全文获取类型
收费全文 | 9159篇 |
免费 | 900篇 |
国内免费 | 513篇 |
专业分类
电工技术 | 1076篇 |
技术理论 | 1篇 |
综合类 | 1158篇 |
化学工业 | 291篇 |
金属工艺 | 187篇 |
机械仪表 | 525篇 |
建筑科学 | 942篇 |
矿业工程 | 179篇 |
能源动力 | 223篇 |
轻工业 | 212篇 |
水利工程 | 233篇 |
石油天然气 | 131篇 |
武器工业 | 100篇 |
无线电 | 1584篇 |
一般工业技术 | 334篇 |
冶金工业 | 263篇 |
原子能技术 | 53篇 |
自动化技术 | 3080篇 |
出版年
2024年 | 13篇 |
2023年 | 52篇 |
2022年 | 95篇 |
2021年 | 140篇 |
2020年 | 146篇 |
2019年 | 112篇 |
2018年 | 138篇 |
2017年 | 187篇 |
2016年 | 209篇 |
2015年 | 258篇 |
2014年 | 496篇 |
2013年 | 525篇 |
2012年 | 643篇 |
2011年 | 743篇 |
2010年 | 579篇 |
2009年 | 594篇 |
2008年 | 697篇 |
2007年 | 798篇 |
2006年 | 740篇 |
2005年 | 617篇 |
2004年 | 506篇 |
2003年 | 457篇 |
2002年 | 318篇 |
2001年 | 303篇 |
2000年 | 235篇 |
1999年 | 160篇 |
1998年 | 139篇 |
1997年 | 135篇 |
1996年 | 93篇 |
1995年 | 67篇 |
1994年 | 77篇 |
1993年 | 64篇 |
1992年 | 44篇 |
1991年 | 32篇 |
1990年 | 28篇 |
1989年 | 27篇 |
1988年 | 20篇 |
1987年 | 6篇 |
1986年 | 7篇 |
1985年 | 9篇 |
1984年 | 4篇 |
1983年 | 13篇 |
1982年 | 7篇 |
1981年 | 5篇 |
1979年 | 3篇 |
1976年 | 3篇 |
1971年 | 5篇 |
1964年 | 2篇 |
1957年 | 3篇 |
1955年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 187 毫秒
1.
樊琳 《石油化工安全环保技术》2020,(2):1-3,I0001
分包商安全能力不足以及总包商安全管理薄弱,已成为导致工程建设项目事故多发的重要原因。将分包商的安全管理有效纳入到总承包商的安全管理体系内,做好分包商的安全管理,对提高总承包商的安全绩效、确保施工安全,具有极其重要的现实意义。从总承包商和分包商两个角度,研究分析分包安全管理中存在的问题及原因,得出分包安全管理各种问题的根源主要是经济利益,管理源头在总承包单位,站在总承包商的视角提出加强分包商安全管理的建议。 相似文献
2.
CRAFT is a tweakable block cipher introduced in 2019 that aims to provide strong protection against differential fault analysis. In this paper, we show that CRAFT is vulnerable to side-channel cube attacks. We apply side-channel cube attacks to CRAFT with the Hamming weight leakage assumption. We found that the first half of the secret key can be recovered from the Hamming weight leakage after the first round. Next, using the recovered key bits, we continue our attack to recover the second half of the secret key. We show that the set of equations that are solvable varies depending on the value of the key bits. Our result shows that 99.90% of the key space can be fully recovered within a practical time. 相似文献
3.
Stream ciphers based on linear feedback shift register (LFSR) are suitable for constrained environments, such as satellite communications, radio frequency identification devices tag, sensor networks and Internet of Things, due to its simple hardware structures, high speed encryption and lower power consumption. LFSR, as a cryptographic primitive, has been used to generate a maximum period sequence. Because the switching of the status bits is regular, the power consumption of the LFSR is correlated in a linear way. As a result, the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization vectors under the power attacks. In this paper, a new design of LFSR against power attacks is proposed. The power consumption characteristics of LFSR can be masked by using an additional LFSR and confused by adding a new filter Boolean function and a flip-flop. The design method has been implemented easily by circuits in this new design in comparison with the others. 相似文献
4.
Metamerism phenomenon can be used in illuminant detection to ensure the accuracy of light source. A method based on Long‐, Middle‐, Short‐ wavelength cones(LMS) weighting algorithm to evaluate metamerism degree is proposed. The chromatic relationship between the degree of metamerism mismatch and the light source is studied. Herein, the consistency between the metameric indices (MIs) and CIE1976 L*a*b* color difference ranking is analyzed by SRCC, KRCC, PLCC and RMSE. A statistically sampling method to obtain practical LMS cone fundamentals to evaluate metamerism degree is employed. The analysis results obtained show that the method based on LMS weighting algorithm has good evaluation ability and stability in simulation experiments and statistically sampling experiments, which are in line with visual characteristics of human. Proposed method meets the requirements of selecting metameric pairs used in light source detection. The analysis results have certain guiding significance. 相似文献
5.
Bahram Rashidi 《International Journal of Circuit Theory and Applications》2020,48(8):1227-1243
In this paper, low-cost and two-cycle hardware structures of the PRINCE lightweight block cipher are presented. In the first structure, we proposed an area-constrained structure, and in the second structure, a high-speed implementation of the PRINCE cipher is presented. The substitution box (S-box) and the inverse of S-box (S-box−1) blocks are the most complex blocks in the PRINCE cipher. These blocks are designed by an efficient structure with low critical path delay. In the low-cost structure, the S-boxes and S-boxes−1 are shared between the round computations and the intermediate step of PRINCE cipher. Therefore, the proposed architecture is implemented based on the lowest number of computation resources. The two-cycle implementation of PRINCE cipher is designed by a processing element (PE), which is a general and reconfigurable element. This structure has a regular form with the minimum number of the control signal. Implementation results of the proposed structures in 180-nm CMOS technology and Virtex-4 and Virtex-6 FPGA families are achieved. The proposed structures, based on the results, have better critical path delay and throughput compared with other's related works. 相似文献
6.
7.
8.
文章针对一维长序DFT计算问题,分析其计算结构以及算法的并行性,提出一种阵列协处理结构.并分析这种协处理机结构上DFT计算的组织及具体实施算法步骤和方法,并对这种协处理阵列结构上运行的DFT进行复杂性分析。这对计算DFT专用集成协处理结构芯片开发,提高专用嵌套系统性能非常实用。 相似文献
9.
10.