首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6169篇
  免费   257篇
  国内免费   256篇
电工技术   166篇
综合类   400篇
化学工业   118篇
金属工艺   202篇
机械仪表   522篇
建筑科学   327篇
矿业工程   139篇
能源动力   56篇
轻工业   144篇
水利工程   84篇
石油天然气   50篇
武器工业   33篇
无线电   799篇
一般工业技术   241篇
冶金工业   37篇
原子能技术   18篇
自动化技术   3346篇
  2024年   15篇
  2023年   92篇
  2022年   88篇
  2021年   146篇
  2020年   133篇
  2019年   106篇
  2018年   69篇
  2017年   100篇
  2016年   136篇
  2015年   180篇
  2014年   294篇
  2013年   287篇
  2012年   395篇
  2011年   405篇
  2010年   362篇
  2009年   427篇
  2008年   378篇
  2007年   414篇
  2006年   462篇
  2005年   433篇
  2004年   314篇
  2003年   347篇
  2002年   305篇
  2001年   189篇
  2000年   202篇
  1999年   116篇
  1998年   76篇
  1997年   34篇
  1996年   26篇
  1995年   27篇
  1994年   17篇
  1993年   18篇
  1992年   18篇
  1991年   8篇
  1990年   9篇
  1989年   9篇
  1988年   4篇
  1987年   1篇
  1986年   5篇
  1985年   6篇
  1984年   5篇
  1983年   6篇
  1982年   8篇
  1981年   5篇
  1980年   1篇
  1979年   1篇
  1977年   1篇
  1976年   2篇
排序方式: 共有6682条查询结果,搜索用时 0 毫秒
71.
72.
The tracker based on the Siamese network regards tracking tasks as solving a similarity problem between the target template and search area. Using shallow networks and offline training, these trackers perform well in simple scenarios. However, due to the lack of semantic information, they have difficulty meeting the accuracy requirements of the task when faced with complex backgrounds and other challenging scenarios. In response to this problem, we propose a new model, which uses the improved ResNet-22 network to extract deep features with more semantic information. Multilayer feature fusion is used to obtain a high-quality score map to reduce the influence of interference factors in the complex background on the tracker. In addition, we propose a more powerful Corner Distance IoU (intersection over union) loss function so that the algorithm can better regression to the bounding box. In the experiments, the tracker was extensively evaluated on the object tracking benchmark data sets, OTB2013 and OTB2015, and the visual object tracking data sets, VOT2016 and VOT2017, and achieved competitive performance, proving the effectiveness of this method.  相似文献   
73.
People who are totally blind or who have vevere visual impairments (e.g. less than 20/200 acuity, central macular scotomas, or advanced diabetic retinopathy) see the environment in a fashion that may be completely foreign to those who operate in a very visual fashion. For this population, the visual complexity of the environment is not a concern. What is of concern are salient features found within the environment that relate to their ability to navigate successfully in, and/or interact with, the environment as needed. Toward the purpose of representing these salient features in comprehensive form, investigators at the Atlanta Veterans Affairs Research and Development Center are employing wearable computer technology to develop a virtual environment interface. The long-range goal is to create a simplistic virtual representation of the environment that includes only features related to the current navigational task and/or interactive needs of the person. In a completed study, the use of digital infrared transmitters as beacons representing salient features of the environment was explored. The purpose of a current study now in progress is to evaluate and compare various user interface structures that were suggested by subjects during the preliminary study. The problem of interest in the current study is street-crossing; however, the results of this research should be applicable to many other problems, including identifying and locating building entrances, and identifying, locating and interacting with electronic devices such as information kiosks, automated teller machines, and self-serve point-of-sale terminals. The long-range result desired is a wearable computer with which one can easily identify and interact with a wide variety of devices in the environment via one familiar, easy-to-use interface.  相似文献   
74.
