全文获取类型
收费全文 | 9471篇 |
免费 | 1186篇 |
国内免费 | 994篇 |
学科分类
工业技术 | 11651篇 |
出版年
2024年 | 18篇 |
2023年 | 116篇 |
2022年 | 174篇 |
2021年 | 236篇 |
2020年 | 260篇 |
2019年 | 207篇 |
2018年 | 214篇 |
2017年 | 255篇 |
2016年 | 257篇 |
2015年 | 374篇 |
2014年 | 647篇 |
2013年 | 542篇 |
2012年 | 720篇 |
2011年 | 792篇 |
2010年 | 618篇 |
2009年 | 676篇 |
2008年 | 775篇 |
2007年 | 812篇 |
2006年 | 659篇 |
2005年 | 648篇 |
2004年 | 531篇 |
2003年 | 517篇 |
2002年 | 412篇 |
2001年 | 324篇 |
2000年 | 251篇 |
1999年 | 151篇 |
1998年 | 98篇 |
1997年 | 86篇 |
1996年 | 65篇 |
1995年 | 63篇 |
1994年 | 28篇 |
1993年 | 23篇 |
1992年 | 10篇 |
1991年 | 10篇 |
1990年 | 7篇 |
1989年 | 10篇 |
1988年 | 7篇 |
1987年 | 4篇 |
1986年 | 5篇 |
1985年 | 9篇 |
1984年 | 9篇 |
1983年 | 4篇 |
1982年 | 4篇 |
1981年 | 7篇 |
1980年 | 3篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1973年 | 2篇 |
1972年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
冯鹏一 《信息通信技术与政策》2020,(1):12-15
以电信用户入网协议为切入点,电信用户的携号转网行为应受到《合同法》《消费者权益保护法》等私法规范的保护与限制。该行为引起的格式条款解释、合同终止、违约责任、损失赔偿等问题,不能仅靠《电信条例》等公法规范来调整。应当积极引导广大消费者用户以私法领域相关规定为依据,转变争议解决思维,拓宽纠纷处理途径,合理选择维权手段,以保护自身合法民事权益,与行业监管部门共同推动电信行业有序发展。 相似文献
2.
Matthew O'Sullivan Daire
hUallachin Patrícia Oliveira Antunes Eleanor Jennings Mary Kelly‐Quinn 《河流研究与利用》2019,35(2):146-158
Cattle access to streams has been linked globally with degradation of stream water quality, driven largely by bank erosion and resultant instream, fine sediment deposition. The majority of evidence on such effects is however based in arid and semiarid regions of the United States and Australia, with few studies relating to cool temperate climates such as Northwest Europe. In this study, “Quorer” resuspendable sediment samples were taken from riffle geomorphic units upstream (control) and at two points downstream (pressure and recovery) of cattle access points in headwater streams in agricultural catchments in Ireland to assess levels of deposited stream sediment. Samples were taken in April/May (2016) prior to the grazing season and in October (2016) at the end of the grazing season. Sites in good‐high ecological status catchments and less than good ecological status catchments were included in the study. Higher levels of sediment were found downstream of cattle access points in both good‐high status and less than good status catchments; however, the impacts of access points were spatially confined to, in most cases, the area immediately downstream of the point of access. There was a strong correlation between deposited sediment mass and organic matter (OM) mass, with levels of OM increasing linearly with deposited sediment mass. Levels of measured sediment were negatively correlated with riparian habitat health (measured using a qualitative habitat assessment). The results of this study highlight the need for measures to prevent cattle access to headwater streams where access points can be many in order to manage local habitat quality and downstream water quality issues. 相似文献
3.
In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one bit secret information. Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource, it makes this protocol more convenient from an applied point of view. 相似文献
4.
