全文获取类型
收费全文 | 6169篇 |
免费 | 257篇 |
国内免费 | 256篇 |
专业分类
电工技术 | 166篇 |
综合类 | 400篇 |
化学工业 | 118篇 |
金属工艺 | 202篇 |
机械仪表 | 522篇 |
建筑科学 | 327篇 |
矿业工程 | 139篇 |
能源动力 | 56篇 |
轻工业 | 144篇 |
水利工程 | 84篇 |
石油天然气 | 50篇 |
武器工业 | 33篇 |
无线电 | 799篇 |
一般工业技术 | 241篇 |
冶金工业 | 37篇 |
原子能技术 | 18篇 |
自动化技术 | 3346篇 |
出版年
2024年 | 15篇 |
2023年 | 92篇 |
2022年 | 88篇 |
2021年 | 146篇 |
2020年 | 133篇 |
2019年 | 106篇 |
2018年 | 69篇 |
2017年 | 100篇 |
2016年 | 136篇 |
2015年 | 180篇 |
2014年 | 294篇 |
2013年 | 287篇 |
2012年 | 395篇 |
2011年 | 405篇 |
2010年 | 362篇 |
2009年 | 427篇 |
2008年 | 378篇 |
2007年 | 414篇 |
2006年 | 462篇 |
2005年 | 433篇 |
2004年 | 314篇 |
2003年 | 347篇 |
2002年 | 305篇 |
2001年 | 189篇 |
2000年 | 202篇 |
1999年 | 116篇 |
1998年 | 76篇 |
1997年 | 34篇 |
1996年 | 26篇 |
1995年 | 27篇 |
1994年 | 17篇 |
1993年 | 18篇 |
1992年 | 18篇 |
1991年 | 8篇 |
1990年 | 9篇 |
1989年 | 9篇 |
1988年 | 4篇 |
1987年 | 1篇 |
1986年 | 5篇 |
1985年 | 6篇 |
1984年 | 5篇 |
1983年 | 6篇 |
1982年 | 8篇 |
1981年 | 5篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
1976年 | 2篇 |
排序方式: 共有6682条查询结果,搜索用时 0 毫秒
71.
72.
The tracker based on the Siamese network regards tracking tasks as solving a similarity problem between the target template and search area. Using shallow networks and offline training, these trackers perform well in simple scenarios. However, due to the lack of semantic information, they have difficulty meeting the accuracy requirements of the task when faced with complex backgrounds and other challenging scenarios. In response to this problem, we propose a new model, which uses the improved ResNet-22 network to extract deep features with more semantic information. Multilayer feature fusion is used to obtain a high-quality score map to reduce the influence of interference factors in the complex background on the tracker. In addition, we propose a more powerful Corner Distance IoU (intersection over union) loss function so that the algorithm can better regression to the bounding box. In the experiments, the tracker was extensively evaluated on the object tracking benchmark data sets, OTB2013 and OTB2015, and the visual object tracking data sets, VOT2016 and VOT2017, and achieved competitive performance, proving the effectiveness of this method. 相似文献
73.
D. A. Ross 《Virtual Reality》1998,3(3):212-221
People who are totally blind or who have vevere visual impairments (e.g. less than 20/200 acuity, central macular scotomas, or advanced diabetic retinopathy) see the environment in a fashion that may be completely foreign to those who operate in a very visual fashion. For this population, the visual complexity of the environment is not a concern. What is of concern are salient features found within the environment that relate to their ability to navigate successfully in, and/or interact with, the environment as needed. Toward the purpose of representing these salient features in comprehensive form, investigators at the Atlanta Veterans Affairs Research and Development Center are employing wearable computer technology to develop a virtual environment interface. The long-range goal is to create a simplistic virtual representation of the environment that includes only features related to the current navigational task and/or interactive needs of the person. In a completed study, the use of digital infrared transmitters as beacons representing salient features of the environment was explored. The purpose of a current study now in progress is to evaluate and compare various user interface structures that were suggested by subjects during the preliminary study. The problem of interest in the current study is street-crossing; however, the results of this research should be applicable to many other problems, including identifying and locating building entrances, and identifying, locating and interacting with electronic devices such as information kiosks, automated teller machines, and self-serve point-of-sale terminals. The long-range result desired is a wearable computer with which one can easily identify and interact with a wide variety of devices in the environment via one familiar, easy-to-use interface. 相似文献
74.
