全文获取类型
收费全文 | 102738篇 |
免费 | 7880篇 |
国内免费 | 3935篇 |
专业分类
电工技术 | 5333篇 |
技术理论 | 14篇 |
综合类 | 6052篇 |
化学工业 | 17340篇 |
金属工艺 | 5082篇 |
机械仪表 | 5524篇 |
建筑科学 | 7027篇 |
矿业工程 | 2567篇 |
能源动力 | 3086篇 |
轻工业 | 7472篇 |
水利工程 | 1731篇 |
石油天然气 | 4627篇 |
武器工业 | 671篇 |
无线电 | 13482篇 |
一般工业技术 | 13378篇 |
冶金工业 | 6106篇 |
原子能技术 | 1101篇 |
自动化技术 | 13960篇 |
出版年
2024年 | 412篇 |
2023年 | 1602篇 |
2022年 | 2912篇 |
2021年 | 4027篇 |
2020年 | 3120篇 |
2019年 | 2547篇 |
2018年 | 2894篇 |
2017年 | 3028篇 |
2016年 | 2916篇 |
2015年 | 3705篇 |
2014年 | 4707篇 |
2013年 | 5951篇 |
2012年 | 6219篇 |
2011年 | 6947篇 |
2010年 | 5671篇 |
2009年 | 5541篇 |
2008年 | 5546篇 |
2007年 | 5132篇 |
2006年 | 4793篇 |
2005年 | 4078篇 |
2004年 | 3203篇 |
2003年 | 3058篇 |
2002年 | 3109篇 |
2001年 | 2712篇 |
2000年 | 2489篇 |
1999年 | 2700篇 |
1998年 | 2665篇 |
1997年 | 2074篇 |
1996年 | 1941篇 |
1995年 | 1605篇 |
1994年 | 1383篇 |
1993年 | 1019篇 |
1992年 | 788篇 |
1991年 | 607篇 |
1990年 | 562篇 |
1989年 | 501篇 |
1988年 | 388篇 |
1987年 | 305篇 |
1986年 | 237篇 |
1985年 | 204篇 |
1984年 | 166篇 |
1983年 | 115篇 |
1982年 | 122篇 |
1981年 | 91篇 |
1980年 | 115篇 |
1979年 | 61篇 |
1978年 | 66篇 |
1977年 | 67篇 |
1976年 | 89篇 |
1973年 | 45篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
951.
计算机数据库的入侵检测技术对计算机的安全运行有着很大的帮助,这是一项积极主动防御外来侵害的高新技术,对计算机数据库可以进行多重保护。检测技术不仅能够对外来的病毒入侵一一攻克,还能对内部的潜在病毒进行查杀,对数据进行保护。 相似文献
952.
基于局域网建立的VLAN技术得到了用户的广泛应用和支持,这也反映了局域网技术必然存在一些特点和优势。本文通过对VLAN技术的特征分析,逐步解译VLAN技术如何在网络安全管理领域发挥各种效用。 相似文献
953.
We present an efficient algorithm for collision detection between static rigid objects using a dual bounding volume hierarchy which consists of an oriented bounding box (OBB) tree enhanced with bounding spheres. This approach combines the compactness of OBBs and the simplicity of spheres. The majority of distant objects are separated using the simpler sphere tests. The remaining objects are in close proximity, where some separation axes are significantly more effective than others. We select 5 from among the 15 potential separating axes for OBBs. Experimental results show that our algorithm achieves considerable speedup in most cases with respect to the existing OBB algorithms. 相似文献
954.
