全文获取类型
收费全文 | 19793篇 |
免费 | 1940篇 |
国内免费 | 1187篇 |
专业分类
电工技术 | 1181篇 |
技术理论 | 2篇 |
综合类 | 2262篇 |
化学工业 | 1020篇 |
金属工艺 | 1228篇 |
机械仪表 | 1588篇 |
建筑科学 | 1653篇 |
矿业工程 | 694篇 |
能源动力 | 357篇 |
轻工业 | 1469篇 |
水利工程 | 542篇 |
石油天然气 | 696篇 |
武器工业 | 238篇 |
无线电 | 1788篇 |
一般工业技术 | 1191篇 |
冶金工业 | 910篇 |
原子能技术 | 251篇 |
自动化技术 | 5850篇 |
出版年
2024年 | 209篇 |
2023年 | 258篇 |
2022年 | 310篇 |
2021年 | 410篇 |
2020年 | 438篇 |
2019年 | 456篇 |
2018年 | 351篇 |
2017年 | 441篇 |
2016年 | 496篇 |
2015年 | 540篇 |
2014年 | 1068篇 |
2013年 | 954篇 |
2012年 | 1317篇 |
2011年 | 1369篇 |
2010年 | 1179篇 |
2009年 | 1154篇 |
2008年 | 1110篇 |
2007年 | 1411篇 |
2006年 | 1259篇 |
2005年 | 1162篇 |
2004年 | 950篇 |
2003年 | 905篇 |
2002年 | 747篇 |
2001年 | 665篇 |
2000年 | 595篇 |
1999年 | 472篇 |
1998年 | 357篇 |
1997年 | 384篇 |
1996年 | 331篇 |
1995年 | 277篇 |
1994年 | 251篇 |
1993年 | 195篇 |
1992年 | 144篇 |
1991年 | 132篇 |
1990年 | 81篇 |
1989年 | 93篇 |
1988年 | 65篇 |
1987年 | 51篇 |
1986年 | 33篇 |
1985年 | 39篇 |
1984年 | 28篇 |
1983年 | 15篇 |
1982年 | 19篇 |
1981年 | 18篇 |
1980年 | 17篇 |
1979年 | 18篇 |
1976年 | 11篇 |
1974年 | 13篇 |
1973年 | 11篇 |
1959年 | 10篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
2.
It has recently been shown that authenticated Byzantine agreement,
in which more than a third of the parties are corrupted, cannot be
securely realized under concurrent or parallel (stateless)
composition. This result puts into question any usage of
authenticated Byzantine agreement in a setting where many
executions take place. In particular, this is true for the whole
body of work of secure multi-party protocols in the case that a
third or more of the parties are corrupted. This is because these
protocols strongly rely on the extensive use of a broadcast
channel, which is in turn realized using authenticated Byzantine
agreement. We remark that it was accepted folklore that the use of
a broadcast channel (or authenticated Byzantine agreement) is
actually essential for achieving meaningful secure multi-party
computation whenever a third or more of the parties are corrupted.
In this paper we show that this folklore is false. We present a
mild relaxation of the definition of secure computation allowing
abort. Our new definition captures all the central security issues
of secure computation, including privacy, correctness and
independence of inputs. However, the novelty of the definition is
in decoupling the issue of agreement from these issues. We
then show that this relaxation suffices for achieving secure
computation in a point-to-point network. That is, we show that
secure multi-party computation for this definition can be achieved
for any number of corrupted parties and without a
broadcast channel (or trusted pre-processing phase as required for
running authenticated Byzantine agreement). Furthermore, this is
achieved by just replacing the broadcast channel in known
protocols with a very simple and efficient echo-broadcast
protocol. An important corollary of our result is the ability to
obtain multi-party protocols that remain secure under composition,
without assuming a broadcast channel. 相似文献
3.
Mark T. Muldoon Dale V. Onisk Michael C. Brown & James W. Stave 《International Journal of Food Science & Technology》2004,39(8):851-861
Bovine spongiform encephalopathy (BSE), or ‘mad cow disease’, is one of several transmissable spongiform encephalopathies (TSEs) known to affect certain mammals and is spread through the ingestion of infected animal tissue. It is believed that the inadvertent contamination of meat and bone meal (MBM) with infected animal tissue and the subsequent use of this material as a feed supplement contributed to the spread of the disease in cattle. As a result, the use of processed animal proteins (PAPs) in animal feeds is regulated in many parts of the world. Although feed testing is the only definitive means to certify compliance, regulatory compliance often relies solely on paper certification. Recently, rapid methods have become available that can be used by regulators to determine compliance during routine inspections. We describe a rapid, immunochromatographic strip test that can detect 0.1% MBM in animal feed. The test takes 15 min to perform and large numbers of samples can be screened for PAPs simultaneously. 相似文献
4.
Analog circuits are one of the most important parts of modern electronic systems and the failure of electronic hardware presents a critical threat to the completion of modern aircraft, spacecraft, and robot missions. Compared to digital circuits, designing fault-tolerant analog circuits is a difficult and knowledge-intensive task. A simple but powerful method for robustness is a redundancy approach to use multiple circuits instead of single one. For example, if component failures occur, other redundant components can replace the functions of broken parts and the system can still work. However, there are several research issues to make the redundant system automatically. In this paper, we used evolutionary computation to generate multiple analog circuits automatically and then we combined the solutions to generate robust outputs. Evolutionary computation is a natural way to produce multiple redundant solutions because it is a population-based search. Experimental results on the evolution of the low-pass, high-pass and band-stop filters show that the combination of multiple evolved analog circuits produces results that are more robust than those of the best single circuit. 相似文献
5.
6.
添加物对ZrO2系快离子导体烧结性能的影响 总被引:1,自引:0,他引:1
本文介绍了1320℃下,CaO,Y2O3等稳定剂,低融物组成及1-6价阳离子化合物对ZrO2烧结性能的影响并列举出材料的晶型及某些主要性能。 相似文献
7.
The modern technological advancement influences the growth of the cyber–physical system and cyber–social system to a more advanced computing system cyber–physical–social system (CPSS). Therefore, CPSS leads the data science revolution by promoting tri-space information resource from a single space. The establishment of CPSSs increases the related privacy concerns. To provide privacy on CPSSs data, various privacy-preserving schemes have been introduced in the recent past. However, technological advancement in CPSSs requires the modifications of previous techniques to suit its dynamics. Meanwhile, differential privacy has emerged as an effective method to safeguard CPSSs data privacy. To completely comprehend the state-of-the-art developments and learn the field’s research directions, this article provides a comprehensive review of differentially private data fusion and deep learning in CPSSs. Additionally, we present a novel differentially private data fusion and deep learning Framework for Cyber–Physical–Social Systems , and various future research directions for CPSSs. 相似文献
8.
9.
10.
引用优化设计中一维搜索和黄金分割法,针对数控加工中非圆曲线的处理,给出实用、简洁和新颖的宏程序实现方法,解决在数控系统中求解方程组的问题,是数控用户快速解决相关应用问题的有效手段。 相似文献