全文获取类型
收费全文 | 54050篇 |
免费 | 7052篇 |
国内免费 | 5117篇 |
专业分类
电工技术 | 5538篇 |
技术理论 | 2篇 |
综合类 | 9099篇 |
化学工业 | 2000篇 |
金属工艺 | 1058篇 |
机械仪表 | 4012篇 |
建筑科学 | 3114篇 |
矿业工程 | 1220篇 |
能源动力 | 1089篇 |
轻工业 | 2669篇 |
水利工程 | 1407篇 |
石油天然气 | 1481篇 |
武器工业 | 731篇 |
无线电 | 8193篇 |
一般工业技术 | 5087篇 |
冶金工业 | 999篇 |
原子能技术 | 582篇 |
自动化技术 | 17938篇 |
出版年
2024年 | 215篇 |
2023年 | 643篇 |
2022年 | 1148篇 |
2021年 | 1285篇 |
2020年 | 1402篇 |
2019年 | 1267篇 |
2018年 | 1272篇 |
2017年 | 1614篇 |
2016年 | 1830篇 |
2015年 | 1988篇 |
2014年 | 2867篇 |
2013年 | 3172篇 |
2012年 | 3917篇 |
2011年 | 4296篇 |
2010年 | 3508篇 |
2009年 | 3736篇 |
2008年 | 3970篇 |
2007年 | 4626篇 |
2006年 | 4048篇 |
2005年 | 3529篇 |
2004年 | 2876篇 |
2003年 | 2387篇 |
2002年 | 1860篇 |
2001年 | 1585篇 |
2000年 | 1370篇 |
1999年 | 1083篇 |
1998年 | 844篇 |
1997年 | 713篇 |
1996年 | 607篇 |
1995年 | 518篇 |
1994年 | 430篇 |
1993年 | 307篇 |
1992年 | 269篇 |
1991年 | 220篇 |
1990年 | 201篇 |
1989年 | 179篇 |
1988年 | 117篇 |
1987年 | 71篇 |
1986年 | 41篇 |
1985年 | 36篇 |
1984年 | 27篇 |
1983年 | 34篇 |
1982年 | 25篇 |
1981年 | 12篇 |
1980年 | 14篇 |
1979年 | 10篇 |
1978年 | 6篇 |
1977年 | 6篇 |
1976年 | 7篇 |
1964年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
An implementation for a fast public-key cryptosystem 总被引:9,自引:0,他引:9
In this paper we examine the development of a high-speed implementation of a system to perform exponentiation in fields of the form GF(2
n
). For sufficiently large n, this device has applications in public-key cryptography. The selection of representation and observations on the structure of multiplication have led to the development of an architecture which is of low complexity and high speed. A VLSI implementation has being fabricated with measured throughput for exponentiation for cryptographic purposes of approximately 300 kilobits per second. 相似文献
92.
Stephen M. Matyas 《Journal of Cryptology》1991,3(2):113-136
A method is presented for controlling cryptographic key usage based on control vectors. Each cryptographic key has an associated control vector that defines the permitted uses of the key within the cryptographic system. At key generation, the control vector is cryptographically coupled to the key by way of a special encryption process. Each encrypted key and control vector are stored and distributed within the cryptographic system as a single token. Decryption of a key requires respecification of the control vector. As part of the decryption process, the cryptographic hardware verifies that the requested use of the key is authorized by the control vector. This article focuses mainly on the use of control vectors in cryptosystems based on the Data Encryption Algorithm. 相似文献
93.
94.
In this paper we introduce an empirical Bayes procedure for estimating an unknown parameter, say θ. This procedure gives the empirical Bayes estimator for θ and its associated minimum posterior risk in closed forms without estimating the unknown prior density function of θ. In such procedure the posterior probability density function of θ is not required. A sufficient statistic for θ with conditional probability density function in the one parameter exponential family is required. Instead of estimating the unknown prior density function, the marginal density function of the sufficient statistic must be estimated. As special cases the empirical Bayes estimators and their respective minimum posterior risks of the failure rate for the exponential distribution, the unknown scale parameters of Weibull and gamma distributions are obtained in simple forms as special cases. Numerical results and a simulation study are introduced to (i) investigate how the number of available past experiments and the sample size of each influence the accuracy of the empirical Bayes estimator, (ii) make a comparison between the presented procedure and the Bayes procedure when the prior probability density function of the parameter θ is gamma. 相似文献
95.
一种新的图像水印方案 总被引:1,自引:0,他引:1
目标区域是图像中视觉上最重要的部分。针对现有的水印算法很少考虑图像中确定的目标区域这一问题,提出了一种基于目标区域的水印方案(WIOR)。方案首先利用小波变换分析图像的目标特征,并依据图像的小波高频系数特征对其进行聚类,获得水印的嵌入域,在此嵌入域中,选择小波系数并对其进行量化调制来嵌入二值扩谱水印;同时,通过只在图像的局部区域内嵌入较少的水印信息来改善水印的隐蔽性。实验结果表明,该方案对于一类具有突出目标特征的图像具有较好的效果。嵌入的水印主要优势在于真正把水印嵌入图像的视觉重要部分,从而能有效地抵御剪切攻击,而且可以实现盲检测。 相似文献
96.
No authorship indicated 《Canadian Metallurgical Quarterly》2006,61(8):811
Presents the citation for Anthony D. Wagner, who received the Award for Distinguished Scientific Early Career Contributions to Psychology (cognition and human learning) "for outstanding and innovative research on the neural basis of memory and executive control." A brief profile and a selected bibliography accompany the citation. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
97.
Ettenhofer Mark L.; Hambrick David Z.; Abeles Norman 《Canadian Metallurgical Quarterly》2006,20(5):607
A number of methodological questions have been raised about the reliability and validity of measuring executive functioning (EF) across multiple time points. In this study, correlational and latent-variable analyses were used to examine test-retest reliability of 5 common measures of EF and the stability of a latent EF construct. One hundred eighteen nondemented older adults were tested twice over a 4- to 8-week period. Findings demonstrated modest reliability of individual EF measures but very high stability of a latent EF construct. Relative contributions of each measure to the latent EF factor did not change across measurement trials. In addition, age-related effects on EF were similar at the 2 time points and were within the expected range. Implications for future studies of EF are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
98.
99.
A general variance predictor for Cavalieri slices 总被引:1,自引:0,他引:1
L. M. CRUZ-ORIVE 《Journal of microscopy》2006,222(3):158-165
A general variance predictor is presented for a Cavalieri design with slices of an arbitrary thickness t ≥ 0. So far, prediction formulae have been available either for measurement functions with smoothness constant q = 0, 1, … , and t ≥ 0, or for fractional q ∈ [0, 1] with t = 0. Because the possibility of using a fractional q adds flexibility to the variance prediction, we have extended the latter for any q ∈ [0, 1] and t ≥ 0. Empirical checks with previously published human brain data suggest an improved performance of the new prediction formula with respect to the hitherto available ones. 相似文献
100.
席静芳 《上海第二工业大学学报》2005,22(Z1):27-32
首先阐明有源滤波器的基本概念和传递函数,然后着重介绍具有低灵敏度的GIC型双运放电路和在较高频率时应用的开关电容滤波器,最后举例说明它们的应用. 相似文献