全文获取类型
收费全文 | 67351篇 |
免费 | 7400篇 |
国内免费 | 4493篇 |
专业分类
电工技术 | 5815篇 |
技术理论 | 2篇 |
综合类 | 5261篇 |
化学工业 | 9582篇 |
金属工艺 | 3722篇 |
机械仪表 | 4567篇 |
建筑科学 | 5296篇 |
矿业工程 | 2260篇 |
能源动力 | 2070篇 |
轻工业 | 5069篇 |
水利工程 | 1660篇 |
石油天然气 | 3465篇 |
武器工业 | 847篇 |
无线电 | 8871篇 |
一般工业技术 | 6881篇 |
冶金工业 | 2639篇 |
原子能技术 | 914篇 |
自动化技术 | 10323篇 |
出版年
2024年 | 365篇 |
2023年 | 1177篇 |
2022年 | 2368篇 |
2021年 | 3376篇 |
2020年 | 2371篇 |
2019年 | 1897篇 |
2018年 | 2071篇 |
2017年 | 2367篇 |
2016年 | 2192篇 |
2015年 | 3193篇 |
2014年 | 4004篇 |
2013年 | 4702篇 |
2012年 | 5440篇 |
2011年 | 5627篇 |
2010年 | 5075篇 |
2009年 | 4766篇 |
2008年 | 4602篇 |
2007年 | 4356篇 |
2006年 | 4039篇 |
2005年 | 3230篇 |
2004年 | 2246篇 |
2003年 | 1660篇 |
2002年 | 1565篇 |
2001年 | 1269篇 |
2000年 | 1015篇 |
1999年 | 903篇 |
1998年 | 672篇 |
1997年 | 512篇 |
1996年 | 483篇 |
1995年 | 388篇 |
1994年 | 305篇 |
1993年 | 193篇 |
1992年 | 180篇 |
1991年 | 119篇 |
1990年 | 102篇 |
1989年 | 71篇 |
1988年 | 49篇 |
1987年 | 21篇 |
1986年 | 40篇 |
1985年 | 16篇 |
1984年 | 27篇 |
1983年 | 13篇 |
1982年 | 25篇 |
1981年 | 18篇 |
1980年 | 24篇 |
1979年 | 17篇 |
1978年 | 8篇 |
1977年 | 13篇 |
1976年 | 23篇 |
1959年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
31.
Weiran Liu Jianwei Liu Qianhong Wu Bo Qin Yan Li 《International Journal of Information Security》2016,15(1):35-50
We focus on practical Hierarchical Identity-Based Broadcast Encryption (HIBBE) with semantic security against adaptively chosen-ciphertext attacks (CCA2) in the standard model. We achieve this goal in two steps. First, we propose a new HIBBE scheme that is secure against chosen-plaintext attacks (CPA). Compared with the existing HIBBE scheme that is built from composite-order bilinear groups, our construction is based on prime-order bilinear groups. The much better efficiency of group operations in prime-order bilinear groups makes our proposed HIBBE scheme more practical. Then, we convert it into a CCA2-secure scheme at the cost of a one-time signature. Instead of extending one user hierarchy in the Canetti–Halevi–Katz approach from CPA-secure (\(l+1\))-Hierarchical Identity-Based Encryption [(\(l+1\))-HIBE] to CCA2-secure \(l\)-HIBE, our construction merely adds one on-the-fly dummy user in the basic scheme. We formally prove the security of these two schemes in the standard model. Comprehensive theoretical analyses and experimental results demonstrate that the proposed HIBBE schemes achieve desirable performance. 相似文献
32.
33.
