全文获取类型
收费全文 | 6997篇 |
免费 | 644篇 |
国内免费 | 605篇 |
专业分类
电工技术 | 114篇 |
技术理论 | 1篇 |
综合类 | 346篇 |
化学工业 | 230篇 |
金属工艺 | 199篇 |
机械仪表 | 200篇 |
建筑科学 | 2245篇 |
矿业工程 | 193篇 |
能源动力 | 225篇 |
轻工业 | 229篇 |
水利工程 | 89篇 |
石油天然气 | 110篇 |
武器工业 | 33篇 |
无线电 | 780篇 |
一般工业技术 | 230篇 |
冶金工业 | 1010篇 |
原子能技术 | 43篇 |
自动化技术 | 1969篇 |
出版年
2024年 | 13篇 |
2023年 | 89篇 |
2022年 | 349篇 |
2021年 | 285篇 |
2020年 | 318篇 |
2019年 | 238篇 |
2018年 | 160篇 |
2017年 | 162篇 |
2016年 | 224篇 |
2015年 | 247篇 |
2014年 | 574篇 |
2013年 | 492篇 |
2012年 | 456篇 |
2011年 | 488篇 |
2010年 | 373篇 |
2009年 | 552篇 |
2008年 | 381篇 |
2007年 | 461篇 |
2006年 | 405篇 |
2005年 | 335篇 |
2004年 | 266篇 |
2003年 | 287篇 |
2002年 | 392篇 |
2001年 | 130篇 |
2000年 | 117篇 |
1999年 | 115篇 |
1998年 | 61篇 |
1997年 | 46篇 |
1996年 | 49篇 |
1995年 | 32篇 |
1994年 | 21篇 |
1993年 | 16篇 |
1992年 | 14篇 |
1991年 | 11篇 |
1990年 | 9篇 |
1989年 | 17篇 |
1988年 | 10篇 |
1987年 | 7篇 |
1986年 | 10篇 |
1985年 | 7篇 |
1984年 | 6篇 |
1983年 | 5篇 |
1982年 | 4篇 |
1981年 | 3篇 |
1980年 | 4篇 |
1979年 | 3篇 |
1958年 | 1篇 |
1954年 | 1篇 |
排序方式: 共有8246条查询结果,搜索用时 0 毫秒
11.
12.
在PKI体系中,私钥集中存放或私钥托管方式的安全性和方便性依赖于管理员的可信性或者需要一个各行业都能使用和接受的具有权威性的第三方托管机构。借鉴密钥托管的思想,设计了一个私钥管理方案。将加密的私钥和加密私钥的密钥分离,使得KMC和KEC都不能单独解密出私钥。与其他私钥管理方案相比,该方案安全性不依赖于管理员或第三方托管机构的可信性,更加方便和安全。 相似文献
13.
移动自组网安全技术研究 总被引:1,自引:0,他引:1
移动Ad Hoc网络由于其动态拓扑和无线通信等特点,容易受到安全威胁.将现有的移动Ad Hoc网络的网络安全技术分为入侵检测与防范、安全路由协议技术、架构模型技术、密钥技术和其他技术.其中,入侵检测与防范主要基于移动Ad Hoc网络的特点,在一定教学模型的基础上对于网络节点的行为进行分析和监测,以保证整个移动网络的网络安全.安全路由协议技术包括全新的安全路由协议技术和现有路由协议的安全化改进技术.密钥技术主要是基于移动Ad Hoc网络的特点对现有密钥技术进行改造.对上述移动Ad Hoc网络的网络安全技术分别进行了介绍和分析. 相似文献
14.
《The Electricity Journal》2022,35(9):107202
The historical competition between public power and private power shows that retail customers have chosen the former to reduce costs and improve customer service. Research also shows that publicly owned utilities employ cost-minimizing algorithms, and that federal and state regulators favor the interests of investors over those of customers, undermining their obligation to protect consumer welfare. Institutional options matter and should be strongly encouraged. 相似文献
15.
