首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1998篇
  免费   448篇
  国内免费   220篇
电工技术   62篇
综合类   259篇
化学工业   277篇
金属工艺   41篇
机械仪表   52篇
建筑科学   24篇
矿业工程   22篇
能源动力   28篇
轻工业   36篇
水利工程   15篇
石油天然气   19篇
武器工业   6篇
无线电   484篇
一般工业技术   224篇
冶金工业   45篇
原子能技术   2篇
自动化技术   1070篇
  2024年   17篇
  2023年   56篇
  2022年   47篇
  2021年   55篇
  2020年   65篇
  2019年   77篇
  2018年   58篇
  2017年   79篇
  2016年   72篇
  2015年   76篇
  2014年   102篇
  2013年   119篇
  2012年   141篇
  2011年   175篇
  2010年   172篇
  2009年   205篇
  2008年   198篇
  2007年   206篇
  2006年   163篇
  2005年   149篇
  2004年   143篇
  2003年   75篇
  2002年   71篇
  2001年   36篇
  2000年   32篇
  1999年   13篇
  1998年   10篇
  1997年   5篇
  1996年   8篇
  1995年   5篇
  1994年   7篇
  1993年   1篇
  1992年   7篇
  1991年   3篇
  1990年   1篇
  1989年   2篇
  1988年   5篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   2篇
  1979年   1篇
  1977年   1篇
  1974年   1篇
  1959年   1篇
排序方式: 共有2666条查询结果,搜索用时 15 毫秒
51.
Robust reversible watermarking can provide robustness against various attacks besides the ability to recover the cover image. However, robustness and reversibility are somewhat separate in many schemes. The original cover image cannot be recovered even if the watermarked image suffers from a tiny distortion. This paper presents a new robust reversible watermarking scheme by exploring the reversibility of spread-spectrum codes. Watermark bits are embedded by a suggested adaptive spread-spectrum code. The embedding amplitude used in the algorithms is determined by quantizing the source interference of the cover. The proposed scheme is robust to various attacks. Furthermore, since the embedding amplitude is available at the receiver, the original image can be recovered losslessly when there is no attack. Even in the presence of attacks, the original cover images can still be partially recovered. Experimental results demonstrate that the proposed scheme performs well on robustness and watermarked image quality, and provide extra reversibility that resists image distortions.  相似文献   
52.
One of the elementary operations in computing systems is multiplication. Therefore, high-speed and low-power multipliers design is mandatory for efficient computing systems. In designing low-energy dissipation circuits, reversible logic is more efficient than irreversible logic circuits but at the cost of higher complexity. This paper introduces an efficient signed/unsigned 4 × 4 reversible Vedic multiplier with minimum quantum cost. The Vedic multiplier is considered fast as it generates all partial product and their sum in one step. This paper proposes two reversible Vedic multipliers with optimized quantum cost and garbage output. First, the unsigned Vedic multiplier is designed based on the Urdhava Tiryakbhyam (UT) Sutra. This multiplier consists of bitwise multiplication and adder compressors. Compared with Vedic multipliers in the literature, the proposed design has a quantum cost of 111 with a reduction of 94% compared to the previous design. It has a garbage output of 30 with optimization of the best-compared design. Second, the proposed unsigned multiplier is expanded to allow the multiplication of signed numbers as well as unsigned numbers. Two signed Vedic multipliers are presented with the aim of obtaining more optimization in performance parameters. DesignI has separate binary two’s complement (B2C) and MUX circuits, while DesignII combines binary two’s complement and MUX circuits in one circuit. DesignI shows the lowest quantum cost, 231, regarding state-of-the-art. DesignII has a quantum cost of 199, reducing to 86.14% of DesignI. The functionality of the proposed multiplier is simulated and verified using XILINX ISE 14.2.  相似文献   
53.
在大数据的时代背景下,数据潜在的价值使其成为重要的财富之一。数据的非法篡改、修正和非法分发给追踪数据的泄密源头带来巨大挑战。数字指纹技术可应用在数据泄密溯源领域,即在数据中嵌入一串能够唯一标识用户信息的序列,当数据发生泄密后,提取其中蕴含的数字指纹,追踪到泄密的叛逆者。多个用户对数据合谋攻击并泄密数据,从而毁坏其中嵌入的指纹信息达到逃脱追责的目的,抗合谋编码能够解决此问题。针对现有的数字指纹编码无法满足数据再分发需求、数字指纹嵌入造成较大数据失真的问题,本文使用BIBD(Balanced incomplete block design)作为外码,码字扩展后的C码作为内码,构建一种可再分发的抗合谋指纹编码RD-ACC(Redistributable anti-collusion fingerprint coding)。在此基础上,提出一种基于多目标优化的数据库指纹算法,能够在较小的数据库失真情况下保证数字指纹较高的鲁棒性,提取出的RD-ACC能够有效抵抗组内、组间多用户合谋攻击。实验结果表明,该算法能够在较小的数据失真下实现数据的再分发操作,并且能抵抗合谋攻击进行泄密溯源。  相似文献   
54.
