首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14722篇
  免费   2230篇
  国内免费   1365篇
电工技术   2394篇
综合类   2008篇
化学工业   2041篇
金属工艺   252篇
机械仪表   776篇
建筑科学   513篇
矿业工程   222篇
能源动力   294篇
轻工业   592篇
水利工程   252篇
石油天然气   465篇
武器工业   138篇
无线电   2059篇
一般工业技术   1088篇
冶金工业   431篇
原子能技术   96篇
自动化技术   4696篇
  2024年   99篇
  2023年   253篇
  2022年   428篇
  2021年   577篇
  2020年   589篇
  2019年   519篇
  2018年   548篇
  2017年   619篇
  2016年   691篇
  2015年   724篇
  2014年   943篇
  2013年   1008篇
  2012年   1266篇
  2011年   1206篇
  2010年   887篇
  2009年   891篇
  2008年   825篇
  2007年   884篇
  2006年   868篇
  2005年   669篇
  2004年   550篇
  2003年   547篇
  2002年   437篇
  2001年   330篇
  2000年   315篇
  1999年   244篇
  1998年   215篇
  1997年   165篇
  1996年   167篇
  1995年   129篇
  1994年   114篇
  1993年   86篇
  1992年   81篇
  1991年   65篇
  1990年   54篇
  1989年   54篇
  1988年   36篇
  1987年   27篇
  1986年   16篇
  1985年   29篇
  1984年   16篇
  1983年   19篇
  1982年   30篇
  1981年   14篇
  1979年   6篇
  1978年   5篇
  1977年   7篇
  1964年   10篇
  1963年   5篇
  1961年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Yu FU  Yihan YU  Xiaoping WU 《通信学报》2019,40(10):157-168
The privacy protection in big data is a research hotspot in the field of cyberspace security.As a strict and provable definition of privacy protection,studying application status of differential privacy protection in big data environment can provide reference and guidance for its subsequent system applications.Based on the analysis of the related concepts and technical characteristics of differential privacy protection,the application of differential privacy protection technology was reviewed in data distribution and analysis,cloud computing and big data computing,location and trajectory services and social networks,which expounded the current representative research results and analyzed its existing problems.The research shows that the existing results have made effective innovation and exploration of differential privacy protection applications from the aspects of differential privacy protection mechanism,noise addition mechanism and location,and data processing methods,and the related results have been cross-applied in different scenarios.Finally,four major problems that need to be studied in the further systematic application of differential privacy protection in the big data environment are proposed.  相似文献   
992.
With the continuous development of social network application,user’s personal social data is so sensitive that the problem of privacy protection needs to be solved urgently.In order to reduce the network data sensitivity,a differential privacy protection scheme BCPA based on edge betweenness model was proposed.The 2K sequence corresponding to the graph structure based on the dK model was captured,and 2K sequences based on the edge betweenness centrality were reordered.According to the result of reordering,the 2K sequence was grouped into several sub-sequences,and each sub-sequence was respectively added with noise by a dK perturbation algorithm.Finally,a social network graph satisfying differential privacy was generated according to the new 2K sequences after integration.Based on the real datasets,the scheme was compared with the classical schemes through simulation experiments.The results demonstrate that it improves the accuracy and usability of data while ensuring desired privacy protection level.  相似文献   
993.
With rapid developments of digital photography and social networks,users of photo-sharing-supported social networking applications can easily forward photos across different social networks at the cost of their growing privacy concerns.To address this problem,a privacy-preserving photo sharing framework was proposed,which could apply to extended control and privacy invasion tracing.In extended control scheme,the following users on a dissemination chain was restrained by each user’s privacy policy.Then several privacy areas of photos were encrypted and the access control polices were bound to the uploaded photos,so that any privacy areas on the photos could be hidden away from unwanted viewers even across different social networks.On this basis,the behaviors of users were record by tracing scheme of privacy invasion,the integrality of records was protected by using nested signature algorithm.The correctness,security and performance of overhead of the scheme are then thoroughly analyzed and evaluated via detailed simulations.  相似文献   
994.
The existing encryption schemes were usua11y poor of index construction and maintenance,which was difficu1t to meet the retrieva1 requirements for distributed ciphertext.Aiming at the above shortage of existing schemes,a structure of separab1e ciphertext inverted index was proposed for improving the performance of para11e1 constructing cryptograph index,simp1ifying the data maintenance process,and increasing the compatibi1ity with the traditiona1 NoSQL system.The method of centra1ized inverted index was adopted to improve the retrieva1 efficiency of distributed retrieva1 system.Then,the proposed scheme was proved to meet the wide1y adopted IND-CKA security standard.Fina11y,Cassandra was combined to eva1uate the severa1 performance parameters,and the experimenta1 resu1ts show proposed architecture has good app1icabi1ity to the distributed and massive encrypted data environment.  相似文献   
995.
