首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13654篇
  免费   851篇
  国内免费   110篇
电工技术   205篇
综合类   61篇
化学工业   3533篇
金属工艺   347篇
机械仪表   489篇
建筑科学   515篇
矿业工程   21篇
能源动力   951篇
轻工业   1276篇
水利工程   188篇
石油天然气   224篇
武器工业   4篇
无线电   1378篇
一般工业技术   2527篇
冶金工业   490篇
原子能技术   95篇
自动化技术   2311篇
  2024年   70篇
  2023年   268篇
  2022年   587篇
  2021年   892篇
  2020年   751篇
  2019年   812篇
  2018年   911篇
  2017年   827篇
  2016年   807篇
  2015年   474篇
  2014年   748篇
  2013年   1366篇
  2012年   902篇
  2011年   947篇
  2010年   663篇
  2009年   594篇
  2008年   418篇
  2007年   355篇
  2006年   302篇
  2005年   192篇
  2004年   174篇
  2003年   152篇
  2002年   119篇
  2001年   91篇
  2000年   90篇
  1999年   81篇
  1998年   137篇
  1997年   114篇
  1996年   96篇
  1995年   68篇
  1994年   51篇
  1993年   59篇
  1992年   46篇
  1991年   38篇
  1990年   40篇
  1989年   32篇
  1988年   25篇
  1987年   24篇
  1986年   34篇
  1985年   27篇
  1984年   27篇
  1983年   25篇
  1982年   21篇
  1981年   19篇
  1980年   19篇
  1979年   16篇
  1978年   18篇
  1977年   18篇
  1976年   24篇
  1975年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.

Visual Cryptography (VC) is gaining attraction during the past few years to secure the visual information in the transmission network. It enables the visual data i.e. handwritten notes, photos, printed text, etc. to encrypt in such a way that their decryption can be done through the human visual framework. Hence, no computational assistance is required for the decryption of the secret images they can be seen through naked eye. In this paper, a novel enhanced halftoning-based VC scheme is proposed that works for both binary and color images. Fake share is generated by the combination of random black and white pixels. The proposed algorithm consists of 3 stages i.e., detection, encryption, and decryption. Halftoning, Encryption, (2, 2) visual cryptography and the novel idea of fake share, make it even more secure and improved. As a result, it facilitates the original restored image to the authentic user, however, the one who enters the wrong password gets the combination of fake share with any real share. Both colored and black images can be processed with minimal capacity using the proposed scheme.

  相似文献   
62.

Software product prone to continuous evolution due to increase in the use of technology. Therefore, more stakeholders are involved in software evolution increases the cost and complexity. This required optimization of resources and cost to handle evolution with Global Software Development (GSD) to utilize time zones efficiently. The significance challenge of GSD reports: time zone difference, geographical location, communication delays, knowledge sharing, control among stakeholders and development team. Because of these challenges, the requirements for development in GSD environment are also challenge as compared to on site development. Different requirement engineering methods have been used to improve the requirements analysis to deal with ambiguities and inconsistency in large set of requirements. The customization and tailoring of requirements according to changing project’s situations required to improve project development with reusing existing agile methods during requirement engineering phase. Moreover, complex information systems where heterogeneity is inevitable that implies the involvement of divergent stakeholders and necessitate a comprehensive framework to capture multidimensional viewpoints and fulfill aforementioned issues. Therefore, a situational multi-dimensional agile requirement engineering method has been proposed to support team and stakeholders’ viewpoints. The schema of the proposed method is based on challenges recognized by performing Literature Review. Then proposed method has been evaluated via experimental approach and statistical analysis conducted to validated reliability of data collected. This result is significant approved both practically and statistically that the proposed approach ease to use, implement, trained and increased productivity and performance. Hence, the experimental study for the evaluation of the proposed approach results concluded that, proposed approach is the important multimedia tool for supporting organization and distributed development team for information sharing, collaboration, product development.

  相似文献   
63.

This paper proposes a novel algorithm for encrypting color images. The innovation in this study is the use of messenger ribonucleic acid (mRNA) encoding to import into Deoxyribonucleic acid (DNA) encoding. For permutation of the plain image bits, we use Arnold’s Cat Map at the bit-level. Then, using Non-Adjacent Coupled Map Lattices (NCML), we apply diffusion operations to the permuted color channels. We also provide the upgrade of the diffusion phase with DNA encoding. In the proposed algorithm, the choices are random depending on the secret key, which is implemented using a simple logistic map. Hashing the string entered by the user, the secret key, parameters, and initial values are generated by the Double MD5 method. The results of tests and security analysis showed that the results of encryption with this scheme are effective, and the key space is large enough to withstand common attacks.

