首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   12167篇
  免费   1930篇
  国内免费   1238篇
电工技术   1819篇
技术理论   1篇
综合类   1658篇
化学工业   535篇
金属工艺   206篇
机械仪表   621篇
建筑科学   916篇
矿业工程   257篇
能源动力   365篇
轻工业   280篇
水利工程   457篇
石油天然气   247篇
武器工业   135篇
无线电   2000篇
一般工业技术   968篇
冶金工业   239篇
原子能技术   70篇
自动化技术   4561篇
  2024年   71篇
  2023年   183篇
  2022年   355篇
  2021年   428篇
  2020年   514篇
  2019年   431篇
  2018年   374篇
  2017年   507篇
  2016年   568篇
  2015年   619篇
  2014年   913篇
  2013年   886篇
  2012年   1003篇
  2011年   1169篇
  2010年   840篇
  2009年   806篇
  2008年   816篇
  2007年   926篇
  2006年   756篇
  2005年   601篇
  2004年   485篇
  2003年   393篇
  2002年   307篇
  2001年   261篇
  2000年   205篇
  1999年   155篇
  1998年   127篇
  1997年   128篇
  1996年   80篇
  1995年   58篇
  1994年   62篇
  1993年   49篇
  1992年   40篇
  1991年   44篇
  1990年   18篇
  1989年   30篇
  1988年   22篇
  1987年   15篇
  1986年   11篇
  1985年   11篇
  1984年   4篇
  1983年   6篇
  1982年   7篇
  1981年   9篇
  1980年   6篇
  1979年   6篇
  1978年   6篇
  1977年   4篇
  1976年   8篇
  1962年   3篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
31.
Threshold cryptography based on Asmuth-Bloom secret sharing   总被引:1,自引:0,他引:1  
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present three novel function sharing schemes for RSA, ElGamal and Paillier cryptosystems. To the best of our knowledge, these are the first provably secure threshold cryptosystems realized using the Asmuth-Bloom secret sharing. Proposed schemes are comparable in performance to earlier proposals in threshold cryptography.  相似文献   
32.
Probabilistic Visual Cryptography Schemes   总被引:1,自引:0,他引:1  
  相似文献   
33.
Decision routines unburden the cognitive capacity of the decision maker. In changing environments, however, routines may become maladaptive. In 2 experiments with a hypothetical stock market game (n = 241), the authors tested whether decision routines tend to persist at the level of decision strategies rather than at the level of options in strategy selection. The payoff structure of the task was changed after 80 decision trials, rendering a new strategy optimal with respect to expected payoff. Whereas most participants detected the appropriate strategy at the beginning of the task, they tended to retain it even when it was no longer optimal. A hint about a possible change had only a small influence on this maladaptive routine; a monetary incentive had none. Switching to a similar but not identical task relaxed the routine, but not much. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
34.
Understanding information sharing is an important challenge to modern organizations, and is likely to be increasingly considered when IT investment decisions are made world-wide. Our research study investigated the influence of cultural factors on information sharing in China. It was postulated that social network structures such as guanxi, Confucian dynamism, and collectivism could explain the degree to which information sharing took place between people in China. It was found that guanxi, Confucian dynamism, and collectivism all had a significant influence on information sharing.  相似文献   
35.
36.
The Cooperative Institute for Great Lakes Research (CIGLR) in collaboration with the Great Lakes Observing System and National Oceanic and Atmospheric Administration, Great Lakes Environmental Research Laboratory (NOAA GLERL) deployed an autonomous underwater glider in southern Lake Michigan several times per year between 2012 and 2019 to collect offshore (>30 m depth) limnological measurements, including temperature, photosynthetically active radiation (beginning during 2015), and chlorophyll fluorescence. From these data, we calculated mixed layer depth, several measures of light penetration (diffuse attenuation coefficient, first optical depth, euphotic zone depth), and depth of the subsurface chlorophyll maxima. During summer, mean offshore mixed layer depth was typically 10–15 m, Kd for PAR was 0.1–0.17 m?1, first optical depth was 6–9 m, euphotic zone depth was 35–40 m, and depth of subsurface chlorophyll maxima was 30–35 m. We also observed substantial spatial and temporal variation in these values across the basin and within and among seasons. Glider-based observations provide a wider horizontal and vertical perspective than other methods (e.g., ship- and satellite-based observations, buoys, and fixed moorings), and are therefore a valuable, complementary tool for Great Lakes limnology. The set of observations reported here provide seasonal and basin-scale information that may help to identify anomalies useful for future glider-assisted investigation into the role of biophysical processes in Great Lakes limnology and ecology.  相似文献   
37.
