全文获取类型
收费全文 | 77424篇 |
免费 | 4706篇 |
国内免费 | 3238篇 |
专业分类
电工技术 | 6068篇 |
技术理论 | 21篇 |
综合类 | 8763篇 |
化学工业 | 2652篇 |
金属工艺 | 994篇 |
机械仪表 | 3334篇 |
建筑科学 | 13912篇 |
矿业工程 | 3482篇 |
能源动力 | 2027篇 |
轻工业 | 2201篇 |
水利工程 | 4525篇 |
石油天然气 | 1953篇 |
武器工业 | 369篇 |
无线电 | 7233篇 |
一般工业技术 | 3724篇 |
冶金工业 | 5085篇 |
原子能技术 | 477篇 |
自动化技术 | 18548篇 |
出版年
2024年 | 141篇 |
2023年 | 572篇 |
2022年 | 1192篇 |
2021年 | 1554篇 |
2020年 | 1769篇 |
2019年 | 1205篇 |
2018年 | 1094篇 |
2017年 | 1487篇 |
2016年 | 1868篇 |
2015年 | 2166篇 |
2014年 | 6380篇 |
2013年 | 5032篇 |
2012年 | 5752篇 |
2011年 | 6122篇 |
2010年 | 4761篇 |
2009年 | 5047篇 |
2008年 | 5035篇 |
2007年 | 6080篇 |
2006年 | 5288篇 |
2005年 | 4495篇 |
2004年 | 3889篇 |
2003年 | 3364篇 |
2002年 | 2706篇 |
2001年 | 1964篇 |
2000年 | 1529篇 |
1999年 | 1137篇 |
1998年 | 785篇 |
1997年 | 583篇 |
1996年 | 464篇 |
1995年 | 386篇 |
1994年 | 279篇 |
1993年 | 220篇 |
1992年 | 143篇 |
1991年 | 114篇 |
1990年 | 78篇 |
1989年 | 101篇 |
1988年 | 77篇 |
1987年 | 35篇 |
1986年 | 68篇 |
1985年 | 77篇 |
1984年 | 75篇 |
1983年 | 84篇 |
1982年 | 27篇 |
1981年 | 20篇 |
1980年 | 14篇 |
1979年 | 15篇 |
1977年 | 14篇 |
1964年 | 7篇 |
1961年 | 7篇 |
1959年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
陈彦名 《电信工程技术与标准化》2015,(5)
介绍了目前最炙手可热的REST架构风格,该风格顺应Web2.0的兴起,完美的匹配了云计算时代来临的可扩展要求,在各种应用场景中都得到了充分的表现。根据其技术特点,分析了该风格的API在移动通信网络管理中的应用,从网管系统内部、网管系统之间以及网管系统与上层APP应用之间等多方面对是否适用于REST风格以及如何在合适的位置使用REST API进行了分析。 相似文献
2.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved. 相似文献
3.
吴敬东 《湖南工业职业技术学院学报》2015,(2):137-140
高校是培养人才的摇篮,肩负着科教兴国、人才强国两大历史性战略任务。由于社会环境的复杂化,人际关系的交错性,新时代的大学生行为状况给高校学生管理工作带来了新的挑战。针对新时期大学生行为特点,我们通过加强党建工作、强化学风建设、做好班级自主管理和深化社会服务四个方面工作进行分析,提出了全面引导、约束、规范和优化大学生的行为的建议和对策,从而有效解决新形势下普通高校学生管理工作的实际困难。 相似文献
4.
An Intermediate Bulk Container (IBC) was punctured during its handling, releasing oil onto soil at an environmentally-sensitive region of Australia. The telehandler did not pierce the plastic of the IBC directly (as was expected) but rather one of the tynes had caught on the underside of the metal base plate, despite numerous controls being in place at time of spill, revealing a previously unreported mechanism for a fluid spill from handling of petroleum hydrocarbons. The diverse investigation team used a root cause analysis (RCA) technique to identify the underlying cause: the inspection process was inadequate with contributing factors of not using a spotter and design of IBC did not anticipate conditions. Engineering controls were put in place as part of the change management process to help prevent spills from occurring from piercing from telehandler tynes on the current project site. 相似文献
5.
