全文获取类型
收费全文 | 60909篇 |
免费 | 5743篇 |
国内免费 | 3606篇 |
学科分类
工业技术 | 70258篇 |
出版年
2024年 | 157篇 |
2023年 | 702篇 |
2022年 | 1767篇 |
2021年 | 2358篇 |
2020年 | 1730篇 |
2019年 | 1287篇 |
2018年 | 1458篇 |
2017年 | 1624篇 |
2016年 | 1529篇 |
2015年 | 2501篇 |
2014年 | 3231篇 |
2013年 | 3963篇 |
2012年 | 4807篇 |
2011年 | 5073篇 |
2010年 | 4912篇 |
2009年 | 4763篇 |
2008年 | 4676篇 |
2007年 | 4534篇 |
2006年 | 4094篇 |
2005年 | 3259篇 |
2004年 | 2398篇 |
2003年 | 1787篇 |
2002年 | 1747篇 |
2001年 | 1601篇 |
2000年 | 1171篇 |
1999年 | 788篇 |
1998年 | 450篇 |
1997年 | 384篇 |
1996年 | 330篇 |
1995年 | 241篇 |
1994年 | 211篇 |
1993年 | 162篇 |
1992年 | 114篇 |
1991年 | 112篇 |
1990年 | 67篇 |
1989年 | 66篇 |
1988年 | 47篇 |
1987年 | 27篇 |
1986年 | 26篇 |
1985年 | 21篇 |
1984年 | 10篇 |
1983年 | 14篇 |
1982年 | 6篇 |
1981年 | 10篇 |
1980年 | 12篇 |
1979年 | 5篇 |
1965年 | 3篇 |
1959年 | 5篇 |
1958年 | 2篇 |
1951年 | 13篇 |
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
41.
In this paper, a new multiscale fragile watermarking scheme based on the Gaussian mixture model (GMM) is presented. First, a GMM is developed to describe the statistical characteristics of images in the wavelet domain and an expectation-maximization algorithm is employed to identify GMM model parameters. With wavelet multiscale subspaces being divided into watermarking blocks, the GMM model parameters of different watermarking blocks are adjusted to form certain relationships, which are employed for the presented new fragile watermarking scheme for authentication. An optimal watermark embedding method is developed to achieve minimum watermarking distortion. A secret embedding key is designed to securely embed the fragile watermarks so that the new method is robust to counterfeiting, even when the malicious attackers are fully aware of the watermark embedding algorithm. It is shown that the presented new method can securely embed a message bit stream, such as personal signatures or copyright logos, into a host image as fragile watermarks. Compared with conventional fragile watermark techniques, this new statistical model based method modifies only a small amount of image data such that the distortion on the host image is imperceptible. Meanwhile, with the embedded message bits spreading over the entire image area through the statistical model, the new method can detect and localize image tampering. Besides, the new multiscale implementation of fragile watermarks based on the presented method can help distinguish some normal image operations such as JPEG compression from malicious image attacks and, thus, can be used for semi-fragile watermarking. 相似文献
42.
43.
A survey of quality of service in IEEE 802.11 networks 总被引:9,自引:0,他引:9
Developed as a simple and cost-effective wireless technology for best effort services, IEEE 802.11 has gained popularity at an unprecedented rate. However, due to the lack of built-in quality of service support, IEEE 802.11 experiences serious challenges in meeting the demands of multimedia services and applications. This article surveys 802.11 QoS schemes, including service differentiation in the MAC layer, admission control and bandwidth reservation in MAC and higher layers, and link adaptation in the physical layer, designed to meet these challenges by providing the necessary enhancements for the required QoS. Furthermore, the article addresses issues that arise when end-to-end QoS has to be guaranteed in today's pervasive heterogeneous wired-cum-wireless networks. Among these challenges, protocol interoperability, multihop scheduling, full mobility support, and seamless vertical handoff among multiple mobile/wireless interfaces are specifically addressed. 相似文献
44.
45.
46.
47.
硬件教学实验必须由验证性向设计性转变,才能达到培养学生设计能力和处理问题的能力。而逻辑分析仪是数字系统设计的常用工具.对于实验和教学都起着不可忽视的作用。 相似文献
48.
49.
50.