全文获取类型
收费全文 | 10135篇 |
免费 | 1571篇 |
国内免费 | 1039篇 |
专业分类
电工技术 | 108篇 |
综合类 | 3124篇 |
化学工业 | 259篇 |
金属工艺 | 36篇 |
机械仪表 | 200篇 |
建筑科学 | 7篇 |
矿业工程 | 9篇 |
能源动力 | 45篇 |
轻工业 | 14篇 |
水利工程 | 5篇 |
石油天然气 | 6篇 |
武器工业 | 66篇 |
无线电 | 5840篇 |
一般工业技术 | 280篇 |
冶金工业 | 22篇 |
原子能技术 | 13篇 |
自动化技术 | 2711篇 |
出版年
2024年 | 21篇 |
2023年 | 174篇 |
2022年 | 221篇 |
2021年 | 257篇 |
2020年 | 232篇 |
2019年 | 309篇 |
2018年 | 270篇 |
2017年 | 441篇 |
2016年 | 470篇 |
2015年 | 549篇 |
2014年 | 762篇 |
2013年 | 825篇 |
2012年 | 1083篇 |
2011年 | 1065篇 |
2010年 | 1076篇 |
2009年 | 1190篇 |
2008年 | 819篇 |
2007年 | 606篇 |
2006年 | 472篇 |
2005年 | 408篇 |
2004年 | 367篇 |
2003年 | 207篇 |
2002年 | 181篇 |
2001年 | 155篇 |
2000年 | 164篇 |
1999年 | 61篇 |
1998年 | 39篇 |
1997年 | 61篇 |
1996年 | 60篇 |
1995年 | 37篇 |
1994年 | 40篇 |
1993年 | 49篇 |
1992年 | 30篇 |
1991年 | 6篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 9篇 |
1987年 | 11篇 |
1986年 | 5篇 |
1985年 | 3篇 |
1984年 | 3篇 |
1983年 | 1篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1979年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
Private information retrieval(PIR) is an important privacy protection issue of secure multi-party computation, but the PIR protocols based on classical cryptography are vulnerable because of new technologies,such as quantum computing and cloud computing. The quantum private queries(QPQ) protocols available, however, has a high complexity and is inefficient in the face of large database. This paper, based on the QKD technology which is mature now, proposes a novel QPQ protocol utilizing the key dilution and auxiliary parameter. Only N quits are required to be sent in the quantum channel to generate the raw key, then the straight k bits in the raw key are added bitwise to dilute the raw key, and a final key is consequently obtained to encrypt the database. By flexible adjusting of auxiliary parameters θ and k, privacy is secured and the query success ratio is improved. Feasibility and performance analyses indicate that the protocol has a high success ratio in first-trial query and is easy to implement, and that the communication complexity of O(N) is achieved. 相似文献
2.
For many-objective optimization problems, how to get a set of solutions with good convergence and diversity is a difficult and challenging work. In this paper, a new decomposition based evolutionary algorithm with uniform designs is proposed to achieve the goal. The proposed algorithm adopts the uniform design method to set the weight vectors which are uniformly distributed over the design space, and the size of the weight vectors neither increases nonlinearly with the number of objectives nor considers a formulaic setting. A crossover operator based on the uniform design method is constructed to enhance the search capacity of the proposed algorithm. Moreover, in order to improve the convergence performance of the algorithm, a sub-population strategy is used to optimize each sub-problem. Comparing with some efficient state-of-the-art algorithms, e.g., NSGAII-CE, MOEA/D and HypE, on six benchmark functions, the proposed algorithm is able to find a set of solutions with better diversity and convergence. 相似文献
3.
4.
In this paper, we propose a novel change detection method for synthetic aperture radar images based on unsupervised artificial immune systems. After generating the difference image from the multitemporal images, we take each pixel as an antigen and build an immune model to deal with the antigens. By continuously stimulating the immune model, the antigens are classified into two groups, changed and unchanged. Firstly, the proposed method incorporates the local information in order to restrain the impact of speckle noise. Secondly, the proposed method simulates the immune response process in a fuzzy way to get an accurate result by retaining more image details. We introduce a fuzzy membership of the antigen and then update the antibodies and memory cells according to the membership. Compared with the clustering algorithms we have proposed in our previous works, the new method inherits immunological properties from immune systems and is robust to speckle noise due to the use of local information as well as fuzzy strategy. Experiments on real synthetic aperture radar images show that the proposed method performs well on several kinds of difference images and engenders more robust result than the other compared methods. 相似文献
5.
Multimedia Tools and Applications - In Wyner-Ziv (WZ) video coding, decoder side information (SI) takes a key role in a WZ video codec among other building blocks. In this paper, we review the... 相似文献
6.
7.
基于传统AI-EBG结构,提出了一种小尺寸的增强型电磁带隙结构,实现了从0.5~9.4 GHz的宽频带-40 dB噪声抑制深度,且下截止频率减少到数百MHz,可有效抑制多层PCB板间地弹噪声。文中同时研究了EBG结构在高速电路应用时的信号完整性问题,使用差分信号方案可改善信号完整性。 相似文献
8.
In this work, we focus on the Ge nanoparticles (Ge-np) embedded ZnO multilayered thin films. Effects of reactive and nonreactive growth of ZnO layers on the rapid thermal annealing (RTA) induced formation of Ge-np have been specifically investigated. The samples were deposited by sequential r.f. and d.c. sputtering of ZnO and Ge thin film layers, respectively on Si substrates. As-prepared thin film samples have been exposed to an ex-situ RTA at 600 °C for 60 s under forming gas atmosphere. Structural characterizations have been performed by X-ray Diffraction (XRD), Raman scattering, Secondary Ion Mass Spectroscopy (SIMS), and Scanning Electron Microscopy (SEM) techniques. It has been realized that reactive or nonreactive growth of ZnO layers significantly influences the morphology of the ZnO: Ge samples, most prominently the crystal structure of Ge-np. XRD and Raman analysis have revealed that while reactive growth results in a mixture of diamond cubic (DC) and simple tetragonal (ST12) Ge-np, nonreactive growth leads to the formation of only DC Ge-np upon RTA process. Formation of ST12 Ge-np has been discussed based on structural differences due to reactive and nonreactive growth of ZnO embedding layer. 相似文献
9.
实体造型中的几何约束 总被引:5,自引:0,他引:5
实体造型是一个基于约束的过程,完成从功能约束到几何约束、再到代数约束的转化而得到实体模型。本文讨论了几何约束的层次性及其表示,并且对几何约束同设计意图的关系进行了研究,提出了基于CSG/GCG/B-rep的模型表示。 相似文献
10.
关于布尔函数的二次逼近 总被引:2,自引:0,他引:2
本文首先利用矩阵形式引入了二阶walsh谱的概念并讨论了其性质,其次引入了二次bent函数的概念,同时论述了二次bent函数的密码学意义。 相似文献