全文获取类型
收费全文 | 28202篇 |
免费 | 3305篇 |
国内免费 | 2015篇 |
专业分类
电工技术 | 3899篇 |
综合类 | 3320篇 |
化学工业 | 497篇 |
金属工艺 | 504篇 |
机械仪表 | 2336篇 |
建筑科学 | 1212篇 |
矿业工程 | 1363篇 |
能源动力 | 254篇 |
轻工业 | 602篇 |
水利工程 | 445篇 |
石油天然气 | 766篇 |
武器工业 | 339篇 |
无线电 | 7893篇 |
一般工业技术 | 1838篇 |
冶金工业 | 289篇 |
原子能技术 | 285篇 |
自动化技术 | 7680篇 |
出版年
2024年 | 85篇 |
2023年 | 358篇 |
2022年 | 578篇 |
2021年 | 672篇 |
2020年 | 690篇 |
2019年 | 471篇 |
2018年 | 447篇 |
2017年 | 678篇 |
2016年 | 831篇 |
2015年 | 1060篇 |
2014年 | 1816篇 |
2013年 | 1640篇 |
2012年 | 2235篇 |
2011年 | 2436篇 |
2010年 | 1905篇 |
2009年 | 2003篇 |
2008年 | 2116篇 |
2007年 | 2438篇 |
2006年 | 2196篇 |
2005年 | 1922篇 |
2004年 | 1439篇 |
2003年 | 1216篇 |
2002年 | 919篇 |
2001年 | 736篇 |
2000年 | 574篇 |
1999年 | 398篇 |
1998年 | 256篇 |
1997年 | 233篇 |
1996年 | 207篇 |
1995年 | 212篇 |
1994年 | 159篇 |
1993年 | 123篇 |
1992年 | 84篇 |
1991年 | 73篇 |
1990年 | 59篇 |
1989年 | 51篇 |
1988年 | 40篇 |
1987年 | 24篇 |
1986年 | 20篇 |
1985年 | 22篇 |
1984年 | 26篇 |
1983年 | 14篇 |
1982年 | 16篇 |
1981年 | 9篇 |
1980年 | 10篇 |
1979年 | 11篇 |
1978年 | 3篇 |
1977年 | 3篇 |
1959年 | 4篇 |
1955年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 234 毫秒
911.
912.
913.
914.
915.
W. Clark K. Logan R. Luckin A. Mee & M. Oliver 《Journal of Computer Assisted Learning》2009,25(1):56-69
916.
LUO XiangYang LIU FenLin YANG ChunFang & WANG DaoShun Information Science Technology Institute Zhengzhou China 《中国科学:信息科学(英文版)》2010,(3):634-647
Based on the best wavelet packet decomposition of images, a new universal steganalysis method with high detection correct ratio is proposed. First, the best wavelet packet decomposition of image based on the Shannon entropy information cost function is made. Second, high order absolute characteristic function moments of histogram extracted from the coefficient subbands obtained by best wavelet packet decomposition are regarded as features. Finally, these features are processed and a back-propagation (BP) ne... 相似文献
917.
功率因数校正技术是抑制电网谐波电流,提高功率因数的有效方法。本文设计了一款基于TMS320LF2407的平均电流控制型的数字控制单相Boost-PFC控制器,研究了电压电流双闭环数字控制回路的设计方法,除此之外,还在Matlab/Simulink中建立了该数字控制PFC(Power Factor Correction)控制器模型,并对其性能进行了仿真研究。 相似文献
918.
The recognition of digital shapes is a deeply studied problem. The arithmetical framework, initiated by Reveillès [Géométrie discrète, calcul en nombres entiers et algorithmique, Thèse d’Etat, 1991], provides a powerful theoretical basis, as well as many algorithms to deal with digital objects. The tangential cover, first presented in Feschet and Tougne [Optimal time computation of the tangent of a discrete curve: application to the curvature, in: G. Bertrand, M. Couprie, L. Perroton (Eds.), 8th Discrete Geometry for Computer Imagery, Lecture Notes in Computer Science, vol. 1568, Springer, Berlin, 1999, pp. 31-40] and Feschet [Canonical representations of discrete curves, Pattern Anal. Appl. 8(1-2) (2005) 84-94] is a useful tool for representing geometric digital primitives. It computes the set of all maximal segments of a digital curve and permits either to obtain minimal length polygonalization or asymptotic convergence of tangents estimations. Nevertheless, the arithmetical approach does not tolerate the introduction of irregularities, which are however inherent to the acquisition of digital shapes. The present paper is an extension of Faure and Feschet [Tangential cover for thick digital curves, in: D. Coeurjolly, I. Sivignon, L. Tougne, F. Dupont (Eds.), DGCI 2008, Lecture Notes in Computer Science, vol. 4992, Springer, Berlin, 2008, pp. 358-369], in which we propose a new definition for a class of the so-called “thick digital curves” that applies well to a large class of digital object boundaries. We then propose an extension of the tangential cover to thick digital curves and provide an algorithm with an O(nlogn) time complexity, where n denotes the number of points of specific subparts of the thick digital curve. In order to keep up with this low complexity, some critical points must be taken into account. We describe all required implementation details in this paper. 相似文献
919.
Design of DL-based certificateless digital signatures 总被引:1,自引:0,他引:1
Public-key cryptosystems without requiring digital certificates are very attractive in wireless communications due to limitations imposed by communication bandwidth and computational resource of the mobile wireless communication devices. To eliminate public-key digital certificate, Shamir introduced the concept of the identity-based (ID-based) cryptosystem. The main advantage of the ID-based cryptosystem is that instead of using a random integer as each user’s public key as in the traditional public-key systems, the user’s real identity, such as user’s name or email address, becomes the user’s public key. However, all identity-based signature (IBS) schemes have the inherent key escrow problem, that is private key generator (PKG) knows the private key of each user. As a result, the PKG is able to sign any message on the users’ behalf. This nature violates the “non-repudiation” requirement of digital signatures. To solve the key escrow problem of the IBS while still taking advantage of the benefits of the IBS, certificateless digital signature (CDS) was introduced. In this paper, we propose a generalized approach to construct CDS schemes. In our proposed CDS scheme, the user’s private key is known only to the user himself, therefore, it can eliminate the key escrow problem from the PKG. The proposed construction can be applied to all Discrete Logarithm (DL)-based signature schemes to convert a digital signature scheme into a CDS scheme. The proposed CDS scheme is secure against adaptive chosen-message attack in the random oracle model. In addition, it is also efficient in signature generation and verification. 相似文献
920.
Mobile TV service, which provides television-like content through a mobile device, holds a limelight as the next killer application of wireless technologies and also as a prospective hedonic information technology. However, in a world where other potential wireless technologies and services speedily emerge, vendors and service providers interested in mobile TV hope that it will be diffused over the gulf between early users to general ones prior to competing sprouts. At this point, an investigation of early consumers’ adoption of mobile TV may offer precious information for its survival. Based on the theoretical assumptions of the technology acceptance model (TAM), this study examines influences of cognitive concentration (or flow experience) and media content on consumers’ acceptance of mobile TV. The results are threefold. First, results suggest that cognitive concentration (or flow experience) and content have a significant role in consumers’ intention to use hedonic information technology. Second, results show that content has a critical impact on cognitive concentration. Finally, results support the use of the extended TAM as an explainer in the context of hedonic information technology. 相似文献