全文获取类型
收费全文 | 12167篇 |
免费 | 1930篇 |
国内免费 | 1238篇 |
专业分类
电工技术 | 1819篇 |
技术理论 | 1篇 |
综合类 | 1658篇 |
化学工业 | 535篇 |
金属工艺 | 206篇 |
机械仪表 | 621篇 |
建筑科学 | 916篇 |
矿业工程 | 257篇 |
能源动力 | 365篇 |
轻工业 | 280篇 |
水利工程 | 457篇 |
石油天然气 | 247篇 |
武器工业 | 135篇 |
无线电 | 2000篇 |
一般工业技术 | 968篇 |
冶金工业 | 239篇 |
原子能技术 | 70篇 |
自动化技术 | 4561篇 |
出版年
2024年 | 71篇 |
2023年 | 183篇 |
2022年 | 355篇 |
2021年 | 428篇 |
2020年 | 514篇 |
2019年 | 431篇 |
2018年 | 374篇 |
2017年 | 507篇 |
2016年 | 568篇 |
2015年 | 619篇 |
2014年 | 913篇 |
2013年 | 886篇 |
2012年 | 1003篇 |
2011年 | 1169篇 |
2010年 | 840篇 |
2009年 | 806篇 |
2008年 | 816篇 |
2007年 | 926篇 |
2006年 | 756篇 |
2005年 | 601篇 |
2004年 | 485篇 |
2003年 | 393篇 |
2002年 | 307篇 |
2001年 | 261篇 |
2000年 | 205篇 |
1999年 | 155篇 |
1998年 | 127篇 |
1997年 | 128篇 |
1996年 | 80篇 |
1995年 | 58篇 |
1994年 | 62篇 |
1993年 | 49篇 |
1992年 | 40篇 |
1991年 | 44篇 |
1990年 | 18篇 |
1989年 | 30篇 |
1988年 | 22篇 |
1987年 | 15篇 |
1986年 | 11篇 |
1985年 | 11篇 |
1984年 | 4篇 |
1983年 | 6篇 |
1982年 | 7篇 |
1981年 | 9篇 |
1980年 | 6篇 |
1979年 | 6篇 |
1978年 | 6篇 |
1977年 | 4篇 |
1976年 | 8篇 |
1962年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
31.
Threshold cryptography based on Asmuth-Bloom secret sharing 总被引:1,自引:0,他引:1
In this paper, we investigate how threshold cryptography can be conducted with the Asmuth-Bloom secret sharing scheme and present three novel function sharing schemes for RSA, ElGamal and Paillier cryptosystems. To the best of our knowledge, these are the first provably secure threshold cryptosystems realized using the Asmuth-Bloom secret sharing. Proposed schemes are comparable in performance to earlier proposals in threshold cryptography. 相似文献
32.
Probabilistic Visual Cryptography Schemes 总被引:1,自引:0,他引:1
33.
Decision routines unburden the cognitive capacity of the decision maker. In changing environments, however, routines may become maladaptive. In 2 experiments with a hypothetical stock market game (n = 241), the authors tested whether decision routines tend to persist at the level of decision strategies rather than at the level of options in strategy selection. The payoff structure of the task was changed after 80 decision trials, rendering a new strategy optimal with respect to expected payoff. Whereas most participants detected the appropriate strategy at the beginning of the task, they tended to retain it even when it was no longer optimal. A hint about a possible change had only a small influence on this maladaptive routine; a monetary incentive had none. Switching to a similar but not identical task relaxed the routine, but not much. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
34.
Understanding information sharing is an important challenge to modern organizations, and is likely to be increasingly considered when IT investment decisions are made world-wide. Our research study investigated the influence of cultural factors on information sharing in China. It was postulated that social network structures such as guanxi, Confucian dynamism, and collectivism could explain the degree to which information sharing took place between people in China. It was found that guanxi, Confucian dynamism, and collectivism all had a significant influence on information sharing. 相似文献
35.
36.
