首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4613篇
  免费   394篇
  国内免费   29篇
工业技术   5036篇
  2024年   17篇
  2023年   61篇
  2022年   98篇
  2021年   245篇
  2020年   266篇
  2019年   311篇
  2018年   411篇
  2017年   364篇
  2016年   324篇
  2015年   217篇
  2014年   358篇
  2013年   566篇
  2012年   394篇
  2011年   378篇
  2010年   251篇
  2009年   238篇
  2008年   134篇
  2007年   111篇
  2006年   69篇
  2005年   34篇
  2004年   29篇
  2003年   20篇
  2002年   22篇
  2001年   12篇
  2000年   14篇
  1999年   18篇
  1998年   5篇
  1997年   6篇
  1996年   6篇
  1995年   12篇
  1994年   3篇
  1993年   6篇
  1992年   4篇
  1991年   4篇
  1990年   4篇
  1989年   4篇
  1988年   2篇
  1986年   2篇
  1984年   6篇
  1982年   5篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1974年   1篇
  1967年   1篇
排序方式: 共有5036条查询结果,搜索用时 15 毫秒
51.
In this paper, a novel algorithm for image encryption based on hash function is proposed. In our algorithm, a 512-bit long external secret key is used as the input value of the salsa20 hash function. First of all, the hash function is modified to generate a key stream which is more suitable for image encryption. Then the final encryption key stream is produced by correlating the key stream and plaintext resulting in both key sensitivity and plaintext sensitivity. This scheme can achieve high sensitivity, high complexity, and high security through only two rounds of diffusion process. In the first round of diffusion process, an original image is partitioned horizontally to an array which consists of 1,024 sections of size 8 × 8. In the second round, the same operation is applied vertically to the transpose of the obtained array. The main idea of the algorithm is to use the average of image data for encryption. To encrypt each section, the average of other sections is employed. The algorithm uses different averages when encrypting different input images (even with the same sequence based on hash function). This, in turn, will significantly increase the resistance of the cryptosystem against known/chosen-plaintext and differential attacks. It is demonstrated that the 2D correlation coefficients (CC), peak signal-to-noise ratio (PSNR), encryption quality (EQ), entropy, mean absolute error (MAE) and decryption quality can satisfy security and performance requirements (CC <0.002177, PSNR <8.4642, EQ >204.8, entropy >7.9974 and MAE >79.35). The number of pixel change rate (NPCR) analysis has revealed that when only one pixel of the plain-image is modified, almost all of the cipher pixels will change (NPCR >99.6125 %) and the unified average changing intensity is high (UACI >33.458 %). Moreover, our proposed algorithm is very sensitive with respect to small changes (e.g., modification of only one bit) in the external secret key (NPCR >99.65 %, UACI >33.55 %). It is shown that this algorithm yields better security performance in comparison to the results obtained from other algorithms.  相似文献   
52.
The widespread availability of broadband internet access and the growth in server-based processing have provided an opportunity to run games away from the player into the cloud and offer a new promising service known as cloud gaming. The concept of cloud gaming is to render a game in the cloud and stream the resulting game scenes to the player as a video sequence over a broadband connection. To meet the stringent network bandwidth requirements of cloud gaming and support more players, efficient bit rate reduction techniques are needed. In this paper, we introduce the concept of game attention model (GAM), which is basically a game context-based visual attention model, as a means for reducing the bit rate of the streaming video more efficiently. GAM estimates the importance of each macro-block in a game frame from the player’s perspective and allows encoding the less important macro-blocks with lower bit rate. We have evaluated nine game video sequences, covering a wide range of game genre and a spectrum of scene content in terms of details, motion and brightness. Our subjective assessment shows that by integrating this model into the cloud gaming framework, it is possible to decrease the required bit rate by nearly 25 % on average, while maintaining a relatively high user quality of experience. This clearly enables players with limited communication resources to benefit from cloud gaming with acceptable quality.  相似文献   
53.
在赛车运动开始后不久,工程人员就意识到提高汽车转弯速度的方法之一是使汽车与路面产生更大的摩擦力.在早期进行的获取汽车与路面之间更大摩擦力的众多尝试中,较有趣的一种是采用双后轮行驶.然而,最有代表性的解决办法是采用胎面更宽,即断面宽度更大的轮胎.  相似文献   
54.
