全文获取类型
收费全文 | 491篇 |
免费 | 112篇 |
国内免费 | 97篇 |
专业分类
电工技术 | 4篇 |
综合类 | 59篇 |
化学工业 | 16篇 |
机械仪表 | 6篇 |
建筑科学 | 15篇 |
矿业工程 | 1篇 |
轻工业 | 86篇 |
水利工程 | 7篇 |
石油天然气 | 11篇 |
无线电 | 127篇 |
一般工业技术 | 15篇 |
冶金工业 | 5篇 |
自动化技术 | 348篇 |
出版年
2024年 | 5篇 |
2023年 | 12篇 |
2022年 | 21篇 |
2021年 | 13篇 |
2020年 | 32篇 |
2019年 | 30篇 |
2018年 | 17篇 |
2017年 | 27篇 |
2016年 | 39篇 |
2015年 | 32篇 |
2014年 | 40篇 |
2013年 | 39篇 |
2012年 | 48篇 |
2011年 | 53篇 |
2010年 | 48篇 |
2009年 | 36篇 |
2008年 | 55篇 |
2007年 | 48篇 |
2006年 | 21篇 |
2005年 | 33篇 |
2004年 | 18篇 |
2003年 | 14篇 |
2002年 | 7篇 |
2001年 | 1篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1994年 | 1篇 |
1988年 | 1篇 |
1980年 | 1篇 |
1967年 | 1篇 |
1961年 | 1篇 |
1956年 | 1篇 |
排序方式: 共有700条查询结果,搜索用时 656 毫秒
1.
A double optimal projection method that involves projections for intra-cluster and inter-cluster dimensionality reduction are proposed for video fingerprinting. The video is initially set as a graph with frames as its vertices in a high-dimensional space. A similarity measure that can compute the weights of the edges is then proposed. Subsequently, the video frames are partitioned into different clusters based on the graph model. Double optimal projection is used to explore the optimal mapping points in a low-dimensional space to reduce the video dimensions. The statistics and geometrical fingerprints are generated to determine whether a query video is copied from one of the videos in the database. During matching, the video can be roughly matched by utilizing the statistics fingerprint. Further matching is thereafter performed in the corresponding group using geometrical fingerprints. Experimental results show the good performance of the proposed video fingerprinting method in robustness and discrimination. 相似文献
2.
Qiang Xia Tao Feng Xiaowei Lou Ying Wang Yangying Sun Daodong Pan Jinxuan Cao 《International Journal of Food Science & Technology》2020,55(2):669-680
As a decisive attribute, flavour could be influenced by HP treatments through multiple physical and chemical pathways within the high pressure (HP)-assisted meat curing process. This investigation aimed to identify the major pathway influencing volatile flavour patterns of two representative vinasse-cured duck (VCD) products with HP treatments (150–300 MPa/15 min), including wet and dry types, by employing headspace fingerprinting as an untargeted approach. Results suggested that HP treatments greatly lowered moisture contents and increased Warner-Bratzler shear force and thiobarbituric acid reactive substances of the cured samples. According to multivariate models, the volatile flavour patterns of the HP-processed VCD could be clearly separated from the unprocessed samples, but the VCD pressurised at different intensities represented similar volatile fingerprinting, which was validated by e-nose analysis. The discriminant analysis (OPLS-DA) model outlined vinasse-derived ethanol, acetic acid, 3-methyl-1-butanol, 2-methyl-1-butanol, phenethyl alcohol and 2-methyl-3-octanone as the major discriminant aromas across the unpressurised and pressurised samples. 相似文献
3.
文章设计了一种电子现金系统,关键是对安全性、效率、成本等进行综合考虑。从这些方面入手,论文分析了三种典型的电子现金系统—D.Chaum方案、S.Brands方案和T.okamoto方案。然后,结合匿名通信协议,提出如何更好地满足顾客利用公开网络进行安全通信的需求。 相似文献
4.
5.
洋葱路由技术在公网上提供双向、实时的匿名通信,其面向连接和严格的源路由方式导致效率低、扩展性差。利用分布式的概念,采用分段连接技术思想提出了一种安全、高效的分布式洋葱路由机制(DORS),给出了DORS路由实现算法,并从方案实现效率、安全性方面对DORS进行了分析。分析结果表明DORS具有良好的扩展性、鲁棒性、简单性和有效性。 相似文献
6.
内部类是Java中的一大特色,通过对Java中匿名内部类的创建机制和使用方法的探讨,分析匿名内部类中成员变量与成员方法的属性与规则,并给出匿名内部类的实际应用示例。 相似文献
7.
Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish the identity of a specific wireless device in order to prevent masquerading/impersonation attacks. In the literature, the performance of RF fingerprinting techniques is typically assessed using high-end (expensive) receiver hardware. However, in most practical situations receivers will not be high-end and will suffer from device specific impairments which affect the RF fingerprinting process. This paper evaluates the accuracy of RF fingerprinting employing low-end receivers. The vulnerability to an impersonation attack is assessed for a modulation-based RF fingerprinting system employing low-end commodity hardware (by legitimate and malicious users alike). Our results suggest that receiver impairment effectively decreases the success rate of impersonation attack on RF fingerprinting. In addition, the success rate of impersonation attack is receiver dependent. 相似文献
8.
Farid Ablayev Alexander Vasiliev 《International Journal of Software and Informatics》2013,7(4):485-500
In the paper, we develop a method for constructing quantum algorithms for computing Boolean functions by quantum ordered read-once branching programs (quantum OBDDs). Our method is based on ˉngerprinting technique and representation of Boolean functions by their characteristic polynomials. We use circuit notation for branching programs for desired algorithms presentation. For several known functions our approach provides optimal QOBDDs. Namely we consider such functions as MODm, EQn, Palindromen, and PERMn (testing whether given Boolean matrix is the Permutation Matrix). We also propose a generalization of our method and apply it to the Boolean variant of the Hidden
Subgroup Problem. 相似文献
9.
10.
属性基加密(简称ABE)机制以属性为公钥,将密文和用户私钥与属性关联,能够灵活地表示访问控制策略,从而极大地降低数据共享细粒度访问控制带来的网络带宽和发送节点的处理开销.作为和ABE相关的概念,匿名ABE机制进一步隐藏了密文中的属性信息,因为这些属性是敏感的,并且代表了用户身份.匿名ABE方案中,用户因不确定是否满足访问策略而需进行重复解密尝试,造成巨大且不必要的计算开销.文章提出一种支持属性匹配检测的匿名属性基加密机制,用户通过运行属性匹配检测算法判断用户属性集合是否满足密文的访问策略而无需进行解密尝试,且属性匹配检测的计算开销远低于一次解密尝试.结果分析表明,该解决方案能够显著提高匿名属性基加密机制中的解密效率.同时,可证明方案在双线性判定性假设下的安全性. 相似文献