全文获取类型
收费全文 | 33314篇 |
免费 | 2490篇 |
国内免费 | 1325篇 |
专业分类
电工技术 | 1724篇 |
技术理论 | 2篇 |
综合类 | 1919篇 |
化学工业 | 5592篇 |
金属工艺 | 2009篇 |
机械仪表 | 2264篇 |
建筑科学 | 2601篇 |
矿业工程 | 1068篇 |
能源动力 | 856篇 |
轻工业 | 1947篇 |
水利工程 | 604篇 |
石油天然气 | 2208篇 |
武器工业 | 250篇 |
无线电 | 3656篇 |
一般工业技术 | 4016篇 |
冶金工业 | 1680篇 |
原子能技术 | 414篇 |
自动化技术 | 4319篇 |
出版年
2024年 | 88篇 |
2023年 | 544篇 |
2022年 | 853篇 |
2021年 | 1356篇 |
2020年 | 1106篇 |
2019年 | 826篇 |
2018年 | 1052篇 |
2017年 | 1060篇 |
2016年 | 996篇 |
2015年 | 1295篇 |
2014年 | 1601篇 |
2013年 | 1973篇 |
2012年 | 2124篇 |
2011年 | 2155篇 |
2010年 | 1954篇 |
2009年 | 1955篇 |
2008年 | 1797篇 |
2007年 | 1769篇 |
2006年 | 1896篇 |
2005年 | 1557篇 |
2004年 | 1012篇 |
2003年 | 1004篇 |
2002年 | 850篇 |
2001年 | 703篇 |
2000年 | 744篇 |
1999年 | 880篇 |
1998年 | 734篇 |
1997年 | 649篇 |
1996年 | 585篇 |
1995年 | 484篇 |
1994年 | 374篇 |
1993年 | 269篇 |
1992年 | 213篇 |
1991年 | 162篇 |
1990年 | 121篇 |
1989年 | 102篇 |
1988年 | 85篇 |
1987年 | 53篇 |
1986年 | 52篇 |
1985年 | 25篇 |
1984年 | 20篇 |
1983年 | 15篇 |
1982年 | 16篇 |
1981年 | 10篇 |
1980年 | 8篇 |
1979年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
971.
为了提高视觉特征的鲁棒性,提出尺度空间下最稳定极值区域特征的挖掘算法.该算法在尺度空间下检测特征,首先通过分析特征的局部稳定性来挖掘鲁棒的特征,然后对区分力低的特征基于熵值进行过滤;在此基础上,基于尺度空间下最稳定极值区域特征的尺度一致性提出了基于最大匹配尺度的检索算法,可提高局部敏感哈希高维索引的检索性能.与多种已有方法进行比较的结果表明,文中算法的平均检索精度相对提高10%以上,查询效率也有提升. 相似文献
972.
The estimation of surface curvature is essential for a variety of applications in computer graphics because of its invariance with respect to rigid transformations. In this article, we describe a curvature estimation method for meshes by converting each planar triangular facet into a curved patch using the vertex positions and the normals of three vertices of each triangle. Our method interpolates three end points and the corresponding normal vectors of each triangle to construct a curved patch. Then, we compute the per triangle curvature of the neighboring triangles of a mesh point of interest. Similar to estimating per vertex normal from the adjacent per triangle normal, we compute the per vertex curvature by taking a weighted average of per triangle curvature. Through some examples, we demonstrate that our method is efficient and its accuracy is comparable to that of the existing methods. 相似文献
973.
Security under man-in-the-middle attacks is extremely important when protocols are executed on asynchronous networks, as the Internet. Focusing on interactive proof systems, one would like also to achieve unconditional soundness, so that proving a false statement is not possible even for a computationally unbounded adversarial prover. Motivated by such requirements, in this paper we address the problem of designing constant-round protocols in the plain model that enjoy simultaneously non-malleability (i.e., security against man-in-the-middle attacks) and unconditional soundness (i.e., they are proof systems).We first give a construction of a constant-round one-many (i.e., one honest prover, many honest verifiers) concurrent non-malleable zero-knowledge proof (in contrast to argument) system for every NP language in the plain model. We then give a construction of a constant-round concurrent non-malleable witness-indistinguishable proof system for every NP language. Compared with previous results, our constructions are the first constant-round proof systems that in the plain model guarantee simultaneously security against some non-trivial concurrent man-in-the-middle attacks and against unbounded malicious provers. 相似文献
974.
F5 steganography is much different from most of LSB replacement or matching steganographic schemes, because matrix encoding is employed to increase embedding efficiency while reducing the number of necessary changes. By using this scheme, the hidden message inserted into carrier media imperceptibly can be transferred via a more secure subliminal channel. The embedding domain is the quantized DCT coefficients of JPEG image, which makes the scheme be immune to visual attack and statistical attack from the steganalyst. Based on this effective scheme, an extended matrix encoding algorithm is proposed to improve the performance further in this paper. By changing the hash function in matrix encoding and converting the coding mode, the embedding efficiency and embedding rate get increased to a large extent. Eventually, the experimental results demonstrate the extended algorithm is superior to the classic F5 steganography. 相似文献
975.
Piyi Yang Zhenfu Cao Xiaolei DongAuthor vitae 《Computers & Electrical Engineering》2011,37(4):532-540
We introduce a new cryptographic primitive which is the signature analog of fuzzy identity based encryption (FIBE). We call it fuzzy identity based signature (FIBS). It possesses similar error-tolerance property as FIBE that allows a user with the private key for identity ω to decrypt a ciphertext encrypted for identity ω′ if and only if ω and ω′ are within a certain distance judged by some metric. We give the definition and security model of FIBS and present the first practical FIBS scheme. We prove that our scheme is existentially unforgeable against adaptively chosen message attack in the standard model. To our best knowledge, this primitive was never considered in the identity based signature before. FIBS is of particular value for biometric authentication, where biometric identifiers such as fingerprints, iris, voice and gait are used in human identification. We demonstrate the applicability of our construction to secure biometric authentication. 相似文献
976.
977.
978.
基于MSP430F149与Si4432的无线传感器网络的实现方法 总被引:1,自引:0,他引:1
介绍了基于MSP430F149与Si4432的无线传感器网络节点的硬件及软件设计方法,给出了主要的硬件电路和软件流程图,提出了一种简单易实现的低功耗自组织协议。实验证明,该无线传感器网络具有组网速度快、功耗低、抗干扰能力强、通信稳定可靠等特点,可应用于多个领域的信息探测,具有广阔的市场前景。 相似文献
979.
980.
在分析石脑油裂解炉辐射段的Kumar分子反应动力学模型的基础上,提出了一种应用数据融合技术对Kumar模型一次反应选择性系数进行在线调整的方法。首先,利用进化的遗传算法,以改进的石脑油裂解模型计算出的产率与实际工况产率的误差作为目标函数,对选择性系数进行离线调整,进而建立原料性质与选择性系数相匹配的标准样本数据库。其次,利用数据融合技术中的Dempeter-Shafer证据理论建立模型,计算待估物料与标准样本数据库中样本物料的匹配度,进而对待估原料的一次反应选择性系数进行估算。研究结果表明,利用估算出的一次反应选择性系数建立的裂解工艺模型具有较高精度,将仿真结果与实际工况产率进行对比,证实了该方法的有效性和可行性。 相似文献