全文获取类型
收费全文 | 24450篇 |
免费 | 206篇 |
国内免费 | 408篇 |
专业分类
系统科学 | 383篇 |
丛书文集 | 1126篇 |
教育与普及 | 728篇 |
理论与方法论 | 380篇 |
现状及发展 | 93篇 |
研究方法 | 3篇 |
综合类 | 22351篇 |
出版年
2024年 | 75篇 |
2023年 | 275篇 |
2022年 | 324篇 |
2021年 | 407篇 |
2020年 | 309篇 |
2019年 | 271篇 |
2018年 | 129篇 |
2017年 | 208篇 |
2016年 | 333篇 |
2015年 | 585篇 |
2014年 | 1783篇 |
2013年 | 1836篇 |
2012年 | 2309篇 |
2011年 | 2446篇 |
2010年 | 2011篇 |
2009年 | 2239篇 |
2008年 | 2104篇 |
2007年 | 1900篇 |
2006年 | 1416篇 |
2005年 | 950篇 |
2004年 | 669篇 |
2003年 | 634篇 |
2002年 | 479篇 |
2001年 | 369篇 |
2000年 | 306篇 |
1999年 | 168篇 |
1998年 | 102篇 |
1997年 | 83篇 |
1996年 | 77篇 |
1995年 | 53篇 |
1994年 | 36篇 |
1993年 | 38篇 |
1992年 | 42篇 |
1991年 | 26篇 |
1990年 | 32篇 |
1989年 | 17篇 |
1988年 | 12篇 |
1987年 | 1篇 |
1986年 | 3篇 |
1981年 | 1篇 |
1980年 | 3篇 |
1957年 | 1篇 |
1943年 | 1篇 |
1938年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
951.
JIANGZheng-tao XUWen-li WANGYu-min 《武汉大学学报:自然科学英文版》2005,10(1):239-242
In this paper, we lower the upper bound of the number of solutions of oracle transformation polynomial F(x) over GF(q). So one can also recover all the secrete keys with fewer calls. We use our generalized ““““““““even-and-odd test““““““““ method to recover the least significant p-adic ‘bits‘ of representations of the Lucas Cryptosystem secret keys x. Finally, we analyze the Efficient Compact Subgroup Trace Representation (XTR) Diffie-Hellmen secrete keys and point out that if the order of XTR subgroup has a special form then all the bits of the secrete key of XTR can be recovered form any bit of the exponent x. 相似文献
952.
YANGQing CHENKe-fei 《武汉大学学报:自然科学英文版》2005,10(1):289-292
Digital watermark can be used for image ownership verification or authentication. In this paper, we propose a new image authentication plan concentrating on its security performance. Digital watermark is first turbo coded, scaled and then processed in wavelet domain. To enhance security level, public key cryptosystem is utilized to replace traditional watermark key. Sinmlation results are finally given by experiment. 相似文献
953.
Power system security and reliability are more complex issues in a deregulated environment.Various criteria have been considered for power system reliability. In the day-ahead market, a successful trade schedule should be able to accept various disturbances with sufficient flexibility to be adjusted during the re-dispatch process. This paper describes the dispatch liquidity theory and some liquidity indices. The liquidity indices evaluate the effective operating reserves with the network constraints taken into consideration. A model is presented to calculate the liquidity index. An extended trade scheduling model with minimum liquidity index constraints is presented that considers the distribution requirements of the operating reserves. The liquidity indices could also be used to coordinate the security and reliability between multistage markets and for contingency selection. The algorithms were tested with real power system data. The results show that the dispatch liquidity theory is reasonable and the algorithms are effective. 相似文献
954.
955.
尹殿平 《科技情报开发与经济》2005,15(15):274-275
冒顶事故为煤矿五大灾害之一,其中普采工作面尤为严重,主要发生在初次放顶和老顶来压期问。对普采工作面冒顶事故发生的特点、原因及其防治措施进行了阐述。 相似文献
956.
A large number of pneumatic rock drills are being extensively used in a majority of mines in China nowadays, with a high noise level up to 125 dB(A) and large vibration and oil-fog on working-site, which can seriously jeopardize manipulator' s body and mind. Aiming at improving drilling environment and labor safety condition, the production mechanism of noise of all sorts of rock drills including pneumatic hydraulic and water-powered rock drills and measures of reducing noise level of pneumatic rock drills in special were discussed and led to the conclusion of that the pneumatic rock drills should be eliminated step by step, the hydraulic rock drill should be developed at full speed and especially the water-powered rock drill should be studied and applied according to the situation of China. In addition, the reasons of why hydraulic rock drills have not yet been used extensively and spread wide areas in China were discussed. The main technical parameters of newly developed leg-supporting water-powered rock drill and the comparation of experimental data between pneumatic rock drill and hydraulic rock drill were listed. The experimental results show that water-powered rock drill possesses the same superior properties as hydraulic rock drill and its noise is less than 20 dB(A) than pneumatic rock drill and there is no oil-fog on the working-site and vibration is reduced largely~ but its drilling speed is raised largely , its structure is simpler, and maintenance is convenient. Therefore, popularizing applying of water-powered rock drill will be an effective way of improving mine working environment according to the current situation of China. 相似文献
957.
针对目前校园网上的各种信息安全隐患,深入分析产生这些网络安全问题的根源,运用实践经验,全方位地提出构建高效安全校园网的具体措施,详尽地介绍了解决校园网信息安全的做法,使校园网建成一个安全、稳定、高效的网络系统。 相似文献
958.
鲍金玲 《长春师范学院学报》2005,(9)
与IPv4相比,IPv6具有许多优势。Ipv6不但解决了当今IP地址匮乏的问题,并且由于它引入了加密和认证机制,实现了基于网络层的身份认证,确保了数据包的完整性和机密性,因此,可以说IPV6实现了网络层安全。但是,这种安全不是绝对的,并且,由于IPV6的安全机制给当前的网络安全体系带来了新的挑战,致使许多在现有的网络中对保护网络安全中起着重要作用的工具受到巨大的冲击,这就迫切需要安全专家进一步研究和积累经验,尽快找出合适的解决方法。 相似文献
959.
梁利民 《科技情报开发与经济》2006,16(19):128-130
简单介绍了经济伦理的概念,并从生产环节、分配环节、交换与消费四个方面具体论述了社会主义和谐社会经济伦理的要义。 相似文献
960.
首先介绍了会话初始协议(SessionInitiationProtocol,SIP),并利用END-TO-END和HOP-BY-HOP的分类方法,对基于SIP上的安全机制进行了分析,指出当前安全机制中的缺陷,最后,根据SIP协议简单、开放、可扩展的特点,针对HTTP摘要鉴别和S/MIME认证机制中各自在安全认证中的不足,提出了一种全新的基于HTTP摘要鉴别和S/MIME上的混合安全认证机制。利用该认证机制,可以很好的实现SIP会话的机密性和安全性。 相似文献