首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6733篇
  免费   630篇
  国内免费   645篇
电工技术   316篇
综合类   379篇
化学工业   221篇
金属工艺   240篇
机械仪表   514篇
建筑科学   813篇
矿业工程   192篇
能源动力   42篇
轻工业   134篇
水利工程   56篇
石油天然气   115篇
武器工业   61篇
无线电   1465篇
一般工业技术   153篇
冶金工业   735篇
原子能技术   66篇
自动化技术   2506篇
  2024年   10篇
  2023年   56篇
  2022年   292篇
  2021年   198篇
  2020年   222篇
  2019年   195篇
  2018年   108篇
  2017年   117篇
  2016年   134篇
  2015年   174篇
  2014年   460篇
  2013年   359篇
  2012年   452篇
  2011年   493篇
  2010年   385篇
  2009年   647篇
  2008年   517篇
  2007年   620篇
  2006年   603篇
  2005年   524篇
  2004年   341篇
  2003年   321篇
  2002年   362篇
  2001年   104篇
  2000年   68篇
  1999年   63篇
  1998年   35篇
  1997年   20篇
  1996年   41篇
  1995年   15篇
  1994年   17篇
  1993年   9篇
  1992年   12篇
  1991年   8篇
  1990年   3篇
  1989年   4篇
  1988年   6篇
  1987年   2篇
  1986年   2篇
  1985年   1篇
  1984年   3篇
  1983年   2篇
  1982年   2篇
  1981年   1篇
排序方式: 共有8008条查询结果,搜索用时 15 毫秒
31.
OTG补充协议开辟USB的新篇章   总被引:1,自引:0,他引:1  
USB On-The-Go扩大了USB的应用领域,将USB从传统的PC与外设通讯的模式,扩展到移动电子和嵌入式领域中,实现了通常的外设与外设之间点对点的数据传输模式。  相似文献   
32.
Interactive key frame selection model   总被引:1,自引:0,他引:1  
Video summarization can provide a fine representation of the content of video stream and reduce a large amount of data involved in video indexing, browsing, and retrieval. Moreover, Key frame selection is an important step in the research of content-based video analysis and retrieval. Although there exist a variety of methods for key frame selection, they are heuristic and closed systems, which cannot dynamically generate video summary with user’s preference. In this paper, an M-estimator and epipolar line distance constraint camera motion estimation algorithm is introduced as camera parameters is an important motion feature for key frame selection, and Broyden-Fletcher-Goldfarb-Shanno (BFGS) method is applied to optimize estimated parameters. Moreover, since Interactive Computing is a novel-computing model that represents the transition of algorithm to interaction, an interactive model of key frame selection (IKFS) is presented as a result of improving the model of key frame selection (KFS). The model of KFS and IKFS are proved to satisfy the criterion of induction and coinduction, respectively. Experimental results show that the processing scheme generates flexible and desirable summarizations whose distortion rate is lower than current method. Above all, IKFS is an extension to KFS.  相似文献   
33.
尽管当前有许多维护网络安全的策略,但是局域网内部通讯安全却往往被忽略,文章首先分析当前一些安全策略在维护局域网内部通讯安全的不足,然后提出一种具有加密功能的以太网网卡,用以解决局域网内部通讯的安全问题。  相似文献   
34.
In order to investigate the effect of partitioning procedures on microstructure and properties of a medium carbon Ti Mo bearing steel, the salt bath experiment, field emission SEM, TEM and tensile tests as well as wear tests were utilized to clarify the microstructural evolution and property changes treated by different partitioning parameters. The results show that the microstructures consist of tempered lath martensite, cementite and (Ti, Mo)C particles. With prolonging partitioning time or increasing partitioning temperature, the amount of laths martensite decreases and thicker martensite plates with blunt boundaries appear. In addition, with increasing partitioning temperature from 310℃ to 400℃, the tensile strength, hardness and low temperature toughness are simultaneously decreased, and the reduction reaches up to about 300MPa, 100HV and 20J, respectively. Finally, the wear performance of the samples partitioned below Ms is obviously better than that of samples partitioned above Ms. The morphology of worn surface of samples partitioned below Ms is characterized by plastic fatigue morphology, while the worn surfaces of samples partitioned above Ms are mainly dominated by grooves.  相似文献   
35.
A method is presented for controlling cryptographic key usage based on control vectors. Each cryptographic key has an associated control vector that defines the permitted uses of the key within the cryptographic system. At key generation, the control vector is cryptographically coupled to the key by way of a special encryption process. Each encrypted key and control vector are stored and distributed within the cryptographic system as a single token. Decryption of a key requires respecification of the control vector. As part of the decryption process, the cryptographic hardware verifies that the requested use of the key is authorized by the control vector. This article focuses mainly on the use of control vectors in cryptosystems based on the Data Encryption Algorithm.  相似文献   
36.
介绍一种基于BCM7113的数字电视机顶盒的硬件设计方案,该方案是应杭州市场的需求而设计开发的,最大的特点就是有线电视网和以太网的结合,BCM7113是Broadcom公司出品的集系统控制、信道解码和标清MPEG-2解码于一体的数字电视机顶盒专用芯片,该平台具有强大的扩展接口,如USB、ITU—R656等,并扩展了10M/100M以太网接口,有很强的可升级性。  相似文献   
37.
MouseWarrior是德国CodeMercenaries公司生产的鼠标控制系列芯片。该芯片融合了所有的鼠标接口并集目前市场上所采用的新技术于一身,兼容性好且使用简单,是开发鼠标产品的理想选择。文中介绍了MouseWarrior系列芯片的性能特点和引脚功能,给出了一个鼠标电路的设计实例。  相似文献   
38.
一种便携式数控测井系统采用上位机、下位机结构,通过USB2·0接口协议进行通讯。下位机包括PC104嵌入式计算机和相关数据采集电路,完成测井信号的实时采集、测井仪器的控制和向上位机传送采集的数据。上位机采用笔记本,基于Windows2000/XP平台,完成系统的管理、测井命令的发送、测井数据的接收、信号的处理、图形显示、打印、数据保存和人机交互等工作。系统采用模块化设计,硬件、软件易于扩展。  相似文献   
39.
Key-insulated encryption schemes use a combination of key splitting and key evolution to protect against key exposure. Existing schemes, however scale poorly, having cost proportional to the number t of time periods that may be compromised by the adversary, and thus are practical only for small values of t. Yet in practice t might be large. This paper presents a strongly key-insulated encryption scheme with optimal threshold. In our scheme, t need not be known in advance and can be as large as one less than the total number of periods, yet the cost of the scheme is not impacted. This brings key-insulated encryption closer to practice. Our scheme is based on the Boneh-Franklin identity-based encryption (IBE) scheme [9], and exploits algebraic properties of the latter. Another contribution of this paper is to show that (not strongly) key-insulated encryption with optimal threshold and allowing random-access key updates (which our scheme and all others known allow) is equivalent to a restricted form of IBE. This means that the connection between key-insulated encryption and IBE is not accidental. Supported in part by NSF grants CCR-0098123, ANR-0129617 and CCR-0208842, and by an IBM Faculty Partnership Development Award. Supported in part by an NSF graduate fellowship.  相似文献   
40.
USB技术在飞机外场设备测试中的应用   总被引:3,自引:0,他引:3  
通用串行总线(USB)是近年来流行的一种新的微机总线接口标准,它可以实现较传统方式更有效、更经济、更多点的数据采集,详细介绍了利用USB技术实现飞机外场快速测试的方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号