Computer-Supported Collaborative Learning (CSCL) is concerned with how Information and Communication Technology (ICT) might facilitate learning in groups which can be co-located or distributed over a network of computers such as Internet. CSCL supports effective learning by means of communication of ideas and information among learners, collaborative access of essential documents, and feedback from instructors and peers on learning activities. As the cloud technologies are increasingly becoming popular and collaborative learning is evolving, new directions for development of collaborative learning tools deployed on cloud are proposed. Development of such learning tools requires access to substantial data stored in the cloud. Ensuring efficient access to such data is hindered by the high latencies of wide-area networks underlying the cloud infrastructures. To improve learners’ experience by accelerating data access, important files can be replicated so a group of learners can access data from nearby locations. Since a cloud environment is highly dynamic, resource availability, network latency, and learner requests may change. In this paper, we present the advantages of collaborative learning and focus on the importance of data replication in the design of such a dynamic cloud-based system that a collaborative learning portal uses. To this end, we introduce a highly distributed replication technique that determines optimal data locations to improve access performance by minimizing replication overhead (access and update). The problem is formulated using dynamic programming. Experimental results demonstrate the usefulness of the proposed collaborative learning system used by institutions in geographically distributed locations. 相似文献
5.
6.
1-read/1-write (1R1W) register file (RF) is a popular memory configuration in modern feature rich SoCs requiring significant amount of embedded memory. A memory compiler is constructed using the 8T RF bitcell spanning a range of instances from 32 b to 72 Kb. An 8T low-leakage bitcell of 0.106 μm2 is used in a 14 nm FinFET technology with a 70 nm contacted gate pitch for high-density (HD) two-port (TP) RF memory compiler which achieves 5.66 Mb/mm2 array density for a 72 Kb array which is the highest reported density in 14 nm FinFET technology. The density improvement is achieved by using techniques such as leaf-cell optimization (eliminating transistors), better architectural planning, top level connectivity through leaf-cell abutment and minimizing the number of unique leaf-cells. These techniques are fully compatible with memory compiler usage over the required span. Leakage power is minimized by using power-switches without degrading the density mentioned above. Self-induced supply voltage collapse technique is applied for write and a four stack static keeper is used for read Vmin improvement. Fabricated test chips using 14 nm process have demonstrated 2.33 GHz performance at 1.1 V/25 °C operation. Overall Vmin of 550 mV is achieved with this design at 25 °C. The inbuilt power-switch improves leakage power by 12x in simulation. Approximately 8% die area of a leading 14 nm SoC in commercialization is occupied by these compiled RF instances. 相似文献
7.
范文跃 《信息安全与通信保密》2006,(8):66-68
在分析移动智能平台安全需求基础上,从逻辑原理、硬件组成、软件系统三个层面提出了移动智能平台的可信计算体系结构,之后提出了包含十种可信计算应用功能的全景图。 相似文献
8.
介绍了未来高速移动通信新标准IEEE802.20的总体概况,具体分析了IEEE802.20的技术特性、系统参考结构以及系统的组成模型,并对IEEE802.20标准前景分析与展望进行了详细描述。 相似文献
9.
在探讨了Web查询服务的典型模型后,论文阐述了服务器端会话追踪机制的实现方式,设计了基于服务器端会话追踪的Web查询服务的典型解决方案。该设计方案可以较为安全地保存和维护客户的上下文信息,可靠地跟踪用户查询所处的状态,有效地实现有状态的Web查询服务。 相似文献
10.
网络安全事件的关联分析方法的比较研究 总被引:2,自引:0,他引:2
随着当前攻击手段和技术的日益复杂化,一次入侵事件往往需要多个步骤才能完成,这些步骤都是彼此相关的。但是传统的入侵检测集中于检测底层的入侵或异常,所检测到的结果也仅仅是一次完整入侵的一部分,所以不能将不同的报警结合起来以发现入侵的逻辑步骤或者入侵背后的攻击策略。关联分析技术将不同分析器上产生的报警进行融合与关联分析,极大地减少了报警的数量,降低了入侵检测的误报率,并且适当的减少了入侵检测的漏报率。文中在对网络安全事件关联分析方法的系统结构进行分析后,着重介绍了当前比较流行的几种网络安全事件关联分析方法,最后对各种方法进行了比较研究。 相似文献