首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21514篇
  免费   1492篇
  国内免费   972篇
电工技术   3634篇
综合类   1988篇
化学工业   328篇
金属工艺   589篇
机械仪表   2463篇
建筑科学   453篇
矿业工程   623篇
能源动力   286篇
轻工业   206篇
水利工程   359篇
石油天然气   230篇
武器工业   352篇
无线电   4452篇
一般工业技术   624篇
冶金工业   156篇
原子能技术   131篇
自动化技术   7104篇
  2024年   27篇
  2023年   94篇
  2022年   139篇
  2021年   168篇
  2020年   226篇
  2019年   211篇
  2018年   190篇
  2017年   362篇
  2016年   391篇
  2015年   590篇
  2014年   980篇
  2013年   833篇
  2012年   1382篇
  2011年   1688篇
  2010年   1712篇
  2009年   1978篇
  2008年   1845篇
  2007年   2128篇
  2006年   2102篇
  2005年   1784篇
  2004年   1338篇
  2003年   1115篇
  2002年   782篇
  2001年   486篇
  2000年   323篇
  1999年   217篇
  1998年   147篇
  1997年   146篇
  1996年   117篇
  1995年   87篇
  1994年   98篇
  1993年   66篇
  1992年   41篇
  1991年   45篇
  1990年   18篇
  1989年   24篇
  1988年   19篇
  1987年   13篇
  1986年   4篇
  1985年   11篇
  1984年   7篇
  1983年   6篇
  1982年   6篇
  1981年   7篇
  1980年   5篇
  1978年   2篇
  1977年   2篇
  1976年   3篇
  1974年   3篇
  1962年   2篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
41.
It has recently been shown that authenticated Byzantine agreement, in which more than a third of the parties are corrupted, cannot be securely realized under concurrent or parallel (stateless) composition. This result puts into question any usage of authenticated Byzantine agreement in a setting where many executions take place. In particular, this is true for the whole body of work of secure multi-party protocols in the case that a third or more of the parties are corrupted. This is because these protocols strongly rely on the extensive use of a broadcast channel, which is in turn realized using authenticated Byzantine agreement. We remark that it was accepted folklore that the use of a broadcast channel (or authenticated Byzantine agreement) is actually essential for achieving meaningful secure multi-party computation whenever a third or more of the parties are corrupted. In this paper we show that this folklore is false. We present a mild relaxation of the definition of secure computation allowing abort. Our new definition captures all the central security issues of secure computation, including privacy, correctness and independence of inputs. However, the novelty of the definition is in decoupling the issue of agreement from these issues. We then show that this relaxation suffices for achieving secure computation in a point-to-point network. That is, we show that secure multi-party computation for this definition can be achieved for any number of corrupted parties and without a broadcast channel (or trusted pre-processing phase as required for running authenticated Byzantine agreement). Furthermore, this is achieved by just replacing the broadcast channel in known protocols with a very simple and efficient echo-broadcast protocol. An important corollary of our result is the ability to obtain multi-party protocols that remain secure under composition, without assuming a broadcast channel.  相似文献   
42.
用CPLD实现总线扩展   总被引:1,自引:1,他引:0  
文中介绍了一种用CPLD实现的总线扩展技术,该设计具有灵活和可编程的特点,并在单片机和DSP外部总线扩展中得到了多次应用。  相似文献   
43.
文章分析了液压混合动力汽车的发展趋势,简述数字信号处理器(DSP)作为控制器的优势和DSP作为控制器对并联式混合动力液压车的能源控制的工作原理,给出了能源控制系统DSP信号流程图和主程序流程图。测试结果表明,DSP能源控制系统能够比较精确的对液压混合动力车的能量消耗与分配进行控制,具有很好的应用前景。  相似文献   
44.
We say that a distribution over {0,1}n is (ε,k)-wise independent if its restriction to every k coordinates results in a distribution that is ε-close to the uniform distribution. A natural question regarding (ε,k)-wise independent distributions is how close they are to some k-wise independent distribution. We show that there exist (ε,k)-wise independent distributions whose statistical distance is at least nO(k)·ε from any k-wise independent distribution. In addition, we show that for any (ε,k)-wise independent distribution there exists some k-wise independent distribution, whose statistical distance is nO(k)·ε.  相似文献   
45.
基于TMS320C67xx DSP的软件开发及优化   总被引:2,自引:0,他引:2  
本文介绍了TMS320C67xx的性能特点,给出了其程序开发流程,并详细讨论了常用的软件优化方法.这些方法有一定的工程应用价值。  相似文献   
46.
In this study, crisp and fuzzy multiple-goal optimization approaches are respectively introduced to design an optimal biocompatible solvent to a two-stage extractive fermentation with cell recycling for ethanol production. When designing a biocompatible solvent for the extractive fermentation process, many issues, such as extractive efficiency, conversion, amount of solvent utilized and so on, have to be considered. An interactive multiple-goal design procedure is introduced to determine a trade-off result in order to satisfy such contradicted goals. Both approaches could be iterated to solve the interactive multiple-goal design problem in order to yield a trade-off result. However, the crisp optimization design is a tedious task that requires the designer to provide various pairs of the upper bounds for the design problem to obtain the corresponding solution. The fuzzy optimization approach is able to be trade-off several goals simultaneously and to yield the overall satisfactory grade for the product/process design problem.  相似文献   
47.
邵在平 《测井技术》2003,27(4):343-345
提出了一种采用数字聚焦方法的微电阻率测井仪器设计方案,其主要特点利用DSP集成芯片的数字信号处理优势,实现仪器的控制与测量,并通过软件滤波和聚焦处理获得视电阻率。该设计用超大规模集成电路DSP及软件处理取代了老式微球形聚焦测井仪器复杂的硬件监控、反馈、检波和测量线路,提高了仪器的可靠性和测量精度。对仪器原理进行了较详细的说明,在DSP技术应用于测井井下仪器方面做了有益的探索。  相似文献   
48.
小容量机组保护监控一体化   总被引:2,自引:2,他引:0  
以数字信号处理器(DSP)和复杂可编程逻辑器件(CPLD)为硬件平台,研制了新一代面向中、小型水电站的综合自动化模块.充分发挥MB40智能可编程逻辑控制器(iPLC)及MB100系列保护测控系统的技术优势,将小型水电站的保护装置做成模块插件,融入监控系统,降低了小型水电站自动化设备的成本,为推出真正意义上的面向小型水电站的"五合一"产品打下坚实的基础.  相似文献   
49.
Motion vector plays one significant feature in moving object segmentation. However, the motion vector in this application is required to represent the actual motion displacement, rather than regions of visually significant similarity. In this paper, region-based selective optical flow back-projection (RSOFB) which back-projects optical flows in a region to restore the region's motion vector from gradient-based optical flows, is proposed to obtain genuine motion displacement. The back-projection is performed based on minimizing the projection mean square errors of the motion vector on gradient directions. As optical flows of various magnitudes and directions provide various degrees of reliability in the genuine motion restoration, the optical flows to be used in the RSOFB are optimally selected based on their sensitivity to noises and their tendency in causing motion estimation errors. In this paper a deterministic solution is also derived for performing the minimization and obtaining the genuine motion magnitude and motion direction.  相似文献   
50.
丁刚 《电子产品世界》2002,(13):63-64,58
本文先介绍了TMS320C5000 DSP中的重要存储器概念:存储器空间,装载地址和运行地址。然后在将.const段分配到程序空间的实例中对 这些概念进行具体的阐述,并给出了基于普通C语言编程和基于实时软件基础DSP/BIOS的编程中的详细实现方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号