收费全文 | 5625篇 |
免费 | 507篇 |
国内免费 | 64篇 |
电工技术 | 63篇 |
综合类 | 22篇 |
化学工业 | 1298篇 |
金属工艺 | 85篇 |
机械仪表 | 279篇 |
建筑科学 | 109篇 |
矿业工程 | 8篇 |
能源动力 | 343篇 |
轻工业 | 732篇 |
水利工程 | 67篇 |
石油天然气 | 31篇 |
武器工业 | 1篇 |
无线电 | 728篇 |
一般工业技术 | 1263篇 |
冶金工业 | 106篇 |
原子能技术 | 59篇 |
自动化技术 | 1002篇 |
2024年 | 31篇 |
2023年 | 204篇 |
2022年 | 487篇 |
2021年 | 772篇 |
2020年 | 464篇 |
2019年 | 528篇 |
2018年 | 482篇 |
2017年 | 411篇 |
2016年 | 403篇 |
2015年 | 246篇 |
2014年 | 304篇 |
2013年 | 406篇 |
2012年 | 252篇 |
2011年 | 301篇 |
2010年 | 173篇 |
2009年 | 154篇 |
2008年 | 99篇 |
2007年 | 96篇 |
2006年 | 44篇 |
2005年 | 35篇 |
2004年 | 41篇 |
2003年 | 30篇 |
2002年 | 20篇 |
2001年 | 8篇 |
2000年 | 11篇 |
1999年 | 16篇 |
1998年 | 24篇 |
1997年 | 13篇 |
1996年 | 12篇 |
1995年 | 19篇 |
1994年 | 12篇 |
1993年 | 14篇 |
1992年 | 10篇 |
1991年 | 11篇 |
1990年 | 3篇 |
1989年 | 8篇 |
1988年 | 9篇 |
1987年 | 5篇 |
1986年 | 2篇 |
1985年 | 6篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 4篇 |
1981年 | 5篇 |
1980年 | 2篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 3篇 |
1976年 | 1篇 |
1961年 | 1篇 |
Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the visual data i.e. handwritten notes, photos, printed text, etc. to encrypt in such a way that their decryption can be done through the human visual framework. Hence, no computational assistance is required for the decryption of the secret images they can be seen through naked eye. In this paper, a novel enhanced halftoning-based VC scheme is proposed that works for both binary and color images. Fake share is generated by the combination of random black and white pixels. The proposed algorithm consists of 3 stages i.e., detection, encryption, and decryption. Halftoning, Encryption, (2, 2) visual cryptography and the novel idea of fake share, make it even more secure and improved. As a result, it facilitates the original restored image to the authentic user, however, the one who enters the wrong password gets the combination of fake share with any real share. Both colored and black images can be processed with minimal capacity using the proposed scheme.
相似文献Software product prone to continuous evolution due to increase in the use of technology. Therefore, more stakeholders are involved in software evolution increases the cost and complexity. This required optimization of resources and cost to handle evolution with Global Software Development (GSD) to utilize time zones efficiently. The significance challenge of GSD reports: time zone difference, geographical location, communication delays, knowledge sharing, control among stakeholders and development team. Because of these challenges, the requirements for development in GSD environment are also challenge as compared to on site development. Different requirement engineering methods have been used to improve the requirements analysis to deal with ambiguities and inconsistency in large set of requirements. The customization and tailoring of requirements according to changing project’s situations required to improve project development with reusing existing agile methods during requirement engineering phase. Moreover, complex information systems where heterogeneity is inevitable that implies the involvement of divergent stakeholders and necessitate a comprehensive framework to capture multidimensional viewpoints and fulfill aforementioned issues. Therefore, a situational multi-dimensional agile requirement engineering method has been proposed to support team and stakeholders’ viewpoints. The schema of the proposed method is based on challenges recognized by performing Literature Review. Then proposed method has been evaluated via experimental approach and statistical analysis conducted to validated reliability of data collected. This result is significant approved both practically and statistically that the proposed approach ease to use, implement, trained and increased productivity and performance. Hence, the experimental study for the evaluation of the proposed approach results concluded that, proposed approach is the important multimedia tool for supporting organization and distributed development team for information sharing, collaboration, product development.
相似文献Automatic key concept identification from text is the main challenging task in information extraction, information retrieval, digital libraries, ontology learning, and text analysis. The main difficulty lies in the issues with the text data itself, such as noise in text, diversity, scale of data, context dependency and word sense ambiguity. To cope with this challenge, numerous supervised and unsupervised approaches have been devised. The existing topical clustering-based approaches for keyphrase extraction are domain dependent and overlooks semantic similarity between candidate features while extracting the topical phrases. In this paper, a semantic based unsupervised approach (KP-Rank) is proposed for keyphrase extraction. In the proposed approach, we exploited Latent Semantic Analysis (LSA) and clustering techniques and a novel frequency-based algorithm for candidate ranking is introduced which considers locality-based sentence, paragraph and section frequencies. To evaluate the performance of the proposed method, three benchmark datasets (i.e. Inspec, 500N-KPCrowed and SemEval-2010) from different domains are used. The experimental results show that overall, the KP-Rank achieved significant improvements over the existing approaches on the selected performance measures.
相似文献