全文获取类型
收费全文 | 1276篇 |
免费 | 68篇 |
专业分类
电工技术 | 15篇 |
综合类 | 1篇 |
化学工业 | 384篇 |
金属工艺 | 27篇 |
机械仪表 | 27篇 |
建筑科学 | 129篇 |
矿业工程 | 6篇 |
能源动力 | 46篇 |
轻工业 | 167篇 |
水利工程 | 20篇 |
石油天然气 | 3篇 |
无线电 | 79篇 |
一般工业技术 | 150篇 |
冶金工业 | 73篇 |
原子能技术 | 15篇 |
自动化技术 | 202篇 |
出版年
2023年 | 14篇 |
2022年 | 42篇 |
2021年 | 52篇 |
2020年 | 38篇 |
2019年 | 43篇 |
2018年 | 58篇 |
2017年 | 50篇 |
2016年 | 54篇 |
2015年 | 37篇 |
2014年 | 63篇 |
2013年 | 87篇 |
2012年 | 69篇 |
2011年 | 83篇 |
2010年 | 66篇 |
2009年 | 63篇 |
2008年 | 48篇 |
2007年 | 61篇 |
2006年 | 42篇 |
2005年 | 29篇 |
2004年 | 30篇 |
2003年 | 14篇 |
2002年 | 17篇 |
2001年 | 18篇 |
2000年 | 20篇 |
1999年 | 27篇 |
1998年 | 20篇 |
1997年 | 11篇 |
1996年 | 12篇 |
1995年 | 12篇 |
1994年 | 15篇 |
1993年 | 10篇 |
1992年 | 9篇 |
1991年 | 7篇 |
1990年 | 8篇 |
1989年 | 5篇 |
1988年 | 8篇 |
1987年 | 9篇 |
1985年 | 6篇 |
1983年 | 7篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1979年 | 5篇 |
1978年 | 6篇 |
1977年 | 4篇 |
1975年 | 4篇 |
1974年 | 3篇 |
1966年 | 3篇 |
1954年 | 3篇 |
1940年 | 4篇 |
1934年 | 3篇 |
排序方式: 共有1344条查询结果,搜索用时 0 毫秒
11.
A Distributed Key Generation (DKG) protocol is an essential component of threshold cryptosystems required to initialize the
cryptosystem securely and generate its private and public keys. In the case of discrete-log-based (dlog-based) threshold signature
schemes (ElGamal and its derivatives), the DKG protocol is further used in the distributed signature generation phase to generate
one-time signature randomizers (r = gk). In this paper we show that a widely used dlog-based DKG protocol suggested by Pedersen does not guarantee a uniformly random
distribution of generated keys: we describe an efficient active attacker controlling a small number of parties which successfully
biases the values of the generated keys away from uniform. We then present a new DKG protocol for the setting of dlog-based
cryptosystems which we prove to satisfy the security requirements from DKG protocols and, in particular, it ensures a uniform
distribution of the generated keys. The new protocol can be used as a secure replacement for the many applications of Pedersen's
protocol. Motivated by the fact that the new DKG protocol incurs additional communication cost relative to Pedersen's original
protocol, we investigate whether the latter can be used in specific applications which require relaxed security properties
from the DKG protocol. We answer this question affirmatively by showing that Pedersen's protocol suffices for the secure implementation
of certain threshold cryptosystems whose security can be reduced to the hardness of the discrete logarithm problem. In particular,
we show Pedersen's DKG to be sufficient for the construction of a threshold Schnorr signature scheme. Finally, we observe
an interesting trade-off between security (reductions), computation, and communication that arises when comparing Pedersen's
DKG protocol with ours. 相似文献
12.
Zeev Goldschmidt Dafna Hezroni-Langerman Hugo E. Gottlieb Yizhak Bakal 《Israel journal of chemistry》1990,30(4):385-390
The mechanism of the reactions of (η4-cycloheptatrien-1-al)Fe(CO)3 and its ethyleneglycol acetal with tetracyanoethylene (TCNE) was studied. The aldehyde undergoes a fast reversible 3+2 cycloaddition involving the free aldehyde-substituted double bond, and a slow irreversible 3+2 cycloaddition at the coordinated site. The latter, σ,π-allylic complex undergoes a slow interconversion with the corresponding 5 +2 isomer via the pericyclic [3,3]-sigmahaptotropic rearrangement. In contrast, the acetal reacts with TCNE at the free acetal-substituted double bond to give a single kinetic 3+2 adduct, which, under thermodynamic conditions, undergoes a [4,4]-sigmahaptotropic rearrangement to the 6 + 2 adduct. The reaction kinetics was followed by 1H NMR. The effect of substituents on the reaction course is discussed, and the detailed mechanism of both the cycloadditions and rearrangements is described. 相似文献
13.
Brito Claúdia Esteves Marisa Peixoto Hugo Abelha António Machado José 《Wireless Networks》2022,28(3):1269-1277
Wireless Networks - Continuous ambulatory peritoneal dialysis (CAPD) is a treatment used by patients in the end-stage of chronic kidney diseases. Those patients need to be monitored using blood... 相似文献
14.
Balasa F. Catthoor F. Hugo De Man 《Very Large Scale Integration (VLSI) Systems, IEEE Transactions on》1995,3(2):157-172
Memory cost is responsible for a large amount of the chip and/or board area of customized video and image processing system realizations. In this paper, we present a novel technique-founded on data-flow analysis which allows one to address the problem of background memory size evaluation for a given nonprocedural algorithm specification, operating on multidimensional signals with affine indexes. Most of the target applications are characterized by a huge number of signals, so a new polyhedral data-flow model operating on groups of scalar signals is proposed. These groups are obtained by a novel analytical partitioning technique, allowing to select a desired granularity, depending on the application complexity. The method incorporates a way to tradeoff memory size with computational and controller complexity 相似文献
15.
