全文获取类型
收费全文 | 17787篇 |
免费 | 2189篇 |
国内免费 | 1767篇 |
专业分类
电工技术 | 721篇 |
技术理论 | 12篇 |
综合类 | 2412篇 |
化学工业 | 364篇 |
金属工艺 | 193篇 |
机械仪表 | 505篇 |
建筑科学 | 3770篇 |
矿业工程 | 577篇 |
能源动力 | 200篇 |
轻工业 | 507篇 |
水利工程 | 444篇 |
石油天然气 | 219篇 |
武器工业 | 96篇 |
无线电 | 3182篇 |
一般工业技术 | 874篇 |
冶金工业 | 580篇 |
原子能技术 | 50篇 |
自动化技术 | 7037篇 |
出版年
2024年 | 116篇 |
2023年 | 356篇 |
2022年 | 555篇 |
2021年 | 602篇 |
2020年 | 711篇 |
2019年 | 541篇 |
2018年 | 505篇 |
2017年 | 587篇 |
2016年 | 596篇 |
2015年 | 723篇 |
2014年 | 1589篇 |
2013年 | 1331篇 |
2012年 | 1544篇 |
2011年 | 1580篇 |
2010年 | 1263篇 |
2009年 | 1301篇 |
2008年 | 1268篇 |
2007年 | 1372篇 |
2006年 | 1162篇 |
2005年 | 947篇 |
2004年 | 766篇 |
2003年 | 559篇 |
2002年 | 425篇 |
2001年 | 297篇 |
2000年 | 231篇 |
1999年 | 170篇 |
1998年 | 128篇 |
1997年 | 91篇 |
1996年 | 69篇 |
1995年 | 49篇 |
1994年 | 25篇 |
1993年 | 37篇 |
1992年 | 18篇 |
1991年 | 15篇 |
1990年 | 31篇 |
1989年 | 16篇 |
1988年 | 20篇 |
1985年 | 15篇 |
1984年 | 14篇 |
1983年 | 13篇 |
1982年 | 16篇 |
1981年 | 8篇 |
1980年 | 5篇 |
1966年 | 6篇 |
1965年 | 5篇 |
1964年 | 7篇 |
1963年 | 5篇 |
1958年 | 5篇 |
1957年 | 9篇 |
1956年 | 7篇 |
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
31.
We propose a new multipurpose audio watermarking scheme in which two complementary watermarks are used.For audio copyright protection,the watermark data with copyright information or signature are first encrypted by Arnold transformation.Then the watermark data are inserted in the low frequency largest significant discrete cosine transform(DCT) coefficients to obtain robustness performance.For audio authentication,a chaotic signal is inserted in the high frequency insignificant DCT coefficients to detect tampered regions.Furthermore,the synchronization code is embedded in the audio statistical characteristics to resist desynchronization attacks.Experimental results show that our proposed method can not only obtain satisfactory detection and tampered location,but also achieve imperceptibility and robustness to common signal processing attacks,such as cropping,shifting,and time scale modification(TSM).Comparison results show that our method outperforms some existing methods. 相似文献
32.
介绍透明加解密系统产生的背景、原理以及实现技术,同时还对对称加密算法进行简要的介绍,对于加解密系统的使用提出了独特见解。 相似文献
33.
计算机公共课作为非计算机专业本科学生的公共基础课程核心之一,在教学组织、教学内容、教学方法、实践环节等方面还存在很多亟待解决的问题。针对目前存在的问题,结合相关的指导性文件,探讨解决的思路及对策。 相似文献
34.
介绍了使用Java的点对点通信技术,基于Diffie-Hellman规则,给出了IBM DES密钥交换的总体方案、算法和应用程序,详细说明了其中涉及的主要技术和方法,同时给出了在PC机上用二进制指数分解法实现大数模运算的算法分析和实现方案。 相似文献
35.