Shijie Hu Xiaoyu Li Jiayu Bai Hang Lei Weizhong Qian Sunqiang Hu Cong Zhang Akpatsa Samuel Kofi Qian Qiu Yong Zhou Shan Yang 《计算机、材料和连续体(英文)》2023,74(2):2803-2815
When the Transformer proposed by Google in 2017, it was first used for machine translation tasks and achieved the state of the art at that time. Although the current neural machine translation model can generate high quality translation results, there are still mistranslations and omissions in the translation of key information of long sentences. On the other hand, the most important part in traditional translation tasks is the translation of key information. In the translation results, as long as the key information is translated accurately and completely, even if other parts of the results are translated incorrect, the final translation results’ quality can still be guaranteed. In order to solve the problem of mistranslation and missed translation effectively, and improve the accuracy and completeness of long sentence translation in machine translation, this paper proposes a key information fused neural machine translation model based on Transformer. The model proposed in this paper extracts the keywords of the source language text separately as the input of the encoder. After the same encoding as the source language text, it is fused with the output of the source language text encoded by the encoder, then the key information is processed and input into the decoder. With incorporating keyword information from the source language sentence, the model’s performance in the task of translating long sentences is very reliable. In order to verify the effectiveness of the method of fusion of key information proposed in this paper, a series of experiments were carried out on the verification set. The experimental results show that the Bilingual Evaluation Understudy (BLEU) score of the model proposed in this paper on the Workshop on Machine Translation (WMT) 2017 test dataset is higher than the BLEU score of Transformer proposed by Google on the WMT2017 test dataset. The experimental results show the advantages of the model proposed in this paper. 相似文献
16.
Hajime Nagahama 《AI & Society》1998,12(4):251-263
Japan's educational system has some major problems. The most important among these concerns is the basic concept of the educational process and the goal of education. The old concept of public educational systems has become outdated in today's Japanese society, although this concept had supported social and spiritual faith, economic success and selfless devotion to one's country for more than 100 years. Now, Japanese people need a new concept of the educational process and the goal of education for the twenty-first century. The paper proposes a value chain of educational and learning systems aimed at building a network consisting of multiple fields for fostering future human resources. 相似文献
17.
政务信息资源中心框架设计及关键技术研究 总被引:1,自引:0,他引:1
张家锐 《计算机应用与软件》2011,28(8):117-119
目前国内有关政务信息资源共享的研究及应用还停留在网络互联互通、信息资源整合、点对点数据交换阶段,并没有达到"协同工作"的要求.鉴于此,提出了政务信息资源中心的概念,实现政务信息资源的统一获取、统一管理、规则化和规模化服务.结合工作实践,对其组成、总体框架、技术架构进行了设计,并就实现时需要解决的关键技术进行了研究. 相似文献
18.
Design of DL-based certificateless digital signatures 总被引:1,自引:0,他引:1
Public-key cryptosystems without requiring digital certificates are very attractive in wireless communications due to limitations imposed by communication bandwidth and computational resource of the mobile wireless communication devices. To eliminate public-key digital certificate, Shamir introduced the concept of the identity-based (ID-based) cryptosystem. The main advantage of the ID-based cryptosystem is that instead of using a random integer as each user’s public key as in the traditional public-key systems, the user’s real identity, such as user’s name or email address, becomes the user’s public key. However, all identity-based signature (IBS) schemes have the inherent key escrow problem, that is private key generator (PKG) knows the private key of each user. As a result, the PKG is able to sign any message on the users’ behalf. This nature violates the “non-repudiation” requirement of digital signatures. To solve the key escrow problem of the IBS while still taking advantage of the benefits of the IBS, certificateless digital signature (CDS) was introduced. In this paper, we propose a generalized approach to construct CDS schemes. In our proposed CDS scheme, the user’s private key is known only to the user himself, therefore, it can eliminate the key escrow problem from the PKG. The proposed construction can be applied to all Discrete Logarithm (DL)-based signature schemes to convert a digital signature scheme into a CDS scheme. The proposed CDS scheme is secure against adaptive chosen-message attack in the random oracle model. In addition, it is also efficient in signature generation and verification. 相似文献
19.
Most existing solutions to group security in Mobile Ad Hoc Networks (MANETs) rely on a multicast Core Based Tree (CBT) for key distribution. Such solutions, although suitable for systems with low mobility and static characteristics, are unsuitable for dynamic and sparse groups with changing neighborhoods. In this paper, we propose an entirely decentralized key generation mechanism, employing a central trusted entity only during initialization. Using our approach, keys can be established between group members with absolutely no prior communication. The solution relies on threshold cryptography and introduces a novel concept of Node-Group-Key (NGK) mapping. We have provided an extensive analytical model for the computations involved and communication costs and have also provided a lie detection mechanism. Simulation results show appreciable performance improvement and enhanced robustness. 相似文献
20.
对重催I/A'S系统三冲量控制回路的探讨 总被引:1,自引:0,他引:1
本文主要对广州石油化工总厂重油催化裂化装置的复杂回路——三冲量控制在I/A'S系统的实现进行探讨和实施。 相似文献