol is proposed,in which unitary operation is not required.By making use of the results of high-dimensional Bell measurement,the sender and the receiver can encode and decode the message respectively by performing the modular addition and subtraction.Two mutually complementary bases are constructed;and according to the property of mutual complement,a method for checking security of the high-dimensional quantum channel is put forward.Some common attack strategies are analyzed,and the corresponding error rates are calculated.Then the upper bound of the threshold of error rate is deduced. 相似文献
5.
随着移动设备的发展,移动应用程序也变得丰富多彩。本文主要介绍如何在SmartFoxServer平台上开发移动互联网应用,并且实现实时与SmartFoxServer 2X服务器进行交互,更新和持久化玩家相关信息。简要介绍SmartFoxServer的Java扩展以及Android应用程序的构成,通过一个网络游戏系统的开发过程,详细说明其开发原理和开发流程。最后结合游戏应用程序的开发实现,进一步说明Android在SmartFoxServer 2X平台上的应用前景和巨大应用潜力。 相似文献
6.
7.
《Calphad》2021
The isothermal sections of the Mg–Sn–Sr ternary system in the Mg-rich region at 415 and 350 °C have been determined using the scanning electron microscopy (SEM) equipped with energy dispersive X-Ray spectrometry (EDS). The existence of the MgSnSr ternary compound was confirmed in these two isothermal sections. Two new compounds, named Mg5Sn3Sr and Mg25Sn24Sr14, were found in the present work based on the SEM/EDS results. Thermodynamic optimization of the Sn–Sr binary and Mg–Sn–Sr ternary systems were carried out using the CALPHAD (CALculation of PHAse Diagrams) technique. The Modified quasi-chemical model (MQM) was used for the liquid solution which exhibits a high degree of short-range ordering behavior. The solid phases were described with the Compound energy formalism (CEF). Finally, a self-consistent thermodynamic databases for the Mg–Sn–Sr ternary system has been constructed in the present work, which can be an efficient and convenient guidance to investigate and develop the Mg-based alloys. 相似文献
8.
9.
随着网络系统应用的普及和其复杂多变性,网络蠕虫已对网络安全造成极其严重的威胁。本文介绍了网络蠕虫的定义和检测策略,对几种常用的网络蠕虫检测防御技术进行了比较,分析了它们的优点和不足,同时对未来网络蠕虫检测防治技术研究提出了几点建议。 相似文献
10.
An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 总被引:1,自引:0,他引:1
《Journal of Network and Computer Applications》2012,35(2):763-769
Generally, if a user wants to use numerous different network services, he/she must register himself/herself to every service providing server. It is extremely hard for users to remember these different identities and passwords. In order to resolve this problem, various multi-server authentication protocols have been proposed. Recently, Sood et al. analyzed Hsiang and Shih's multi-server authentication protocol and proposed an improved dynamic identity based authentication protocol for multi-server architecture. They claimed that their protocol provides user's anonymity, mutual authentication, the session key agreement and can resist several kinds of attacks. However, through careful analysis, we find that Sood et al.'s protocol is still vulnerable to leak-of-verifier attack, stolen smart card attack and impersonation attack. Besides, since there is no way for the control server CS to know the real identity of the user, the authentication and session key agreement phase of Sood et al.'s protocol is incorrect. We propose an efficient and security dynamic identity based authentication protocol for multi-server architecture that removes the aforementioned weaknesses. The proposed protocol is extremely suitable for use in distributed multi-server architecture since it provides user's anonymity, mutual authentication, efficient, and security. 相似文献