DETECTOR: A knowledge-based system for injection molding diagnostics   总被引:1,自引:0,他引:1  
A knowledge-based system (KBS) for diagnosis of multiple defects in injection molding is presented. The general scheme for knowledge representation based on fuzzy set theory has been shown useful in representing inexact and incomplete information for developing the KBS. An optimality criterion is created for selecting a simple and best cover to explain the given problem. An efficient search algorithm for finding such cover is also discussed.  相似文献   
38.
The bivariate distributions are useful in simultaneous modeling of two random variables. These distributions provide a way to model models. The bivariate families of distributions are not much widely explored and in this article a new family of bivariate distributions is proposed. The new family will extend the univariate transmuted family of distributions and will be helpful in modeling complex joint phenomenon. Statistical properties of the new family of distributions are explored which include marginal and conditional distributions, conditional moments, product and ratio moments, bivariate reliability and bivariate hazard rate functions. The maximum likelihood estimation (MLE) for parameters of the family is also carried out. The proposed bivariate family of distributions is studied for the Weibull baseline distributions giving rise to bivariate transmuted Weibull (BTW) distribution. The new bivariate transmuted Weibull distribution is explored in detail. Statistical properties of the new BTW distribution are studied which include the marginal and conditional distributions, product, ratio and conditional momenst. The hazard rate function of the BTW distribution is obtained. Parameter estimation of the BTW distribution is also done. Finally, real data application of the BTW distribution is given. It is observed that the proposed BTW distribution is a suitable fit for the data used.  相似文献   
39.
Fairly exchanging digital content is an everyday problem. It has been shown that fair exchange cannot be achieved without a trusted third party (called the Arbiter). Yet, even with a trusted party, it is still non-trivial to come up with an efficient solution, especially one that can be used in a p2p file sharing system with a high volume of data exchanged.We provide an efficient optimistic fair exchange mechanism for bartering digital files, where receiving a payment in return for a file (buying) is also considered fair. The exchange is optimistic, removing the need for the Arbiter’s involvement unless a dispute occurs. While the previous solutions employ costly cryptographic primitives for every file or block exchanged, our protocol employs them only once per peer, therefore achieving an O(n) efficiency improvement when n blocks are exchanged between two peers. Our protocol uses very efficient cryptography, making it perfectly suitable for a p-2-p file sharing system where tens of peers exchange thousands of blocks and they do not know beforehand which ones they will end up exchanging. Therefore, our system yields up to one-to-two orders of magnitude improvement in terms of both computation and communication (40 s vs. 42 min, 1.6 MB vs. 200 MB). Thus, for the first time, a provably secure (and privacy-respecting when payments are made using e-cash) fair exchange protocol can be used in real bartering applications (e.g., BitTorrent) [14] without sacrificing performance.  相似文献   
40.
Given an array ofn input numbers, therange-maxima problem is that of preprocessing the data so that queries of the type what is the maximum value in subarray [i..j] can be answered quickly using one processor. We present a randomized preprocessing algorithm that runs inO(log* n) time with high probability, using an optimal number of processors on a CRCW PRAM; each query can be processed in constant time by one processor. We also present a randomized algorithm for a parallel comparison model. Using an optimal number of processors, the preprocessing algorithm runs inO( (n)) time with high probability; each query can be processed inO ( (n)) time by one processor. (As is standard, (n) is the inverse of Ackermann function.) A constant time query can be achieved by some slowdown in the performance of the preprocessing stage.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号