  相似文献   
64.
International Journal of Control, Automation and Systems - This paper proposes two control techniques to provide robust tracking for magnetic levitation systems (MLS): model-free control (MFC) and...  相似文献   
65.
The compulsion to use bioplastics has increased significantly today. One of the important aspects of plastics is their recyclability. Therefore, the important question of this research is that although bio-based compounds containing starch are sensitive to thermal-mechanical recycling processes, are such products thermally recyclable? To answer the question, polypropylene (PP)/thermoplastic starch (TPS) compound granules were extruded up to five times, and in the other part, single-extruded granules were blended at different ratios with virgin granules by extrusion. In order to characterize these samples, Fourier transform infrared spectroscopy, thermogravimetric analysis, differential scanning calorimetry, rotational disc rheometry, tensile properties, and appearance evaluation were used. The results showed that it is possible to recycle PP/TPS granules up to four times repetition of the extrusion operation and the fifth repetition also showed slight changes. There was also a blend of single-extruded granules with virgin material up to a 50:50% composition without significant variation.  相似文献   
66.
A novel image encryption algorithm in streaming mode is proposed which exhaustively employs an entire set of DNA complementary rules alongwith one dimensional chaotic maps. The proposed algorithm is highly efficient due to encrypting the subset of digital image which contains 92.125 % of information. DNA addition operation is carried out on this MSB part. The core idea of the proposed scheme is to scramble the whole image by means of piecewise linear chaotic map (PWLCM) followed by decomposition of image into most significant bits (MSB) and least significant bits (LSB). The logistic sequence is XORed with the decoded MSB and LSB parts separately and finally these two parts are combined to get the ciphered image. The parameters for PWLCM, logistic map and selection of different DNA rules for encoding and decoding of both parts of an image are derived from 128-bit MD5 hash of the plain image. Simulated experimental results in terms of quantitative and qualitative ways prove the encryption quality. Efficiency and robustness against different noises make the proposed cipher a good candidate for real time applications.  相似文献   
67.
In this paper, metamodeling and five well-known metaheuristic optimization algorithms were used to reduce the weight and improve crash and NVH attributes of a vehicle simultaneously. A high-fidelity full vehicle model is used to analyze peak acceleration, intrusion and component’s internal-energy under Full-Frontal, Offset-Frontal, and Side crash scenarios as well as vehicle natural frequencies. The radial basis functions method is used to approximate the structural responses. A nonlinear surrogate-based mass minimization was formulated and solved by five different optimization algorithms under crash-vibration constraints. The performance of these algorithms is investigated and discussed.  相似文献   
68.
69.
In this paper, the robust input covariance constraint (ICC) control problem with polytopic uncertainty is solved using convex optimization with linear matrix inequality (LMI) approach. The ICC control problem is an optimal control problem that optimizes the output performance subjected to multiple constraints on the input covariance matrices. This control problem has significant practical implications when hard constraints need to be satisfied on control actuators. The contribution of this paper is the characterization of the control synthesis LMIs used to solve the robust ICC control problem for polytopic uncertain systems. Both continuous‐ and discrete‐time systems are considered. Parameter‐dependent and independent Lyapunov functions have been used for robust ICC controller synthesis. Numerical design examples are presented to illustrate the effectiveness of the proposed approach.  相似文献   
70.
Force-driven liquid argon flows both in nanoscale periodic domains and in gold nano-channels are simulated using non-equilibrium molecular dynamics to investigate the scale and wall force field effects. We examined variations in liquid density, viscosity, velocity profile, slip length, shear stress and mass flow rate in different sized periodic domains and nano-channels at a fixed thermodynamic state. In the absence of walls, liquid argon obeys Newton’s law of viscosity with the desired absolute viscosity in domains as small as 4 molecular diameters in height. Results prove that deviations from continuum solution are solely due to wall effects. Simulations in nano-channels with heights varying from 3.26 to 36 nm exhibit parabolic velocity profiles with constant slip length modeled by Navier-type slip boundary condition. Both channel averaged density and “apparent viscosity” decrease with reduced channel height, which has competing effects in determination of the mass flow rate. Density layering and wall force field induce deviations from Newton’s law of viscosity in the near-wall region, while constant “apparent viscosity” with the deformation rate from a parabolic velocity profile successfully predicts shear stress in the bulk flow region.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号