首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   42886篇
  免费   4769篇
  国内免费   1751篇
电工技术   11438篇
技术理论   6篇
综合类   3776篇
化学工业   3754篇
金属工艺   1581篇
机械仪表   1118篇
建筑科学   6676篇
矿业工程   2918篇
能源动力   1088篇
轻工业   1804篇
水利工程   2865篇
石油天然气   2206篇
武器工业   273篇
无线电   2460篇
一般工业技术   1697篇
冶金工业   1917篇
原子能技术   387篇
自动化技术   3442篇
  2024年   103篇
  2023年   439篇
  2022年   1028篇
  2021年   1279篇
  2020年   1253篇
  2019年   922篇
  2018年   821篇
  2017年   1102篇
  2016年   1227篇
  2015年   1509篇
  2014年   3381篇
  2013年   2136篇
  2012年   3586篇
  2011年   3802篇
  2010年   2859篇
  2009年   2853篇
  2008年   2532篇
  2007年   3043篇
  2006年   2946篇
  2005年   2361篇
  2004年   1916篇
  2003年   1782篇
  2002年   1421篇
  2001年   1227篇
  2000年   1086篇
  1999年   781篇
  1998年   486篇
  1997年   349篇
  1996年   296篇
  1995年   267篇
  1994年   164篇
  1993年   95篇
  1992年   78篇
  1991年   61篇
  1990年   42篇
  1989年   38篇
  1988年   39篇
  1987年   13篇
  1986年   17篇
  1985年   12篇
  1984年   21篇
  1983年   4篇
  1982年   3篇
  1981年   10篇
  1980年   4篇
  1965年   2篇
  1959年   2篇
  1957年   1篇
  1954年   1篇
  1951年   1篇
排序方式: 共有10000条查询结果,搜索用时 14 毫秒
991.
数字水印技术研究进展   总被引:120,自引:4,他引:116       下载免费PDF全文
随着因特网的日益普及,多媒体信息交流达到了前所未有的深度和广度,但作品侵权也随之更加容易,篡改也更加方便,因此,如何保护作品版权已受到人们的高度重视,而如今信息隐藏技术,特别是数字水印技术作为版权保护的重要手段,已得到广泛的研究和应用,为了使人们对该技术有一个较全面的了解,因而对数字水印技术的研究与进展情况进行了较系统的论述,即首先对信息隐藏技术进行了介绍,并对该技术进行了分类,然后重点分析了数字水印技术的模型、典型算法及其攻击方法,最后对数字水印技术的研究发展及其应用前景指出了一些可能的方向。  相似文献   
992.
矿井提升机智能监测系统   总被引:4,自引:0,他引:4       下载免费PDF全文
本文根据煤矿生产的实际情况,设计了矿井提升设备运行状态智能监测系统,应用模糊数学理论建立了多参数综合故障监测与诊断模型,并编制了相应的Visual C++程序和汇编语言程序。实践证明,该系统反应灵敏,运行可靠。  相似文献   
993.
中国传统节日是中国传统文化的一部分,春节作为其中一个重要的节日集中体现了中国的民俗,是中国非物质文化遗产的重要组成部分。通过分析中国传统节日春节的视觉形象,从建筑上的装饰、庆祝活动、饮食文化、服饰文化和人的行为模式五个方面提炼出春节中传统民俗的视觉特征,将非物质文化遗产中的传统节日视觉化、有形化,并初探其视觉形象的应用,以便更好地保护、传承与发展中国传统节日的传统民俗。  相似文献   
994.
防火墙技术是目前一种保护计算机网络安全运行的技术,也是使用最广泛的一种网络安全防护技术。防火墙是一种由计算机硬件和软件组合,使互联网与内部网之间建立起一个安全网关,保护内部网免受非法用户的侵入,就是互联网与内部网隔开的屏障。校园网是校园信息传输、知识传授的平台,必须建立有效的、安全的、高效网络安全防范体系以保护校园信息和关键应用的安全。防火墙技术的应用对于加强校园网络的安全起着重要的作用。  相似文献   
995.
该文从个人计算机用户的角度,分析了在网络环境下计算机安全所面临的各种威胁,介绍了个人用户计算机安全策略所应用的方法,对个人计算机用户具有实际的参考和应用价值。  相似文献   
996.
该文首先分析了IP/MPLS over WDM网络单层生存性和多层联合生存性,并就生存性策略的性能进行对比,然后对多层空闲资源分配进行了研究。  相似文献   
997.
