全文获取类型
收费全文 | 64629篇 |
免费 | 6465篇 |
国内免费 | 4148篇 |
专业分类
电工技术 | 5281篇 |
技术理论 | 2篇 |
综合类 | 4594篇 |
化学工业 | 7576篇 |
金属工艺 | 3494篇 |
机械仪表 | 3818篇 |
建筑科学 | 4454篇 |
矿业工程 | 1934篇 |
能源动力 | 1700篇 |
轻工业 | 4346篇 |
水利工程 | 1504篇 |
石油天然气 | 2636篇 |
武器工业 | 775篇 |
无线电 | 7400篇 |
一般工业技术 | 5367篇 |
冶金工业 | 2104篇 |
原子能技术 | 917篇 |
自动化技术 | 17340篇 |
出版年
2024年 | 324篇 |
2023年 | 965篇 |
2022年 | 2024篇 |
2021年 | 2873篇 |
2020年 | 2037篇 |
2019年 | 1613篇 |
2018年 | 1745篇 |
2017年 | 2000篇 |
2016年 | 1846篇 |
2015年 | 2721篇 |
2014年 | 3569篇 |
2013年 | 4100篇 |
2012年 | 5448篇 |
2011年 | 7775篇 |
2010年 | 5442篇 |
2009年 | 5068篇 |
2008年 | 4521篇 |
2007年 | 4258篇 |
2006年 | 3761篇 |
2005年 | 3146篇 |
2004年 | 2342篇 |
2003年 | 1879篇 |
2002年 | 1546篇 |
2001年 | 998篇 |
2000年 | 743篇 |
1999年 | 543篇 |
1998年 | 418篇 |
1997年 | 284篇 |
1996年 | 243篇 |
1995年 | 215篇 |
1994年 | 141篇 |
1993年 | 89篇 |
1992年 | 90篇 |
1991年 | 57篇 |
1990年 | 56篇 |
1989年 | 42篇 |
1988年 | 30篇 |
1987年 | 20篇 |
1986年 | 29篇 |
1985年 | 18篇 |
1984年 | 37篇 |
1983年 | 20篇 |
1982年 | 14篇 |
1981年 | 17篇 |
1980年 | 22篇 |
1979年 | 15篇 |
1978年 | 8篇 |
1977年 | 14篇 |
1976年 | 24篇 |
1959年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
Generalized honeycomb torus (GHT) is recognized as an attractive alternative to existing torus interconnection networks in parallel computing systems. Assume that m and d are integers with m ? 2 and d ? 8. This paper addresses the fault-tolerant hamiltonicity of GHT(m, 2d, d) with fault set F = {(w, y), (x, y)}, where w < x, w + y is even and x + y is odd. We show that such a faulty GHT is hamiltonian by presenting a systematic method for constructing a fault-free hamiltonian cycle. This result reveals another appealing feature of GHTs. 相似文献
92.
Design of DL-based certificateless digital signatures 总被引:1,自引:0,他引:1
Public-key cryptosystems without requiring digital certificates are very attractive in wireless communications due to limitations imposed by communication bandwidth and computational resource of the mobile wireless communication devices. To eliminate public-key digital certificate, Shamir introduced the concept of the identity-based (ID-based) cryptosystem. The main advantage of the ID-based cryptosystem is that instead of using a random integer as each user’s public key as in the traditional public-key systems, the user’s real identity, such as user’s name or email address, becomes the user’s public key. However, all identity-based signature (IBS) schemes have the inherent key escrow problem, that is private key generator (PKG) knows the private key of each user. As a result, the PKG is able to sign any message on the users’ behalf. This nature violates the “non-repudiation” requirement of digital signatures. To solve the key escrow problem of the IBS while still taking advantage of the benefits of the IBS, certificateless digital signature (CDS) was introduced. In this paper, we propose a generalized approach to construct CDS schemes. In our proposed CDS scheme, the user’s private key is known only to the user himself, therefore, it can eliminate the key escrow problem from the PKG. The proposed construction can be applied to all Discrete Logarithm (DL)-based signature schemes to convert a digital signature scheme into a CDS scheme. The proposed CDS scheme is secure against adaptive chosen-message attack in the random oracle model. In addition, it is also efficient in signature generation and verification. 相似文献
93.
