全文获取类型
收费全文 | 3791篇 |
免费 | 496篇 |
国内免费 | 560篇 |
专业分类
电工技术 | 68篇 |
综合类 | 205篇 |
化学工业 | 208篇 |
金属工艺 | 193篇 |
机械仪表 | 168篇 |
建筑科学 | 800篇 |
矿业工程 | 176篇 |
能源动力 | 35篇 |
轻工业 | 125篇 |
水利工程 | 51篇 |
石油天然气 | 98篇 |
武器工业 | 30篇 |
无线电 | 565篇 |
一般工业技术 | 106篇 |
冶金工业 | 733篇 |
原子能技术 | 13篇 |
自动化技术 | 1273篇 |
出版年
2024年 | 8篇 |
2023年 | 53篇 |
2022年 | 291篇 |
2021年 | 190篇 |
2020年 | 214篇 |
2019年 | 187篇 |
2018年 | 105篇 |
2017年 | 92篇 |
2016年 | 103篇 |
2015年 | 110篇 |
2014年 | 354篇 |
2013年 | 250篇 |
2012年 | 262篇 |
2011年 | 249篇 |
2010年 | 168篇 |
2009年 | 333篇 |
2008年 | 189篇 |
2007年 | 242篇 |
2006年 | 238篇 |
2005年 | 192篇 |
2004年 | 146篇 |
2003年 | 184篇 |
2002年 | 302篇 |
2001年 | 78篇 |
2000年 | 63篇 |
1999年 | 63篇 |
1998年 | 34篇 |
1997年 | 20篇 |
1996年 | 40篇 |
1995年 | 15篇 |
1994年 | 17篇 |
1993年 | 9篇 |
1992年 | 12篇 |
1991年 | 8篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 6篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1985年 | 1篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1981年 | 1篇 |
排序方式: 共有4847条查询结果,搜索用时 9 毫秒
1.
CMP系统技术与市场 总被引:3,自引:1,他引:2
葛劢冲 《电子工业专用设备》2003,32(1):17-24
概述了CMP系统技术的发展历史、发展趋势以及在IC生产中的重要性,介绍了国外CMP设备主要制造厂家的设备型号和性能及CMP设备市场分布和需求,阐述了CMP系统技术的基础研究、关键技术和国内研究概况。 相似文献
2.
3.
长安之星空调放大器所具有延时启动、温度控制、过热保护、加速切断、点火控制以及转速控制等功能.该放大器以进口空调放大器为原型,通过其原理、结构及功能的分析,对软件和硬件分别进行反求设计,研制开发出能替代原产品的新产品.该产品硬件采用MDT2005单片机作核心控制,温度和水温采集用LM324实现模数转换,发动机转速经过两级滤波、降压后,再进入LM324作波形整理.MDT2005的8位计数器采用递增方式计数,当计至FFH时自动复零,并重新开始计数,一直循环.程序设计以循环方式与分支处理方式相结合,以实现空调放大器的各种控制功能与技术指标. 相似文献
4.
What are the key elements of a sustainable university? 总被引:1,自引:0,他引:1
Nowadays, the principles of sustainable development are becoming increasingly important and universities are acting as agents
in promoting these principles within society. In the future, universities will inevitably play crucial role in propagating
these principles. This paper highlights important documents and discusses definitions of the term education for sustainable development. Elements, based on continuous feedback loop (Deming spiral) are discussed, in order to incorporate sustainability principles
into university activities. The University of Maribor has been used as a case study to test the effectiveness of the proposed
integration of sustainable development principles. 相似文献
5.
Interactive key frame selection model 总被引:1,自引:0,他引:1
Jian-quan Ouyang Jin-tao Li Huanrong Tang 《Journal of Visual Communication and Image Representation》2006,17(6):1145-1163
Video summarization can provide a fine representation of the content of video stream and reduce a large amount of data involved in video indexing, browsing, and retrieval. Moreover, Key frame selection is an important step in the research of content-based video analysis and retrieval. Although there exist a variety of methods for key frame selection, they are heuristic and closed systems, which cannot dynamically generate video summary with user’s preference. In this paper, an M-estimator and epipolar line distance constraint camera motion estimation algorithm is introduced as camera parameters is an important motion feature for key frame selection, and Broyden-Fletcher-Goldfarb-Shanno (BFGS) method is applied to optimize estimated parameters. Moreover, since Interactive Computing is a novel-computing model that represents the transition of algorithm to interaction, an interactive model of key frame selection (IKFS) is presented as a result of improving the model of key frame selection (KFS). The model of KFS and IKFS are proved to satisfy the criterion of induction and coinduction, respectively. Experimental results show that the processing scheme generates flexible and desirable summarizations whose distortion rate is lower than current method. Above all, IKFS is an extension to KFS. 相似文献
6.
