全文获取类型
收费全文 | 4036篇 |
免费 | 200篇 |
国内免费 | 3篇 |
专业分类
电工技术 | 30篇 |
综合类 | 2篇 |
化学工业 | 1016篇 |
金属工艺 | 88篇 |
机械仪表 | 89篇 |
建筑科学 | 171篇 |
矿业工程 | 13篇 |
能源动力 | 139篇 |
轻工业 | 342篇 |
水利工程 | 36篇 |
石油天然气 | 8篇 |
无线电 | 292篇 |
一般工业技术 | 808篇 |
冶金工业 | 529篇 |
原子能技术 | 20篇 |
自动化技术 | 656篇 |
出版年
2024年 | 12篇 |
2023年 | 62篇 |
2022年 | 133篇 |
2021年 | 192篇 |
2020年 | 100篇 |
2019年 | 97篇 |
2018年 | 140篇 |
2017年 | 128篇 |
2016年 | 133篇 |
2015年 | 114篇 |
2014年 | 177篇 |
2013年 | 283篇 |
2012年 | 251篇 |
2011年 | 321篇 |
2010年 | 226篇 |
2009年 | 175篇 |
2008年 | 198篇 |
2007年 | 202篇 |
2006年 | 134篇 |
2005年 | 123篇 |
2004年 | 114篇 |
2003年 | 104篇 |
2002年 | 83篇 |
2001年 | 52篇 |
2000年 | 41篇 |
1999年 | 41篇 |
1998年 | 76篇 |
1997年 | 70篇 |
1996年 | 42篇 |
1995年 | 40篇 |
1994年 | 28篇 |
1993年 | 29篇 |
1992年 | 24篇 |
1991年 | 18篇 |
1990年 | 29篇 |
1989年 | 22篇 |
1988年 | 15篇 |
1987年 | 12篇 |
1986年 | 11篇 |
1985年 | 20篇 |
1984年 | 9篇 |
1983年 | 14篇 |
1982年 | 10篇 |
1981年 | 14篇 |
1980年 | 11篇 |
1979年 | 10篇 |
1977年 | 9篇 |
1976年 | 21篇 |
1975年 | 8篇 |
1974年 | 9篇 |
排序方式: 共有4239条查询结果,搜索用时 11 毫秒
31.
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash ( i.e., round) functions are modeled as random oracles, meets indistinguishability under chosen-plaintext attack (IND-CPA) in the standard model based on simple, non-interactive, and non-interdependent assumptions on RSA and the hash functions. To prove this, we first give a result on a more general notion called “padding-based” encryption, saying that such a scheme is IND-CPA if (1) its underlying padding transform satisfies a “fooling" condition against small-range distinguishers on a class of high-entropy input distributions, and (2) its trapdoor permutation is sufficiently lossy as defined by Peikert and Waters (STOC 2008). We then show that the first round of OAEP satisfies condition (1) if its hash function is t-wise independent for t roughly proportional to the allowed message length. We clarify that this result requires the hash function to be keyed, and for its key to be included in the public key of RSA-OAEP. We also show that RSA satisfies condition (2) under the \(\Phi \)-Hiding Assumption of Cachin et al. (Eurocrypt 1999). This is the first positive result about the instantiability of RSA-OAEP. In particular, it increases confidence that chosen-plaintext attacks are unlikely to be found against the scheme. In contrast, RSA-OAEP’s predecessor in PKCS #1 v1.5 was shown to be vulnerable to such attacks by Coron et al. (Eurocrypt 2000). 相似文献
32.
