全文获取类型
收费全文 | 9203篇 |
免费 | 1067篇 |
国内免费 | 761篇 |
专业分类
电工技术 | 1021篇 |
综合类 | 1013篇 |
化学工业 | 149篇 |
金属工艺 | 153篇 |
机械仪表 | 732篇 |
建筑科学 | 419篇 |
矿业工程 | 121篇 |
能源动力 | 64篇 |
轻工业 | 277篇 |
水利工程 | 57篇 |
石油天然气 | 84篇 |
武器工业 | 125篇 |
无线电 | 2239篇 |
一般工业技术 | 344篇 |
冶金工业 | 159篇 |
原子能技术 | 54篇 |
自动化技术 | 4020篇 |
出版年
2024年 | 42篇 |
2023年 | 74篇 |
2022年 | 119篇 |
2021年 | 179篇 |
2020年 | 203篇 |
2019年 | 171篇 |
2018年 | 164篇 |
2017年 | 264篇 |
2016年 | 325篇 |
2015年 | 343篇 |
2014年 | 542篇 |
2013年 | 567篇 |
2012年 | 731篇 |
2011年 | 868篇 |
2010年 | 639篇 |
2009年 | 626篇 |
2008年 | 665篇 |
2007年 | 751篇 |
2006年 | 626篇 |
2005年 | 570篇 |
2004年 | 437篇 |
2003年 | 395篇 |
2002年 | 346篇 |
2001年 | 271篇 |
2000年 | 195篇 |
1999年 | 174篇 |
1998年 | 143篇 |
1997年 | 118篇 |
1996年 | 109篇 |
1995年 | 78篇 |
1994年 | 68篇 |
1993年 | 35篇 |
1992年 | 31篇 |
1991年 | 20篇 |
1990年 | 20篇 |
1989年 | 20篇 |
1988年 | 19篇 |
1987年 | 11篇 |
1986年 | 9篇 |
1985年 | 6篇 |
1984年 | 4篇 |
1982年 | 4篇 |
1979年 | 3篇 |
1978年 | 3篇 |
1977年 | 4篇 |
1976年 | 4篇 |
1966年 | 4篇 |
1961年 | 3篇 |
1955年 | 2篇 |
1954年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
Steganography is the science of hiding secret message in an appropriate digital multimedia in such a way that the existence of the embedded message should be invisible to anyone apart from the sender or the intended recipient. This paper presents an irreversible scheme for hiding a secret image in the cover image that is able to improve both the visual quality and the security of the stego-image while still providing a large embedding capacity. This is achieved by a hybrid steganography scheme incorporates Noise Visibility Function (NVF) and an optimal chaotic based encryption scheme. In the embedding process, first to reduce the image distortion and to increase the embedding capacity, the payload of each region of the cover image is determined dynamically according to NVF. NVF analyzes the local image properties to identify the complex areas where more secret bits should be embedded. This ensures to maintain a high visual quality of the stego-image as well as a large embedding capacity. Second, the security of the secret image is brought about by an optimal chaotic based encryption scheme to transform the secret image into an encrypted image. Third, the optimal chaotic based encryption scheme is achieved by using a hybrid optimization of Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) which is allowing us to find an optimal secret key. The optimal secret key is able to encrypt the secret image so as the rate of changes after embedding process be decreased which results in increasing the quality of the stego-image. In the extracting process, the secret image can be extracted from the stego-image losslessly without referring to the original cover image. The experimental results confirm that the proposed scheme not only has the ability to achieve a good trade-off between the payload and the stego-image quality, but also can resist against the statistics and image processing attacks. 相似文献
2.
Journal of Computer Science and Technology - DOACROSS loops are significant parts in many important scientific and engineering applications, which are generally exploited pipeline/wave-front... 相似文献
3.
可并联逆变器中的同步控制技术及其实现 总被引:5,自引:2,他引:3
论述了可并联逆变器中的同步控制技术及其实现方法。在分析了同步的重要性之后,提出了抢占与并发相结合的同步控制策略及其实现方法,实践证明该方法具有很高的控制精度。 相似文献
4.
Panagiotis N. Zarros Myung J. Lee Tarek N. Saadawi 《Journal of Network and Systems Management》1994,2(4):361-382
In this paper, an algorithm to determine the set of packets generated continuously and periodically from different participants that are arriving at a node either for mixing at the master of a conference, or for simply playing back at a regular participant of a conference, is proposed. The essence of the algorithm is to estimate the expected packet arrival time (or reference time) for each participant. With the reference time at hand, the maximum jitter and the optimum waiting time for a mixer to wait packets from all participants can be determined. An enhancement to improve synchronization which deals with the estimation of the time offsets between the individual periods of the sources and the period of the receiver is also presented. The error of the proposed algorithm is enumerated by the Chernoff bound and demonstrated by simulation and is shown to be acceptable in practical application. The algorithm can also be employed when traffic sources operate with different periods. 相似文献
5.
一种语音混沌保密通信方案的研究与硬件实现 总被引:7,自引:0,他引:7
在硬件实验研究的基础上,建立一种环形蔡氏电路,提出用环蔡氏电路实现语音混沌保密通信的一种闭环逆系统方案,其特点是利用环形蔡氏电路的单向耦合原理,通过反馈的方法形成一个包括有用信号在内的极联闭合环路,从而实现改善端与接收端之间混沌系统的严格同步而不受有用信息调制的影响。理论分析与硬件实验结果证明,该方案同现有的其它混沌通信方案相比较,具有非线性失真小、保真度高的优点,完全能够满足传送语音信号的要求。 相似文献
6.
Recently, in our laboratory a closed form expression for the correlation function of the hard-sphere dimer fluid obtained
from Wertheims multidensity Ornstein-Zernike integral equation theory with Percus-Yevick approximation was presented by Kim
et al. [2001]. However, it is difficult to apply its expression to perturbation theory and vapor-liquid equilibria calculations,
since it is of very complex form. In this work, we present a simplified expression for the first shell of the radial distribution
function (RDF) of the hard-sphere dimer fluid using a series expansion of the analytical expression. The expansion is carried
out in terms of both the packing fraction and the radial distance. Expressions are also obtained for the coordination number
and its first and second derivatives as functions of radial distance and packing fraction. These expressions, which are useful
in perturbation theory, are simpler to use than those obtained from the starting equation, while giving good agreement with
the original expression results. Then we present an simplified equation of state for the square-well dimer fluid of variable
well width (λ) based on Barker-Henderson perturbation theory using its expression for the radial distribution function of
the hard-sphere dimer fluid, and test its expression with NVT and Gibbs ensemble Monte Carlo simulation data [Kim et al.,
2001]. 相似文献
7.
8.
张峡 《核电子学与探测技术》2002,22(3):257-259
叙述了应用 Winsock技术与多线程技术实现高性能的 CAMAC通信服务器程序。介绍了整个程序的设计实现方法 ,重点介绍了网络通信服务的实现和多线程访问设备时的同步问题 相似文献
9.
10.
非理想信道下Colpitts混沌电路的自适应同步研究 总被引:1,自引:0,他引:1
本文研究了Colpitts混沌电路在非理想信道条件下的自适应同步问题。引入自适应控制器对输入到响应部分(response system)的衰变混沌信号进行预处理,来补偿衰落信道对于同步性能的影响。给出了系统的数学模型,对恒定信道衰变和时变信道衰变两种非理想信道条件下的混沌ColpiRs电路的自适应同步进行了数值仿真研究。仿真结果表明,对于恒定或慢变化的时变信道衰变,自适应控制器可以有效的提高Colpitts电路响应部分和驱动部分(Drive system)的同步性能。 相似文献