Zhe-Ming Lu Author Vitae Jun-Xiang Wang Author Vitae Bei-Bei Liu Author Vitae 《Journal of Systems and Software》2009,82(6):1016-1024
Copyright protection and information security have become serious problems due to the ever growing amount of digital data over the Internet. Reversible data hiding is a special type of data hiding technique that guarantees not only the secret data but also the cover media can be reconstructed without any distortion. Traditional schemes are based on spatial, discrete cosine transformation (DCT) and discrete wavelet transformation (DWT) domains. Recently, some vector quantization (VQ) based reversible data hiding schemes have been proposed. This paper proposes an improved reversible data hiding scheme based on VQ-index residual value coding. Experimental results show that our scheme outperforms two recently proposed schemes, namely side-match vector quantization (SMVQ)-based data hiding and modified fast correlation vector quantization (MFCVQ)-based data hiding. 相似文献
94.
We consider the problem of revenue maximization on multi‐unit auctions where items are distinguished by their relative values; any pair of items has the same ratio of values to all buyers. As is common in the study of revenue maximizing problems, we assume that buyers' valuations are drawn from public known distributions and they have additive valuations for multiple items. Our problem is well motivated by sponsored search auctions, which made money for Google and Yahoo! in practice. In this auction, each advertiser bids an amount bi to compete for ad slots on a web page. The value of each ad slot corresponds to its click‐through‐rate, and each buyer has her own per‐click valuations, which is her private information. Obviously, a strategic bidder may bid an amount that is different with her true valuation to improve her utility. Our goal is to design truthful mechanisms avoiding this misreporting. We develop the optimal (with maximum revenue) truthful auction for a relaxed demand model (where each buyer i wants at most di items) and a sharp demand model (where buyer i wants exactly di items). We also find an auction that always guarantees at least half of the revenue of the optimal auction when the buyers are budget constrained. Moreover, all of the auctions we design can be computed efficiently, that is, in polynomial time. 相似文献
95.
张博 《电脑编程技巧与维护》2013,(10):80-81
从PHP实现字符串的正确输出入手,分析了PHP中相关字符串处理函数在Web程序开发中发挥的重要作用。 相似文献
96.
This paper studies event design in event-triggered feedback systems. A novel event-triggering scheme is presented to ensure exponential stability of the resulting sampled-data system. The scheme postpones the triggering of events over previously proposed methods and therefore enlarges the intersampling period. The resulting intersampling periods and deadlines are bounded strictly away from zero when the continuous time system is input-to-state stable with respect to measurement errors. 相似文献
97.
Céline Casenave Author vitae 《Automatica》2011,47(10):2273-2278
We present a time-continuous identification method for nonlinear dynamic Volterra models of the form HX=f(u,X)+v with H, a causal convolution operator. It is mainly based on a suitable parameterization of H deduced from the so-called diffusive representation, which is devoted to state representations of integral operators. Following this approach, the complex dynamic nature of H can be summarized by a few numerical parameters on which the identification of the dynamic part of the model will focus. The method is validated on a physical numerical example. 相似文献
98.
Model reference control design methods fail when the plant has one or more non-minimum phase zeros that are not included in the reference model, leading possibly to an unstable closed loop. This is a very serious problem for data-based control design methods, where the plant is typically unknown. In this paper, we extend the Virtual Reference Feedback Tuning method to non-minimum phase plants. This extension is based on the idea proposed in Lecchini and Gevers (2002) for Iterative Feedback Tuning. We present a simple two-step procedure that can cope with the situation where the unknown plant may or may not have non-minimum phase zeros. 相似文献
99.
Duan Li Xiaoling Sun Jianjun Gao Shenshen Gu Xiaojin ZhengAuthor vitae 《Automatica》2011,47(9):2094-2098
Reachability is one of the most important behavioral properties of Petri nets. We propose in this paper a novel approach for solving the fundamental equation in the reachability analysis of acyclic Petri nets, which has been known to be NP-complete. More specifically, by adopting a revised version of the cell enumeration method for an arrangement of hyperplanes in discrete geometry, we develop an efficient solution scheme to identify firing count vector solution(s) to the fundamental equation on a bounded integer set, with a complexity bound of O((nu)n−m), where n is the number of transitions, m is the number of places and u is the upper bound of the number of firings for all individual transitions. 相似文献
100.
Yoshito Ohta Author vitae 《Automatica》2011,47(5):1001-1006
This paper studies the system transformation using generalized orthonormal basis functions that include the Laguerre basis as a special case. The transformation of the deterministic systems is studied in the literature, which is called the Hambo transform. The aim of the paper is to develop a transformation theory for stochastic systems. The paper establishes the equivalence of continuous and transformed-discrete-time stochastic systems in terms of solutions. The method is applied to the continuous-time system identification problem. It is shown that using the transformed signals the PO-MOESP subspace identification algorithm yields consistent estimates for system matrices. An example is included to illustrate the efficacy of the proposed identification method, and to make a comparison with the method using the Laguerre filter. 相似文献