全文获取类型
收费全文 | 122327篇 |
免费 | 12368篇 |
国内免费 | 7414篇 |
专业分类
电工技术 | 9477篇 |
技术理论 | 5篇 |
综合类 | 9708篇 |
化学工业 | 18044篇 |
金属工艺 | 7341篇 |
机械仪表 | 8359篇 |
建筑科学 | 10367篇 |
矿业工程 | 3507篇 |
能源动力 | 3409篇 |
轻工业 | 8944篇 |
水利工程 | 2871篇 |
石油天然气 | 5751篇 |
武器工业 | 1311篇 |
无线电 | 15138篇 |
一般工业技术 | 13453篇 |
冶金工业 | 4834篇 |
原子能技术 | 1527篇 |
自动化技术 | 18063篇 |
出版年
2024年 | 666篇 |
2023年 | 2189篇 |
2022年 | 4311篇 |
2021年 | 5851篇 |
2020年 | 4418篇 |
2019年 | 3424篇 |
2018年 | 3542篇 |
2017年 | 4191篇 |
2016年 | 3795篇 |
2015年 | 5460篇 |
2014年 | 6724篇 |
2013年 | 7983篇 |
2012年 | 8992篇 |
2011年 | 9673篇 |
2010年 | 8617篇 |
2009年 | 8423篇 |
2008年 | 8391篇 |
2007年 | 7474篇 |
2006年 | 6972篇 |
2005年 | 5581篇 |
2004年 | 3813篇 |
2003年 | 3193篇 |
2002年 | 3415篇 |
2001年 | 3040篇 |
2000年 | 2393篇 |
1999年 | 1974篇 |
1998年 | 1427篇 |
1997年 | 1181篇 |
1996年 | 1050篇 |
1995年 | 899篇 |
1994年 | 709篇 |
1993年 | 548篇 |
1992年 | 408篇 |
1991年 | 339篇 |
1990年 | 229篇 |
1989年 | 196篇 |
1988年 | 151篇 |
1987年 | 100篇 |
1986年 | 75篇 |
1985年 | 56篇 |
1984年 | 38篇 |
1983年 | 35篇 |
1982年 | 36篇 |
1981年 | 26篇 |
1980年 | 35篇 |
1979年 | 18篇 |
1976年 | 5篇 |
1967年 | 3篇 |
1959年 | 8篇 |
1951年 | 11篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
71.
72.
73.
The SRM (Spatial Rich Model) is a very effective steganalysis method. It uses statistics of neighboring noise residual samples as features to capture the dependency changes caused by embedding. Because the noise residuals are the high-frequency components of image and closely tied to image content, the residuals of different types of image regions have different statistical properties and effectiveness for steganalysis. In this paper, the effectiveness of the residuals is investigated. Then the effectiveness of the statistics collected from different types of neighboring residual samples is investigated from the FLD (Fisher Linear Discriminant) viewpoint, and ineffective, effective and high-effective neighboring residual samples are defined. The ineffective neighboring residual samples are not likely to change during embedding, and if they are counted in statistics, they may mix the features with noise and make the features impure. Pure SRM features are extracted based on neighboring noise residual sample selection strategy. Furthermore, multi-order statistical features are proposed to increase the statistical diversity. Steganalysis performances of the statistical features collected from different types of neighboring residual samples are investigated on three content adaptive steganographic algorithms. Experimental results demonstrate that the proposed method can achieve a more accurate detection than SRM. 相似文献
74.
75.
Multi-agent technologies have been widely employed for the development of web-based systems, including web-based e-markets, web-based grid computing, e-governments and service-oriented software systems. In these service-oriented systems, service provider agents and service consumer agents are autonomous and rational entities, which can enter and leave the environments freely. For simplicity, we use terms ‘provider’ and ‘consumer’ to represent this two types of agents. How to select the most suitable service providers according to a service request from a consumer in such an open environment is a very challenging issue. In this paper, we propose an innovative trust model, called the GTrust model, for service group selection in general service-oriented environments. In the GTrust model, the trust evaluation for a service group is based on the functionality coverage of the group, the dependency relationships among individual services in the group, the ratings of individual services on the attributes of the service request and a similarity measurement of the extent to which reference reports can reflect the service request in terms of the priority distribution of attributes. The experimental results and analysis demonstrate the good performance of the GTrust model on the service group selection in service-oriented environments. 相似文献
76.
77.
In this work, we have put forth two different protocols to address a concrete secure multi-party computational (MPC) problem related to a triangle, of which the coordinates of the three vertices are confidentially kept by the three participants, respectively. The three parties wish to collaboratively compute the area of this triangle while preserving their own coordinate privacy. As one of the merits, our protocols employ weaker assumptions of the existence of pseudorandom generators. In particular, unlike massive secure MPC protocols that rely a lot on oblivious transfer, ours utilize a new computing idea called “pseudorandom-then-rounding” method to avoid this burdensome obstacle. The two protocols are based on different theorems, while they both make use of the same underlying idea. At last, we provide a detailed proof for the first protocol by a series of security reductions of our newly defined games, which seems somewhat stronger than the previous simulation-based proofs and a proof sketch for the second one. Analysis and discussion about the reasons are provided as well to round off our work. 相似文献
78.
在经济的推动下,商业区数量日益增多,空间布局更加紧凑,用电量也随之大幅增加,管理更为困难。因此,要重视商业区建筑的供电配电。介绍了商业区建筑的特点,然后结合实际案例对其供配电进行了设计。 相似文献
79.
80.