全文获取类型
收费全文 | 91694篇 |
免费 | 7622篇 |
国内免费 | 4085篇 |
专业分类
电工技术 | 5693篇 |
技术理论 | 2篇 |
综合类 | 5777篇 |
化学工业 | 14015篇 |
金属工艺 | 4957篇 |
机械仪表 | 5215篇 |
建筑科学 | 6721篇 |
矿业工程 | 1854篇 |
能源动力 | 2647篇 |
轻工业 | 7088篇 |
水利工程 | 1811篇 |
石油天然气 | 3878篇 |
武器工业 | 675篇 |
无线电 | 12041篇 |
一般工业技术 | 11655篇 |
冶金工业 | 5643篇 |
原子能技术 | 1029篇 |
自动化技术 | 12700篇 |
出版年
2024年 | 370篇 |
2023年 | 1371篇 |
2022年 | 2574篇 |
2021年 | 3570篇 |
2020年 | 2502篇 |
2019年 | 2107篇 |
2018年 | 2358篇 |
2017年 | 2802篇 |
2016年 | 2455篇 |
2015年 | 3396篇 |
2014年 | 4445篇 |
2013年 | 5666篇 |
2012年 | 6040篇 |
2011年 | 6751篇 |
2010年 | 5857篇 |
2009年 | 5649篇 |
2008年 | 5585篇 |
2007年 | 5347篇 |
2006年 | 5124篇 |
2005年 | 4179篇 |
2004年 | 2844篇 |
2003年 | 2349篇 |
2002年 | 2370篇 |
2001年 | 2025篇 |
2000年 | 1913篇 |
1999年 | 1969篇 |
1998年 | 2161篇 |
1997年 | 1757篇 |
1996年 | 1535篇 |
1995年 | 1239篇 |
1994年 | 970篇 |
1993年 | 823篇 |
1992年 | 614篇 |
1991年 | 468篇 |
1990年 | 396篇 |
1989年 | 309篇 |
1988年 | 269篇 |
1987年 | 189篇 |
1986年 | 160篇 |
1985年 | 147篇 |
1984年 | 100篇 |
1983年 | 78篇 |
1982年 | 74篇 |
1981年 | 61篇 |
1980年 | 63篇 |
1979年 | 35篇 |
1978年 | 34篇 |
1977年 | 55篇 |
1976年 | 126篇 |
1973年 | 21篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
991.
介绍了MIMO系统无线信道研究的现状,对现阶段的MIMO信道建模方法进行了分析和比较,提出了自由真实空间内的MIMO信道实时测量系统方案,该系统采用USRP平台,能实时地测量真实空间通信信道传输性能,并对信道数据进行存储分析,该系统成本低,为真实MIMO信道研究提供了基础. 相似文献
992.
Jiachen Yang Shudong He Yancong Lin Zhihan Lv 《Multimedia Tools and Applications》2017,76(17):17735-17750
For the issues of large space and storage security of multimedia files, we analyzed the impact of access control and cloud storage on multimedia file, and proposed a mixed security cloud storage framework based on Internet of Things. This paper introduced the concept of multimedia protection into the method based on role access control. Moreover, we also adopted a scheme based on the combination of multimedia data state and role access control. At the same time, all input and output devices were connected to this system. Internet of Things is used to judge whether circuits are connected and whether the devices are normally operated, so as to improve the access efficiency. On this basis, we also described in detail the complete process of registration, role assignment, multimedia file owner’s request for data encryption, and user login and access to multimedia file. According to the result, this scheme can be used to resist the known attacks. It guarantees security of multimedia files. 相似文献
993.
994.
