全文获取类型
收费全文 | 52666篇 |
免费 | 5639篇 |
国内免费 | 3105篇 |
专业分类
电工技术 | 3199篇 |
技术理论 | 1篇 |
综合类 | 3904篇 |
化学工业 | 8506篇 |
金属工艺 | 2940篇 |
机械仪表 | 3460篇 |
建筑科学 | 3551篇 |
矿业工程 | 1284篇 |
能源动力 | 1331篇 |
轻工业 | 5611篇 |
水利工程 | 1134篇 |
石油天然气 | 1989篇 |
武器工业 | 464篇 |
无线电 | 6477篇 |
一般工业技术 | 6380篇 |
冶金工业 | 2049篇 |
原子能技术 | 638篇 |
自动化技术 | 8492篇 |
出版年
2024年 | 176篇 |
2023年 | 796篇 |
2022年 | 1439篇 |
2021年 | 2095篇 |
2020年 | 1607篇 |
2019年 | 1418篇 |
2018年 | 1639篇 |
2017年 | 1715篇 |
2016年 | 1650篇 |
2015年 | 2263篇 |
2014年 | 2860篇 |
2013年 | 3522篇 |
2012年 | 4035篇 |
2011年 | 4504篇 |
2010年 | 4054篇 |
2009年 | 4000篇 |
2008年 | 3808篇 |
2007年 | 3554篇 |
2006年 | 3244篇 |
2005年 | 2692篇 |
2004年 | 1977篇 |
2003年 | 1515篇 |
2002年 | 1441篇 |
2001年 | 1204篇 |
2000年 | 937篇 |
1999年 | 716篇 |
1998年 | 495篇 |
1997年 | 413篇 |
1996年 | 316篇 |
1995年 | 252篇 |
1994年 | 204篇 |
1993年 | 184篇 |
1992年 | 136篇 |
1991年 | 115篇 |
1990年 | 81篇 |
1989年 | 71篇 |
1988年 | 48篇 |
1987年 | 43篇 |
1986年 | 37篇 |
1985年 | 19篇 |
1984年 | 12篇 |
1983年 | 14篇 |
1982年 | 17篇 |
1981年 | 5篇 |
1980年 | 7篇 |
1979年 | 11篇 |
1978年 | 13篇 |
1977年 | 13篇 |
1976年 | 13篇 |
1975年 | 12篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
51.
Anti-collusion fingerprinting for multimedia 总被引:10,自引:0,他引:10
Digital fingerprinting is a technique for identifying users who use multimedia content for unintended purposes, such as redistribution. These fingerprints are typically embedded into the content using watermarking techniques that are designed to be robust to a variety of attacks. A cost-effective attack against such digital fingerprints is collusion, where several differently marked copies of the same content are combined to disrupt the underlying fingerprints. We investigate the problem of designing fingerprints that can withstand collusion and allow for the identification of colluders. We begin by introducing the collusion problem for additive embedding. We then study the effect that averaging collusion has on orthogonal modulation. We introduce a tree-structured detection algorithm for identifying the fingerprints associated with K colluders that requires O(Klog(n/K)) correlations for a group of n users. We next develop a fingerprinting scheme based on code modulation that does not require as many basis signals as orthogonal modulation. We propose a new class of codes, called anti-collusion codes (ACCs), which have the property that the composition of any subset of K or fewer codevectors is unique. Using this property, we can therefore identify groups of K or fewer colluders. We present a construction of binary-valued ACC under the logical AND operation that uses the theory of combinatorial designs and is suitable for both the on-off keying and antipodal form of binary code modulation. In order to accommodate n users, our code construction requires only O(/spl radic/n) orthogonal signals for a given number of colluders. We introduce three different detection strategies that can be used with our ACC for identifying a suspect set of colluders. We demonstrate the performance of our ACC for fingerprinting multimedia and identifying colluders through experiments using Gaussian signals and real images. 相似文献
52.
53.