Adam S. Hayes 《Telematics and Informatics》2017,34(7):1308-1321
This paper aims to identify the likely determinants for cryptocurrency value formation, including for that of bitcoin. Due to Bitcoin’s growing popular appeal and merchant acceptance, it has become increasingly important to try to understand the factors that influence its value formation. Presently, the value of all bitcoins in existence represent approximately $7 billion, and more than $60 million of notional value changes hands each day. Having grown rapidly over the past few years, there is now a developing but vibrant marketplace for bitcoin, and a recognition of digital currencies as an emerging asset class. Not only is there a listed and over-the-counter market for bitcoin and other digital currencies, but also an emergent derivatives market. As such, the ability to value bitcoin and related cryptocurrencies is becoming critical to its establishment as a legitimate financial asset.Using cross-sectional empirical data examining 66 of the most widely used cryptocurrencies, a regression model was estimated that points to three main drivers of cryptocurrency value: the level of competition in the network of producers, the rate of unit production, and the difficulty of algorithm used to “mine” for the cryptocurrency. These amount to relative differences in the cost of production of one digital currency over another at the margin, pointing to differences in relative cost of production – electricity goes in, cryptocurrency comes out. Using that as a starting point, a no-arbitrage situation is established for Bitcoin-like cryptocurrencies followed by the formalization of a cost of production model to determine the fair value of a bitcoin. 相似文献
33.
Ari Paasio Adam Dawidziuk Kari Halonen Veikko Porra 《Analog Integrated Circuits and Signal Processing》1997,12(1):59-70
The paper presents a Cellular Neural Network implementation based on a high gain sigmoid operation. The required simplifications to the original theory are described that allow the use of high gain. With this design black and white images can be processed. The basic building blocks in a cell are described. A 16×16 cells network has been designed and processed with 1.2 micron CMOS technology. Measurement results which show the operation of the network are presented. 相似文献
34.
Dynamic resource allocation in OFDM systems: an overview of cross-layer optimization principles and techniques 总被引:2,自引:0,他引:2
Mathias Bohge James Gross Adam Wolisz Michael Meyer 《IEEE network》2007,21(1):53-59
Recently, a lot of research effort has been spent on cross-layer system design. It has been shown that cross-layer mechanisms (i.e., policies) potentially provide significant performance gains for various systems. In this article we review several aspects of cross-layer system optimization regarding wireless OFDM systems. We discuss basic optimization models and present selected heuristic approaches realizing cross-layer policies by means of dynamic resource allocation. Two specific areas are treated separately: models and dynamic approaches for single transmitter/receiver pairs (i.e., a point-to-point communication scenario) as well as models and approaches for point-to-multipoint communication scenarios (e.g., the downlink of a wireless cell). This article provides basic knowledge in order to investigate future OFDM cross-layer-optimization issues 相似文献
35.
M. Mikulics Xuemei Zheng R. Adam R. Sobolewski P. Kordos 《Photonics Technology Letters, IEEE》2003,15(4):528-530
In this letter, we report high-speed photoconductive switches based on low-temperature (LT) grown GaAs on Si substrate. Epitaxially grown LT GaAs was separated from its substrate, transferred on an SiO/sub 2/-coated Si substrate and integrated with a transmission line. The 10/spl times/20-/spl mu/m/sup 2/ switches exhibit high breakdown voltage and low dark currents (<10/sup -7/ A at 100 V). The photoresponse at 810 nm shows electrical transients with /spl sim/0.55-ps full-width at half-maximum and /spl sim/0.37-ps decay time, both independent on the bias voltage up to the tested limit of 120 V. The photoresponse amplitude increases up to /spl sim/0.7 V with increased bias and the signal bandwith is /spl sim/500 GHz. The freestanding LT GaAs switches are best suited for ultrafast optoelectronic testing since they can be placed at virtually any point on the test circuit. 相似文献
36.
Adam Cooman Gerd Vandersteen Yves Rolain 《Analog Integrated Circuits and Signal Processing》2014,78(1):153-163
Although non-linear distortion is an important specification for op-amps, it is only determined at the end of the design in classical design flows, leaving the designers without a clue about its origin. Recently, the Best Linear Approximation (BLA) has been introduced to approximate non-linear systems. It allows to describe the behaviour of a non-linear system as a linear Frequency Response Function combined with a coloured noise source to describe respectively the wanted linear response and the distortion. To determine the dominant source of non-linear distortion, we combine the BLA with a classical noise analysis in this paper. The paper explains the BLA-based noise analysis and shows the result of this simulation-based analysis when applied to various op-amp architectures. The analysis pinpoints the non-linear hot-spots in an efficient way, without the use of special simulations, manual analytical calculations or modified transistor models. 相似文献
37.