The solid‐state radical polymerization of sodium methacrylate was investigated. It was initiated by azobisisobutyronitrile, which was used as a radical initiator. Differential scanning calorimetry (DSC) was used to observe the endothermic and exothermic transitions during the polymerization reaction. Structural studies were performed with the DSC thermograms and Fourier transform infrared and ultraviolet–visible spectra, and all of the results confirmed the progress of the reaction. The obtained data revealed that the polymerization reaction proceeded completely with a 100% conversion. ΔH of this reaction was calculated with various amounts of the initiator, and the peak temperatures were determined at different heating rates. The activation energy (19.7 kcal mol?1) was also obtained by the Kissinger method for this type of solid polymerization reaction. © 2003 Wiley Periodicals, Inc. J Appl Polym Sci 90: 1648–1654, 2003  相似文献   
55.
We performed surface modification of ultra‐high‐molecular‐weight polyethylene (UHMWPE) through chromic acid etching, with the aim of improving the performance of its composites with poly(ethylene terephthalate) (PET) fibers. In this article, we report on the morphology and physicomechanical and tribological properties of modified UHMWPE/PET composites. Composites containing chemically modified UHMWPE had higher impact properties than those based on unmodified UHMWPE because of improved interfacial bonding between the polymer matrix and the fibers and better dispersion of the fibers within the modified UHMWPE matrix. Chemical modification of UHMWPE before the introduction of PET fibers resulted in composites exhibiting improved wear resistance compared to the base material and compared to unmodified UHMWPE/PET composites. On the basis of the morphological studies of worn samples, microploughing and fatigue failure associated with microcracking were identified as the principle wear mechanisms. © 2005 Wiley Periodicals, Inc. J Appl Polym Sci, 2006  相似文献   
56.
57.
In clustering algorithm, one of the main challenges is to solve the global allocation of the clusters instead of just local tuning of the partition borders. Despite this, all external cluster validity indexes calculate only point-level differences of two partitions without any direct information about how similar their cluster-level structures are. In this paper, we introduce a cluster level index called centroid index. The measure is intuitive, simple to implement, fast to compute and applicable in case of model mismatch as well. To a certain extent, we expect it to generalize other clustering models beyond the centroid-based k-means as well.  相似文献   
58.
Application of quantum-dot is a promising technology for implementing digital systems at nano-scale. QCA supports the new devices with nanotechnology architecture. This technique works based on electron interactions inside quantum-dots leading to emergence of quantum features and decreasing the problem of future integrated circuits in terms of size. In this paper, we will successfully design, implement and simulate a new full adder based on QCA with the minimum delay, area and complexities. Also, new XOR gates will be presented which are used in 8-bit controllable inverter in QCA. Furthermore, a new 8-bit full adder is designed based on the majority gate in the QCA, with the minimum number of cells and area which combines both designs to implement an 8-bit adder/subtractor in the QCA. This 8-bit adder/subtractor circuit has the minimum delay and complexity. Being potentially pipeline, the QCA technology calculates the maximum operating speed.  相似文献   
59.
In this paper, we describe a procedure for the processing of SiC-whisker-reinforced MoSi2 composites via tape casting. Based on the characteristics of SiC whiskers and MoSi2 powder in aqueous and nonaqueous solvents, a slip formulation (solvent, dispersant, binder, etc.) has been developed. The formulation developed allows for a uniform distribution of SiC whiskers in the matrix, easy separation of the tapes from the polymeric carrier, convenient control of both tape thickness and orientation of SiC whiskers, and a low binder burnout temperature. The latter is important for the prevention of the oxidation of MoSi2 powder during the binder burnout in an oxidizing atmosphere.  相似文献   
60.
The equilibrium and kinetic characteristics of the adsorption of human serum albumin (HSA) and ovalbumin (OVA) to the DEAE Sepharose FF weak anion exchanger were experimentally determined. The rate for protein adsorption was simulated with two different models, the first being based on a single lumped kinetic parameter, while the second includes the individual mass transfer processes occurring prior to the adsorption intervention, i.e., diffusion across the liquid film surrounding individual particles and diffusion within the ion exchanger particle itself. The actual adsorption of OVA to DEAE Sepharose FF in fully mixed stirred vessels and in packed bed columns was consistent with both models. In the case of HSA, however, the adsorption profile in an agitated vessel was consistent only with the pore diffusion model and neither model could correctly predict the latter part of the breakthrough profile observed in packed bed experiments.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号