Michael E. Fraker Anisha Shrestha Lauren Marshall Lacey Mason Russ Miller 《Journal of Great Lakes research》2021,47(4):1228-1234
The Cooperative Institute for Great Lakes Research (CIGLR) in collaboration with the Great Lakes Observing System and National Oceanic and Atmospheric Administration, Great Lakes Environmental Research Laboratory (NOAA GLERL) deployed an autonomous underwater glider in southern Lake Michigan several times per year between 2012 and 2019 to collect offshore (>30 m depth) limnological measurements, including temperature, photosynthetically active radiation (beginning during 2015), and chlorophyll-α fluorescence. From these data, we calculated mixed layer depth, several measures of light penetration (diffuse attenuation coefficient, first optical depth, euphotic zone depth), and depth of the subsurface chlorophyll-α maxima. During summer, mean offshore mixed layer depth was typically 10–15 m, Kd for PAR was 0.1–0.17 m?1, first optical depth was 6–9 m, euphotic zone depth was 35–40 m, and depth of subsurface chlorophyll-α maxima was 30–35 m. We also observed substantial spatial and temporal variation in these values across the basin and within and among seasons. Glider-based observations provide a wider horizontal and vertical perspective than other methods (e.g., ship- and satellite-based observations, buoys, and fixed moorings), and are therefore a valuable, complementary tool for Great Lakes limnology. The set of observations reported here provide seasonal and basin-scale information that may help to identify anomalies useful for future glider-assisted investigation into the role of biophysical processes in Great Lakes limnology and ecology. 相似文献
37.
A knowledge-based system (KBS) for diagnosis of multiple defects in injection molding is presented. The general scheme for knowledge representation based on fuzzy set theory has been shown useful in representing inexact and incomplete information for developing the KBS. An optimality criterion is created for selecting a simple and best cover to explain the given problem. An efficient search algorithm for finding such cover is also discussed. 相似文献
38.
The bivariate distributions are useful in simultaneous modeling of two random variables. These distributions provide a way to model models. The bivariate families of distributions are not much widely explored and in this article a new family of bivariate distributions is proposed. The new family will extend the univariate transmuted family of distributions and will be helpful in modeling complex joint phenomenon. Statistical properties of the new family of distributions are explored which include marginal and conditional distributions, conditional moments, product and ratio moments, bivariate reliability and bivariate hazard rate functions. The maximum likelihood estimation (MLE) for parameters of the family is also carried out. The proposed bivariate family of distributions is studied for the Weibull baseline distributions giving rise to bivariate transmuted Weibull (BTW) distribution. The new bivariate transmuted Weibull distribution is explored in detail. Statistical properties of the new BTW distribution are studied which include the marginal and conditional distributions, product, ratio and conditional momenst. The hazard rate function of the BTW distribution is obtained. Parameter estimation of the BTW distribution is also done. Finally, real data application of the BTW distribution is given. It is observed that the proposed BTW distribution is a suitable fit for the data used. 相似文献
39.
Fairly exchanging digital content is an everyday problem. It has been shown that fair exchange cannot be achieved without a trusted third party (called the Arbiter). Yet, even with a trusted party, it is still non-trivial to come up with an efficient solution, especially one that can be used in a p2p file sharing system with a high volume of data exchanged.We provide an efficient optimistic fair exchange mechanism for bartering digital files, where receiving a payment in return for a file (buying) is also considered fair. The exchange is optimistic, removing the need for the Arbiter’s involvement unless a dispute occurs. While the previous solutions employ costly cryptographic primitives for every file or block exchanged, our protocol employs them only once per peer, therefore achieving an O(n) efficiency improvement when n blocks are exchanged between two peers. Our protocol uses very efficient cryptography, making it perfectly suitable for a p-2-p file sharing system where tens of peers exchange thousands of blocks and they do not know beforehand which ones they will end up exchanging. Therefore, our system yields up to one-to-two orders of magnitude improvement in terms of both computation and communication (40 s vs. 42 min, 1.6 MB vs. 200 MB). Thus, for the first time, a provably secure (and privacy-respecting when payments are made using e-cash) fair exchange protocol can be used in real bartering applications (e.g., BitTorrent) [14] without sacrificing performance. 相似文献
40.
Given an array ofn input numbers, therange-maxima problem is that of preprocessing the data so that queries of the type what is the maximum value in subarray [i..j] can be answered quickly using one processor. We present a randomized preprocessing algorithm that runs inO(log*
n) time with high probability, using an optimal number of processors on a CRCW PRAM; each query can be processed in constant time by one processor. We also present a randomized algorithm for a parallel comparison model. Using an optimal number of processors, the preprocessing algorithm runs inO( (n)) time with high probability; each query can be processed inO ( (n)) time by one processor. (As is standard, (n) is the inverse of Ackermann function.) A constant time query can be achieved by some slowdown in the performance of the preprocessing stage. 相似文献