全文获取类型
收费全文 | 83545篇 |
免费 | 14497篇 |
国内免费 | 10439篇 |
专业分类
电工技术 | 9050篇 |
技术理论 | 1篇 |
综合类 | 10026篇 |
化学工业 | 3138篇 |
金属工艺 | 1823篇 |
机械仪表 | 5744篇 |
建筑科学 | 1609篇 |
矿业工程 | 1060篇 |
能源动力 | 1638篇 |
轻工业 | 4020篇 |
水利工程 | 1181篇 |
石油天然气 | 967篇 |
武器工业 | 1327篇 |
无线电 | 14191篇 |
一般工业技术 | 5302篇 |
冶金工业 | 1090篇 |
原子能技术 | 428篇 |
自动化技术 | 45886篇 |
出版年
2024年 | 632篇 |
2023年 | 1498篇 |
2022年 | 2842篇 |
2021年 | 3049篇 |
2020年 | 3344篇 |
2019年 | 2873篇 |
2018年 | 2835篇 |
2017年 | 3370篇 |
2016年 | 3840篇 |
2015年 | 4555篇 |
2014年 | 5853篇 |
2013年 | 5908篇 |
2012年 | 7208篇 |
2011年 | 7516篇 |
2010年 | 6013篇 |
2009年 | 6187篇 |
2008年 | 6490篇 |
2007年 | 6966篇 |
2006年 | 5501篇 |
2005年 | 4517篇 |
2004年 | 3639篇 |
2003年 | 2914篇 |
2002年 | 2235篇 |
2001年 | 1792篇 |
2000年 | 1477篇 |
1999年 | 1078篇 |
1998年 | 876篇 |
1997年 | 721篇 |
1996年 | 552篇 |
1995年 | 389篇 |
1994年 | 334篇 |
1993年 | 269篇 |
1992年 | 244篇 |
1991年 | 130篇 |
1990年 | 166篇 |
1989年 | 121篇 |
1988年 | 92篇 |
1987年 | 38篇 |
1986年 | 48篇 |
1985年 | 52篇 |
1984年 | 36篇 |
1983年 | 39篇 |
1982年 | 44篇 |
1981年 | 30篇 |
1980年 | 38篇 |
1979年 | 23篇 |
1978年 | 17篇 |
1977年 | 19篇 |
1976年 | 12篇 |
1975年 | 20篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
带关键字搜索的公钥加密(PEKS)是一种有用的加密原语,它允许用户将在加密数据上搜索的功能委托给不可信的第三方服务器,而不影响原始数据的安全性和隐私性。但是,由于缺乏对于数据的加密以及解密能力,PEKS方案不能单独进行使用,必须与标准的公钥加密方案(PKE)相结合。因此,Baek等人在2006年引入了一种新的加密原语,称为结合PKE和PEKS的加密方案(PKE+PEKS),它同时提供了PKE和PEKS的功能。目前,已有文献提出了几种PKE+PEKS方案。然而,他们都没有考虑关键字猜测攻击的问题。本文提出一个新的高效且能够抵抗关键字猜测攻击的PKE+PEKS方案,与已有方案相比,该方案在性能上有很大的提升,并且在生成关键字和数据密文时,不需要使用双线性对,极大地降低了计算和存储成本。安全性分析表明,本文中所提出的方案能够满足密文隐私安全性、陷门不可区分性和抗关键字猜测攻击的安全性。效率分析表明,本分提出的方案更加高效。 相似文献
2.
针对现有混合入侵检测模型仅定性选取特征而导致检测精度较低的问题,同时为了充分结合误用检测模型和异常检测模型的优势,提出一种采用信息增益率的混合入侵检测模型.首先,利用信息增益率定量地选择特征子集,最大程度地保留样本信息;其次,采用余弦时变粒子群算法确定支持向量机参数构建误用检测模型,使其更好地平衡粒子在全局和局部的搜索能力,然后,选取灰狼算法确定单类支持向量机参数构建异常检测模型,以此来提高对最优参数的搜索效率和精细程度,综合提高混合入侵检测模型对攻击的检测效果;最后,通过两种数据集进行仿真实验,验证了所提混合入侵检测模型具有较好的检测性能. 相似文献
3.
马钢二烧结配料计算机控制系统 总被引:1,自引:0,他引:1
阐明了马钢二烧结配科计算机控制系统的目的、控制形式、控制原理;根据烧结配料控制对象的特点对信号采样和控制算法进行了探讨;提供了系统的主要硬件结构,软件功能和程序框图。 相似文献
4.
Namyong Kim 《ETRI Journal》2006,28(2):155-161
In this paper, we introduce an escalator (ESC) algorithm based on the least squares (LS) criterion. The proposed algorithm is relatively insensitive to the eigenvalue spread ratio (ESR) of an input signal and has a faster convergence speed than the conventional ESC algorithms. This algorithm exploits the fast adaptation ability of least squares methods and the orthogonalization property of the ESC structure. From the simulation results, the proposed algorithm shows superior convergence performance. 相似文献
5.
基于进化算法的常减压装置模拟 总被引:1,自引:0,他引:1
提出了基于优选优生进化算法(Select—best and prepotency evolution algorithm,SPEA)的常减压装置模拟方法。以各塔的温度分布为目标,基于生产过程和分析数据,采用SPEA确定各塔板Murphree效率,从而精确描述各塔板平衡偏离程度。在实际应用中,获得具有良好精度的常减压装置模型。系统分析了SPEA算法的关键参数——优选领域大小与计算复杂性及寻优性能之间的关系,结果显示其取值为群体规模的10%最为合适。 相似文献
6.
