首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11976篇
  免费   1907篇
  国内免费   1290篇
电工技术   819篇
综合类   1740篇
化学工业   501篇
金属工艺   187篇
机械仪表   627篇
建筑科学   443篇
矿业工程   144篇
能源动力   167篇
轻工业   225篇
水利工程   131篇
石油天然气   116篇
武器工业   95篇
无线电   2329篇
一般工业技术   1471篇
冶金工业   223篇
原子能技术   53篇
自动化技术   5902篇
  2024年   37篇
  2023年   228篇
  2022年   276篇
  2021年   388篇
  2020年   481篇
  2019年   443篇
  2018年   483篇
  2017年   537篇
  2016年   592篇
  2015年   557篇
  2014年   836篇
  2013年   857篇
  2012年   957篇
  2011年   959篇
  2010年   701篇
  2009年   820篇
  2008年   803篇
  2007年   850篇
  2006年   681篇
  2005年   578篇
  2004年   476篇
  2003年   495篇
  2002年   349篇
  2001年   298篇
  2000年   255篇
  1999年   188篇
  1998年   162篇
  1997年   151篇
  1996年   119篇
  1995年   86篇
  1994年   91篇
  1993年   64篇
  1992年   67篇
  1991年   44篇
  1990年   44篇
  1989年   30篇
  1988年   30篇
  1987年   14篇
  1986年   15篇
  1985年   14篇
  1984年   12篇
  1983年   8篇
  1982年   15篇
  1981年   17篇
  1980年   8篇
  1979年   6篇
  1978年   7篇
  1966年   5篇
  1964年   13篇
  1963年   6篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)).  相似文献   
2.
Spinels with the generic chemical formula AB2O4 have potential applications in nuclear energy and batteries. In both cases, their functionality is related to mass transport through the crystal. Here, using long-time atomistic simulations, we examine the impact of the cation structure on interstitial transport in two spinel chemistries, inverse MgGa2O4 and double MgAlGaO4. We emphasize two aspects of the transport properties: the unit mechanisms that are described by individual barriers, for which we introduce pole-figure-like plots, and the aggregate behavior of those unit mechanisms. Compared to previous work on normal spinels, we find that inversion significantly reduces the rate of interstitial transport in these structures and has an impact on the stability of defects as they move through the lattice. In particular, B cation interstitials are found to be kinetically stable only in the inverse MgGa2O4. These results provide new insight into relationship between structure, chemistry, and transport in spinels.  相似文献   
3.
The materials processing history has a great influence on their properties and finally determines their application effect. In this paper, the ferroelectric, polarization-switching current, and strain properties of Mn-doped 0.75Pb(Mg1/3Nb2/3)O3-0.25PbTiO3 ceramics were studied in fresh state, aged state, and poled state, respectively. Compared with the symmetric polarization-electric-field (P-E) hysteresis loops, current-density-electric-field (J-E) curves, and bipolar electric-field-induced strain (S-E) curves in fresh state samples, asymmetric P-E loops, J-E curves, and bipolar S-E curves were obtained in poled state samples. Well-aged-state samples exhibit double hysteresis P-E loop, four peaks J-E curves, and symmetric S-E curves without negative strain. The symmetry-conforming short-range order (SC-SRO) principle of point defects and internal electric field Ei is employed to clarify the different phenomenon of three states. Results indicated that randomly oriented defect polarization PD in aged samples can reverse the spontaneous polarization PS back and result in the double hysteresis P-E loop and four peaks J-E curves. The oriented PD and resulting Ei in poled-state samples will lead to the asymmetric loops and strain memory effect.  相似文献   
4.
目的 从秩序与非秩序理论出发,研究文创产品卡通形象的设计方法.方法 对秩序与非秩序理论的视觉机制和创制理论进行梳理,结合实例,阐述了其与文创产品卡通形象设计之间的联系,分析文创产品卡通形象中的秩序与非秩序的表现形式,提出基于秩序与非秩序理论文创产品卡通形象设计的主要原则,归纳出一套基于秩序与非秩序理论的文创产品卡通形象设计流程与方法,指导设计实践,并验证这些理论方法在设计实践中有效性与可行性.结论 通过对秩序与非秩序理论的研究,文创产品卡通形象设计时应注意提高辨识度、亲和力和便于衍生设计的原则.探索基于秩序与非秩序理论的设计流程与方法,按照界定主题、主体形象设计、主体形象拓展、衍生品应用四个环节开展整体方案设计,为文创产品卡通形象设计提供新的思路与方法.  相似文献   
5.
Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra-lightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.  相似文献   
6.
A multiphase dc‐dc converter is effective for miniaturization and achieving high‐power density in a switching power supply. However, its mathematical modeling becomes complex as the phase number of the circuit increases. This study proposes a new modeling method to derive a reduced‐order method in a simple manner. The frequency characteristics of the reduced‐order model are fit to those of the original mathematical model of the multiphase dc‐dc converter. Therefore, the efficacy of the proposed method is validated.  相似文献   
7.
With the evolution of location-based services (LBS), a new type of LBS has already gain a lot of attention and implementation, we name this kind of LBS as the Device-Dependent LBS (DLBS). In DLBS, the service provider (SP) will not only send the information according to the user’s location, more significant, he also provides a service device which will be carried by the user. DLBS has been successfully practised in some of the large cities around the world, for example, the shared bicycle in Beijing and London. In this paper, we, for the first time, blow the whistle of the new location privacy challenges caused by DLBS, since the service device is enabled to perform the localization without the permission of the user. To conquer these threats, we design a service architecture along with a credit system between DLBS provider and the user. The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy, DLBS provider has to sacrifice their revenue in order to gain extra location information of their device. We make the simulation of our proposed scheme and the result convince its effectiveness.  相似文献   
8.
In this paper numerical approximation of history-dependent hemivariational inequalities with constraint is considered, and corresponding Céa’s type inequality is derived for error estimate. For a viscoelastic contact problem with normal penetration, an optimal order error estimate is obtained for the linear element method. A numerical experiment for the contact problem is reported which provides numerical evidence of the convergence order predicted by the theoretical analysis.  相似文献   
9.
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号