Abdullah Azfar Kim-Kwang Raymond Choo Lin Liu 《Multimedia Tools and Applications》2017,76(3):3313-3341
Android productivity apps have provided the facility of having a constantly accessible and productive workforce to the information and work capabilities needed by the users. With hundreds of productivity apps available in the Android app market, it is necessary to develop a taxonomy for the forensic investigators and the end users to allow them to know what personal data remnants are available from the productivity apps. In this paper, 30 popular Android productivity apps were examined. A logical extraction of the Android phone was collected by using a well-known mobile forensic tool- XRY to extract various information of forensic interest such as user email ID and list of tasks. Based on the findings, a two-dimensional taxonomy of the forensic artefacts of the productivity apps is proposed with the app categories in one dimension and the classes of artefacts in the other dimension. The artefacts identified in the study of the apps are summarised using the taxonomy. In addition, a comparison with the existing forensic taxonomies of different categories of Android apps is provided to facilitate timely collection and analysis of evidentiary materials from mobile devices. 相似文献
995.
Junliu Zhong Yanfen Gan Janson Young Lian Huang Peiyu Lin 《Multimedia Tools and Applications》2017,76(13):14887-14903
Copy move forgery detection (CMFD) is one of the most active subtopic in forgery scheme. The methods of CMFD are divided into to block-based method and keypoint-based method in general. Compared with keypoint-based method, block-based method can detect undetectable detail without morphology segmentation. But many block-based methods detect the plain copy-move forgeries only. They have been incompetent to detect the post-processing operations such as various geometrical distortions, and then fail to detect the forgery regions accurately. Therefore, this paper presents an improved block-based efficient method for CMFD. Firstly, after pre-processing, an auxiliary overlapped circular block is presented to divide the forged image into overlapped circular blocks. The local and inner image feature is extracted by the Discrete Radial Harmonic Fourier Moments (DRHFMs) with the overlapped circular block from the suspicious image. Then, the similar feature vectors of blocks are searched by 2 Nearest Neighbors (2NN) test. Euclidean distance and correlation coefficient is employed to filter these features and then remove the false matches. Morphologic operation is employed to delete the isolated pixels. A series of experiments are done to analyze the performance for CMFD. Experimental results show that the new DRHFMs can obtain outstanding performance even under image geometrical distortions. 相似文献
996.
Chen Wenshuo Ding Guiguang Lin Zijia Pei Jisheng 《Multimedia Tools and Applications》2017,76(2):2441-2466
Multimedia Tools and Applications - Hashing is a binary-code encoding method which tries to preserve the neighborhood structures in the original feature space, in order to realize efficient... 相似文献
997.
Lu Zhao Lin Yu-Ru Huang Xiaoxia Xiong Naixue Fang Zhijun 《Multimedia Tools and Applications》2017,76(8):10855-10879
Multimedia Tools and Applications - Nowadays, microblogging has become popular, with hundreds of millions of short messages being posted and shared every minute on a variety of topics in social... 相似文献
998.
Yang Cheng-Hsing Weng Chi-Yao Lin Yih-Kai Liu Kuan-Liang 《Multimedia Tools and Applications》2017,76(22):23699-23720
Multimedia Tools and Applications - Reversible data hiding based on prediction methods is a data hiding technique wherein secret bits can be efficiently hidden into cover images. In this paper, we... 相似文献
999.
Multimedia Tools and Applications - A novel scheme for non-rigid video object tracking using segment-based object candidates is proposed in this paper. Rather than using a conventional bounding... 相似文献
1000.
Shaio Yan Huang Chi-Chen Lin An-An Chiu David C. Yen 《Information Systems Frontiers》2017,19(6):1343-1356
The objective of this study is to identify the financial statement fraud factors and rank the relative importance. First, this study reviews the previous studies to identify the possible fraud indicators. Expert questionnaires are distributed next. After questionnaires are collected, Lawshe’s approach is employed to eliminate these factors whose CVR (content validity ratio) values do not meet the criteria. Further, the remaining 32 factors are reviewed by experts to be the measurements suitable for the assessment of fraud detection. The Analytic Hierarchy Process (AHP) is utilized to determine the relative weights of the individual items. The result of AHP shows that the most important dimension is Pressure/Incentive and the least one is Attitude/rationalization. In addition, the top five important measurements are “Poor performance”, “The need for external financing”, “Financial distress”, “Insufficient board oversight”, and “Competition or market saturation”. The result provides a significant advantage to auditors and managers in enhancing the efficiency of fraud detection and critical evaluation. 相似文献