全文获取类型
收费全文 | 51909篇 |
免费 | 5221篇 |
国内免费 | 3230篇 |
专业分类
电工技术 | 3423篇 |
技术理论 | 3篇 |
综合类 | 4421篇 |
化学工业 | 8447篇 |
金属工艺 | 2936篇 |
机械仪表 | 2943篇 |
建筑科学 | 4577篇 |
矿业工程 | 1503篇 |
能源动力 | 1614篇 |
轻工业 | 4084篇 |
水利工程 | 1052篇 |
石油天然气 | 2640篇 |
武器工业 | 363篇 |
无线电 | 6039篇 |
一般工业技术 | 5742篇 |
冶金工业 | 2117篇 |
原子能技术 | 720篇 |
自动化技术 | 7736篇 |
出版年
2024年 | 206篇 |
2023年 | 920篇 |
2022年 | 1549篇 |
2021年 | 2260篇 |
2020年 | 1737篇 |
2019年 | 1664篇 |
2018年 | 1681篇 |
2017年 | 1826篇 |
2016年 | 1530篇 |
2015年 | 2172篇 |
2014年 | 2587篇 |
2013年 | 3028篇 |
2012年 | 3179篇 |
2011年 | 3322篇 |
2010年 | 3108篇 |
2009年 | 2873篇 |
2008年 | 2826篇 |
2007年 | 2630篇 |
2006年 | 2576篇 |
2005年 | 2112篇 |
2004年 | 1857篇 |
2003年 | 2396篇 |
2002年 | 3267篇 |
2001年 | 2708篇 |
2000年 | 1481篇 |
1999年 | 1162篇 |
1998年 | 675篇 |
1997年 | 599篇 |
1996年 | 571篇 |
1995年 | 459篇 |
1994年 | 371篇 |
1993年 | 252篇 |
1992年 | 217篇 |
1991年 | 125篇 |
1990年 | 111篇 |
1989年 | 82篇 |
1988年 | 66篇 |
1987年 | 32篇 |
1986年 | 35篇 |
1985年 | 27篇 |
1984年 | 21篇 |
1983年 | 11篇 |
1982年 | 10篇 |
1981年 | 9篇 |
1980年 | 14篇 |
1979年 | 6篇 |
1965年 | 1篇 |
1959年 | 6篇 |
1951年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
981.
Ayesha Kulsoom Di Xiao Aqeel-ur-Rehman Syed Ali Abbas 《Multimedia Tools and Applications》2016,75(1):1-23
A novel image encryption algorithm in streaming mode is proposed which exhaustively employs an entire set of DNA complementary rules alongwith one dimensional chaotic maps. The proposed algorithm is highly efficient due to encrypting the subset of digital image which contains 92.125 % of information. DNA addition operation is carried out on this MSB part. The core idea of the proposed scheme is to scramble the whole image by means of piecewise linear chaotic map (PWLCM) followed by decomposition of image into most significant bits (MSB) and least significant bits (LSB). The logistic sequence is XORed with the decoded MSB and LSB parts separately and finally these two parts are combined to get the ciphered image. The parameters for PWLCM, logistic map and selection of different DNA rules for encoding and decoding of both parts of an image are derived from 128-bit MD5 hash of the plain image. Simulated experimental results in terms of quantitative and qualitative ways prove the encryption quality. Efficiency and robustness against different noises make the proposed cipher a good candidate for real time applications. 相似文献
982.
983.
984.
985.