GOST 34.10 is Russia's DSA. Like its US counterpart, GOST is an ElGamal-like signature scheme used in Schnorr mode. It is similar to NIST DSA in many aspects. In this paper we will overview GOST 34.10 and discuss the three main differences between the two algorithms, (i) GOST's principal design criterion does not seem to be computational efficiency: the algorithm is 1.6 times slower than the DSA and produces 512-bit signatures. This is mainly due to the usage of the modulus q which is at least 254 bits long. During verification, modular inverses are computed by exponentiation (while the Extended Euclidian algorithm is roughly 100 times faster for this parameter size) and the generation of the public parameters is much more complicated than in the DSA. This choice of the parameters makes GOST 34.10 very secure. (ii) GOST signers do not have to generate modular inverses as the basic signature equation is s = xr + mk (mod q) instead of (mod q). (iii) GOST's hash function (the Russian equivalent of the SHA) is the standard GOST 34.11 which uses the block cipher GOST 28147 (partially classified) as a building block. The hash function will be briefly described. Copyright 相似文献
75.
In numerous modern stream ciphers, the internal state consists of a large array of pseudo-random words, while the output key-stream is a relatively simple function of the state. It has been heuristically shown in several situations [3], [8], [9], [10], [11] and [14] that this structure may lead to distinguishing attacks on the cipher. In this note we present a more rigorous treatment of this structural attack. First, we present a rigorous proof of the main probabilistic claim behind it in the basic cases. We then apply it concretely to the cipher sn3 [12], and demonstrate that the heuristic assumptions of the attack are remarkably precise in more complicated cases. 相似文献
76.
Santanu Sarkar 《Information Processing Letters》2010,110(5):178-340
In this paper, we consider RSA with N=pq, where p,q are of same bit size, i.e., q<p<2q. We study the weaknesses of RSA when multiple encryption and decryption exponents are considered with same RSA modulus N. A decade back, Howgrave-Graham and Seifert (CQRE 1999) studied this problem in detail and presented the bounds on the decryption exponents for which RSA is weak. For the case of two decryption exponents, the bound was N0.357. We have exploited a different lattice based technique to show that RSA is weak beyond this bound. Our analysis provides improved results and it shows that for two exponents, RSA is weak when the RSA decryption exponents are less than N0.416. Moreover, we get further improvement in the bound when some of the most significant bits (MSBs) of the decryption exponents are same (but unknown). 相似文献
77.
T. Hoang Ngan Le Chia-Chen Lin Chin-Chen Chang Hoai Bac LeAuthor vitae 《Digital Signal Processing》2011,21(6):734-745
Many secret sharing schemes for digital images have been developed in recent decades. Traditional schemes typically must deal with the problem of computational complexity, and other visual secret sharing schemes come with a higher transmission cost and storage cost; that is, each shadow size is m times as big as the original secret image. The new (2,n) secret sharing scheme for grayscale images proposed in this paper is based a combination of acceptable image quality using block truncation coding (BTC), high compression ratio discrete wavelet transform (DWT) and good subjective performance of the vector quantization (VQ) technique. Experimental results confirm that our proposed scheme not only generates a high quality reconstructed original image but also generates small, random-like grayscale shadows. 相似文献
78.
Andrzej Chmielowiec 《Theoretical computer science》2010,411(1):288-4737
In this paper the problem of the number of fixed points for an RSA algorithm is considered. This is an important question from the point of view of any cryptosystem. We have estimated the expected value of this number for randomly chosen RSA parameters. It turned out that it is O(ln2n), and the probability of finding such a point is O(ln2n/n). Thus, these values are really negligible, which had been intuitively expected. 相似文献
79.
应用型本科经管类专业Visual FoxPro程序设计课程教学改革探索 总被引:1,自引:0,他引:1
针对目前多数应用型本科院校经济、管理类专业计算机公共基础课Visual FoxPro程序设计教学中存在的问题,本文提出以项目导向、模块驱动的方式来组织教学内容,课堂教学和项目小组协同学习相互促进的教学方式,课内实验和实战演练相结合的训练方法,并给出具体实施办法,实践证明这种教学模式行之有效、教学效果良好。 相似文献
80.
通过对《Visual Foxpro程序设计》课程章节教学方法和手段问题进行探讨,激发非计算机专业学生利用Visual Foxpro(以下简称VF)语言熟练编写程序的能力,拓展他们的逻辑思维,技巧转换意识,培养独立思考问题、分析问题和解决问题的能力,并养成良好编写程序代码的风格。 相似文献