为解决在一些一对二的交流场景中使用信息隐藏技术来传递信息时对载密图像的视觉质量和载体图像的精确度的高要求问题. 在本文中提出了一种基于模函数和像素值差值(pixel value difference , PVD)的双图像可逆信息隐藏方案, 通过模函数和对数函数确定了PVD范围表, 从而确定在单位面积上的信息嵌入位数以及模函数的系数. 所提出的方案可以在信息嵌入位数不断增加的情况下仍然保持像素值的修改量与信息嵌入位数之比不大于0.5, 所以与目前一些基于PVD的方案相比在像素对差值越大的图像中越占有优势. 实验结果表明与现有的一些在载密图像质量方面优质的方案相比, 具有更高的PSNRSSIM, 此外本方案在抗RS隐写分析和PDH隐写分析的静态攻击方面上具有良好的性能, 并且避免了大多数在基于像素值差值的信息隐藏方案中对溢出问题的解决方案复杂繁琐的情况.  相似文献   
55.
Despite the merits of high specific capacity, low cost, and high safety, the practical application of aqueous Zn metal batteries (AZMBs) is plagued by the dendritic growth and corrosion reaction of Zn metal anodes. To solve these issues, a Zn3(PO4)2·4H2O protective layer is in-situ constructed on Zn foil (Zn@ZnPO) by a simple hydrothermal method, avoiding the traditional slurry-casting process. The insulating and conformable ZnPO layer improves the wettability of Zn@ZnPO and aqueous electrolyte via decreasing the contact angle to 11.7o. Compared with bare Zn, the Zn@ZnPO possesses a lower desolvation activation energy of 35.25 kJ mol-1, indicating that the ZnPO fasters the desolvation of hydrated Zn2+ ions and thereby ameliorates their transport dynamics. Micro-morphology and structural characterization show that there are no dendrites forming on the post-cycling Zn@ZnPO anodes, and the interfacial ZnPO layer remains almost identical before and after cycles. It can be explained that the electrochemically stable ZnPO layer acts as an ionic modulator to enable the homogeneous distribution of Zn2+ ions, inhibiting the growth of Zn dendrites. Benefiting from these advantages, the Zn@ZnPO based symmetric and full cells deliver highly reversible Zn plating/stripping behavior and long cycling lifespans.  相似文献   
56.
57.
Nitrogen and sulfur‐codoped graphene composites with Co9S8 (NS/rGO‐Co) are synthesized by facile thermal annealing of graphene oxides with cobalt nitrate and thiourea in an ammonium atmosphere. Significantly, in 0.1 m KOH aqueous solution the best sample exhibits an oxygen evolution reaction (OER) activity that is superior to that of benchmark RuO2 catalysts, an oxygen reduction reaction (ORR) activity that is comparable to that of commercial Pt/C, and an overpotential of only ?0.193 V to reach 10 mA cm?2 for hydrogen evolution reaction (HER). With this single catalyst for oxygen reversible electrocatalysis, a potential difference of only 0.700 V is observed in 0.1 m KOH solution between the half‐wave potential in ORR and the potential to reach 10 mA cm?2 in OER; in addition, an overpotential of only 450 mV is needed to reach 10 mA cm?2 for full water splitting in the same electrolyte. The present trifunctional catalytic activities are markedly better than leading results reported in recent literature, where the remarkable trifunctional activity is attributed to the synergetic effects between N,S‐codoped rGO, and Co9S8 nanoparticles. These results highlight the significance of deliberate structural engineering in the preparation of multifunctional electrocatalysts for versatile electrochemical reactions.  相似文献   
58.
59.
自修复聚合物材料是一种具有自修复能力的聚合物智能材料,近年来已成为国内外的研究热点。在聚合物基体中引入可逆共价键,在外界条件刺激下,聚合物可快速、高效自修复,这有助于延长聚合物材料的使用寿命。能形成可逆共价键的反应主要包括可逆开环加成反应、交换反应和稳定自由基重组反应等。文中以不同类型的可逆反应为线索,从可逆共价键的类型、修复条件、修复效率等方面综述了近年来基于可逆共价键的自修复聚合物材料的研究进展,比较了不同可逆共价键形成聚合物的优缺点,并展望了其未来的发展方向。  相似文献   
60.
针对多媒体信息中的视频流采用数字水印技术实现版权保护和防攻击时存在的一些问题,提出了采用基于小波变换的非对称数字水印算法,不仅能有效地保护多媒体信息中作者的版权,还能抵抗一些常见攻击以达到防止被篡改的目的,具有很强的鲁棒性和实用性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号