蒋玲  沈龙妹  侯文 《现代电子技术》2006,29(12):130-131
PSpice软件以其精确和接近实际的电路模型和元器件模型,能对电子线路进行逼真的模拟,为电路学习和设计者提供一个虚拟工作平台。以差动放大电路的研究为实例,通过理论推导差动放大电路的差模传输特性和共模传输特性,对照PSpice仿真结果,说明ORCAD电路仿真在模拟电子电路教学中的积极作用。  相似文献   
996.
一套测量对流层臭氧的差分吸收激光雷达系统   总被引:1,自引:0,他引:1  
差分吸收激光雷达是探测对流层臭氧分布的一种先进工具。研制了一套车载差分激光雷达系统,系统基于NdYAG四倍频激光和拉曼频移技术产生紫外差分光源,并采用卡塞格林(Cassegrain)型望远镜,利用光栅光谱仪分离四波长的回波信号,使用光子计数和模拟采集相融合的方式采集数据。讨论分析了系统的测量精度并与臭氧探空仪进行了对比验证实验。实验结果表明,两台仪器测量的对流层臭氧具有很好的一致性,证实了车载差分吸收激光雷达系统及臭氧浓度分析软件的可靠性。  相似文献   
997.
一种基于Hash函数的RFID安全认证方法   总被引:1,自引:0,他引:1  
钱萍  吴蒙 《电信科学》2011,27(10):109-112
近年来,射频识别(RFID)技术得到越来越多的应用,随之而来的是各种RFID安全问题。对现有的基于Hash函数的RFID认证协议进行分析,针对现有技术存在的不足,提出了一种基于Hash函数的低成本的RFID双向安全认证方法,该方法只需要进行一次Hash函数计算,且加入了标签ID动态更新机制,通过在后台数据库中存储旧的标签ID解决同步问题,与现有技术相比具有一定的优越性。  相似文献   
998.
赵建 《液晶与显示》2012,27(1):121-124
为了实现对模糊图像边缘及纹理的增强,使图像的细节信息更加清晰,需要对图像进行锐化增强。现有的增强方法一般是整数阶微分锐化及高通滤波,由于这些方法的处理效果仍不理想,文中引入了分数阶微分算子。分数阶微分不仅可以很好地增强图像的边缘和纹理信息,还可以保留平滑区域信息,抑制较大噪声。研究并分析了Tiansi分数阶微分算子的原理及特点,并对其进行了改进,提出了一种新的分数阶微分算子,可以更好地增强图像的边缘和纹理信息,同时保证图像的亮度不产生大幅度变化,而且可以抑制较小噪声的影响。从定量的角度分析,改进的分数阶微分算子的平均梯度最大可比原图像提高3.8倍。从而验证了改进的分数阶微分算子比整数阶微分算子如Laplace算子及Tiansi分数阶微分算子具有优越性,且算法简单易于实现,可应用于工程中的实时图像处理系统中。  相似文献   
999.
陈月云  张龙  周贤伟 《中国通信》2012,9(12):117-126
In this study, aiming at the characteristics of randomness and dynamics in Wearable Audio-o-riented BodyNets(WA-BodyNets), stochastic differ-ential game theory is applied to the investigation of the problem of transmitted power control inconsum-er electronic devices. First, astochastic differential game model is proposed for non-cooperative decen-tralized uplink power control with a wisdom regula-tion factor over WA-BodyNets with a one-hop star topology.This model aims to minimize the cost as-sociated with the novel payoff function of a player, for which two cost functions are defined: functions of inherent power radiation and accumulated power radiation damage. Second, the feedback Nash equi-librium solution of the proposed model and the con-straint of the Quality of Service (QoS) requirement of the player based on the SIR threshold are derived by solving the Fleming-Bellman-Isaacs partial dif-ferential equations. Furthermore, the Markov prop-erty of the optimal feedback strategies in this model is verified.The simulation results show that the pro-posed game model is effective and feasible for con-trolling the transmitted power of WA-BodyNets.  相似文献   
1000.
The current success of ephemeral communication apps such as Snapchat points to the growing awareness among users about online ‘biographic mining’ through information technology by advertisers, companies and government agencies. Based on the literature, we argue that location-based services (LBS) can be the answer to preserving privacy, on the condition that they target trusted communities of anonymous users and that the communication is transient. The paper describes in three steps the development of an app fulfilling these conditions. From the interdisciplinary exchange between digital anthropologists, GIScientists and ICT engineers resulted Zone-it, a virtual notice board for self-zoning, permitting the user to start location-based interactions under certain categories. We present the results of a user survey that determined the app's functionalities. The functionalities offer a way for LBS to invert the purpose of social media such as Facebook by shifting attention from person-based to goal-oriented communication. The paper discusses why this move away from ‘faces’ to ‘places’ meets the purpose of community-building, rather than jeopardising it.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号