首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9551篇
  免费   561篇
  国内免费   365篇
电工技术   473篇
技术理论   1篇
综合类   441篇
化学工业   309篇
金属工艺   379篇
机械仪表   725篇
建筑科学   534篇
矿业工程   206篇
能源动力   83篇
轻工业   121篇
水利工程   50篇
石油天然气   38篇
武器工业   99篇
无线电   2106篇
一般工业技术   712篇
冶金工业   95篇
原子能技术   117篇
自动化技术   3988篇
  2024年   21篇
  2023年   161篇
  2022年   155篇
  2021年   268篇
  2020年   195篇
  2019年   109篇
  2018年   107篇
  2017年   173篇
  2016年   220篇
  2015年   194篇
  2014年   418篇
  2013年   415篇
  2012年   512篇
  2011年   690篇
  2010年   479篇
  2009年   543篇
  2008年   541篇
  2007年   738篇
  2006年   620篇
  2005年   656篇
  2004年   585篇
  2003年   499篇
  2002年   434篇
  2001年   289篇
  2000年   238篇
  1999年   223篇
  1998年   185篇
  1997年   140篇
  1996年   113篇
  1995年   99篇
  1994年   85篇
  1993年   71篇
  1992年   75篇
  1991年   52篇
  1990年   36篇
  1989年   28篇
  1988年   28篇
  1987年   17篇
  1986年   5篇
  1985年   21篇
  1984年   6篇
  1983年   11篇
  1982年   6篇
  1981年   5篇
  1980年   4篇
  1979年   4篇
  1978年   1篇
  1977年   1篇
  1973年   1篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
31.
With business ecosystems digitalizing by the force of digital innovation, the deployment of boundary resources (such as application programming interfaces: APIs) becomes a strategic option across contexts. We distinguish between boundary resources that provide access openness and those that provide resource openness, and theorize the antecedents and consequences of their deployment. Employing panel data regressions to a longitudinal cross-industry dataset, we find that the digital knowledge base of the focal firm and the existence of potential digital complementors drive boundary resource deployment. Such deployment benefits firm performance depending on the firm’s market power. From our empirical analysis, we reveal a differentiated perspective on the quality of the confined openness provided by boundary resources as well as the embeddedness of their deployment in the rationales and motivations of the associated actors in digital business ecosystems. We complement the existent theoretical framework on boundary resources and provide valuable insights to managers reflecting about deploying boundary resources in a beneficial way.  相似文献   
32.
利用小波的带通性质 ,给出了一种新的小波预处理方法 .实验表明 ,经过小波预处理后提取的特征 ,提高了语音的识别率  相似文献   
33.
GOST 34.10 is Russia's DSA. Like its US counterpart, GOST is an ElGamal-like signature scheme used in Schnorr mode. It is similar to NIST DSA in many aspects. In this paper we will overview GOST 34.10 and discuss the three main differences between the two algorithms, (i) GOST's principal design criterion does not seem to be computational efficiency: the algorithm is 1.6 times slower than the DSA and produces 512-bit signatures. This is mainly due to the usage of the modulus q which is at least 254 bits long. During verification, modular inverses are computed by exponentiation (while the Extended Euclidian algorithm is roughly 100 times faster for this parameter size) and the generation of the public parameters is much more complicated than in the DSA. This choice of the parameters makes GOST 34.10 very secure. (ii) GOST signers do not have to generate modular inverses as the basic signature equation is s = xr + mk (mod q) instead of (mod q). (iii) GOST's hash function (the Russian equivalent of the SHA) is the standard GOST 34.11 which uses the block cipher GOST 28147 (partially classified) as a building block. The hash function will be briefly described. Copyright  相似文献   
34.
Vimal Singh 《Automatica》2010,46(2):475-4311
A criterion for the global asymptotic stability of fixed-point state-space digital filters using two’s complement arithmetic is presented. The criterion is a modified form of a well-known criterion due to Mills, Mullis, and Roberts. The criterion is in the form of linear matrix inequality and, hence, computationally tractable. An example shows the effectiveness of the modified criterion.  相似文献   
35.
Traceable content protection based on chaos and neural networks   总被引:1,自引:0,他引:1  
In this paper, a media content encryption/decryption algorithm is designed based on a chaos system and neural networks, which generates random sequences with chaos, and encrypts or decrypts media contents with neural networks in a parallel way. In this scheme, different decryption keys can be used to recover the media content into different copies. That is, the decryption operation gets the content containing certain random sequence that can be used as the identification. With respect to this property, the scheme is used for secure content distribution. Taking the audio content for example, it is encrypted by a key at the sender side and decrypted by different keys at the receiver side. The differences between decryption keys lead to different decrypted audio copies. If one customer distributes his copy to other unauthorized customers, the chaotic sequence contained in the copy can tell the illegal customer. The performances, including security, imperceptibility and robustness, are analyzed, and some experimental results are given to show the scheme's practicability.  相似文献   
36.
设计一种音频设备的上位机控制系统,实现对多台音频设备的集中和远程控制。为了保证上位机在与设备通信的同时,能及时响应前台界面的用户操作,引入了多线程技术。同时,音频设备具有经常被持续、快速调节同一参数的特点,为解决在此情况下由于硬件通信速度有限而导致的设备滞后响应上位机用户操作的问题,设计了一种冗余命令剔除机制。该机制不仅有效地减少了通信占用的资源,而且更好地保证了用户对设备调节控制的实时性。  相似文献   
37.
Pricing schemes for digital content with DRM mechanisms   总被引:1,自引:0,他引:1  
In this paper, utilizing game-theoretic model, we examine the impact of collaborative structure, content quality, and network environment on the development of pricing scheme and DRM protection policy of digital content. DRM protection level decreases and pirating activities becomes relatively tolerable as the content provider and platform provider operate collaboratively. Depending on the market structure, higher content quality may strengthen or weaken the adoption of DRM. However, it would seem that, as the network environment becomes more decentralized and uncontrolled, weaker DRM protection should be a better strategy.  相似文献   
38.
基于动态逻辑许可证的PDF版权管理系统   总被引:1,自引:1,他引:0       下载免费PDF全文
王景艳  钟勇  朱珍 《计算机工程》2009,35(11):169-171
电子文档版权管理是数字版权管理的重要研究领域,提出一种PDF电子文档版权保护方案,该方案的权限管理基于一种具有强大表达力、灵活性和开放权限管理能力的动态逻辑许可证,具有详细的文档权限控制方法,并通过内容级的PDF文档加密方法增强文档的安全性。对系统模型、实现结构和方法进行说明,并与相关方法进行对比和应用示例。  相似文献   
39.
由于在数字图书馆系统中流通着的大多是数字化的索引、文摘、全文、图像或音频视频等多媒体信息,对Web服务器性能有着较高的要求.结合实际工程的经验,从硬件实现手段(缓存服务器、均衡负载设备、Web双机镜像等)和软件实现手段(多层软件结构设计、应用部署等)等两个大方面论述如何提高Web服务器性能,以便使用户能够更快捷、高效、安全地使用数字图书馆应用系统.  相似文献   
40.
随着数字IC的规模和复杂性不断增加,数字IC设计的难度也在加大,为了更好地进行数字IC设计,业界普遍采用了自动化的设计方式,通过应用工具软件,将IC设计的效率极大地提高.主要探讨了在IC设计当中逻辑综合方面的问题.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号