全文获取类型
收费全文 | 14722篇 |
免费 | 2230篇 |
国内免费 | 1365篇 |
专业分类
电工技术 | 2394篇 |
综合类 | 2008篇 |
化学工业 | 2041篇 |
金属工艺 | 252篇 |
机械仪表 | 776篇 |
建筑科学 | 513篇 |
矿业工程 | 222篇 |
能源动力 | 294篇 |
轻工业 | 592篇 |
水利工程 | 252篇 |
石油天然气 | 465篇 |
武器工业 | 138篇 |
无线电 | 2059篇 |
一般工业技术 | 1088篇 |
冶金工业 | 431篇 |
原子能技术 | 96篇 |
自动化技术 | 4696篇 |
出版年
2024年 | 99篇 |
2023年 | 253篇 |
2022年 | 428篇 |
2021年 | 577篇 |
2020年 | 589篇 |
2019年 | 519篇 |
2018年 | 548篇 |
2017年 | 619篇 |
2016年 | 691篇 |
2015年 | 724篇 |
2014年 | 943篇 |
2013年 | 1008篇 |
2012年 | 1266篇 |
2011年 | 1206篇 |
2010年 | 887篇 |
2009年 | 891篇 |
2008年 | 825篇 |
2007年 | 884篇 |
2006年 | 868篇 |
2005年 | 669篇 |
2004年 | 550篇 |
2003年 | 547篇 |
2002年 | 437篇 |
2001年 | 330篇 |
2000年 | 315篇 |
1999年 | 244篇 |
1998年 | 215篇 |
1997年 | 165篇 |
1996年 | 167篇 |
1995年 | 129篇 |
1994年 | 114篇 |
1993年 | 86篇 |
1992年 | 81篇 |
1991年 | 65篇 |
1990年 | 54篇 |
1989年 | 54篇 |
1988年 | 36篇 |
1987年 | 27篇 |
1986年 | 16篇 |
1985年 | 29篇 |
1984年 | 16篇 |
1983年 | 19篇 |
1982年 | 30篇 |
1981年 | 14篇 |
1979年 | 6篇 |
1978年 | 5篇 |
1977年 | 7篇 |
1964年 | 10篇 |
1963年 | 5篇 |
1961年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
The privacy protection in big data is a research hotspot in the field of cyberspace security.As a strict and provable definition of privacy protection,studying application status of differential privacy protection in big data environment can provide reference and guidance for its subsequent system applications.Based on the analysis of the related concepts and technical characteristics of differential privacy protection,the application of differential privacy protection technology was reviewed in data distribution and analysis,cloud computing and big data computing,location and trajectory services and social networks,which expounded the current representative research results and analyzed its existing problems.The research shows that the existing results have made effective innovation and exploration of differential privacy protection applications from the aspects of differential privacy protection mechanism,noise addition mechanism and location,and data processing methods,and the related results have been cross-applied in different scenarios.Finally,four major problems that need to be studied in the further systematic application of differential privacy protection in the big data environment are proposed. 相似文献
992.
With the continuous development of social network application,user’s personal social data is so sensitive that the problem of privacy protection needs to be solved urgently.In order to reduce the network data sensitivity,a differential privacy protection scheme BCPA based on edge betweenness model was proposed.The 2K sequence corresponding to the graph structure based on the dK model was captured,and 2K sequences based on the edge betweenness centrality were reordered.According to the result of reordering,the 2K sequence was grouped into several sub-sequences,and each sub-sequence was respectively added with noise by a dK perturbation algorithm.Finally,a social network graph satisfying differential privacy was generated according to the new 2K sequences after integration.Based on the real datasets,the scheme was compared with the classical schemes through simulation experiments.The results demonstrate that it improves the accuracy and usability of data while ensuring desired privacy protection level. 相似文献
993.
With rapid developments of digital photography and social networks,users of photo-sharing-supported social networking applications can easily forward photos across different social networks at the cost of their growing privacy concerns.To address this problem,a privacy-preserving photo sharing framework was proposed,which could apply to extended control and privacy invasion tracing.In extended control scheme,the following users on a dissemination chain was restrained by each user’s privacy policy.Then several privacy areas of photos were encrypted and the access control polices were bound to the uploaded photos,so that any privacy areas on the photos could be hidden away from unwanted viewers even across different social networks.On this basis,the behaviors of users were record by tracing scheme of privacy invasion,the integrality of records was protected by using nested signature algorithm.The correctness,security and performance of overhead of the scheme are then thoroughly analyzed and evaluated via detailed simulations. 相似文献
994.