Let S be a set of elements. We say that a collection C of subsets of S has the consecutive ones property if there exist a linear order on S and a 0-1 matrix M, where Mij=1 if and only if the jth element is in the ith set in C, such that all 1's appear consecutively in each row of M. A set X∈C is hit by a subset S′⊆S if X∩S′≠∅. Let Cr (red collection) and Cb (blue collection) be two collections of subsets of S respectively. The red-blue hitting set problem asks for a subset S′⊆S such that all sets in the blue collection are hit by S′, while the number of sets in the red collection hit by S′ has to be minimum. We present a shortest-path based algorithm with time complexity O(|Cb||S|+|Cr||S|+2|S|) for this problem with Cr∪Cb having the consecutive ones property, which improves the previous time bound O(|Cr||Cb|2|S|) by Dom et al. (2008) [8]. 相似文献
955.
To provide both a high payload capacity and a good stego-image quality, a high payload frequency-based reversible image hiding (HPFRIH) method was presented in this paper. These performances can be achieved by transforming a cover image from the spatial domain into the frequency domain through Haar digital wavelet transform (HDWT) method followed by an adaptive arithmetic coding method to encode the HDWT coefficients in a high-frequency band. The HPFRIH method was used to conceal both the compressed data and the secret data in the high-frequency band. This simple method can completely reconstruct the cover image only from the stego-image. Moreover, experimental results showed that the HPFRIH method offers both impressive hiding capacity and satisfied stego-image quality. 相似文献
956.
Obtaining good visual quality and high hiding capacity with reversible data hiding systems is a technically challenging problem. In this paper, we propose a simple reversible data hiding scheme that uses a complementary hiding strategy. The proposed method embeds one secret bit horizontally and vertically into one cover pixel of a grayscale cover image by decreasing odd-valued pixels and increasing even-valued pixels by one. Experimental results show that the hiding capacity measured by bit per pixel (bpp) of the proposed scheme is at least 1.21 bpp with a PSNR (peak signal-to-noise ratio) value greater than 52 dB for all standard test images. Especially in the case of four-layer embedding, the PSNR value of the proposed method is still greater than 51 dB at a hiding capacity of about 5 bpp for all standard test images. In addition, the proposed method is quite simple because it primarily uses additions and subtractions. These results indicate that the proposed scheme is superior to many existing reversible data hiding schemes introduced in the literature. 相似文献
957.
卢进军 《网络安全技术与应用》2011,(5):34-36
本文通过介绍IPv6的IPSec安全机制,就IPv6在校园网组建中的安全问题展开探讨.采用相互对比和理论分析两种方式相结合,给出IPV6的两种模式组合应用在校园网中的具体实现方法. 相似文献
958.
本文提出了一种多功能网络监控与防御系统。文中根据网络自身的结构,从骨干层、汇聚层、接入层三个层次分析,采用三层设计模式,它们相互独立又相互协作,共同构成高性能、多层次、多功能综合解决方案。形成深度防御体系,最大限度地保护企业和组织的网络安全。 相似文献
959.
基于光电传感器电路的迷宫机器人设计 总被引:1,自引:0,他引:1
采用Freescale公司的MC9SDG128单片机进行控制,使用ROHM公司生产的发送接收一体化反射型光电传感器RPR220,设计了一种新型迷宫机器人.该迷宫机器人能够在程序中严格控制光电传感器的开关,同时用软件消除外界干扰,取得了很好的探测效果. 相似文献
960.
T. Hoang Ngan Le Chia-Chen Lin Chin-Chen Chang Hoai Bac LeAuthor vitae 《Digital Signal Processing》2011,21(6):734-745
Many secret sharing schemes for digital images have been developed in recent decades. Traditional schemes typically must deal with the problem of computational complexity, and other visual secret sharing schemes come with a higher transmission cost and storage cost; that is, each shadow size is m times as big as the original secret image. The new (2,n) secret sharing scheme for grayscale images proposed in this paper is based a combination of acceptable image quality using block truncation coding (BTC), high compression ratio discrete wavelet transform (DWT) and good subjective performance of the vector quantization (VQ) technique. Experimental results confirm that our proposed scheme not only generates a high quality reconstructed original image but also generates small, random-like grayscale shadows. 相似文献