The SRM (Spatial Rich Model) is a very effective steganalysis method. It uses statistics of neighboring noise residual samples as features to capture the dependency changes caused by embedding. Because the noise residuals are the high-frequency components of image and closely tied to image content, the residuals of different types of image regions have different statistical properties and effectiveness for steganalysis. In this paper, the effectiveness of the residuals is investigated. Then the effectiveness of the statistics collected from different types of neighboring residual samples is investigated from the FLD (Fisher Linear Discriminant) viewpoint, and ineffective, effective and high-effective neighboring residual samples are defined. The ineffective neighboring residual samples are not likely to change during embedding, and if they are counted in statistics, they may mix the features with noise and make the features impure. Pure SRM features are extracted based on neighboring noise residual sample selection strategy. Furthermore, multi-order statistical features are proposed to increase the statistical diversity. Steganalysis performances of the statistical features collected from different types of neighboring residual samples are investigated on three content adaptive steganographic algorithms. Experimental results demonstrate that the proposed method can achieve a more accurate detection than SRM. 相似文献
986.
987.
Consensus in second‐order Markovian jump multi‐agent systems via impulsive control using sampled information with heterogenous delays
下载免费PDF全文
![点击此处可从《Asian journal of control》网站下载免费的PDF全文](/ch/ext_images/free.gif)
This paper investigates the consensus problem of second‐order Markovian jump multi‐agent systems with delays. Both network‐induced random delay and node‐induced state delay are considered, where the network‐induced random delay, subjected to a Markov chain, exists in the switching signal and the node‐induced state delay, related to switching topologies, is heterogeneous between any two linked agents. In order to reduce communication and control energy, an impulsive protocol is proposed, where each agent only can get delayed relative positions to neighbors and the velocity of itself at impulsive instants. By performing three steps of model transformation and introducing a mapping for two independent Markov chains, the consensus problem of the original continuous‐time system is equivalent to the stability problem of a discrete‐time expand error system with two Markovian jumping parameters and a necessary and sufficient criterion is derived. A numerical example is given to illustrate the effectiveness of the theoretical result.@@@@This work is supported by the National Natural Science Foundation of China under Grants 61374171, 61572210, and 51537003, the Fundamental Research Funds for the Central Universities (2015TS030), and the Program for Changjiang Scholars and Innovative Research Team in University (IRT1245). 相似文献
988.
Hong Lai Mehmet A. Orgun Josef Pieprzyk Jing Li Mingxing Luo Jinghua Xiao Fuyuan Xiao 《Quantum Information Processing》2016,15(11):4663-4679
We propose an approach that achieves high-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding. In particular, we encode a key with the Chebyshev-map values corresponding to Lucas numbers and then use k-Chebyshev maps to achieve consecutive and flexible key expansion and apply the pre-shared classical information between Alice and Bob and fountain codes for privacy amplification to solve the security of the exchange of classical information via the classical channel. Consequently, our high-capacity protocol does not have the limitations imposed by orbital angular momentum and down-conversion bandwidths, and it meets the requirements for longer distances and lower error rates simultaneously. 相似文献
989.
光电装备延伸保修策略选择中最重要工作就是评估待选择的策略;为选出最合适策略,提高决策的科学性和合理性,克服不同指标之间的属性不一致性和以往指标确定主观性过大的问题,提出基于粗糙集和模糊集理论的综合评估模型;根据粗糙集理论和经验,采用属性指标重要度计算属性评估指标权重;与专家模糊指标评估矩阵相结合,得到最终综合评估值,选定最优策略;通过具体实例应用分析,验证方法的合理性和可行性。 相似文献
990.
为了提高燃煤锅炉NOX排放浓度预测的准确度,更好地进行氮氧化物的污染监测,提出了一种结合最小二乘支持向量机(Least squares support vector machines,LSSVM)和改进的粒子群优化算法(Particle swarm optimization,PSO)的预测方法。依据LSSVM预测原理及其参数选择的不确定性,采用一种改进的PSO优化算法对模型参数进行寻优,建立锅炉燃烧NOX排放特性模型,并与另两种方法结果进行比较。结果表明:LSSVM是一种有效的建模方法,有较高的拟合度;改进的PSO与LSSVM结合可改善模型的预测精度和泛化能力,在NOX排放浓度预测方面明显优于其他两种参数优化算法,对NOX排放预测有指导意义。 相似文献