随着信息化的日益普及,网络舆论已成为公众表达民情民意、讨论公共事务、进行舆论监督的一个开放的公共平台。突发事件发生后,该事件一旦成为互联网上的热门话题,往往能够在短时间内形成巨大的网络舆论场,吸引为数众多的网络受众参与其中。这些网络舆论一旦达到一定的传播强度,就可能转化为实际生活中的社会舆论,在整个社会范围中产生巨大影响。因此,有必要研究和讨论突发事件中的网络舆论引导问题,作者就是想把情报的概念引入到对突发事件中网络舆论的引导上,并建立起相应的情报引导模式,通过这一模式,可以实现对突发事件网络舆论的合理引导。 相似文献
36.
刘城霞 《网络安全技术与应用》2012,(1):30-33
本文着重分析了Beller-Yacobi协议及以其中用到的RSA加解密及签名算法,并以RSA加解密算法为例在.NET环境下使用C#语言模拟实现了其详细过程,最终实现了整个Beller-Yacobi密钥传输协议的过程。 相似文献
37.
This article focuses on the emerging online Arab public sphere that the web has enabled. It explores how the “local” interacts with the “global,” critically examining their implications on global politics. Specifically looking at online readers' comments about the Swiss minaret ban the so‐called “Ground Zero Mosque,” how does the Arab online public sphere respond to and frame these issues? What implications do these reader frames portend locally and globally? The study analyzes online comments and responses that readers of Al Arabiya.net and Al Jazeera.net posted on related news articles. The article concludes that the new online public sphere does make it possible for Arab citizens to circumvent and challenge traditional authoritarian controls. 相似文献
38.
Fairly exchanging digital content is an everyday problem. It has been shown that fair exchange cannot be achieved without a trusted third party (called the Arbiter). Yet, even with a trusted party, it is still non-trivial to come up with an efficient solution, especially one that can be used in a p2p file sharing system with a high volume of data exchanged.We provide an efficient optimistic fair exchange mechanism for bartering digital files, where receiving a payment in return for a file (buying) is also considered fair. The exchange is optimistic, removing the need for the Arbiter’s involvement unless a dispute occurs. While the previous solutions employ costly cryptographic primitives for every file or block exchanged, our protocol employs them only once per peer, therefore achieving an O(n) efficiency improvement when n blocks are exchanged between two peers. Our protocol uses very efficient cryptography, making it perfectly suitable for a p-2-p file sharing system where tens of peers exchange thousands of blocks and they do not know beforehand which ones they will end up exchanging. Therefore, our system yields up to one-to-two orders of magnitude improvement in terms of both computation and communication (40 s vs. 42 min, 1.6 MB vs. 200 MB). Thus, for the first time, a provably secure (and privacy-respecting when payments are made using e-cash) fair exchange protocol can be used in real bartering applications (e.g., BitTorrent) [14] without sacrificing performance. 相似文献
39.
群签名具备良好的匿名认证特性,满足车载自组网信息安全和隐私保护需求。但是,其作废开销较大,不适于在大规模网络环境中应用。为此,本文提出了一种支持群签名认证的分布式密钥管理方案DKM,将车载自组网的覆盖区域划分为若干子区域,车辆周期性地从所在子区域的群管理机构更新群密钥。这样,作废某个成员只需要在其拥有合法密钥的子区域内通告,而不是整个网络,有利于降低作废开销。同时,DKM中的密钥更新机制能够保证车辆的群密钥的私密性,从而避免了车辆与区域群管理机构的授权争议,保持了数字签名的不可否认性。性能分析表明DKM能够显著缩短作废列表长度,同时没有增加认证开销。 相似文献
40.
Compared 2 motivational bases for not contributing to a public good, desire to "free ride" (or greed) and fear of being a "sucker," among 110 Japanese undergraduates. It was hypothesized that these 2 types of motivation would be activated under different situations. When a public good was provided conjunctively, fear would have a strong effect but greed would not; when a public good was disjunctively provided, greed would have a strong effect but fear would not. In addition, it was predicted that the greater mutual trust existing among friends would make them contribute more than strangers would in the conjunctive condition but would make no difference in the disjunctive condition. Three types of production rules, in which a public good was conjunctively, disjunctively, or additively produced on the basis of members' contributions, were experimentally created. Half of the groups in each condition consisted of total strangers, and the other half consisted of friends. The hypotheses were supported when the size of the public good (bonus points) was relatively large. Also, Ss responded similarly in the conjunctive condition and in the additive condition. (25 ref) (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献