全文获取类型
收费全文 | 73614篇 |
免费 | 8540篇 |
国内免费 | 5034篇 |
专业分类
电工技术 | 6162篇 |
技术理论 | 5篇 |
综合类 | 5932篇 |
化学工业 | 10396篇 |
金属工艺 | 4434篇 |
机械仪表 | 5085篇 |
建筑科学 | 6241篇 |
矿业工程 | 2581篇 |
能源动力 | 2200篇 |
轻工业 | 5488篇 |
水利工程 | 1827篇 |
石油天然气 | 3525篇 |
武器工业 | 927篇 |
无线电 | 9445篇 |
一般工业技术 | 7424篇 |
冶金工业 | 2756篇 |
原子能技术 | 1040篇 |
自动化技术 | 11720篇 |
出版年
2024年 | 473篇 |
2023年 | 1421篇 |
2022年 | 2967篇 |
2021年 | 4164篇 |
2020年 | 3113篇 |
2019年 | 2324篇 |
2018年 | 2575篇 |
2017年 | 2883篇 |
2016年 | 2488篇 |
2015年 | 3838篇 |
2014年 | 4764篇 |
2013年 | 5450篇 |
2012年 | 6465篇 |
2011年 | 6662篇 |
2010年 | 5941篇 |
2009年 | 5471篇 |
2008年 | 5181篇 |
2007年 | 4593篇 |
2006年 | 3905篇 |
2005年 | 3129篇 |
2004年 | 2042篇 |
2003年 | 1354篇 |
2002年 | 1218篇 |
2001年 | 924篇 |
2000年 | 789篇 |
1999年 | 711篇 |
1998年 | 434篇 |
1997年 | 377篇 |
1996年 | 333篇 |
1995年 | 282篇 |
1994年 | 224篇 |
1993年 | 152篇 |
1992年 | 107篇 |
1991年 | 102篇 |
1990年 | 70篇 |
1989年 | 51篇 |
1988年 | 50篇 |
1987年 | 27篇 |
1986年 | 22篇 |
1985年 | 9篇 |
1984年 | 11篇 |
1983年 | 3篇 |
1982年 | 11篇 |
1981年 | 11篇 |
1980年 | 21篇 |
1979年 | 16篇 |
1978年 | 2篇 |
1976年 | 2篇 |
1959年 | 14篇 |
1951年 | 10篇 |
排序方式: 共有10000条查询结果,搜索用时 10 毫秒
61.
Aggregate signatures are useful in special areas where the signatures on many different messages generated by many different users need to be compressed. In this paper, we study aggregate signatures in certificateless public key settings. We first present the notion and security model of certificateless aggregate signature schemes. Then we give an efficient certificateless aggregate signature scheme. Our scheme is existentially unforgeable under adaptive chosen-message attacks assuming the computational Diffie–Hellman problem is hard. 相似文献
62.
The measurement of plant community structure provides an extensive understanding of its function, succession and ecological process. The detection of plant community boundary is rather a challenge despite in situ work. Recent advances in object-based image analysis (OBIA) and machine learning algorithms offer new opportunities to address this challenge. This study presents a multi-scale segmentation approach to accurately identify the boundaries of each vegetation and plant community for mapping plant community structure. Initially, a very high resolution (VHR) Worldview-2 image of a desert area is hierarchically segmented from scale parameter 2 to 500. Afterward, the peak values of the standard deviation of brightness and normalized difference vegetation index (NDVI) across the segmentation scales are detected to determine the optimal segmentation scales of homogeneous single plant and plant community boundaries. A multi-scale classification of vegetation characterization with features of multiple bands, NDVI, grey-level co-occurrence matrix (GLCM) entropy and shape index is performed to identify dryland vegetation types. Finally, the four vegetation structural features on the type, diversity, object size and shape are calculated within the plant community boundaries and composed to plant community structure categories. Comparing the results with the object fitting index (FI) of the reference data, the validation indicates that the optimal segmentations of tree, shrub and plant communities are consistent with the identified peak values. 相似文献
63.
Jianjun Lei Cuicui Zhang Min Wu Lei You Kefeng Fan Chunping Hou 《Multimedia Tools and Applications》2017,76(6):7661-7676
Large holes are unavoidably generated in depth image based rendering (DIBR) using a single color image and its associated depth map. Such holes are mainly caused by disocclusion, which occurs around the sharp depth discontinuities in the depth map. We propose a divide-and-conquer hole-filling method which refines the background depth pixels around the sharp depth discontinuities to address the disocclusion problem. Firstly, the disocclusion region is detected according to the degree of depth discontinuity, and the target area is marked as a binary mask. Then, the depth pixels located in the target area are modified by a linear interpolation process, whose pixel values decrease from the foreground depth value to the background depth value. Finally, in order to remove the isolated depth pixels, median filtering is adopted to refine the depth map. In these ways, disocclusion regions in the synthesized view are divided into several small holes after DIBR, and are easily filled by image inpainting. Experimental results demonstrate that the proposed method can effectively improve the quality of the synthesized view subjectively and objectively. 相似文献
64.
Deng Juan Zhao Shu Wang Yan Wang Lei Wang Hong Sha Hong 《Multimedia Tools and Applications》2017,76(7):10097-10117
Multimedia Tools and Applications - Most of the existing image encryption algorithms based on compressive sensing are too complex to operate. An image compression-encryption scheme with simple... 相似文献
65.
E-commerce present opportunities and challenges for businesses, especially for micro-enterprises. This paper proposed a theoretical framework that in line with the unique characteristics of E-commerce acceptance in micro-enterprises in Chengdu, which is based on the unified theory of acceptance and use of technology (UTAUT) model. The extending UTAUT model includes key constructs of performance expectation, perceived behavioral control and the characteristics of owner-managers. 相似文献
66.
随着新课程改革的不断推进,小学数学课堂教学形式异彩纷呈。作为一名小学数学教师,我注重以新课标为指引,积极投身课改实验,逐步摸索出一条适用于小学数学课堂教学的模式。 相似文献
67.
无线传感器网络的应用日益广泛但安全性问题越发突出,由于其计算能力、存储能力和通信能力有限,一直被认为不适合使用公钥密码学方案。然而近年来不需要认证中心的IBE算法的研究成果表明,IBE方案非常适合无线传感器网络。本文提出一种高效的IBE方案,并做了算法介绍,同时在无线传感器网络中提出相应的密钥分配、认证、管理以及更新的应用方案。与现有其他算法相比,新方案具有系统参数短、安全性高等特点。 相似文献
68.
69.
70.
三对角对称矩阵逆特征问题 总被引:6,自引:0,他引:6
In this paper, four inverse eigenproblems with giventhree eigenvalues and corresponding eigenvectors are considered, somenecessary and sufficient conditions under which there exists a uniquesolution for these problems are given. Furthermore some numerical algorithmsand some numerical experiments are given. 相似文献