全文获取类型
收费全文 | 15000篇 |
免费 | 2528篇 |
国内免费 | 1369篇 |
专业分类
电工技术 | 1156篇 |
技术理论 | 1篇 |
综合类 | 1207篇 |
化学工业 | 1604篇 |
金属工艺 | 1045篇 |
机械仪表 | 753篇 |
建筑科学 | 545篇 |
矿业工程 | 188篇 |
能源动力 | 379篇 |
轻工业 | 270篇 |
水利工程 | 90篇 |
石油天然气 | 260篇 |
武器工业 | 115篇 |
无线电 | 2553篇 |
一般工业技术 | 1484篇 |
冶金工业 | 451篇 |
原子能技术 | 38篇 |
自动化技术 | 6758篇 |
出版年
2024年 | 42篇 |
2023年 | 251篇 |
2022年 | 333篇 |
2021年 | 440篇 |
2020年 | 543篇 |
2019年 | 629篇 |
2018年 | 590篇 |
2017年 | 709篇 |
2016年 | 756篇 |
2015年 | 814篇 |
2014年 | 1082篇 |
2013年 | 967篇 |
2012年 | 1066篇 |
2011年 | 1068篇 |
2010年 | 838篇 |
2009年 | 903篇 |
2008年 | 920篇 |
2007年 | 1066篇 |
2006年 | 925篇 |
2005年 | 858篇 |
2004年 | 674篇 |
2003年 | 675篇 |
2002年 | 646篇 |
2001年 | 610篇 |
2000年 | 418篇 |
1999年 | 306篇 |
1998年 | 220篇 |
1997年 | 152篇 |
1996年 | 115篇 |
1995年 | 66篇 |
1994年 | 50篇 |
1993年 | 38篇 |
1992年 | 33篇 |
1991年 | 10篇 |
1990年 | 17篇 |
1989年 | 12篇 |
1988年 | 17篇 |
1987年 | 3篇 |
1986年 | 5篇 |
1985年 | 6篇 |
1984年 | 4篇 |
1983年 | 5篇 |
1982年 | 5篇 |
1981年 | 4篇 |
1975年 | 3篇 |
1974年 | 1篇 |
1958年 | 1篇 |
1951年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
《International Journal of Hydrogen Energy》2022,47(61):25511-25521
Metal/carbon composite materials are highly promising electrocatalysts for water electrolysis. In this work, three composites of metal cobalt nanoparticles highly dispersed in N-doped carbon materials were facilely constructed by pyrolysis of different phenylenediamine based Schiff base-Co complexes (PDBs). Interestingly, the composites derived from PDBs based on different phenylenediamine exhibited different morphologies. The superior case is that rodlike composite catalyst was derived from o-phenylenediamine based PDBs. The obtained catalyst exhibited remarkable performances for both cathodic hydrogen evolution reaction (HER) and anodic oxygen evolution reaction (OER), as well as overall water electrolysis. Only 172 and 289 mV of overpotentials and 1.57 V of cell voltage were exhibited at 10 mA cm?2 for HER, OER and water splitting in 1.0 M KOH, respectively. The catalyst also displayed robust stability and high Faraday efficiency, and thus are potential high-performance catalyst for commercial water electrolysis. 相似文献
2.
3.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)). 相似文献
4.
5.
针对传统大数据特征加密方法中大数据精度较差、加密耗时较长的问题,提出基于信息熵抑制的大数据特征隐匿性加密方法。分析信息熵抑制相关理论,采用信息熵映射函数对大数据分类,将信息熵抑制过程转化为计算2个文件相似性的过程,并根据余弦相似度公式以及Hamming距离值计算数据相似度,完成数据消冗。在完成数据消冗的基础上,分析分组密码方法和ECC加密方法,结合两种方法得到大数据特征隐匿性加密处理计算公式,实现基于信息熵抑制的大数据特征隐匿性加密。实验研究结果表明,所提方法能够有效去除冗余数据,提升大数据精度,加快数据加密的处理速度,高效完成大数据加密过程。 相似文献
6.
