全文获取类型
收费全文 | 1246篇 |
免费 | 63篇 |
国内免费 | 79篇 |
专业分类
电工技术 | 20篇 |
综合类 | 54篇 |
化学工业 | 47篇 |
金属工艺 | 19篇 |
机械仪表 | 73篇 |
建筑科学 | 30篇 |
矿业工程 | 12篇 |
能源动力 | 24篇 |
轻工业 | 21篇 |
水利工程 | 11篇 |
石油天然气 | 22篇 |
武器工业 | 8篇 |
无线电 | 314篇 |
一般工业技术 | 108篇 |
冶金工业 | 3篇 |
原子能技术 | 47篇 |
自动化技术 | 575篇 |
出版年
2024年 | 2篇 |
2023年 | 8篇 |
2022年 | 11篇 |
2021年 | 18篇 |
2020年 | 20篇 |
2019年 | 17篇 |
2018年 | 16篇 |
2017年 | 26篇 |
2016年 | 33篇 |
2015年 | 41篇 |
2014年 | 51篇 |
2013年 | 66篇 |
2012年 | 62篇 |
2011年 | 94篇 |
2010年 | 65篇 |
2009年 | 78篇 |
2008年 | 85篇 |
2007年 | 104篇 |
2006年 | 110篇 |
2005年 | 88篇 |
2004年 | 61篇 |
2003年 | 51篇 |
2002年 | 50篇 |
2001年 | 14篇 |
2000年 | 30篇 |
1999年 | 37篇 |
1998年 | 22篇 |
1997年 | 22篇 |
1996年 | 18篇 |
1995年 | 19篇 |
1994年 | 12篇 |
1993年 | 14篇 |
1992年 | 8篇 |
1991年 | 5篇 |
1990年 | 6篇 |
1989年 | 6篇 |
1988年 | 3篇 |
1987年 | 1篇 |
1986年 | 5篇 |
1985年 | 3篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有1388条查询结果,搜索用时 203 毫秒
1.
By leveraging the secret data coding using the remainder storage based exploiting modification direction (RSBEMD), and the pixel change operation recording based on multi-segment left and right histogram shifting, a novel reversible data hiding (RHD) scheme is proposed in this paper. The secret data are first encoded by some specific pixel change operations to the pixels in groups. After that, multi-segment left and right histogram shifting based on threshold manipulation is implemented for recording the pixel change operations. Furthermore, a multiple embedding policy based on chess board prediction (CBP) and threshold manipulation is put forward, and the threshold can be adjusted to achieve adaptive data hiding. Experimental results and analysis show that it is reversible and can achieve good performance in capacity and imperceptibility compared with the existing methods. 相似文献
2.
3.
4.
NMOS器件两次沟道注入杂质分布和阈电压计算 总被引:1,自引:1,他引:0
分别考虑了深浅两次沟道区注入杂质在氧化扩散过程中对表面浓度的贡献。对两次注入杂质的扩散分别提取了扩散系数的氧化增强系数、氧化衰减系数和有效杂地系数,给出了表面浓度与工艺参数之间的模拟关系式,以峰值浓度为强反型条件计算了开启电压,文章还给出了开启电压、氧化条件、不同注入组合之间的关系式。 相似文献
5.
A probabilistic model for cleavage fracture with a length scale--parameter estimation and predictions of stationary crack experiments 总被引:1,自引:0,他引:1
This study presents a large experimental investigation in the transition temperature region on a modified A508 steel. Tests were carried out on single-edge-notch-bend specimens with three different crack depth over specimen width ratios to capture the strong constraint effect on fracture toughness. Three test temperatures were considered, covering a range of 85 °C. All specimens failed by cleavage fracture prior to ductile tearing. A recently proposed probabilistic model for the cumulative failure by cleavage was applied to the comprehensive sets of experimental data. This modified weakest link model incorporates a length scale, which together with a threshold stress reduce the scatter in predicted toughness distributions as well as introduces a fracture toughness threshold value. Model parameters were estimated by a robust procedure, which is crucial in applications of probabilistic models to real structures. The conformity between predicted and experimental toughness distributions, respectively, were notable at all the test temperatures. 相似文献
6.
A revision algorithm is a learning algorithm that identifies the target concept, starting from an initial concept. Such an algorithm is considered efficient if its complexity (in terms of the resource one is interested in) is polynomial in the syntactic distance between the initial and the target concept, but only polylogarithmic in the number of variables in the universe. We give an efficient revision algorithm in the model of learning with equivalence and membership queries for threshold functions, and some negative results showing, for instance, that threshold functions cannot be revised efficiently from either type of query alone. The algorithms work in a general revision model where both deletion and addition type revision operators are allowed. 相似文献
7.
楼滨乔 《核电子学与探测技术》1993,(4)
本文对最基本的HCMOS器件(反相器和与非门)作了γ辐射损伤实验。通过器件性能变化,分析了γ辐射对电路的作用。 相似文献
8.
9.
10.
Yu Long Author Vitae Kefei Chen Author Vitae Shengli Liu Author Vitae 《Computers & Electrical Engineering》2007,33(3):166-176
This paper proposes an identity-based threshold decryption scheme IB-ThDec and reduces its security to the Bilinear Diffie-Hellman problem. Compared with previous work, this conceals two pairing computations in the ciphertext validity verification procedure. The formal proof of security of this scheme is provided in the random oracle model. Additionally, we show that IB-ThDec can be applied to the threshold key escrow and the mediated cryptosystems. 相似文献