全文获取类型
收费全文 | 550篇 |
免费 | 87篇 |
国内免费 | 56篇 |
专业分类
电工技术 | 8篇 |
综合类 | 62篇 |
化学工业 | 15篇 |
金属工艺 | 4篇 |
机械仪表 | 24篇 |
建筑科学 | 2篇 |
矿业工程 | 2篇 |
能源动力 | 2篇 |
轻工业 | 3篇 |
水利工程 | 2篇 |
石油天然气 | 1篇 |
武器工业 | 2篇 |
无线电 | 311篇 |
一般工业技术 | 55篇 |
冶金工业 | 2篇 |
原子能技术 | 1篇 |
自动化技术 | 197篇 |
出版年
2024年 | 3篇 |
2023年 | 11篇 |
2022年 | 25篇 |
2021年 | 28篇 |
2020年 | 24篇 |
2019年 | 16篇 |
2018年 | 10篇 |
2017年 | 9篇 |
2016年 | 11篇 |
2015年 | 14篇 |
2014年 | 27篇 |
2013年 | 36篇 |
2012年 | 30篇 |
2011年 | 27篇 |
2010年 | 26篇 |
2009年 | 26篇 |
2008年 | 44篇 |
2007年 | 24篇 |
2006年 | 33篇 |
2005年 | 38篇 |
2004年 | 28篇 |
2003年 | 11篇 |
2002年 | 22篇 |
2001年 | 18篇 |
2000年 | 30篇 |
1999年 | 22篇 |
1998年 | 14篇 |
1997年 | 16篇 |
1996年 | 14篇 |
1995年 | 15篇 |
1994年 | 6篇 |
1993年 | 12篇 |
1992年 | 13篇 |
1991年 | 4篇 |
1990年 | 3篇 |
1988年 | 1篇 |
1983年 | 1篇 |
1974年 | 1篇 |
排序方式: 共有693条查询结果,搜索用时 15 毫秒
1.
2.
Diffractive optical elements have a large number of industrial applications, such as beam shaping and optical filtering. Traditionally, these elements modulate the phase of the incoming light or its amplitude, but not both. To overcome this limitation, full complex-amplitude modulation diffractive optical elements were developed. Well-established integrated circuit fabrication steps were employed to fabricate the devices with high precision. Using this approach, the new element‘s optical performances are improved also for near field operations. With this device it is possible to obtain 100% efficient spatial filtering and low noise reconstructed images. 相似文献
3.
在制作付里叶计算全息过程中,加入适当的二次位相因子,使此种全息图在相干光照明下就可预定的位置上只再现一个像,省略了过去丙现此种计算全息图必要的付里叶透镜,并且使两个互为共轭像分离,从而拓宽了此种计算全息的应用领域,实验结果与理论分析相符。 相似文献
4.
5.
6.
Tomoyoshi Shimobaba Takashi Kakue Nobuyuki Masuda Tomoyoshi Ito 《Journal of the Society for Information Display》2012,20(9):533-538
Holographic projection is for laser displays and has the merits of being aberration free, producing high‐contrast images, having the ability of color reconstruction with one spatial light modulator, and so on. In this paper, we propose a zoomable holographic projection without using a zoom lens and verify the proposed method by using numerical simulation. Although such a system can be readily realized to use the features of holography, which is capable of recording a large image exceeding the hologram size, the required calculation is very time consuming. For acceleration, we used shifted Fresnel diffraction for setting different sampling rates on a hologram and projected image. The proposed method can project any zoom‐in and zoom‐out image between zeroth‐order and first‐order lights, and the processing time and required memory for the zoom are constant. 相似文献
7.
ZENG Yong WU Zhengyuan DONG Lihua LIU Zhihong MA Jianfeng LI Zan 《西安电子科技大学学报(自然科学版)》2021,48(3):170-187
The encrypted transmission of network traffic is one of the development trends of the Internet.The identification of malicious traffic in encrypted traffic is an important way to maintain the security of cyberspace.One of the prior tasks of identifying malicious traffic is to classify encrypted traffic into the encrypted/unencrypted,different kinds of the application programs and encryption algorithms in order to improve the efficiency of identification.Then they are transformed into the image,matrix,n-gram or other forms which will be sent into the machine learning training model,so as to realize the binary classification and multi classification of benign malicious traffic.However,the machine learning based way relies seriously on the number and quality of samples,and can not effectively deal with the data after traffic shaping or confusion.Fortunately,cryptography based malicious traffic identification can search malicious keywords over encrypted traffic to avoid such problems,which must integrate searchable encryption technology,deep packet inspection and a provable security model to protect both data and rules.Finally,some unsolved problems of malicious traffic identification technology in encrypted traffic are presented. 相似文献
8.
Koki Murano Tomoyoshi Shimobaba Atsushi Sugiyama Naoki Takada Takashi Kakue Minoru Oikawa Tomoyoshi Ito 《Computer Physics Communications》2014
We report fast computation of computer-generated holograms (CGHs) using Xeon Phi coprocessors, which have massively x86-based processors on one chip, recently released by Intel. CGHs can generate arbitrary light wavefronts, and therefore, are promising technology for many applications: for example, three-dimensional displays, diffractive optical elements, and the generation of arbitrary beams. CGHs incur enormous computational cost. In this paper, we describe the implementations of several CGH generating algorithms on the Xeon Phi, and the comparisons in terms of the performance and the ease of programming between the Xeon Phi, a CPU and graphics processing unit (GPU). 相似文献
9.
We have developed a new multicolor holographic polymer film. Our holographic polymer film contains 3‐[(2,4,6‐trichloro)azo]‐9H‐carbazole‐9‐ethanol (A‐1) and poly(methyl methacrylate). The holographic polymer film can be recorded with a holographic image without applying an external electric field. The diffraction efficiency was 57% at A‐1 with a 20 wt% of dope ratio. The writable holographic image writing for the holographic polymer film step used the silver halide photographic emulsion master plate 532‐nm laser beam under the nonelectric field. After the copy hologram is formed, our holographic polymer film can be displayed in red and green holographic images. Even though our holographic polymer film is rewritten over 200 times, the diffraction efficiency does not fall. As the holographic polymer film is manufactured using roll‐to‐roll techniques, although still in a laboratory scale in this study, it has a strong possibility of being manufactured in larger sizes with lower cost. 相似文献
10.
公钥可搜索加密能实现基于密文的信息检索,适用于云计算环境。但现有公钥可搜索加密方案普遍依赖于双线性对,并且无法对服务器返回的搜索结果进行验证,效率和安全性较低。为此,基于El Gamal加密算法提出一种可验证的公钥可搜索加密方案。该方案使用El Gamal加密算法替代双线性对运算,与传统算法相比具有较低的计算复杂度,并且易于实现。在密文关键词及加密文件生成算法中,采用El Gamal签名算法对关键词的哈希值进行数字签名。当收到服务器返回的搜索结果后,用户可以通过计算得到发送者的公钥,并对相应的签名值进行验证,从而有效防止服务器返回错误结果。 相似文献