全文获取类型
收费全文 | 2713篇 |
免费 | 472篇 |
国内免费 | 340篇 |
专业分类
电工技术 | 110篇 |
综合类 | 478篇 |
化学工业 | 50篇 |
金属工艺 | 13篇 |
机械仪表 | 67篇 |
建筑科学 | 52篇 |
矿业工程 | 15篇 |
能源动力 | 19篇 |
轻工业 | 23篇 |
水利工程 | 17篇 |
石油天然气 | 12篇 |
武器工业 | 17篇 |
无线电 | 819篇 |
一般工业技术 | 189篇 |
冶金工业 | 15篇 |
原子能技术 | 12篇 |
自动化技术 | 1617篇 |
出版年
2024年 | 6篇 |
2023年 | 37篇 |
2022年 | 86篇 |
2021年 | 79篇 |
2020年 | 97篇 |
2019年 | 80篇 |
2018年 | 89篇 |
2017年 | 94篇 |
2016年 | 106篇 |
2015年 | 113篇 |
2014年 | 163篇 |
2013年 | 223篇 |
2012年 | 242篇 |
2011年 | 263篇 |
2010年 | 183篇 |
2009年 | 221篇 |
2008年 | 190篇 |
2007年 | 218篇 |
2006年 | 196篇 |
2005年 | 141篇 |
2004年 | 112篇 |
2003年 | 106篇 |
2002年 | 76篇 |
2001年 | 65篇 |
2000年 | 61篇 |
1999年 | 52篇 |
1998年 | 26篇 |
1997年 | 34篇 |
1996年 | 26篇 |
1995年 | 26篇 |
1994年 | 18篇 |
1993年 | 15篇 |
1992年 | 12篇 |
1991年 | 8篇 |
1990年 | 10篇 |
1989年 | 15篇 |
1988年 | 12篇 |
1987年 | 2篇 |
1986年 | 4篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 5篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1979年 | 2篇 |
1977年 | 2篇 |
1951年 | 1篇 |
排序方式: 共有3525条查询结果,搜索用时 31 毫秒
1.
2.
本文介绍了无证书签名的基本工作原理,介绍并分析了Hashimoto等人提出的一种无证书签名方案,对该方案进行了Ⅰ类型攻击,证明了该方案是不安全的,不能抵御超Ⅰ类型对手的攻击,对该方案提出了改进措施。 相似文献
3.
Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultra-lightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture. 相似文献
4.
无证书签名具有基于身份密码体制和传统公钥密码体制的优点,可解决复杂的公钥证书管理和密钥托管问题.Wu和Jing提出了一种强不可伪造的无证书签名方案,其安全性不依赖于理想的随机预言机.针对该方案的安全性,提出了两类伪造攻击.分析结果表明,该方案无法实现强不可伪造性,并在"malicious-but-passive"的密钥生成中心攻击下也是不安全的.为了提升该方案的安全性,设计了一个改进的无证书签名方案.在标准模型中证明了改进的方案对于适应性选择消息攻击是强不可伪造的,还能抵抗恶意的密钥生成中心攻击.此外,改进的方案具有较低的计算开销和较短的私钥长度,可应用于区块链、车联网、无线体域网等领域. 相似文献
5.
6.
Bahram Rashidi 《International Journal of Circuit Theory and Applications》2020,48(8):1227-1243
In this paper, low-cost and two-cycle hardware structures of the PRINCE lightweight block cipher are presented. In the first structure, we proposed an area-constrained structure, and in the second structure, a high-speed implementation of the PRINCE cipher is presented. The substitution box (S-box) and the inverse of S-box (S-box−1) blocks are the most complex blocks in the PRINCE cipher. These blocks are designed by an efficient structure with low critical path delay. In the low-cost structure, the S-boxes and S-boxes−1 are shared between the round computations and the intermediate step of PRINCE cipher. Therefore, the proposed architecture is implemented based on the lowest number of computation resources. The two-cycle implementation of PRINCE cipher is designed by a processing element (PE), which is a general and reconfigurable element. This structure has a regular form with the minimum number of the control signal. Implementation results of the proposed structures in 180-nm CMOS technology and Virtex-4 and Virtex-6 FPGA families are achieved. The proposed structures, based on the results, have better critical path delay and throughput compared with other's related works. 相似文献
7.
8.
9.
ABSTRACTMultiple-material products are characterised by a complex property profile which is achieved by combining the particular advantages of at least two different materials. Bimetal casting is an energy- and material-efficient technology for the production of multi-metallic objects. This paper describes the development of a semi-continuous casting process for the formation of a rotationally symmetric bimetal with a cohesive bonding character at the interface of a copper–tin alloy (CuSn6) and pure copper (Cu99.5). Initial experiments are conducted by static casting to evaluate the thermal process window. Based on the results of the initial experiments, a vertical semi-continuous compound casting process is developed. A stable cohesive bond between the joining partners is accomplished by forming a solid solution at the interface.This paper is part of a Thematic Issue on Copper and its Alloys. 相似文献
10.
Xianda XIE Shuting WANG Ming YE Zhaohui XIA Wei ZHAO Ning JIANG Manman XU 《Frontiers of Mechanical Engineering》2020,15(1):100
We present an energy penalization method for isogeometric topology optimization using moving morphable components (ITO–MMC), propose an ITO–MMC with an additional bilateral or periodic symmetric constraint for symmetric structures, and then extend the proposed energy penalization method to an ITO–MMC with a symmetric constraint. The energy penalization method can solve the problems of numerical instability and convergence for the ITO–MMC and the ITO–MMC subjected to the structural symmetric constraint with asymmetric loads. Topology optimization problems of asymmetric, bilateral symmetric, and periodic symmetric structures are discussed to validate the effectiveness of the proposed energy penalization approach. Compared with the conventional ITO–MMC, the energy penalization method for the ITO–MMC can improve the convergence rate from 18.6% to 44.5% for the optimization of the asymmetric structure. For the ITO–MMC under a bilateral symmetric constraint, the proposed method can reduce the objective value by 5.6% and obtain a final optimized topology that has a clear boundary with decreased iterations. For the ITO–MMC under a periodic symmetric constraint, the proposed energy penalization method can dramatically reduce the number of iterations and obtain a speedup of more than 2. 相似文献