首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   39370篇
  免费   4579篇
  国内免费   2381篇
电工技术   3036篇
技术理论   3篇
综合类   5178篇
化学工业   1972篇
金属工艺   747篇
机械仪表   1916篇
建筑科学   4546篇
矿业工程   1901篇
能源动力   1055篇
轻工业   4147篇
水利工程   2093篇
石油天然气   4198篇
武器工业   876篇
无线电   2912篇
一般工业技术   2780篇
冶金工业   1130篇
原子能技术   290篇
自动化技术   7550篇
  2024年   237篇
  2023年   626篇
  2022年   1131篇
  2021年   1371篇
  2020年   1503篇
  2019年   1204篇
  2018年   1227篇
  2017年   1303篇
  2016年   1628篇
  2015年   1662篇
  2014年   2740篇
  2013年   2458篇
  2012年   3188篇
  2011年   3249篇
  2010年   2357篇
  2009年   2457篇
  2008年   2226篇
  2007年   2645篇
  2006年   2296篇
  2005年   2003篇
  2004年   1630篇
  2003年   1366篇
  2002年   987篇
  2001年   901篇
  2000年   695篇
  1999年   588篇
  1998年   432篇
  1997年   411篇
  1996年   346篇
  1995年   298篇
  1994年   234篇
  1993年   176篇
  1992年   122篇
  1991年   109篇
  1990年   75篇
  1989年   90篇
  1988年   37篇
  1987年   33篇
  1986年   36篇
  1985年   26篇
  1984年   31篇
  1983年   32篇
  1982年   20篇
  1981年   16篇
  1980年   8篇
  1979年   14篇
  1978年   9篇
  1977年   9篇
  1976年   9篇
  1959年   7篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
181.
Verifiable Distributed Oblivious Transfer and Mobile Agent Security   总被引:1,自引:0,他引:1  
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting mobile agents not only is possible, but also can be implemented efficiently. This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399 and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003. Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases, and wireless networks. On the theoretical side, he is interested in cryptography and game theory. Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS) at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998 and 2001).  相似文献   
182.
The recommendation of the CIE has been followed as closely as possible to evaluate the accuracy of five color gamut mapping algorithms (GMAs)—two nonspatial and three spatial algorithms—by psychophysical experiments with 20 test images, 20 observers, one test done on paper and a second one on display. Even though the results do not show any overall “winner,” one GMA is definitely perceived as not accurate. The importance of a high number of test images to obtain robust evaluation is underlined by the high variability of the results depending on the test images. Significant correlations between the percentage of out‐of‐gamut pixels, the number of distinguishable pairs of GMAs, and the perceived difficulty to distinguish them have been found. The type of observers is also important. The experts, who prefer a spatial GMA, show a stronger consensus and look especially for a good rendering of details, whereas the nonexperts hardly make a difference between the GMAs. © 2008 Wiley Periodicals, Inc. Col Res Appl, 33, 470–476, 2008  相似文献   
183.
河南油田泌阳凹陷稠油地化录井评价方法   总被引:1,自引:1,他引:0  
全杰 《录井工程》2006,17(1):12-14
河南油田泌阳凹陷分布有古城、井楼、杨楼、新庄4个稠油油田,各油田油质复杂,查清各区块、各层系稠油油质是开发生产的重要工作之一。通过对稠油层基本特征分析,应用地化录井参数建立了TPI评价法、原油密度评价法及原油黏度评价法。TPI评价法主要是利用原油中气态烃和液态烃与全烃比值大小划分油质类型;原油密度评价法主要利用油质重,TPI值小,反之TPI值大的关系划分油质类型;原油黏度评价法主要利用TPI反映油质组分的综合性参数的特点,建立TPI与黏度的关系。这套评价评价方法提供了快速精细评价稠油油质的新手段。  相似文献   
184.
企业所建立的HSE管理体系已运行多年,大多满足认证的条件,HSE体系认证是体系运行的重要环节,也是体系运行绩效的肯定。审核时要面对大量的体系文件和作业记录,因此把握住审核要点会起到事半功倍的效果。  相似文献   
185.
分析了基于互信息域的有效信噪比映射的L2S(link level to system level)接口方法,研究了信道相关带宽对接口复杂度的影响,在不明显降低预测准确度的前提下,验证了利用信道相关带宽来简化接口计算复杂度的可能性。  相似文献   
186.
方守川  于素君 《物探装备》2003,13(4):266-270
在简单介绍高程系统的基础上,对影响GPS高程精度的几何水准联测误差、卫星分布不对称、星历误差、多路径误差等因素逐一进行了分析,并提出了相应的改进措施。同时,还对高程拟合使用的稳健估计方法进行了探讨。  相似文献   
187.
气藏储量可采性评价的实质是对储层进行可采性评价。以苟西C2hl气藏为例,通过对该气藏储层孔隙度与渗透率、孔隙度与排驱压力及孔喉结构等反映储层连通性的各项参数分析,讨论储层可采性评价的方法。对气藏储量可采性评价及苟西C2hl气藏开发有一定指导意义。  相似文献   
188.
郑怀明  常红敏 《山西建筑》2003,29(13):87-88
针对太原可口可乐综合厂房主筋采用φ28、φ32三级钢存在的可焊性差的问题,提出了在施工中采用套筒挤压连接的方式,并对该方法的操作要点及质量控制措施进行了总结。  相似文献   
189.
This work aims to present and evaluate a Fuzzy-Case Based Reasoning Diagnosis system of Historical Text Comprehension. The synergism of fuzzy logic and case based reasoning techniques handles the uncertainty in the acquisition of human expert's knowledge regarding learner's observable behaviour and integrates the right balance between expert's knowledge described in the form of fuzzy sets and previous experiences documented in the form of cases. The formative evaluation focused on the comparison of the system's performance to the performance of human experts concerning the diagnosis accuracy. The system was also evaluated for its behaviour when using two different historical texts. Empirical evaluation conducted with human experts and real students indicated the need for revision of the diagnosis model. The evaluation results are encouraging for the system's educational impact on learners and for future work concerning an intelligent educational system for individualized learning.  相似文献   
190.
In this work, a new method for the creation of classifier ensembles is introduced. The patterns are partitioned into clusters to group together similar patterns, a training set is built using the patterns that belong to a cluster. Each of the new sets is used to train a classifier. We show that the approach here presented, called FuzzyBagging, obtains performance better than Bagging.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号