全文获取类型
收费全文 | 3369篇 |
免费 | 556篇 |
国内免费 | 403篇 |
专业分类
电工技术 | 87篇 |
综合类 | 445篇 |
化学工业 | 220篇 |
金属工艺 | 106篇 |
机械仪表 | 70篇 |
建筑科学 | 110篇 |
矿业工程 | 52篇 |
能源动力 | 35篇 |
轻工业 | 57篇 |
水利工程 | 25篇 |
石油天然气 | 36篇 |
武器工业 | 26篇 |
无线电 | 783篇 |
一般工业技术 | 254篇 |
冶金工业 | 94篇 |
原子能技术 | 2篇 |
自动化技术 | 1926篇 |
出版年
2024年 | 4篇 |
2023年 | 25篇 |
2022年 | 37篇 |
2021年 | 52篇 |
2020年 | 72篇 |
2019年 | 85篇 |
2018年 | 64篇 |
2017年 | 93篇 |
2016年 | 119篇 |
2015年 | 130篇 |
2014年 | 176篇 |
2013年 | 205篇 |
2012年 | 260篇 |
2011年 | 286篇 |
2010年 | 251篇 |
2009年 | 283篇 |
2008年 | 349篇 |
2007年 | 357篇 |
2006年 | 273篇 |
2005年 | 281篇 |
2004年 | 212篇 |
2003年 | 206篇 |
2002年 | 162篇 |
2001年 | 135篇 |
2000年 | 93篇 |
1999年 | 40篇 |
1998年 | 23篇 |
1997年 | 23篇 |
1996年 | 11篇 |
1995年 | 1篇 |
1994年 | 3篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 5篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1985年 | 1篇 |
排序方式: 共有4328条查询结果,搜索用时 15 毫秒
21.
本文用超声浸液法测量了单向纤维增强热塑性树脂及其半互穿聚合物网络(Semi-IPN)复合材料的杨氏模量、剪切模量、泊松比和内耗,并对不同树脂、纤维和Semi-IPN中共混组成比对弹性性能的影响进行了研究。 相似文献
22.
数字水印技术作为数字媒体版权保护的重要手段越来越引起人们的重视。文章讨论了数字水印的概念、特征,重点介绍了数字水印的鲁棒性及影响数字水印鲁棒性的因素,总结和分析了数字水印主要攻击方式并提出相应的应对措施。 相似文献
23.
《中国科学:信息科学(英文版)》2012,(11):2570-2581
As one of the famous block-based image coding schemes,block truncation coding(BTC) has been also applied in digital watermarking.Previous BTC-based watermarking or hiding schemes usually embed secret data by modifying the BTC encoding stage or BTC-compressed data,obtaining the watermarked image with poorer quality than the BTC-compressed version.This paper presents a new oblivious image watermarking scheme by exploiting BTC bitmaps.Unlike the traditional schemes,our approach does not really perform the BTC compression on images during the embedding process but utilizes the parity of the number of horizontal edge transitions in each BTC bitmap to guide the watermark embedding and extraction processes.The embedding process starts by partitioning the original cover image into non-overlapping 4×4 blocks and performing BTC on each block to obtain its BTC bitmap.One watermark bit is embedded in each block by modifying at most three pixel values in the block to make sure that the parity of the number of horizontal edge transitions in the bitmap of the modified block is equal to the embedded watermark bit.In the extraction stage,the suspicious image is first partitioned into non-overlapping 4×4 blocks and BTC is performed on each block to obtain its bitmap.Then,by checking the parity of the number of horizontal edge transitions in the bitmap,we can extract one watermark bit in each block.Experimental results demonstrate that the proposed watermarking scheme is fragile to various image processing operations while keeping the transparency very well. 相似文献
24.
《浙江大学学报:C卷英文版》2012,(8):573-584
We propose a robust digital watermarking algorithm for copyright protection.A stable feature is obtained by utilizing QR factorization and discrete cosine transform(DCT) techniques,and a meaningful watermark image is embedded into an image by modifying the stable feature with a quantization index modulation(QIM) method.The combination of QR factorization,DCT,and QIM techniques guarantees the robustness of the algorithm.Furthermore,an embedding location selection method is exploited to select blocks with small modifications as the embedding locations.This can minimize the embedding distortion and greatly improve the imperceptibility of our scheme.Several standard images were tested and the experimental results were compared with those of other published schemes.The results demonstrate that our proposed scheme can achieve not only better imperceptibility,but also stronger robustness against common signal processing operations and lossy compressions,such as filtering,noise addition,scaling,sharpening,rotation,cropping,and JPEG/JPEG2000 compression. 相似文献
25.
We propose a new multipurpose audio watermarking scheme in which two complementary watermarks are used.For audio copyright protection,the watermark data with copyright information or signature are first encrypted by Arnold transformation.Then the watermark data are inserted in the low frequency largest significant discrete cosine transform(DCT) coefficients to obtain robustness performance.For audio authentication,a chaotic signal is inserted in the high frequency insignificant DCT coefficients to detect tampered regions.Furthermore,the synchronization code is embedded in the audio statistical characteristics to resist desynchronization attacks.Experimental results show that our proposed method can not only obtain satisfactory detection and tampered location,but also achieve imperceptibility and robustness to common signal processing attacks,such as cropping,shifting,and time scale modification(TSM).Comparison results show that our method outperforms some existing methods. 相似文献
26.
27.
28.
对多媒体产品进行数字水印处理是解决这类产品的版权保护的有效途径。从数字水印的概念、原理和基本特性出发,探讨了如何构造版权水印信息、嵌入用户指定的授权信息、版权水印鉴定等问题。 相似文献
29.
This paper addresses the problem of semi‐global stabilization by output feedback for a class of nonlinear systems whose output gains are unknown. For each subsystem, we first design a state compensator and use the compensator states to construct a control law to stabilize the nominal linear system without the perturbing nonlinearities. Then, combining the output feedback domination approach with block‐backstepping scheme, a series of homogeneous output feedback controllers are constructed recursively for each subsystem and the closed‐loop system is rendered semi‐globally asymptotically stable. 相似文献
30.
In this paper, a feedback model predictive control method is presented to tackle control problems with constrained multivariables for uncertain discrete‐time nonlinear Markovian jump systems. An uncertain Markovian jump fuzzy system (MJFS) is obtained by employing the Takagi‐Sugeno (T‐S) fuzzy model to represent a discrete‐time nonlinear system with norm bounded uncertainties and Markovain jump parameters. To achieve more generality, the transition probabilities of the Markov chain are assumed to be partly unknown and partly accessible. The predictive formulation adopts an on‐line optimization paradigm that utilizes the closed‐loop state feedback controller and is solved using the standard semi‐definite programming (SDP). To reduce the on‐line computational burden, a mode independent control move is calculated at every sampling time based on a stochastic fuzzy Lyapunov function (FLF) and a parallel distributed compensation (PDC) scheme. The robust mean square stability, performance minimization and constraint satisfaction properties are guaranteed under the control move for all admissible uncertainties. A numerical example is given to show the efficiency of the developed approach. Copyright © 2011 John Wiley and Sons Asia Pte Ltd and Chinese Automatic Control Society 相似文献