首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2578篇
  免费   447篇
  国内免费   222篇
电工技术   175篇
综合类   377篇
化学工业   161篇
金属工艺   57篇
机械仪表   89篇
建筑科学   51篇
矿业工程   22篇
能源动力   123篇
轻工业   7篇
水利工程   62篇
石油天然气   8篇
武器工业   16篇
无线电   598篇
一般工业技术   188篇
冶金工业   30篇
原子能技术   10篇
自动化技术   1273篇
  2024年   58篇
  2023年   157篇
  2022年   197篇
  2021年   183篇
  2020年   167篇
  2019年   126篇
  2018年   89篇
  2017年   185篇
  2016年   128篇
  2015年   116篇
  2014年   227篇
  2013年   195篇
  2012年   282篇
  2011年   256篇
  2010年   203篇
  2009年   235篇
  2008年   117篇
  2007年   74篇
  2006年   39篇
  2005年   37篇
  2004年   10篇
  2003年   14篇
  2002年   19篇
  2001年   19篇
  2000年   3篇
  1999年   21篇
  1998年   8篇
  1997年   4篇
  1996年   7篇
  1995年   4篇
  1994年   3篇
  1993年   4篇
  1992年   3篇
  1991年   3篇
  1990年   4篇
  1989年   2篇
  1988年   5篇
  1987年   14篇
  1986年   15篇
  1985年   4篇
  1984年   2篇
  1982年   2篇
  1980年   2篇
  1979年   2篇
  1978年   2篇
排序方式: 共有3247条查询结果,搜索用时 0 毫秒
1.
An Intermediate Bulk Container (IBC) was punctured during its handling, releasing oil onto soil at an environmentally-sensitive region of Australia. The telehandler did not pierce the plastic of the IBC directly (as was expected) but rather one of the tynes had caught on the underside of the metal base plate, despite numerous controls being in place at time of spill, revealing a previously unreported mechanism for a fluid spill from handling of petroleum hydrocarbons. The diverse investigation team used a root cause analysis (RCA) technique to identify the underlying cause: the inspection process was inadequate with contributing factors of not using a spotter and design of IBC did not anticipate conditions. Engineering controls were put in place as part of the change management process to help prevent spills from occurring from piercing from telehandler tynes on the current project site.  相似文献   
2.
An information criterion-based model selection method is proposed for monitoring unit root and multiple structural changes. In this method, a battery of possible models is considered by changing the integration order (I(0) or I(1)) and the combinations of change points. Next, the best model is selected from among alternative models via a modified Bayesian information criterion (BIC). Accordingly, on the basis of the selected model, the process that generates the observed time series is determined. The BIC is modified in order to adjust the frequency count of incorrectly selecting stationary models via the conventional BIC. The simulation results of monitoring unit root and structural change suggest that the proposed method outperforms the conventional hypothesis testing method in terms of detection accuracy and detection speed. Furthermore, the empirical results suggest that the proposed method exhibits better performances with regard to detection stability and forecastability.  相似文献   
3.
针对二进制分辨矩阵无法处理连续型数据,提出一种基于邻域的改进二进制分辨矩阵及其属性约简方法。实验结果表明,与先数据离散化,后属性约简的方法相比,利用文中方法提取出的特征属性的分类能力更高。  相似文献   
4.
By analysis of the basic properties of entanglement swapping of high-dimensional Bell states,a universal and general deterministic secure quantum communication(DSQC)protocol is proposed,in which unitary operation is not required.By making use of the results of high-dimensional Bell measurement,the sender and the receiver can encode and decode the message respectively by performing the modular addition and subtraction.Two mutually complementary bases are constructed;and according to the property of mutual complement,a method for checking security of the high-dimensional quantum channel is put forward.Some common attack strategies are analyzed,and the corresponding error rates are calculated.Then the upper bound of the threshold of error rate is deduced.  相似文献   
5.
随着移动设备的发展,移动应用程序也变得丰富多彩。本文主要介绍如何在SmartFoxServer平台上开发移动互联网应用,并且实现实时与SmartFoxServer 2X服务器进行交互,更新和持久化玩家相关信息。简要介绍SmartFoxServer的Java扩展以及Android应用程序的构成,通过一个网络游戏系统的开发过程,详细说明其开发原理和开发流程。最后结合游戏应用程序的开发实现,进一步说明Android在SmartFoxServer 2X平台上的应用前景和巨大应用潜力。  相似文献   
6.
基于LINQ to SQL的实验室网上预约系统的设计与实现   总被引:1,自引:0,他引:1  
实验室开放管理已成了信息化时代高校实验教学改革的重要内容。本文利用B/S体系架构和LINQ to SQL技术,设计并实现实验室网上预约管理系统。该系统为高效的实验室管理提供了平台,能有效地平衡各实验室的利用率,减轻实验室管理人员的工作,使实验室的开放管理水平和服务水平推上了一个新的台阶。  相似文献   
7.
The isothermal sections of the Mg–Sn–Sr ternary system in the Mg-rich region at 415 and 350 °C have been determined using the scanning electron microscopy (SEM) equipped with energy dispersive X-Ray spectrometry (EDS). The existence of the MgSnSr ternary compound was confirmed in these two isothermal sections. Two new compounds, named Mg5Sn3Sr and Mg25Sn24Sr14, were found in the present work based on the SEM/EDS results. Thermodynamic optimization of the Sn–Sr binary and Mg–Sn–Sr ternary systems were carried out using the CALPHAD (CALculation of PHAse Diagrams) technique. The Modified quasi-chemical model (MQM) was used for the liquid solution which exhibits a high degree of short-range ordering behavior. The solid phases were described with the Compound energy formalism (CEF). Finally, a self-consistent thermodynamic databases for the Mg–Sn–Sr ternary system has been constructed in the present work, which can be an efficient and convenient guidance to investigate and develop the Mg-based alloys.  相似文献   
8.
9.
随着网络系统应用的普及和其复杂多变性,网络蠕虫已对网络安全造成极其严重的威胁。本文介绍了网络蠕虫的定义和检测策略,对几种常用的网络蠕虫检测防御技术进行了比较,分析了它们的优点和不足,同时对未来网络蠕虫检测防治技术研究提出了几点建议。  相似文献   
10.
Generally, if a user wants to use numerous different network services, he/she must register himself/herself to every service providing server. It is extremely hard for users to remember these different identities and passwords. In order to resolve this problem, various multi-server authentication protocols have been proposed. Recently, Sood et al. analyzed Hsiang and Shih's multi-server authentication protocol and proposed an improved dynamic identity based authentication protocol for multi-server architecture. They claimed that their protocol provides user's anonymity, mutual authentication, the session key agreement and can resist several kinds of attacks. However, through careful analysis, we find that Sood et al.'s protocol is still vulnerable to leak-of-verifier attack, stolen smart card attack and impersonation attack. Besides, since there is no way for the control server CS to know the real identity of the user, the authentication and session key agreement phase of Sood et al.'s protocol is incorrect. We propose an efficient and security dynamic identity based authentication protocol for multi-server architecture that removes the aforementioned weaknesses. The proposed protocol is extremely suitable for use in distributed multi-server architecture since it provides user's anonymity, mutual authentication, efficient, and security.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号