GOST 34.10 is Russia's DSA. Like its US counterpart, GOST is an ElGamal-like signature scheme used in Schnorr mode. It is similar to NIST DSA in many aspects. In this paper we will overview GOST 34.10 and discuss the three main differences between the two algorithms, (i) GOST's principal design criterion does not seem to be computational efficiency: the algorithm is 1.6 times slower than the DSA and produces 512-bit signatures. This is mainly due to the usage of the modulus q which is at least 254 bits long. During verification, modular inverses are computed by exponentiation (while the Extended Euclidian algorithm is roughly 100 times faster for this parameter size) and the generation of the public parameters is much more complicated than in the DSA. This choice of the parameters makes GOST 34.10 very secure. (ii) GOST signers do not have to generate modular inverses as the basic signature equation is s = xr + mk (mod q) instead of (mod q). (iii) GOST's hash function (the Russian equivalent of the SHA) is the standard GOST 34.11 which uses the block cipher GOST 28147 (partially classified) as a building block. The hash function will be briefly described. Copyright  相似文献   
75.
In numerous modern stream ciphers, the internal state consists of a large array of pseudo-random words, while the output key-stream is a relatively simple function of the state. It has been heuristically shown in several situations [3], [8], [9], [10], [11] and [14] that this structure may lead to distinguishing attacks on the cipher. In this note we present a more rigorous treatment of this structural attack. First, we present a rigorous proof of the main probabilistic claim behind it in the basic cases. We then apply it concretely to the cipher sn3 [12], and demonstrate that the heuristic assumptions of the attack are remarkably precise in more complicated cases.  相似文献   
76.
In this paper, we consider RSA with N=pq, where p,q are of same bit size, i.e., q<p<2q. We study the weaknesses of RSA when multiple encryption and decryption exponents are considered with same RSA modulus N. A decade back, Howgrave-Graham and Seifert (CQRE 1999) studied this problem in detail and presented the bounds on the decryption exponents for which RSA is weak. For the case of two decryption exponents, the bound was N0.357. We have exploited a different lattice based technique to show that RSA is weak beyond this bound. Our analysis provides improved results and it shows that for two exponents, RSA is weak when the RSA decryption exponents are less than N0.416. Moreover, we get further improvement in the bound when some of the most significant bits (MSBs) of the decryption exponents are same (but unknown).  相似文献   
77.
Many secret sharing schemes for digital images have been developed in recent decades. Traditional schemes typically must deal with the problem of computational complexity, and other visual secret sharing schemes come with a higher transmission cost and storage cost; that is, each shadow size is m times as big as the original secret image. The new (2,n) secret sharing scheme for grayscale images proposed in this paper is based a combination of acceptable image quality using block truncation coding (BTC), high compression ratio discrete wavelet transform (DWT) and good subjective performance of the vector quantization (VQ) technique. Experimental results confirm that our proposed scheme not only generates a high quality reconstructed original image but also generates small, random-like grayscale shadows.  相似文献   
78.
In this paper the problem of the number of fixed points for an RSA algorithm is considered. This is an important question from the point of view of any cryptosystem. We have estimated the expected value of this number for randomly chosen RSA parameters. It turned out that it is O(ln2n), and the probability of finding such a point is O(ln2n/n). Thus, these values are really negligible, which had been intuitively expected.  相似文献   
79.
钟志水  姚珺 《计算机教育》2010,(8):122-124,114
针对目前多数应用型本科院校经济、管理类专业计算机公共基础课Visual FoxPro程序设计教学中存在的问题,本文提出以项目导向、模块驱动的方式来组织教学内容,课堂教学和项目小组协同学习相互促进的教学方式,课内实验和实战演练相结合的训练方法,并给出具体实施办法,实践证明这种教学模式行之有效、教学效果良好。  相似文献   
80.
朱强 《福建电脑》2010,26(2):210-211
通过对《Visual Foxpro程序设计》课程章节教学方法和手段问题进行探讨,激发非计算机专业学生利用Visual Foxpro(以下简称VF)语言熟练编写程序的能力,拓展他们的逻辑思维,技巧转换意识,培养独立思考问题、分析问题和解决问题的能力,并养成良好编写程序代码的风格。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号