首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3791篇
  免费   496篇
  国内免费   560篇
电工技术   68篇
综合类   205篇
化学工业   208篇
金属工艺   193篇
机械仪表   168篇
建筑科学   800篇
矿业工程   176篇
能源动力   35篇
轻工业   125篇
水利工程   51篇
石油天然气   98篇
武器工业   30篇
无线电   565篇
一般工业技术   106篇
冶金工业   733篇
原子能技术   13篇
自动化技术   1273篇
  2024年   8篇
  2023年   53篇
  2022年   291篇
  2021年   190篇
  2020年   214篇
  2019年   187篇
  2018年   105篇
  2017年   92篇
  2016年   103篇
  2015年   110篇
  2014年   354篇
  2013年   250篇
  2012年   262篇
  2011年   249篇
  2010年   168篇
  2009年   333篇
  2008年   189篇
  2007年   242篇
  2006年   238篇
  2005年   192篇
  2004年   146篇
  2003年   184篇
  2002年   302篇
  2001年   78篇
  2000年   63篇
  1999年   63篇
  1998年   34篇
  1997年   20篇
  1996年   40篇
  1995年   15篇
  1994年   17篇
  1993年   9篇
  1992年   12篇
  1991年   8篇
  1990年   3篇
  1989年   4篇
  1988年   6篇
  1987年   2篇
  1986年   2篇
  1985年   1篇
  1984年   3篇
  1983年   2篇
  1982年   2篇
  1981年   1篇
排序方式: 共有4847条查询结果,搜索用时 9 毫秒
1.
CMP系统技术与市场   总被引:3,自引:1,他引:2  
概述了CMP系统技术的发展历史、发展趋势以及在IC生产中的重要性,介绍了国外CMP设备主要制造厂家的设备型号和性能及CMP设备市场分布和需求,阐述了CMP系统技术的基础研究、关键技术和国内研究概况。  相似文献   
2.
3.
薛斌  王萍  陈琴 《兵工自动化》2002,21(4):54-56
长安之星空调放大器所具有延时启动、温度控制、过热保护、加速切断、点火控制以及转速控制等功能.该放大器以进口空调放大器为原型,通过其原理、结构及功能的分析,对软件和硬件分别进行反求设计,研制开发出能替代原产品的新产品.该产品硬件采用MDT2005单片机作核心控制,温度和水温采集用LM324实现模数转换,发动机转速经过两级滤波、降压后,再进入LM324作波形整理.MDT2005的8位计数器采用递增方式计数,当计至FFH时自动复零,并重新开始计数,一直循环.程序设计以循环方式与分支处理方式相结合,以实现空调放大器的各种控制功能与技术指标.  相似文献   
4.
What are the key elements of a sustainable university?   总被引:1,自引:0,他引:1  
Nowadays, the principles of sustainable development are becoming increasingly important and universities are acting as agents in promoting these principles within society. In the future, universities will inevitably play crucial role in propagating these principles. This paper highlights important documents and discusses definitions of the term education for sustainable development. Elements, based on continuous feedback loop (Deming spiral) are discussed, in order to incorporate sustainability principles into university activities. The University of Maribor has been used as a case study to test the effectiveness of the proposed integration of sustainable development principles.  相似文献   
5.
Interactive key frame selection model   总被引:1,自引:0,他引:1  
Video summarization can provide a fine representation of the content of video stream and reduce a large amount of data involved in video indexing, browsing, and retrieval. Moreover, Key frame selection is an important step in the research of content-based video analysis and retrieval. Although there exist a variety of methods for key frame selection, they are heuristic and closed systems, which cannot dynamically generate video summary with user’s preference. In this paper, an M-estimator and epipolar line distance constraint camera motion estimation algorithm is introduced as camera parameters is an important motion feature for key frame selection, and Broyden-Fletcher-Goldfarb-Shanno (BFGS) method is applied to optimize estimated parameters. Moreover, since Interactive Computing is a novel-computing model that represents the transition of algorithm to interaction, an interactive model of key frame selection (IKFS) is presented as a result of improving the model of key frame selection (KFS). The model of KFS and IKFS are proved to satisfy the criterion of induction and coinduction, respectively. Experimental results show that the processing scheme generates flexible and desirable summarizations whose distortion rate is lower than current method. Above all, IKFS is an extension to KFS.  相似文献   
6.