Adam Eades 《电子与电脑》2008,(11)
现在全球各地已逐渐淘汰传统的白炽灯泡.不仅政府机构,连民间使用者也要求更高效率的照明解决方案.精致型荧光灯泡(CFL)并非解决此项问题的最佳方案. 相似文献
38.
Almawgani A. H. M. Alhawari Adam R. H. Hindi Ayman Taher Al-Arashi Waled Hussein Al-Ashwal A. Y. 《Multidimensional Systems and Signal Processing》2022,33(2):561-578
Multidimensional Systems and Signal Processing - Digital images are commonly used in steganography due to the popularity of digital image transfer and exchange through the Internet. However, the... 相似文献
39.
The problem of reconstructing the reflectivity of a biological tissue is examined by means of blind deconvolution of the echo ultrasound signals. It is shown that the quality of the reconstruction procedure can be significantly improved when initially the ultrasonic pulse is accurately estimated. A new approach to the estimation of the ultrasound pulse echo sequences is proposed, using local polynomial approximation, which is closely related to the wavelet transform theory. This approach can be viewed as a modification of homomorphic deconvolution, by using bases different from the Fourier basis of the space of square-integrable functions L2. The bases used here are the orthogonal compactly supported wavelet bases. It is shown that the locality of the estimate can be extremely useful in number of cases of practical interest, resulting in estimates with smaller root-mean squared (rms) errors, as compared with estimates employing the Fourier basis. This approach is applied to ultrasound signals, for estimation of the ultrasound pulse log-spectrum from the log-spectrum of radio-frequency (RF) sequences. It is shown, conceptually and experimentally, that the proposed approach can provide robust and rapidly computed estimates of the ultrasound pulses from the RF-sequences, as obtained in the process of tissue scanning. The pulse phase was recovered using the minimum-phase assumption, which was found to hold for the transducers in use. The obtained pulse estimates are used for the deconvolution of the RF-sequences, which result in stable estimates of the tissue reflectivity function, fairly independent of the properties of the imaging system. Simulated data, data obtained from several phantoms and from in vitro experiments have been processed and the results seem to be quite promising. 相似文献
40.
In grid systems, users compete for different types of resources such that they may execute their applications. Traditional grid systems are formed of organisations that join together for the purpose of collaborative projects. Resources of each of the participating organisation are pooled such that members of individual organisations may access the shared infrastructure. In general, each participant is both a provider and a consumer of resources. Whilst such systems address large organisations, in this paper we address democratic grid systems to satisfy needs of small organisations and even individuals, where on-demand grids may be formed by drawing idling resources available on the Internet. Whilst traditional grid systems resort to allocations that satisfy system specific objectives such as maximization of the resource utilisation, market mechanisms try to obtain allocations that are efficient economically. Economic mechanisms permit to achieve equilibrium between supply and demand and furthermore provide incentives for providers. Combinatorial auction has been argued as an effective mechanism to address the problem of resource allocation within grid systems. Auctions within which multiple types of resources in varying quantities may be traded eliminate the exposure problem by addressing co-allocation. In this paper, we describe a combinatorial exchange where multiple providers and multiple consumers may participate. We describe the winner determination problem that incorporates the time dimension, i.e. resource bundles may be requested for different time ranges, and describe a set of heuristics that have been designed to be fast. We show that these achieve a high level of efficiency as compared to exact solutions. The second part focusses on the pricing problem. The objective is to compute prices that represent the state of the market and bring trustworthy feedback to participants. Drawing on the approach taken by Kwasnica et al. (Manage Sci 51(3):419–434, 2005), we propose a pricing model that computes per-item pricing. Per-item pricing allows users to deduce the price of bundles that they require by linear summation. Furthermore, we propose a model that computes prices as a function of time, thus permitting users, in particular consumers to adjust their demand trading off price and time of execution. 相似文献