全文获取类型
收费全文 | 5065篇 |
免费 | 761篇 |
国内免费 | 614篇 |
专业分类
电工技术 | 139篇 |
技术理论 | 2篇 |
综合类 | 626篇 |
化学工业 | 51篇 |
金属工艺 | 2篇 |
机械仪表 | 95篇 |
建筑科学 | 195篇 |
矿业工程 | 19篇 |
能源动力 | 11篇 |
轻工业 | 197篇 |
水利工程 | 13篇 |
石油天然气 | 12篇 |
武器工业 | 16篇 |
无线电 | 1274篇 |
一般工业技术 | 195篇 |
冶金工业 | 454篇 |
原子能技术 | 6篇 |
自动化技术 | 3133篇 |
出版年
2024年 | 8篇 |
2023年 | 67篇 |
2022年 | 121篇 |
2021年 | 120篇 |
2020年 | 167篇 |
2019年 | 134篇 |
2018年 | 140篇 |
2017年 | 144篇 |
2016年 | 181篇 |
2015年 | 211篇 |
2014年 | 337篇 |
2013年 | 353篇 |
2012年 | 443篇 |
2011年 | 477篇 |
2010年 | 435篇 |
2009年 | 428篇 |
2008年 | 492篇 |
2007年 | 451篇 |
2006年 | 340篇 |
2005年 | 328篇 |
2004年 | 255篇 |
2003年 | 215篇 |
2002年 | 149篇 |
2001年 | 98篇 |
2000年 | 72篇 |
1999年 | 59篇 |
1998年 | 43篇 |
1997年 | 34篇 |
1996年 | 27篇 |
1995年 | 22篇 |
1994年 | 12篇 |
1993年 | 6篇 |
1992年 | 11篇 |
1991年 | 8篇 |
1990年 | 2篇 |
1989年 | 3篇 |
1988年 | 6篇 |
1987年 | 4篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1984年 | 6篇 |
1983年 | 2篇 |
1982年 | 7篇 |
1981年 | 6篇 |
1967年 | 1篇 |
1966年 | 1篇 |
1962年 | 1篇 |
1961年 | 1篇 |
1960年 | 1篇 |
1959年 | 2篇 |
排序方式: 共有6440条查询结果,搜索用时 15 毫秒
1.
Recent generative adversarial networks (GANs) have yielded remarkable performance in face image synthesis. GAN inversion embeds an image into the latent space of a pretrained generator, enabling it to be used for real face manipulation. However, current inversion approaches for real faces suffer the dilemma of initialization collapse and identity loss. In this paper, we propose a hierarchical GAN inversion for real faces with identity preservation based on mutual information maximization. We first use a facial domain guaranteed initialization to avoid the initialization collapse. Furthermore, we prove that maximizing the mutual information between inverted faces and their identities is equivalent to minimizing the distance between identity features from inverted and original faces. Optimization for real face inversion with identity preservation is implemented on this mutual information-maximizing constraint. Extensive experimental results show that our approach outperforms state-of-the-art solutions for inverting and editing real faces, particularly in terms of face identity preservation. 相似文献
2.
《Ceramics International》2022,48(3):3495-3503
The photochromic phenomenon has been recently used as a fascinating technology in the development of highly efficient anti-counterfeiting materials with dual-mode security encoding of concurrent photochromism and fluorescence emission. Herein, we successfully developed lanthanide-doped aluminate nanoparticles (LAN)/polystyrene (PS) electrospun nanofibers as novel secure authentication films. Different ratios of lanthanide-doped aluminate nanoparticles were mixed with polystyrene-based copolymer solutions in N,N-dimethylformamide (DMF) and subjected to electrospinning to afford photochromic and fluorescent nanofibers. The generated electrospun nanofibers demonstrated a narrow diameter distribution, a smooth surface and well-defined morphological properties. The produced smart nanofibers were applied onto cellulose paper sheets to demonstrate a dual-mode secure strategy with a simple and rapid authentication. LAN was prepared in the nano-scale for better dispersion in PS, which guarantee the formation of transparent films. LAN was studied by transmission electron microscope (TEM) and X-ray diffraction (XRD). LAN displayed diameters of 5–12 nm. On the other hand, the fibrous diameters of LAN-PS samples were studied by scanning electron microscopy (SEM) to indicate diameters of 200–300 nm. The induced security marking was invisible (363 nm) under visible daylight turning into visible green (520 nm) color under ultraviolet irradiation demonstrating a bathochromic shift. Both excitation and emission displayed high intensities. The security marking was fully reversible under ultraviolet/visible irradiation cycles without fatigue. Those advantageous properties could be attributed to the high surface area of the chromogenic nanofibrous films to result in high absorption of light leading to strong optical dual-mode photo-responsiveness. The generated LAN-PS hybrid films showed improved hydrophobic properties with increasing LAN. The nanofibers showed transparency, stretchability and flexibility. The present strategy can be reported as an efficient technology to develop many anti-counterfeiting products toward a better market with social and economic values to avoid fake products. 相似文献
3.