Aykut Avci Jan De CockPeter Lambert Roel BeernaertJelle De Smet Lawrence BogaertYouri Meuret Hugo ThienpontHerbert De Smet 《Journal of Visual Communication and Image Representation》2012,23(2):287-292
An efficient disparity estimation algorithm for multi-view video sequences, recorded by a two-dimensional camera array in which the cameras are spaced equidistantly, is presented. Because of the strong geometrical relationship among views, the disparity vectors of a certain view can for most blocks be derived from the disparity vectors of other views. A frame constructed using that idea is called a D frame in this work. Three new prediction schemes which contain D frames are proposed for encoding 5 × 3 multi-view video sequences. The schemes are applied to several multi-view image sequences taken from a camera-array and they are compared in terms of quality, bit-rate and complexity. The experimental results show that the proposed prediction schemes significantly decrease the complexity of the encoder at a very low cost of quality and/or bit-rate. 相似文献
16.
17.
Klaus Nolte Alexandros Kaloxylos Kostas Tsagkaris Thomas Rosowski Makis Stamatelatos Aristi Galani Eckard Bogenfeld Panagis Magdalinos Jens Tiemann Jens Gebert Paul Arnold Dirk von Hugo Nancy Alonistioti Panagiotis Demestichas Wolfgang Koenig 《International Journal of Network Management》2011,21(5):360-383
Future mobile networks are expected to be complex heterogeneous systems. On the one hand this will enable users to take advantage of a number of different access technologies. On the other hand it will seriously affect network management procedures since more extensive operations and decisions will have to be dealt with. To tackle these challenges a number of new dynamic mechanisms need to be designed. It is imperative that certain network management tasks have to be performed without human intervention to reduce the OPEX costs and achieve faster responses in different events. To achieve this goal, the introduction of self‐x functionalities, combined with cognitive mechanisms and the ability to reconfigure network entities and terminals, is required. Moreover, the introduction of a new pilot channel needs to be considered to assist the terminals in selecting the most suitable radio access technology according to their requirements. We present the functional architecture of an evolved network that was designed in the context of the EU‐funded IP project ‘E3: End‐to‐End Efficiency’. This architecture aims to enhance existing procedures usually performed in traditional operation and maintenance systems (e.g. spectrum management, network planning, configuration actions). We explain the rationale of our design and provide specific examples to illustrate the role of the different functional entities and their interfaces. A considerable part of this architecture has recently been approved as a feasibility study by the ETSI Committee Reconfigurable Radio System. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献
18.
Wei Wang Chenzhe Li Hugo Rodrigue Fengpei Yuan Min‐Woo Han Maenghyo Cho Sung‐Hoon Ahn 《Advanced functional materials》2017,27(7)
The beam steering mechanism has been a key element for various applications ranging from sensing and imaging to solar tracking systems. However, conventional beam steering systems are bulky and complex and present significant challenges for scaling up. This work introduces the use of soft deployable reflectors combining a soft deployable structure with simple kirigami/origami reflective films. This structure can be used as a macroscale beam steering mechanism that is both simple and compact. This work first develops a soft deployable structure that is easily scalable by patterning of soft linear actuators. This soft deployable structure is capable of increasing its height several folds by expanding in a continuous and controllable manner, which can be used as a frame to deform the linearly stretchable kirigami/origami structures integrated into the structure. Experiments on the reflective capability of the reflectors are conducted and show a good fit to the modeling results. The proposed principles for deployment and for beam steering can be used to realize novel active beam steering devices, highlighting the use of soft robotic principles to produce scalable morphing structures. 相似文献
19.
Laura Moya Leandro Domenech Andrea Cardoso Hugo O´Neill Vanesa Baño 《Holz als Roh- und Werkstoff》2017,75(6):1017-1019
A previous database with bending and density data of 261 structural size specimens of currently produced Uruguayan slash pine and loblolly pine timber was adjusted to meet testing and characterization requirements of European standards. Visual parameters and mechanical properties for each specimen were evaluated and their relationship was statistically analyzed. Results suggested that all specimens can be grouped in one visual grade with engineered properties similar to those of European C14 strength class. Modulus of elasticity and characteristic bending strength were the defining properties for class assignation. 相似文献
20.
Alejandro Torres-Haro Melchor Arellano-Plaza Juan C. Mateos-Díaz Hugo Espinosa-Andrews Gustavo A. Castillo-Herrera 《International Journal of Food Science & Technology》2022,57(2):1040-1049
Xanthophyllomyces dendrorhous is one of the most attractive natural sources of astaxanthin. The yeast produces the compound intracellularly, therefore, it is necessary to evaluate cell rupture methods using clean and efficient technologies for its extraction and it subsequent use in industries. At present work, two non-conventional high-pressure extraction methods were evaluated for astaxanthin recovery: Supercritical fluid extraction and microfluidisation. Results: Effect of pressure (15, 30, and 45 Megapascals; MPa), Temperature (313 and 343 °K) and usage of co-solvent were studied in supercritical extraction process, meanwhile the effect of microfluidisation process (five stages and 160 MPa) for cell rupture and its combination with conventional technics (lithic enzymes, glass beads and ultrasonication) for the recovery of astaxanthin were evaluated. Supercritical fluid extraction presented a higher astaxanthin recovery, 54% yield extraction, at 32.5 MPa and 313 °K, and using ethanol as co-solvent, compared to a 31% yield extraction by mean microfluidisation process at 160 MPa combined with 15 min of sonication (amplitude of 80%). 相似文献