全文获取类型
收费全文 | 41796篇 |
免费 | 5027篇 |
国内免费 | 3863篇 |
专业分类
电工技术 | 3413篇 |
技术理论 | 2篇 |
综合类 | 7160篇 |
化学工业 | 2069篇 |
金属工艺 | 889篇 |
机械仪表 | 2778篇 |
建筑科学 | 2930篇 |
矿业工程 | 874篇 |
能源动力 | 907篇 |
轻工业 | 2683篇 |
水利工程 | 1089篇 |
石油天然气 | 913篇 |
武器工业 | 514篇 |
无线电 | 5521篇 |
一般工业技术 | 4328篇 |
冶金工业 | 1015篇 |
原子能技术 | 556篇 |
自动化技术 | 13045篇 |
出版年
2024年 | 178篇 |
2023年 | 562篇 |
2022年 | 997篇 |
2021年 | 1105篇 |
2020年 | 1153篇 |
2019年 | 1089篇 |
2018年 | 1104篇 |
2017年 | 1324篇 |
2016年 | 1448篇 |
2015年 | 1514篇 |
2014年 | 2237篇 |
2013年 | 2556篇 |
2012年 | 2936篇 |
2011年 | 3114篇 |
2010年 | 2458篇 |
2009年 | 2653篇 |
2008年 | 2778篇 |
2007年 | 3180篇 |
2006年 | 2803篇 |
2005年 | 2489篇 |
2004年 | 2113篇 |
2003年 | 1740篇 |
2002年 | 1448篇 |
2001年 | 1220篇 |
2000年 | 1082篇 |
1999年 | 904篇 |
1998年 | 732篇 |
1997年 | 629篇 |
1996年 | 570篇 |
1995年 | 512篇 |
1994年 | 428篇 |
1993年 | 300篇 |
1992年 | 273篇 |
1991年 | 222篇 |
1990年 | 205篇 |
1989年 | 184篇 |
1988年 | 120篇 |
1987年 | 71篇 |
1986年 | 40篇 |
1985年 | 36篇 |
1984年 | 27篇 |
1983年 | 38篇 |
1982年 | 26篇 |
1981年 | 13篇 |
1980年 | 14篇 |
1979年 | 10篇 |
1978年 | 6篇 |
1977年 | 6篇 |
1976年 | 7篇 |
1955年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
971.
魏专 《湖南工业大学学报》1998,(2)
产品形态设计怎样才能顺应时代的发展?根据我国国情,从国际流行趋势、功能、性能优化、人本性、新技术以及产品周期六个方面进行了探讨。 相似文献
972.
Valuations — morphisms from (
n
*
,·,) to ((0, ), ·, 1) — are a simple generalization of so-called Bernoulli morphisms. In this paper, we show a characterization of strongly unambiguous regular expressions with the help of valuations and formal power series. We apply these algebraic results to the determination of Hausdorff dimensions of fractals described by regular expressions. 相似文献
973.
GOST 34.10 is Russia's DSA. Like its US counterpart, GOST is an ElGamal-like signature scheme used in Schnorr mode. It is similar to NIST DSA in many aspects. In this paper we will overview GOST 34.10 and discuss the three main differences between the two algorithms, (i) GOST's principal design criterion does not seem to be computational efficiency: the algorithm is 1.6 times slower than the DSA and produces 512-bit signatures. This is mainly due to the usage of the modulus q which is at least 254 bits long. During verification, modular inverses are computed by exponentiation (while the Extended Euclidian algorithm is roughly 100 times faster for this parameter size) and the generation of the public parameters is much more complicated than in the DSA. This choice of the parameters makes GOST 34.10 very secure. (ii) GOST signers do not have to generate modular inverses as the basic signature equation is s = xr + mk (mod q) instead of (mod q). (iii) GOST's hash function (the Russian equivalent of the SHA) is the standard GOST 34.11 which uses the block cipher GOST 28147 (partially classified) as a building block. The hash function will be briefly described. Copyright 相似文献
974.
密码技术在信息安全中有着举足轻重的作用。文章介绍了密码技术的相关理论及应用现状,并以应用比较广泛的单向散列函数MD5为例介绍了单向散列函数在当前的应用,特别以网页设计中用户认证为例,对单向散列函数MD5所起的作用进行了比较。 相似文献
975.
976.
在公安现役院校计算机基础教学改革中,大学计算机基础实践教学的课堂教学与实践教学分离,实践教学以学员自主学习为主。作为学员学习的主要参考资料和教学的有益补充,教材在新教学模式下的重要性越发突出。本文对公安现役院校大学计算机基础实践指导教材的建设思路和教材特色进行了详细阐述。 相似文献
977.
利用单片机实现了对某引进的火灾监控报警系统液晶显示模块的汉化工作。系统中对显示信息建立相应的单词字典,进行逐词翻译。在翻译过程中,采用快速的Hash查找算法来进行查找翻译,构造了一个计算简单的哈希函数并设定了一种简单有效的处理冲突的方法,有效地缩短了翻译时间,满足了汉化系统实时性的要求。 相似文献
978.
Image City sharing platform and its typical applications 总被引:1,自引:0,他引:1
SHAO ZhenFeng & Li DeRen State Key Laboratory for Information Engineering in Surveying Mapping Remote Sensing Wuhan University Wuhan China 《中国科学:信息科学(英文版)》2011,(8):1738-1746
In this paper,the trend of urban spatial information sharing service from the electronic map to image is analyzed and its sharing framework based on service-oriented architecture is designed.Moreover,the service implementation,feedback data service procedure and its processing service model are explored. Based on the software with independent intellectual property rights,image city of Taizhou is developed as an example to realize various image data and processing servicesLastly,the bright future prospects o... 相似文献
979.
数字图像LS(BLeast Significant Bits)在统计上与二项分布相似,结构上与原宿主图像仍然具有一定的相关性,从而导致经典LSB替换算法产生直方图"阶梯效应"。本文主要从图像像素以及像素间关系的特征函数出发,观察其常见统计模型的变化,为设计有效的图像隐写算法及隐写分析算法提供参考依据。 相似文献
980.
In this paper, optimum positioning of the conical cutter for five-axis flank milling of slender surfaces is addressed from the perspective of approximating the tool envelope surface to the data points on the design surface following the minimum zone criterion recommended by ANSI and ISO standards for tolerance evaluation. Based on the observation that a conical surface can be treated as a canal surface, i.e. envelope surface of one-parameter family of spheres, the swept envelope of a conical cutter is represented as a sphere-swept surface. Then, an approach is presented to efficiently compute the signed distance between a point in space and the swept surface without constructing the swept surface itself. The first order differential increment of the signed point-to-surface distance with respect to the differential deformation of the tool axis trajectory surface is derived. By using the distance function, tool path optimizations for semi-finish and finish millings are formulated as two constrained optimization problems in a unified framework, and a sequential approximation algorithm along with a hierarchical algorithmic structure is developed for the optimization. Numerical examples are given to confirm the validity and efficiency of the proposed approach. Comparing with the existing approaches, the present one improves the machining accuracy greatly. The rationale developed applies to general rotary cutters. 相似文献