Real-time traffic will be a predominant traffic type in the next generation networks, and networks with 100% reliability and availability will be required by real-time premium traffic. It is believed that QoS guarantees could be better provided by connection oriented networks such as Multi Protocol Label Switching (MPLS). These connection oriented networks are more vulnerable to network failure. Conventional path protection methods perform re-routing to cope with this. However, re-routing always causes packet losses and results in service outage. These losses are bursty in nature and highly degrade the QoS of the real-time premium traffic. Thus, 100% availability cannot be achieved by conventional methods. The novel path protection proposed in this paper recovers the bursty packet losses due to re-routing by using forward error correction (FEC) path. Therefore, it can provide network architecture with no service outage for such traffic. The numerical results show that the proposed method can achieve a very high availability for real-time premium traffic in future IP/MPLS networks.
Mitsuo HayasakaEmail:

Mitsuo Hayasaka   received B.E. and M.E. degrees from the University of Electro-Communications, Tokyo, Japan in 2000 and 2002, respectively. He is currently a Ph.D. student at the University of Electro-Communications, Tokyo, Japan. His research interests involve QoS controls of real-time multimedia communications, and reliable network architecture. He is a member of IEEE, IEICE and IPSJ. Tetsuya Miki   received the B.E. degree from the University of Electro-Communications, Tokyo, Japan in 1965, the M.E. and Ph.D. degrees from Tohoku University, Sendai, Japan in 1967 and 1970, respectively. He joined the Electrical Communication Laboratories of NTT in 1970, where he engaged in the research and development of high-speed digital transmission systems using coaxial cable, fiber-optical transmission systems including the initial WDM technologies, fiber-to-the-home systems, ATM systems, network management systems, and broadband network architecture. He is currently a Professor at the University of Electro-Communications, Tokyo, Japan, and is interested in photonic networks, community networks, access networks, and dependable networks. A fellow of the IEEE and IEICE, he also served as vice-president of the IEEE Communications Society in 1998 and 1999 and as vice-president of IEICE in 2003 and 2004.  相似文献   
998.
The protection design is a key issue in survivable wavelength division multiplexing (WDM) optical networks. Most researches focused on protecting unicast traffic against the failure of a single network component such as a link or a node. In this paper, we investigate the protection scheme for multicast traffic in meshed WDM optical networks under dual-link failure consideration, and propose a novel protection algorithm called shared segment protection with reprovisioning (SSPR). Through dynamically adjusting link-cost according to the current network state, SSPR establishes a primary light-tree and corresponding link-disjoint backup segments for each multicast connection request. A backup segment can efficiently share wavelength capacity of its working tree or the common resource of other backup segments. Capacity reprovisioning establishes new segments for the vulnerable connections after a link failure and tolerates following link failures. The simulation results show that SSPR not only can make good use of wavelength resources and protect multicast sessions against any single-link failure, but also can greatly improve the traffic restorability in the event of dual-link breakdown.  相似文献   
999.
Efficient video encryption scheme based on advanced video coding   总被引:1,自引:0,他引:1  
A video encryption scheme combining with advanced video coding (AVC) is presented and analyzed in this paper, which is different from the ones used in MPEG1/2 video encryption. In the proposed scheme, the intra-prediction mode and motion vector difference are encrypted with the length-kept encryption algorithm (LKE) in order to keep the format compliance, and the residue data of the macroblocks are encrypted with the residue data encryption algorithm (RDE) in order to keep low cost. Additionally, a key distribution scheme is proposed to keep the robustness to transmission errors, which assigns sub-keys to different frames or slices independently. The encryption scheme’s security, time efficiency and error robustness are analyzed in detail. Experimental results show that the encryption scheme keeps file format unchanged, is secure against replacement attacks, is efficient in computing, and is robust to some transmission errors. These properties make it a suitable choice for real-time applications, such as secure IPTV, secure videoconference or mobile/wireless multimedia, etc.
Shiguo LianEmail:
  相似文献   
1000.
The use of information and communications technology and the ‘digitalisation’ of everyday tasks has resulted in a paradigm shift where vast amounts of personal information about individuals, their opinions and habits is generated and stored in the databases of those providing online services. The mere existence of those data pools has created ‘unwholesome’ desires in both private and public organisations which cover that data for their own purposes. This article looks at the way in which the ‘market value’ of privacy seems to be falling as individuals are persuaded to disclose information about themselves in order to minimise real or perceived risks. It examines the way in which our perception of risk has changed in recent years and the way in which that perception may be manipulated. It analyses the link between risk perception, data processing and individual concepts of privacy as well as the dangers that increased privacy intrusion represents for the relationship between the individual and the state and the relationship between citizens.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号