身份基加密(IBE)需要提供一种有效的成员撤销机制,然而,现有可撤销成员的IBE方案存在密钥更新和加密运算量过大的问题,可能使执行该操作的设备成为系统的瓶颈。将完全子树方法和在线离线技术相结合,通过修改指数逆类型IBE的密钥生成和加密算法,提出了一种高效可撤销的身份基在线离线加密方案。方案利用完全子树方法生成更新钥,使得撤销用户无法获得更新钥,进而失去解密能力;利用在线离线技术,将大部分加密运算在离线阶段进行预处理,使得在线阶段仅执行少量简单计算即可生成密文。与相关知名方案相比,该方案不仅提高密钥生成中心的密钥更新的效率,而且极大减少了轻量级设备的在线加密工作量,适合于轻量级设备保护用户隐私信息。 相似文献
7.
无线体域网中传输的是与生命高度相关的敏感数据,身份认证是信息安全保护的第一道防线。现有的基于人体生物信息的身份认证方案存在信息难提取、偶然性大和误差性大的问题,基于传统密码学的认证方案需较大计算资源和能量消耗,并不适用于无线体域网环境。为此,在动态口令和非对称加密机制基础上,提出一种适用于无线体域网的动态口令双向认证轻量协议,并对其进行形式化分析。通过理论证明、SVO逻辑推理及SPIN模型检测得出:该协议满足双向认证,且能够抵御重放攻击、伪装攻击、拒绝服务器攻击和口令离线攻击,具有较高安全性。 相似文献
8.
Highly accurate real‐time localization is of fundamental importance for the safety and efficiency of planetary rovers exploring the surface of Mars. Mars rover operations rely on vision‐based systems to avoid hazards as well as plan safe routes. However, vision‐based systems operate on the assumption that sufficient visual texture is visible in the scene. This poses a challenge for vision‐based navigation on Mars where regions lacking visual texture are prevalent. To overcome this, we make use of the ability of the rover to actively steer the visual sensor to improve fault tolerance and maximize the perception performance. This paper answers the question of where and when to look by presenting a method for predicting the sensor trajectory that maximizes the localization performance of the rover. This is accomplished by an online assessment of possible trajectories using synthetic, future camera views created from previous observations of the scene. The proposed trajectories are quantified and chosen based on the expected localization performance. In this study, we validate the proposed method in field experiments at the Jet Propulsion Laboratory (JPL) Mars Yard. Furthermore, multiple performance metrics are identified and evaluated for reducing the overall runtime of the algorithm. We show how actively steering the perception system increases the localization accuracy compared with traditional fixed‐sensor configurations. 相似文献
9.
Rui-an Huang Yuzhong Guo Zhining Chen Xingshuai Zhang Jianhua Wang Bin Yang 《Ceramics International》2018,44(4):4282-4286
A new three-dimensional (3D) sandwich-like Si/Polyaniline/Graphene nanoarchitecture anode for lithium ion batteries (LIBs) is successfully fabricated through an easy approach. In this nanoarchitecture, the in-situ polymerized electronic conductive polyaniline (PAni) hydrogel, acting as “glue”, agglutinates tightly to both the silicon nanoparticles (SiNPs) and graphene sheets, forming efficient conductive networks with high elastic modulus and high tensile strength. This mechanically robust nanoarchitecture can endure the great volume change of silicon and retain structural stability during Li-ion insertion/extraction. The electrodes consisting of this 3D sandwich-like Si/Polyaniline/Graphene nanoarchitecture reveal excellent electrochemical performance. The progress made in this work provides an easy and scalable route for preparing Si-based anode materials with high performance for advanced LIBs. 相似文献
10.
对访问控制机制中存在的安全性和有效性的问题进行了研究,提出了基于访问树剪枝的属性加密ATP-ABE(Access Tree Pruning Attribute Based Encryption)的访问控制方案。当ATP-ABE算法需要访问它的树型结构访问策略时,通过剪枝处理访问树结构中包含用户ID属性节点的分支,提高了用户所有者DO(Data Owner)管理和控制属性的效率,更加有效地实现了数据共享。还为访问树结构设计了许可访问属性,使DO仍保留共享数据的关键属性,并且能够完全控制它们的共享数据。基于决策双线性密钥交换算法DBDH(Decisional Bilinear Diffie-Hellman)假设分析了ATP-ABE方案的安全性,研究结果表明与两种经典ABE方案比较,ATP-ABE更加有效地减少了算法的系统设置、私钥生成、密文大小、用户属性撤销以及加解密过程中的计算开销,并给出了定量结论。 相似文献