无线体域网中传输的是与生命高度相关的敏感数据,身份认证是信息安全保护的第一道防线。现有的基于人体生物信息的身份认证方案存在信息难提取、偶然性大和误差性大的问题,基于传统密码学的认证方案需较大计算资源和能量消耗,并不适用于无线体域网环境。为此,在动态口令和非对称加密机制基础上,提出一种适用于无线体域网的动态口令双向认证轻量协议,并对其进行形式化分析。通过理论证明、SVO逻辑推理及SPIN模型检测得出:该协议满足双向认证,且能够抵御重放攻击、伪装攻击、拒绝服务器攻击和口令离线攻击,具有较高安全性。 相似文献
4.
采用“区块链技术+不对称加密+生物识别+身份认证”应用模式,依托智能手机客户端设计与开发一套铁路旅客身份认证系统.基于Ethereum开发平台,应用truffle开发框架,实现铁路旅客身份认证系统智能合约的编写与部署.系统针对传统铁路身份认证模式的不足,将旅客身份数据分布式存储,弱化中心化服务器的压力,提升旅客身份数据的安全性和鲁棒性;进行生物信息认证确保旅客对身份信息的所有权;利用非对称加密技术在保护旅客隐私、实现实名制的前提下增强数据的透明性.基于区块链应用模式的铁路旅客身份认证系统能够让用户身份实现本地存储、信息摘要链上校验,实现铁路旅客身份信息数据访问的细粒度控制,保障铁路旅客身份信息安全,提升铁路旅客的乘车体验. 相似文献
5.
Muhammad Zafar Mushtaq Ahmad Shazia Sultana Lubna Adnan Amin Hafiz Muhammad Naseer Zafar Jamal Sheikh Zain Ul Abidin Sajid Mehmood Amir Shehzad Khan 《Microscopy research and technique》2019,82(5):550-557
The use of quality control tool for authentication of Jadwar (Delphinium denudatum Wall. ex Hook.f. & Thomson), a folk herbal drug used for the treatment of different ailments, was studied. People face problems of adulteration for this drug at global, regional, national and local levels. Two different plant species are commercially marketed in the Indo‐Pak Subcontinent under the same trade name of Jadwar. One is D. denudatum Wall. ex Hook.f. & Thomson and the other is Aconitum heterophyllum Wall. ex Royle. To focus on this problem, a marketable available drug sample of Jadwar was authenticated by using basic microscopy tools (LM) and advanced chemo‐taxonomic markers. Authentication, quality and standardization of this drug was achieved using morphology, organoleptography, UV and IR analyses, scanning electron microscopy of pollen and anatomical investigations. The techniques used for authentication marked the clear difference between the studied plants. Microscopic studies, chemotaxonomic investigation and other techniques used in this project provided the basis for the authentication of this species. 相似文献
6.
安全和效率是影响无证书认证组密钥协商协议能否在Ad Hoc网络中得到实际应用的两个关键因素。针对这两个关键因素,以提高Ad Hoc网络安全组通信的安全性和效率为目标,提出一个无证书认证组密钥协商协议,基于椭圆曲线密码体制(ECC)点乘运算实现无配对的无证书认证组密钥协商和身份认证;并使用Huffman密钥树优化通信轮数,以降低计算量和通信量,提高组密钥协商效率。安全分析和性能分析表明,与现有基于无证书的组密钥协商协议相比,所提方案在组密钥协商时具有较高的效率和安全性,可以满足资源受限条件下组密钥建立以及组成员变动带来的密钥更新问题。 相似文献
7.
The use of a secure and robust digital identification system that is capable of protecting privacy is an essential, reliable and user-friendly element for a strong cyber resilience strategy and is a source of new business opportunities and applications for banks, private sector with a return on their investment.The march towards Digital Identity is well underway therefore, focus should be on both adoption and adaption of the new structures and regulations. These are needed to govern the associated services and transactions as well as establishing laws that enforce penalties for violations.There is no doubt then that more and more entities and institutions would move to the cloud. Security challenges affecting the cloud may not be new but the mode of addressing them would be different. The authors develop a Data Colouring technique for securing data processed or stored on both cloud and non-cloud platforms. The technique combines Public Key Infrastructure (PKI), concatenated fingerprints and digital watermarking. Using this technique, data can be secured at creation or during storage and remains secure during processing. 相似文献
8.
针对软件定义网络中,控制器无法保证下发的网络策略能够在转发设备上得到正确执行的安全问题,提出一种新的转发路径监控安全方案。首先以控制器的全局视图能力为基础,设计了基于OpenFlow协议的路径凭据交互处理机制;然后采用哈希链和消息验证码作为生成和处理转发路径凭据信息的关键技术;最后在此基础上,对Ryu控制器和Open vSwitch开源交换机进行深度优化,添加相应处理流程,建立轻量级的路径安全机制。测试结果表明,该机制能够有效保证数据转发路径安全,吞吐量消耗比SDN数据层可信转发方案(SDNsec)降低20%以上,更适用于路径复杂的网络环境,但时延和CPU使用率的浮动超过15%,有待进一步优化。 相似文献
9.
10.