Depending on whether bidirectional links or unidirectional links are used for communications, the network topology under a
given range assignment is either an undirected graph referred to as the bidirectional topology, or a directed graph referred
to as the unidirectional topology. The Min-Power Bidirectional (resp., Unidirectional) k-Node Connectivity problem seeks a range assignment of minimum total power subject to the constraint that the produced bidirectional
(resp. unidirectional) topology is k-vertex connected. Similarly, the Min-Power Bidirectional (resp., Unidirectional) k-Edge Connectivity problem seeks a range assignment of minimum total power subject to the constraint the produced bidirectional
(resp., unidirectional) topology is k-edge connected.
The Min-Power Bidirectional Biconnectivity problem and the Min-Power Bidirectional Edge-Biconnectivity problem have been studied
by Lloyd et al. [23]. They show that range assignment based the approximation algorithm of Khuller and Raghavachari [18],
which we refer to as Algorithm KR, has an approximation ratio of at most 2(2 – 2/n)(2 + 1/n) for Min-Power Bidirectional Biconnectivity, and range assignment based on the approximation algorithm of Khuller and Vishkin [19],
which we refer to as Algorithm KV, has an approximation ratio of at most 8(1 – 1/n) for Min-Power Bidirectional Edge-Biconnectivity.
In this paper, we first establish the NP-hardness of Min-Power Bidirectional (Edge-) Biconnectivity. Then we show that Algorithm KR has an approximation ratio of at most 4 for both Min-Power Bidirectional Biconnectivity and Min-Power Unidirectional Biconnectivity,
and Algorithm KV has an approximation ratio of at most 2k for both Min-Power Bidirectional k-Edge Connectivity and Min-Power Unidirectional k-Edge Connectivity. We also propose a new simple constant-approximation algorithm for both Min-Power Bidirectional Biconnectivity
and Min-Power Unidirectional Biconnectivity. This new algorithm applies only to Euclidean instances, but is best suited for
distributed implementation.
A preliminary version of this work appeared in the proceedings of the 2nd International Conference on AD-HOC Network and Wireless
(Adhoc-Now 2003).
Research performed in part while visiting the Max-Plank-Institut fur Informatik.
Gruia Calinescu is an Assistant Professor of Computer Science at the Illinois Institute of Technology since 2000. He held postdoc or visiting
researcher positions at DIMACS, University of Waterloo, and Max-Plank Institut fur Informatik. Gruia has a Diploma from University
of Bucharest and a Ph.D. from Georgia Insitute of Technology. His research interests are in the area of algorithms.
Peng-Jun Wan has joined the Computer Science Department at Illinois Institute of Technology in 1997 and has been an Associate Professor
since 2004. He received his Ph.D. in Computer Science from University of Minnesota in 1997, M.S. in Operations Research and
Control Theory from Chinese Academy of Science in 1993, and B.S. in Applied Mathematics from Tsinghua University in 1990.
His research interests include optical networks and wireless networks. 相似文献
7.
论文提出利用用户提供的个性化信息来随机产生关联大素数,保证了素数选取的随机化、个性化,提高了RSA算法的安全性。 相似文献
8.
P. CRISP T.J. WICKS D. BRUER E.S. SCOTT 《Australian Journal of Grape and Wine Research》2006,12(3):203-211
Grapevine powdery mildew ( Erysiphe necator) affects grape yield and fruit quality worldwide. Managers of conventional vineyards rely mainly on synthetic fungicides and sulfur to control powdery mildew, while in organic vineyards sulfur is the main control agent, often in rotation with canola-based oils, bicarbonates and biological control agents. The efficacy of those materials has not been evaluated critically under field conditions in Australia. Accordingly, a range of materials showing most promise in previous greenhouse trials (Crisp et al. 2006 Australian Journal of Grape and Wine Research 12 , pp. 192–202) were assessed via field trials in commercial vineyards. Applications of either milk or whey (alone, or mixed with a canola oil-based product), as well as applications of potassium bicarbonate (commercial formulation), all reduced the severity of powdery mildew compared with untreated vines. Eight applications of a 1:10 dilution of milk, 45 g/L whey powder or programs comprising rotations of potassium bicarbonate plus oil and whey, applied at 10–14 day intervals, reduced the severity of powdery mildew to levels not significantly different from that on vines sprayed with sulfur (wettable powder, 3–6 g/L). However, the relative control of powdery mildew by the test materials in field trials was dependent on the susceptibility of the grapevine cultivar and the extent of spray coverage achieved. In vineyards where highly susceptible cultivars were planted, and spray coverage was compromised, the resultant control of powdery mildew was reduced; and sometimes to commercially unacceptable levels. 相似文献
9.
Frank te Beest Ad Peeters Kees van Berkel Hans Kerkhoff 《Journal of Electronic Testing》2003,19(4):397-406
Handshake circuits form a special class of asynchronous circuits that has enabled the industrial exploitation of the asynchronous potential such as low power, low electromagnetic emission, and increased cryptographic security. In this paper we present a test solution for handshake circuits that brings synchronous test-quality to asynchronous circuits. We add a synchronous mode of operation to handshake circuits that allows full controllability and observability during test. This technique is demonstrated on some industrial examples and gives over 99% stuck-at fault coverage, using test-pattern generators developed for synchronous circuits. The paper describes how such a full-scan mode can be achieved, including an approach to minimize the number of dummy latches in case latches are used in the data path of the handshake circuit. 相似文献
10.