In this paper, the Thyristor-Controlled Series-Compensated (TCSC) devices are located for congestion management in the power system by considering the non-smooth fuel cost function and penalty cost of emission. For this purpose, it is considered that the objective function of the proposed optimal power flow (OPF) problem is minimizing fuel and emission penalty cost of generators. A hybrid method that is the combination of the bacterial foraging (BF) algorithm with Nelder–Mead (NM) method (BF-NM) is employed to solve the OPF problems. The optimal location of the TCSC devices are then determined for congestion management. The size of the TCSC is obtained by using of the BF-NM algorithm to minimize the cost of generation, cost of emission, and cost of TCSC. The simulation results on IEEE 30-bus, modified IEEE 30-bus and IEEE 118-bus test system confirm the efficiency of the proposed method for finding the optimal location of the TCSC with non-smooth non-convex cost function and emission for congestion management in the power system. In addition, the results clearly show that a better solution can be achieved by using the proposed OPF problem in comparison with other intelligence methods. 相似文献
6.
通过对档案管理中存在的问题进行分析,提出了提高学籍档案管理效率的对策,以期能为中职学籍档案的管理工作提供有益的参考和借鉴。 相似文献
7.
带关键字搜索的公钥加密(PEKS)是一种有用的加密原语,它允许用户将在加密数据上搜索的功能委托给不可信的第三方服务器,而不影响原始数据的安全性和隐私性。但是,由于缺乏对于数据的加密以及解密能力,PEKS方案不能单独进行使用,必须与标准的公钥加密方案(PKE)相结合。因此,Baek等人在2006年引入了一种新的加密原语,称为结合PKE和PEKS的加密方案(PKE+PEKS),它同时提供了PKE和PEKS的功能。目前,已有文献提出了几种PKE+PEKS方案。然而,他们都没有考虑关键字猜测攻击的问题。本文提出一个新的高效且能够抵抗关键字猜测攻击的PKE+PEKS方案,与已有方案相比,该方案在性能上有很大的提升,并且在生成关键字和数据密文时,不需要使用双线性对,极大地降低了计算和存储成本。安全性分析表明,本文中所提出的方案能够满足密文隐私安全性、陷门不可区分性和抗关键字猜测攻击的安全性。效率分析表明,本分提出的方案更加高效。 相似文献
8.
电网的安全水平主要取决于其使用产品的质量是否过关。如果产品的质量较好,则能建造出优质的电网,电网的安全水平便会随之提高。因此,应加强对产品质量的监督管理,从而提高电网的安全水平。我们可建立质量监督管理系统,及时抽检出质量不过关的产品,从而消除电网运行过程中潜在的安全隐患。 相似文献
9.
WRESTORE (Watershed Restoration Using Spatio-Temporal Optimization of Resources) is a web-based, participatory planning tool that can be used to engage with watershed stakeholder communities, and involve them in using science-based, human-guided, interactive simulation–optimization methods for designing potential conservation practices on their landscape. The underlying optimization algorithms, process simulation models, and interfaces allow users to not only spatially optimize the locations and types of new conservation practices based on quantifiable goals estimated by the dynamic simulation models, but also to include their personal subjective and/or unquantifiable criteria in the location and design of these practices. In this paper, we describe the software, interfaces, and architecture of WRESTORE, provide scenarios for implementing the WRESTORE tool in a watershed community's planning process, and discuss considerations for future developments. 相似文献
10.
An organization requires performing readiness-relevant activities to ensure successful implementation of an enterprise resource planning (ERP) system. This paper develops a novel approach to managing these interrelated activities to get ready for implementing an ERP system. The approach enables an organization to evaluate its ERP implementation readiness by assessing the degree to which it can achieve the interrelated readiness relevant activities using fuzzy cognitive maps. Based on the interrelationship degrees among the activities, the approach clusters the activities into manageable groups and prioritizes them. To help work out a readiness improvement plan, scenario analysis is conducted. 相似文献