Why does it pay to be selfish in a MANET? 总被引:2,自引:0,他引:2
Younghwan Yoo Dharma P. Agrawal 《Wireless Communications, IEEE》2006,13(6):87-97
Routing protocols for a mobile ad hoc network have assumed that all mobile nodes voluntarily participate in forwarding others' packets. This was a reasonable assumption because all MNs in a MANET belonged to a single authority. In the near future, however, a MANET may consist of MNs that belong to many different organizations since numerous civilian applications are expected to crop up. In this situation, some MNs may run independently and purposely decide not to forward packets so as to save their own energy. This could potentially lead to network partitioning and corresponding performance degradation. To minimize such situations in MANETs, many studies have explored the use of both the carrot and the stick approaches by having reputation-based, credit-payment, and game theory schemes. This article summarizes existing schemes, identifies their relative advantages, and projects future directions 相似文献
54.
55.
56.
57.
融合多种网络可满足用户长日寸间连接和尽可能获得较高数据传输速率的需要,但融合后的网络也将各种网络的安全缺陷带进融合网络中。这不但给融合网络的运行带进各种原有的安全问题,而且增加了一些新的安全问题。对此,文章提出了基于恢复的多重防护解决方案,并使用公钥加密算法鉴权。使用私钥对通信数据进行加密。该方案可以为系统提供可靠的安全性,并实现用户对服务的不可抵赖性。该方案还处于研究起步阶段,下一步还需要明确各层的正确行为,以及出现多个恶意节点对某个合法节点诬陷时所应采取的行动。 相似文献
58.
陆东凹陷油气藏烃类组成非均质性及其意义 总被引:1,自引:1,他引:0
陆东凹陷原油和油砂抽提物中烃类的宏观组成存在着明显的非均质性。在高孔隙度(>15%)储层单元中,饱和烃的含量高,占总组成的含量均大于40%,而极性化合物则相对较低,一般不足40%;相反,在低孔隙度(<15%)储层单元中,饱和烃的含量明显降低,而极性化合物则显著增加。此外,陆东凹陷原油和油砂抽提物中烃类成熟度亦存在着非均质性:在高孔隙度储层中,原油和油砂烃类的成熟度参数高,而在低孔隙度储层中原油和油砂烃类的成熟度参数低。根据原油和油砂抽提物中烃类的宏观组成特征和成熟度参数的变化规律,提出了陆东凹陷油气聚集模式。 相似文献
59.
Shi-Jin Ding Hang Hu Lim H.F. Kim S.J. Yu X.F. Chunxiang Zhu Li M.F. Byung Jin Cho Chan D.S.H. Rustagi S.C. Yu M.B. Chin A. Dim-Lee Kwong 《Electron Device Letters, IEEE》2003,24(12):730-732
For the first time, we successfully fabricated and demonstrated high performance metal-insulator-metal (MIM) capacitors with HfO/sub 2/-Al/sub 2/O/sub 3/ laminate dielectric using atomic layer deposition (ALD) technique. Our data indicates that the laminate MIM capacitor can provide high capacitance density of 12.8 fF//spl mu/m/sup 2/ from 10 kHz up to 20 GHz, very low leakage current of 3.2 /spl times/ 10/sup -8/ A/cm/sup 2/ at 3.3 V, small linear voltage coefficient of capacitance of 240 ppm/V together with quadratic one of 1830 ppm/V/sup 2/, temperature coefficient of capacitance of 182 ppm//spl deg/C, and high breakdown field of /spl sim/6 MV/cm as well as promising reliability. As a result, the HfO/sub 2/-Al/sub 2/O/sub 3/ laminate is a very promising candidate for next generation MIM capacitor for radio frequency and mixed signal integrated circuit applications. 相似文献
60.
对三网互联的几个关键技术进行分析与研究,介绍利用IP技术解决有线电视网地址选择问题,探讨怎样将ATM技术与IP技术相互融合,使真正的信息高速公路成为现实,阐述利用H.323标准全面解决视频网络方案。 相似文献