首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   639篇
  免费   35篇
  国内免费   20篇
电工技术   24篇
综合类   103篇
化学工业   89篇
金属工艺   16篇
机械仪表   10篇
建筑科学   74篇
矿业工程   12篇
能源动力   19篇
轻工业   75篇
水利工程   12篇
石油天然气   40篇
武器工业   4篇
无线电   56篇
一般工业技术   19篇
冶金工业   51篇
原子能技术   3篇
自动化技术   87篇
  2024年   1篇
  2023年   7篇
  2022年   13篇
  2021年   16篇
  2020年   14篇
  2019年   14篇
  2018年   11篇
  2017年   12篇
  2016年   15篇
  2015年   17篇
  2014年   34篇
  2013年   31篇
  2012年   44篇
  2011年   37篇
  2010年   35篇
  2009年   50篇
  2008年   30篇
  2007年   35篇
  2006年   43篇
  2005年   35篇
  2004年   37篇
  2003年   53篇
  2002年   31篇
  2001年   33篇
  2000年   18篇
  1999年   10篇
  1998年   6篇
  1997年   3篇
  1994年   1篇
  1993年   2篇
  1990年   3篇
  1989年   1篇
  1957年   1篇
  1954年   1篇
排序方式: 共有694条查询结果,搜索用时 0 毫秒
81.
We present second steps in the construction of formal models of NAND flash memory, based on a recently emerged open standard for such devices. The model is intended as a key part of a pilot project to develop a verified file store system based on flash memory. The project was proposed by Joshi and Holzmann as a contribution to the Grand Challenge in Verified Software, and involves constructing a highly assured flash file store for use in space-flight missions. The model is at a level of abstraction that captures the internal architecture of NAND flash devices. In this paper, we focus on mechanising the state model and its initialisation operation, where most of the conceptual complexity resides.  相似文献   
82.
The Tennessee Eastman challenge process is a realistic simulation of a chemical process that has been widely used in process control studies. In this case study, several identification methods are examined and used to develop MIMO models that contain seven inputs and ten outputs. ARX and finite impulse response models are identified using reduced-rank regression techniques (PLS and CCR) and state-space models identified with prediction error methods and subspace algorithms. For a variety of reasons, the only successful models are the state-space models produced by two popular subspace algorithms, N4SID and canonical variate analysis (CVA). The CVA model is the most accurate. Important issues for identifying the Tennessee Eastman challenge process and comparisons between the subspace algorithms are also discussed.  相似文献   
83.
文章评估了英国赛博空间面临的机遇和威胁,对英国政府在赛博安全领域的投资进行了分析,揭示英国政府在赛博安全领域的最新进展和未来计划,针对英国政府可能面临的挑战提出了应对措施。  相似文献   
84.
文章首先介绍基于SMS的移动电子商务工作模式和安全需求,以此提出了移动电子商务系统的总体安全架构,然后分别从终端接入层、通信链路层、网关协议层、应用服务层四个层面分析了移动电子商务常见的安全问题,最后提出了以动态口令与"挑战"文本相结合的认证方式,以Hash算法实现签名,端到端的SMS移动电子商务安全技术方案。  相似文献   
85.
Key-dependent message (KDM) security is an important security issue that has attracted much research in recent years. In this paper, we present a new construction of the symmetric encryption scheme in the the ideal cipher model (ICM); we prove that our scheme is KDM secure against active attacks with respect to arbitrary polynomialtime challenge functions. Our main idea is to introduce a universal hash function (UHF) h as a random value for each encryption, and then use s = h(sk) as the key of the ideal cipher F, where sk is the private key of our symmetric encryption scheme. Although many other schemes that are secure against KDM attacks have already been proposed, in both the ideal standard models, the much more significance of our paper is the simplicity in which we implement KDM security against active attacks.  相似文献   
86.
We explain why for the verified software challenge proposed in Hoare (J ACM 50(1): 63–69, 2003), Hoare and Misra (Verified software: theories, tools, experiments. Vision of a Grand Challenge project. In: [Meyer05]) to gain practical impact, one needs to include rigorous definitions and analysis, prior to code development and comprising both experimental validation and mathematical verification, of ground models, i.e., blueprints that describe the required application-content of programs. This implies the need to link via successive refinements the relevant properties of such high-level models in a traceable and checkable way to code a compiler can verify. We outline the Abstract State Machines (ASM) method, a discipline for reliable system development which allows one to bridge the gap between informal requirements and executable code by combining application-centric experimentally validatable system modelling with mathematically verifiable stepwise detailing of abstract models to compile-time-verifiable code.  相似文献   
87.
Resource discovery is one of the most important services that significantly affects the efficiency of grid computing systems. The inherent dynamic and large-scale characteristics of grid environments make their resource discovery a challenging task. In recent years, different approaches have been proposed for resource discovery, attempting to tackle the challenges of grid environments and improve the efficiency. Being aware of these challenges and approaches is worthwhile in order to choose an appropriate approach according to the application in different organizations. This study reviews the most important factors that should be considered and challenges to be tackled in order to develop an efficient grid resource discovery system.  相似文献   
88.
近年来,以移动互联、云计算、数据挖掘等技术为基础的大数据技术迅猛发展,已逐渐应用到科技、信息化等各 个行业,成为驱动经济发展的重要引擎。随着教育信息化的不断深入,将新兴的大数据技术应用到教育领域已是大势所趋。 本文对大数据技术进行介绍,分析了大数据教育应用前景及风险挑战,提出可行的建议和措施,以促进大数据技术教育应用的 快速发展。  相似文献   
89.
This paper presents the concept of color space normalization (CSN) and two CSN techniques, i.e., the within-color-component normalization technique (CSN-I) and the across-color-component normalization technique (CSN-II), for enhancing the discriminating power of color spaces for face recognition. Different color spaces usually display different discriminating power, and our experiments on a large scale face recognition grand challenge (FRGC) problem reveal that the RGB and XYZ color spaces are weaker than the I1I2I3, YUV, YIQ, and LSLM color spaces for face recognition. We therefore apply our CSN techniques to normalize the weak color spaces, such as the RGB and the XYZ color spaces, the three hybrid color spaces XGB, YRB and ZRG, and 10 randomly generated color spaces. Experiments using the most challenging FRGC version 2 Experiment 4 with 12,776 training images, 16,028 controlled target images, and 8,014 uncontrolled query images, show that the proposed CSN techniques can significantly and consistently improve the discriminating power of the weak color spaces. Specifically, the normalized RGB, XYZ, XGB, and ZRG color spaces are more effective than or as effective as the I1I2I3, YUV, YIQ and LSLM color spaces for face recognition. The additional experiments using the AR database validate the generalization of the proposed CSN techniques. We finally explain why the CSN techniques can improve the recognition performance of color spaces from the color component correlation point of view.  相似文献   
90.
群山 《轻工机械》2004,(4):143-145
近年来,我国对外经济吸力不断增强,在华外企的作用愈来愈显重要。然而,随着全球化市场变化,外企在华出现了贸易垄断、相互结盟、资本转移、本土挖才和技术壁垒等“逆动’’行为。中国企业应通过提升国际直销经营力、外向渗透力、利用外资聚合力与知识产权创新力等核心竞争能力,实现外向经济更快发展。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号