Stephen M. Matyas 《Journal of Cryptology》1991,3(2):113-136
A method is presented for controlling cryptographic key usage based on control vectors. Each cryptographic key has an associated control vector that defines the permitted uses of the key within the cryptographic system. At key generation, the control vector is cryptographically coupled to the key by way of a special encryption process. Each encrypted key and control vector are stored and distributed within the cryptographic system as a single token. Decryption of a key requires respecification of the control vector. As part of the decryption process, the cryptographic hardware verifies that the requested use of the key is authorized by the control vector. This article focuses mainly on the use of control vectors in cryptosystems based on the Data Encryption Algorithm. 相似文献
7.
Mihir Bellare Adriana Palacio 《Applicable Algebra in Engineering, Communication and Computing》2006,16(6):379-396
Key-insulated encryption schemes use a combination of key splitting and key evolution to protect against key exposure. Existing
schemes, however scale poorly, having cost proportional to the number t of time periods that may be compromised by the adversary, and thus are practical only for small values of t. Yet in practice t might be large.
This paper presents a strongly key-insulated encryption scheme with optimal threshold. In our scheme, t need not be known in advance and can be as large as one less than the total number of periods, yet the cost of the scheme
is not impacted. This brings key-insulated encryption closer to practice. Our scheme is based on the Boneh-Franklin identity-based
encryption (IBE) scheme [9], and exploits algebraic properties of the latter.
Another contribution of this paper is to show that (not strongly) key-insulated encryption with optimal threshold and allowing
random-access key updates (which our scheme and all others known allow) is equivalent to a restricted form of IBE. This means
that the connection between key-insulated encryption and IBE is not accidental.
Supported in part by NSF grants CCR-0098123, ANR-0129617 and CCR-0208842, and by an IBM Faculty Partnership Development Award.
Supported in part by an NSF graduate fellowship. 相似文献
8.
本文提出了一种新的4级密钥管理方案.该方案通过一个密码操作核心的精心设计,为各用户使用系统的各种功能提供了方便的手段,同时确保了系统的安全性.此外,该方案还大大降低了系统开发费用和保密通信的复杂度.因此,该方案克服了以往方案中的缺陷,已被正在开发的系统SUTU采用. 相似文献
9.
In this paper, we present a detailed and systematic overview of communication security aspects of Multi-Processor Systems-on-Chip (MPSoC) and the emerging potential threats on the novel Cloud-of-Chips (CoC) paradigm. The CoC concept refers to highly scalable and composable systems, assembled not only at system design-time using RTL, like traditional SoC, but also at integrated circuit (IC) packaging time thanks to 3D-IC integration technology. Practical implementation of CoC systems needs to solve the problem of scalable, configurable and secure communication not only between different functional blocks in a single ICs, but also between different ICs in a single package, and between different packages on the same or different PCBs and even between different systems. To boost such extremely flexible communication infrastructure CoC system relies on Software-Defined Network-on-Chip (SDNoC) paradigm that combines design-time configurability of on-chip systems (NoC) and highly configurable communication of macroscopic systems (SDN). This study first explores security threats and existing solutions for traditional MPSoC platforms. Afterwards, we propose SDNoC as an alternative to MPSoC communication security, and we further extend our discussion to CoC systems to identify additional security concerns. Moreover, we present a comparison of SDNoC based approach over existing approaches and discuss its potential advantages. 相似文献
10.
目前国家环保部正在开展的国家环境信息与统计能力建设项目中,采用数字证书为业务系统提供强身份认证服务。详细论述了数字证书在环保部的应用模式,指出了今后的工作方向,同时也指出了现有应用模式的不足之处。 相似文献