The existing encryption schemes were usua11y poor of index construction and maintenance,which was difficu1t to meet the retrieva1 requirements for distributed ciphertext.Aiming at the above shortage of existing schemes,a structure of separab1e ciphertext inverted index was proposed for improving the performance of para11e1 constructing cryptograph index,simp1ifying the data maintenance process,and increasing the compatibi1ity with the traditiona1 NoSQL system.The method of centra1ized inverted index was adopted to improve the retrieva1 efficiency of distributed retrieva1 system.Then,the proposed scheme was proved to meet the wide1y adopted IND-CKA security standard.Fina11y,Cassandra was combined to eva1uate the severa1 performance parameters,and the experimenta1 resu1ts show proposed architecture has good app1icabi1ity to the distributed and massive encrypted data environment. 相似文献
995.
996.
一套测量对流层臭氧的差分吸收激光雷达系统 总被引:1,自引:0,他引:1
差分吸收激光雷达是探测对流层臭氧分布的一种先进工具。研制了一套车载差分激光雷达系统,系统基于NdYAG四倍频激光和拉曼频移技术产生紫外差分光源,并采用卡塞格林(Cassegrain)型望远镜,利用光栅光谱仪分离四波长的回波信号,使用光子计数和模拟采集相融合的方式采集数据。讨论分析了系统的测量精度并与臭氧探空仪进行了对比验证实验。实验结果表明,两台仪器测量的对流层臭氧具有很好的一致性,证实了车载差分吸收激光雷达系统及臭氧浓度分析软件的可靠性。 相似文献
997.
一种基于Hash函数的RFID安全认证方法 总被引:1,自引:0,他引:1
近年来,射频识别(RFID)技术得到越来越多的应用,随之而来的是各种RFID安全问题。对现有的基于Hash函数的RFID认证协议进行分析,针对现有技术存在的不足,提出了一种基于Hash函数的低成本的RFID双向安全认证方法,该方法只需要进行一次Hash函数计算,且加入了标签ID动态更新机制,通过在后台数据库中存储旧的标签ID解决同步问题,与现有技术相比具有一定的优越性。 相似文献
998.
为了实现对模糊图像边缘及纹理的增强,使图像的细节信息更加清晰,需要对图像进行锐化增强。现有的增强方法一般是整数阶微分锐化及高通滤波,由于这些方法的处理效果仍不理想,文中引入了分数阶微分算子。分数阶微分不仅可以很好地增强图像的边缘和纹理信息,还可以保留平滑区域信息,抑制较大噪声。研究并分析了Tiansi分数阶微分算子的原理及特点,并对其进行了改进,提出了一种新的分数阶微分算子,可以更好地增强图像的边缘和纹理信息,同时保证图像的亮度不产生大幅度变化,而且可以抑制较小噪声的影响。从定量的角度分析,改进的分数阶微分算子的平均梯度最大可比原图像提高3.8倍。从而验证了改进的分数阶微分算子比整数阶微分算子如Laplace算子及Tiansi分数阶微分算子具有优越性,且算法简单易于实现,可应用于工程中的实时图像处理系统中。 相似文献
999.
In this study, aiming at the characteristics of randomness and dynamics in Wearable Audio-o-riented BodyNets(WA-BodyNets), stochastic differ-ential game theory is applied to the investigation of the problem of transmitted power control inconsum-er electronic devices. First, astochastic differential game model is proposed for non-cooperative decen-tralized uplink power control with a wisdom regula-tion factor over WA-BodyNets with a one-hop star topology.This model aims to minimize the cost as-sociated with the novel payoff function of a player, for which two cost functions are defined: functions of inherent power radiation and accumulated power radiation damage. Second, the feedback Nash equi-librium solution of the proposed model and the con-straint of the Quality of Service (QoS) requirement of the player based on the SIR threshold are derived by solving the Fleming-Bellman-Isaacs partial dif-ferential equations. Furthermore, the Markov prop-erty of the optimal feedback strategies in this model is verified.The simulation results show that the pro-posed game model is effective and feasible for con-trolling the transmitted power of WA-BodyNets. 相似文献
1000.
《Journal of Location Based Services》2013,7(1):16-32
The current success of ephemeral communication apps such as Snapchat points to the growing awareness among users about online ‘biographic mining’ through information technology by advertisers, companies and government agencies. Based on the literature, we argue that location-based services (LBS) can be the answer to preserving privacy, on the condition that they target trusted communities of anonymous users and that the communication is transient. The paper describes in three steps the development of an app fulfilling these conditions. From the interdisciplinary exchange between digital anthropologists, GIScientists and ICT engineers resulted Zone-it, a virtual notice board for self-zoning, permitting the user to start location-based interactions under certain categories. We present the results of a user survey that determined the app's functionalities. The functionalities offer a way for LBS to invert the purpose of social media such as Facebook by shifting attention from person-based to goal-oriented communication. The paper discusses why this move away from ‘faces’ to ‘places’ meets the purpose of community-building, rather than jeopardising it. 相似文献