全文获取类型
收费全文 | 9551篇 |
免费 | 561篇 |
国内免费 | 365篇 |
专业分类
电工技术 | 473篇 |
技术理论 | 1篇 |
综合类 | 441篇 |
化学工业 | 309篇 |
金属工艺 | 379篇 |
机械仪表 | 725篇 |
建筑科学 | 534篇 |
矿业工程 | 206篇 |
能源动力 | 83篇 |
轻工业 | 121篇 |
水利工程 | 50篇 |
石油天然气 | 38篇 |
武器工业 | 99篇 |
无线电 | 2106篇 |
一般工业技术 | 712篇 |
冶金工业 | 95篇 |
原子能技术 | 117篇 |
自动化技术 | 3988篇 |
出版年
2024年 | 21篇 |
2023年 | 161篇 |
2022年 | 155篇 |
2021年 | 268篇 |
2020年 | 195篇 |
2019年 | 109篇 |
2018年 | 107篇 |
2017年 | 173篇 |
2016年 | 220篇 |
2015年 | 194篇 |
2014年 | 418篇 |
2013年 | 415篇 |
2012年 | 512篇 |
2011年 | 690篇 |
2010年 | 479篇 |
2009年 | 543篇 |
2008年 | 541篇 |
2007年 | 738篇 |
2006年 | 620篇 |
2005年 | 656篇 |
2004年 | 585篇 |
2003年 | 499篇 |
2002年 | 434篇 |
2001年 | 289篇 |
2000年 | 238篇 |
1999年 | 223篇 |
1998年 | 185篇 |
1997年 | 140篇 |
1996年 | 113篇 |
1995年 | 99篇 |
1994年 | 85篇 |
1993年 | 71篇 |
1992年 | 75篇 |
1991年 | 52篇 |
1990年 | 36篇 |
1989年 | 28篇 |
1988年 | 28篇 |
1987年 | 17篇 |
1986年 | 5篇 |
1985年 | 21篇 |
1984年 | 6篇 |
1983年 | 11篇 |
1982年 | 6篇 |
1981年 | 5篇 |
1980年 | 4篇 |
1979年 | 4篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
31.
《The Journal of Strategic Information Systems》2022,31(1):101708
With business ecosystems digitalizing by the force of digital innovation, the deployment of boundary resources (such as application programming interfaces: APIs) becomes a strategic option across contexts. We distinguish between boundary resources that provide access openness and those that provide resource openness, and theorize the antecedents and consequences of their deployment. Employing panel data regressions to a longitudinal cross-industry dataset, we find that the digital knowledge base of the focal firm and the existence of potential digital complementors drive boundary resource deployment. Such deployment benefits firm performance depending on the firm’s market power. From our empirical analysis, we reveal a differentiated perspective on the quality of the confined openness provided by boundary resources as well as the embeddedness of their deployment in the rationales and motivations of the associated actors in digital business ecosystems. We complement the existent theoretical framework on boundary resources and provide valuable insights to managers reflecting about deploying boundary resources in a beneficial way. 相似文献
32.
利用小波的带通性质 ,给出了一种新的小波预处理方法 .实验表明 ,经过小波预处理后提取的特征 ,提高了语音的识别率 相似文献
33.
GOST 34.10 is Russia's DSA. Like its US counterpart, GOST is an ElGamal-like signature scheme used in Schnorr mode. It is similar to NIST DSA in many aspects. In this paper we will overview GOST 34.10 and discuss the three main differences between the two algorithms, (i) GOST's principal design criterion does not seem to be computational efficiency: the algorithm is 1.6 times slower than the DSA and produces 512-bit signatures. This is mainly due to the usage of the modulus q which is at least 254 bits long. During verification, modular inverses are computed by exponentiation (while the Extended Euclidian algorithm is roughly 100 times faster for this parameter size) and the generation of the public parameters is much more complicated than in the DSA. This choice of the parameters makes GOST 34.10 very secure. (ii) GOST signers do not have to generate modular inverses as the basic signature equation is s = xr + mk (mod q) instead of (mod q). (iii) GOST's hash function (the Russian equivalent of the SHA) is the standard GOST 34.11 which uses the block cipher GOST 28147 (partially classified) as a building block. The hash function will be briefly described. Copyright 相似文献
34.
Vimal Singh 《Automatica》2010,46(2):475-4311
A criterion for the global asymptotic stability of fixed-point state-space digital filters using two’s complement arithmetic is presented. The criterion is a modified form of a well-known criterion due to Mills, Mullis, and Roberts. The criterion is in the form of linear matrix inequality and, hence, computationally tractable. An example shows the effectiveness of the modified criterion. 相似文献
35.
Traceable content protection based on chaos and neural networks 总被引:1,自引:0,他引:1
In this paper, a media content encryption/decryption algorithm is designed based on a chaos system and neural networks, which generates random sequences with chaos, and encrypts or decrypts media contents with neural networks in a parallel way. In this scheme, different decryption keys can be used to recover the media content into different copies. That is, the decryption operation gets the content containing certain random sequence that can be used as the identification. With respect to this property, the scheme is used for secure content distribution. Taking the audio content for example, it is encrypted by a key at the sender side and decrypted by different keys at the receiver side. The differences between decryption keys lead to different decrypted audio copies. If one customer distributes his copy to other unauthorized customers, the chaotic sequence contained in the copy can tell the illegal customer. The performances, including security, imperceptibility and robustness, are analyzed, and some experimental results are given to show the scheme's practicability. 相似文献
36.
设计一种音频设备的上位机控制系统,实现对多台音频设备的集中和远程控制。为了保证上位机在与设备通信的同时,能及时响应前台界面的用户操作,引入了多线程技术。同时,音频设备具有经常被持续、快速调节同一参数的特点,为解决在此情况下由于硬件通信速度有限而导致的设备滞后响应上位机用户操作的问题,设计了一种冗余命令剔除机制。该机制不仅有效地减少了通信占用的资源,而且更好地保证了用户对设备调节控制的实时性。 相似文献
37.
Pricing schemes for digital content with DRM mechanisms 总被引:1,自引:0,他引:1
In this paper, utilizing game-theoretic model, we examine the impact of collaborative structure, content quality, and network environment on the development of pricing scheme and DRM protection policy of digital content. DRM protection level decreases and pirating activities becomes relatively tolerable as the content provider and platform provider operate collaboratively. Depending on the market structure, higher content quality may strengthen or weaken the adoption of DRM. However, it would seem that, as the network environment becomes more decentralized and uncontrolled, weaker DRM protection should be a better strategy. 相似文献
38.
39.
陈燮琪 《计算机应用与软件》2009,26(1)
由于在数字图书馆系统中流通着的大多是数字化的索引、文摘、全文、图像或音频视频等多媒体信息,对Web服务器性能有着较高的要求.结合实际工程的经验,从硬件实现手段(缓存服务器、均衡负载设备、Web双机镜像等)和软件实现手段(多层软件结构设计、应用部署等)等两个大方面论述如何提高Web服务器性能,以便使用户能够更快捷、高效、安全地使用数字图书馆应用系统. 相似文献
40.
随着数字IC的规模和复杂性不断增加,数字IC设计的难度也在加大,为了更好地进行数字IC设计,业界普遍采用了自动化的设计方式,通过应用工具软件,将IC设计的效率极大地提高.主要探讨了在IC设计当中逻辑综合方面的问题. 相似文献