Bartels–Stewart algorithm is an effective and widely used method with an O(n 3) time complexity for solving a static Sylvester equation. When applied to time-varying Sylvester equation, the computation burden increases intensively with the decrease of sampling period and cannot satisfy continuous realtime calculation requirements. Gradient-based recurrent neural network are able to solve the time-varying Sylvester equation in real time but there always exists an estimation error. In contrast, the recently proposed Zhang neural network has been proven to converge to the solution of the Sylvester equation ideally when time goes to infinity. However, this neural network with the suggested activation functions never converges to the desired value in finite time, which may limit its applications in realtime processing. To tackle this problem, a sign-bi-power activation function is proposed in this paper to accelerate Zhang neural network to finite-time convergence. The global convergence and finite-time convergence property are proven in theory. The upper bound of the convergence time is derived analytically. Simulations are performed to evaluate the performance of the neural network with the proposed activation function. In addition, the proposed strategy is applied to online calculating the pseudo-inverse of a matrix and nonlinear control of an inverted pendulum system. Both theoretical analysis and numerical simulations validate the effectiveness of proposed activation function. 相似文献
34.
35.
廖珊 《计算机光盘软件与应用》2011,(3)
随着社会科学以及社会经济的高速发展,计算机已经普及到了日常的工作、生活,而利用计算机的办公自动化,更是办公的阶段性提高.但是,办公的自动化也伴随着一些网络的安全问题,而提高网络的安全监管,防止信息的失真、修改、盗取,就显得非常重要了.本文就这个问题进行简单的探讨. 相似文献
36.
为了适应大规模广范围高密度的搜索,Google的网络搜索应用允许在不同的处理器上运行不同的查询;同时,通过对全局索引进行分解,Google也允许在多个处理器上运行单一的查询.Google的主旨是,使用市场上流行的具有通用的PC,以达到大型机所具有的高性能.通过对已有资料进行搜集,对Google的体系结构、工作性能等进行分析,目的是通过对Google的调研,给网格建设提供一定的借鉴. 相似文献
37.
在产业技术公共服务平台的影响和带动下,随着其用户规模不断扩大和信息技术的发展,越来越要求平台服务向智能化发展,有必要对其中之一的资源共享智能型系统建设进行探讨。 相似文献
38.
Bo Li Author Vitae Chun-Hou Zheng Author Vitae Author Vitae 《Pattern recognition》2008,41(12):3813-3821
In this paper an efficient feature extraction method named as locally linear discriminant embedding (LLDE) is proposed for face recognition. It is well known that a point can be linearly reconstructed by its neighbors and the reconstruction weights are under the sum-to-one constraint in the classical locally linear embedding (LLE). So the constrained weights obey an important symmetry: for any particular data point, they are invariant to rotations, rescalings and translations. The latter two are introduced to the proposed method to strengthen the classification ability of the original LLE. The data with different class labels are translated by the corresponding vectors and those belonging to the same class are translated by the same vector. In order to cluster the data with the same label closer, they are also rescaled to some extent. So after translation and rescaling, the discriminability of the data will be improved significantly. The proposed method is compared with some related feature extraction methods such as maximum margin criterion (MMC), as well as other supervised manifold learning-based approaches, for example ensemble unified LLE and linear discriminant analysis (En-ULLELDA), locally linear discriminant analysis (LLDA). Experimental results on Yale and CMU PIE face databases convince us that the proposed method provides a better representation of the class information and obtains much higher recognition accuracies. 相似文献
39.
40.
基于双极偏好控制的多目标粒子群优化算法 总被引:2,自引:0,他引:2
考虑双极偏好信息对粒子群的控制作用,提出一种使用双极偏好——正偏好和负偏好引导粒子群向
Pareto 前沿偏好区域进化的方法.根据TOPSIS 决策法思想,将外部种群粒子与正负偏好点的相对贴近度排序作为
外部种群管理和全局最优解更新策略;根据贴近度值确定解集的分布度;选取6 种不同类型的多目标测试函数进行
算法模拟,从世代距离、空间测度和超体积测度3 个指标与基于单极偏好的多目标粒子算法进行性能比较.结果显
示,基于双极偏好控制的多目标粒子群算法的收敛性和综合性能更优秀. 相似文献