首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13733篇
  免费   1500篇
  国内免费   1361篇
电工技术   606篇
综合类   1467篇
化学工业   168篇
金属工艺   163篇
机械仪表   650篇
建筑科学   345篇
矿业工程   217篇
能源动力   45篇
轻工业   79篇
水利工程   90篇
石油天然气   72篇
武器工业   111篇
无线电   5539篇
一般工业技术   471篇
冶金工业   79篇
原子能技术   22篇
自动化技术   6470篇
  2024年   59篇
  2023年   164篇
  2022年   273篇
  2021年   378篇
  2020年   470篇
  2019年   317篇
  2018年   306篇
  2017年   459篇
  2016年   528篇
  2015年   597篇
  2014年   1113篇
  2013年   984篇
  2012年   1038篇
  2011年   1016篇
  2010年   857篇
  2009年   852篇
  2008年   959篇
  2007年   1049篇
  2006年   900篇
  2005年   847篇
  2004年   739篇
  2003年   671篇
  2002年   466篇
  2001年   423篇
  2000年   245篇
  1999年   184篇
  1998年   140篇
  1997年   117篇
  1996年   109篇
  1995年   109篇
  1994年   58篇
  1993年   41篇
  1992年   39篇
  1991年   29篇
  1990年   15篇
  1989年   15篇
  1988年   11篇
  1987年   3篇
  1986年   1篇
  1985年   4篇
  1984年   2篇
  1983年   1篇
  1982年   1篇
  1980年   1篇
  1963年   1篇
  1961年   1篇
  1959年   1篇
  1955年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
徐配忠 《电信科学》2003,19(4):29-31
我国移动通信制造业在2G上晚了十年,未能取得相应的市场份额。但在3G领域,已经逐渐同步业界先进水平。如何改变现有市场格局,我国移动通信业面临全新的机会和重大的挑战,本就我国WCDMA系统产业化现状做了简要论述。  相似文献   
42.
以有线电视为重点介绍了电视信号的数字化概念、优点及数字电视发展的趋势  相似文献   
43.
新型彩电最能集中反映显示技术的突破性进展。本文介绍全球彩电市场概况、交互式彩电、数字式彩电、数字式有线彩电及近年来不断涌现的彩电新品,如眼控式彩电、声控式彩电、声控式彩电、多媒体彩电、三维立体彩电及无荧屏彩电等。  相似文献   
44.
薄膜晶体管液晶电视(TFT-LCD TV)因为具有薄、轻、紧凑和可随意放置的特点,已经占据了大部分电视机市场。除了这些物理特性以外,最重要的特性是已具有了良好像质的对比度。为了将对比度提高到1:600以上,对偏振片膜、背光源板、滤色片树脂、电极锥角和摩擦条件等都进行了研究。优化的背光板组合,光滑的电极锥角和摩擦方法的控制是提高对比度的主要控制因素。应用新开发的滤色片树脂,对获得高对比度最为有效。  相似文献   
45.
In 3 experiments, the authors investigated spatial updating in augmented reality environments. Participants learned locations of virtual objects on the physical floor. They were turned to appropriate facing directions while blindfolded before making pointing judgments (e.g., "Imagine you are facing X. Point to Y"). Experiments manipulated the angular difference between the learning heading and the imagined heading and between the actual heading and the imagined heading. The effect of actual-imagined on pointing latency was observed for naive users but not for users with brief training or instructions concerning the fact that objects can move with body movements. The results indicated that naive users used an environment-stabilized reference frame to access information arrays, but with experience and instruction the nature of the representation changed from an environment stabilized to a body stabilized reference frame. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
46.
简要介绍了数字电视清晰度和机卡分离两项产品认证的进展情况,以及认证工作开展的背景、依据和模式,供有关人员在实施和贯彻标准中参考。  相似文献   
47.
Even with attractive computational advantages, mobile agent technology has not developed its full potential due to various security issues. This paper proposes a method called Private Key Consignment to solve the problem of how to protect the data carried by mobile agents. It exploits new functionalities and mechanism provided by the trusted computing technology, and adopts both public key and symmetric key cryptographic means for data and key protection. The most notable feature of this method is that it protects the private key of the agent by consigning it to a tamper proof hardware, thus, enabling convenient and secure use of the private key. It provides a new scheme of mobile agents' data protection.  相似文献   
48.
用CMTS+CM技术实现宽带接入是有线电视的主流方向。本文对其传输的原理、技术指标、改造注意事项及综合性能进行了分析。  相似文献   
49.
Verifiable Distributed Oblivious Transfer and Mobile Agent Security   总被引:1,自引:0,他引:1  
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting mobile agents not only is possible, but also can be implemented efficiently. This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399 and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003. Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases, and wireless networks. On the theoretical side, he is interested in cryptography and game theory. Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS) at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998 and 2001).  相似文献   
50.
赵希  李秀敏  李桂苓 《电视技术》2005,(12):84-85,88
讨论了数字电视显示图像的同心度、重显率和过扫描,描述了它们的测量方法,重点分析了它们之间的内在联系,以及用它们来衡量显示图像质量的优缺点。实测表明,正确调整和测定这些指标,对保证数字电视图像主观效果具有重要作用。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号