A method is presented for controlling cryptographic key usage based on control vectors. Each cryptographic key has an associated control vector that defines the permitted uses of the key within the cryptographic system. At key generation, the control vector is cryptographically coupled to the key by way of a special encryption process. Each encrypted key and control vector are stored and distributed within the cryptographic system as a single token. Decryption of a key requires respecification of the control vector. As part of the decryption process, the cryptographic hardware verifies that the requested use of the key is authorized by the control vector. This article focuses mainly on the use of control vectors in cryptosystems based on the Data Encryption Algorithm.  相似文献   
7.
Key-insulated encryption schemes use a combination of key splitting and key evolution to protect against key exposure. Existing schemes, however scale poorly, having cost proportional to the number t of time periods that may be compromised by the adversary, and thus are practical only for small values of t. Yet in practice t might be large. This paper presents a strongly key-insulated encryption scheme with optimal threshold. In our scheme, t need not be known in advance and can be as large as one less than the total number of periods, yet the cost of the scheme is not impacted. This brings key-insulated encryption closer to practice. Our scheme is based on the Boneh-Franklin identity-based encryption (IBE) scheme [9], and exploits algebraic properties of the latter. Another contribution of this paper is to show that (not strongly) key-insulated encryption with optimal threshold and allowing random-access key updates (which our scheme and all others known allow) is equivalent to a restricted form of IBE. This means that the connection between key-insulated encryption and IBE is not accidental. Supported in part by NSF grants CCR-0098123, ANR-0129617 and CCR-0208842, and by an IBM Faculty Partnership Development Award. Supported in part by an NSF graduate fellowship.  相似文献   
8.
王敏 《计算机学报》1993,16(2):106-112
本文提出了一种新的4级密钥管理方案.该方案通过一个密码操作核心的精心设计,为各用户使用系统的各种功能提供了方便的手段,同时确保了系统的安全性.此外,该方案还大大降低了系统开发费用和保密通信的复杂度.因此,该方案克服了以往方案中的缺陷,已被正在开发的系统SUTU采用.  相似文献   
9.
In this paper, we present a detailed and systematic overview of communication security aspects of Multi-Processor Systems-on-Chip (MPSoC) and the emerging potential threats on the novel Cloud-of-Chips (CoC) paradigm. The CoC concept refers to highly scalable and composable systems, assembled not only at system design-time using RTL, like traditional SoC, but also at integrated circuit (IC) packaging time thanks to 3D-IC integration technology. Practical implementation of CoC systems needs to solve the problem of scalable, configurable and secure communication not only between different functional blocks in a single ICs, but also between different ICs in a single package, and between different packages on the same or different PCBs and even between different systems. To boost such extremely flexible communication infrastructure CoC system relies on Software-Defined Network-on-Chip (SDNoC) paradigm that combines design-time configurability of on-chip systems (NoC) and highly configurable communication of macroscopic systems (SDN). This study first explores security threats and existing solutions for traditional MPSoC platforms. Afterwards, we propose SDNoC as an alternative to MPSoC communication security, and we further extend our discussion to CoC systems to identify additional security concerns. Moreover, we present a comparison of SDNoC based approach over existing approaches and discuss its potential advantages.  相似文献   
10.
目前国家环保部正在开展的国家环境信息与统计能力建设项目中,采用数字证书为业务系统提供强身份认证服务。详细论述了数字证书在环保部的应用模式,指出了今后的工作方向,同时也指出了现有应用模式的不足之处。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号