全文获取类型
收费全文 | 58635篇 |
免费 | 7435篇 |
国内免费 | 3790篇 |
专业分类
电工技术 | 13123篇 |
技术理论 | 6篇 |
综合类 | 6630篇 |
化学工业 | 1970篇 |
金属工艺 | 1401篇 |
机械仪表 | 4492篇 |
建筑科学 | 3294篇 |
矿业工程 | 1617篇 |
能源动力 | 1877篇 |
轻工业 | 1249篇 |
水利工程 | 971篇 |
石油天然气 | 1696篇 |
武器工业 | 753篇 |
无线电 | 14330篇 |
一般工业技术 | 4576篇 |
冶金工业 | 1753篇 |
原子能技术 | 402篇 |
自动化技术 | 9720篇 |
出版年
2024年 | 264篇 |
2023年 | 930篇 |
2022年 | 1456篇 |
2021年 | 1809篇 |
2020年 | 1980篇 |
2019年 | 1549篇 |
2018年 | 1536篇 |
2017年 | 2024篇 |
2016年 | 2302篇 |
2015年 | 2682篇 |
2014年 | 4027篇 |
2013年 | 3566篇 |
2012年 | 4707篇 |
2011年 | 4945篇 |
2010年 | 3893篇 |
2009年 | 3732篇 |
2008年 | 3748篇 |
2007年 | 4344篇 |
2006年 | 3909篇 |
2005年 | 3129篇 |
2004年 | 2467篇 |
2003年 | 2155篇 |
2002年 | 1733篇 |
2001年 | 1451篇 |
2000年 | 1201篇 |
1999年 | 909篇 |
1998年 | 653篇 |
1997年 | 537篇 |
1996年 | 455篇 |
1995年 | 403篇 |
1994年 | 334篇 |
1993年 | 230篇 |
1992年 | 159篇 |
1991年 | 153篇 |
1990年 | 110篇 |
1989年 | 83篇 |
1988年 | 57篇 |
1987年 | 49篇 |
1986年 | 31篇 |
1985年 | 19篇 |
1984年 | 27篇 |
1983年 | 6篇 |
1982年 | 14篇 |
1981年 | 11篇 |
1980年 | 10篇 |
1979年 | 9篇 |
1977年 | 7篇 |
1975年 | 7篇 |
1962年 | 5篇 |
1959年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
摘 要:为了提高码索引调制(code index modulation,CIM)系统的传输效率,提出了一种具有更低复杂度的单输入单输出(single input single output,SISO)的广义正交码索引调制(generalized orthogonal code index modulation,GQCIM)系统。CIM 系统使用扩频码和星座符号传输信息,但只能激活两个扩频码索引和一个调制符号。而 GQCIM 系统以一种新颖的方式克服了只激活一个调制符号的限制,同时充分利用了调制符号的正交性,增加扩频码索引以传输更多的额外信息位,提高了系统的传输效率。此外,分析了GQCIM系统的理论性能,推导了误码率性能的上界。通过蒙特卡罗仿真验证了GQCIM系统的性能,对比发现GQCIM系统的理论和仿真性能一致。而且在相同的传输效率下,结果显示GQCIM系统的性能优于同样具有正交性的调制系统,如广义码索引调制(generalized code index modulation,GCIM)系统、CIM系统、码索引调制-正交空间调制(code index modulation aided quadrature spatial modulation,CIM-QSM)系统、码索引调制-正交空间调制(code index modulation aided spatial modulation,CIM-SM)系统、脉冲索引调制(pulse index modulation,PIM)系统。 相似文献
2.
互联网通讯采取标准化模式主要以TCP/IP协议为载体,通讯的优越特性体现在同时具备便捷性与开放性,为办公提供很大的便利,但基于网络系统也会入侵病毒、也会给信息数据与办公体系安全性造成威胁,直接影响企业综合稳定发展。据此,为保障办公工作的顺利开展,本文对计算机网络办公自动化及安全策略进行详细分析。 相似文献
3.
频率特性分析在工程应用中具有重要的作用,在电路分析、模拟电子技术、信号与系统、自动控制理论等相关课程中都涉及到相关章节内容,在不同课程中如何根据工程应用和学生学习阶段把握具体的讲解内容和讲解方式非常重要。本文从频率特性的求解方法和具体物理意义角度开展在不同课程中讲解的方法,从时域和频域角度分别讨论其物理意义和具体的分析方法。通过渐进深化的教学过程和教学方法不断提高学生的知识掌握和应用技能,提高学生的工程意识、工程素质和工程创新能力,强化学生对于频率特性课程知识的综合应用能力。 相似文献
4.
This paper introduces the design of a hardware efficient reconfigurable pseudorandom number generator (PRNG) using two different feedback controllers based four-dimensional (4D) hyperchaotic systems i.e. Hyperchaotic-1 and -2 to provide confidentiality for digital images. The parameter's value of these two hyperchaotic systems is set to be a specific value to get the benefits i.e. all the multiplications (except a few multiplications) are performed using hardwired shifting operations rather than the binary multiplications, which doesn't utilize any hardware resource. The ordinary differential equations (ODEs) of these two systems have been exploited to build a generic architecture that fits in a single architecture. The proposed architecture provides an opportunity to switch between two different 4D hyperchaotic systems depending on the required behavior. To ensure the security strength, that can be also used in the encryption process in which encrypt the input data up to two times successively, each time using a different PRNG configuration. The proposed reconfigurable PRNG has been designed using Verilog HDL, synthesized on the Xilinx tool using the Virtex-5 (XC5VLX50T) and Zynq (XC7Z045) FPGA, its analysis has been done using Matlab tool. It has been found that the proposed architecture of PRNG has the best hardware performance and good statistical properties as it passes all fifteen NIST statistical benchmark tests while it can operate at 79.101-MHz or 1898.424-Mbps and utilize only 0.036 %, 0.23 %, and 1.77 % from the Zynq (XC7Z045) FPGA's slice registers, slice LUTs, and DSP blocks respectively. Utilizing these PRNGs, we design two 16 × 16 substitution boxes (S-boxes). The proposed S-boxes fulfill the following criteria: Bijective, Balanced, Non-linearity, Dynamic Distance, Strict Avalanche Criterion (SAC) and BIC non-linearity criterion. To demonstrate these PRNGs and S-boxes, a new three different scheme of image encryption algorithms have been developed: a) Encryption using S-box-1, b) Encryption using S-box-2 and, c) Two times encryption using S-box-1 and S-box-2. To demonstrate that the proposed cryptosystem is highly secure, we perform the security analysis (in terms of the correlation coefficient, key space, NPCR, UACI, information entropy and image encryption quantitatively in terms of (MSE, PSNR and SSIM)). 相似文献
5.
Against the background of smart manufacturing and Industry 4.0, how to achieve real-time scheduling has become a problem to be solved. In this regard, automatic design for shop scheduling based on hyper-heuristics has been widely studied, and a number of reviews and scheduling algorithms have been presented. Few studies, however, have specifically discussed the technical points involved in algorithm development. This study, therefore, constructs a general framework for automatic design for shop scheduling strategies based on hyper-heuristics, and various state-of-the-art technical points in the development process are summarized. First, we summarize the existing types of shop scheduling strategies and classify them using a new classification method. Second, we summarize an automatic design algorithm for shop scheduling. Then, we investigate surrogate-assisted methods that are popular in the current algorithm field. Finally, current problems and challenges are discussed, and potential directions for future research are proposed. 相似文献
6.
Iqbal Ahmad Syed Mujtaba Shah Muhammad Nadeem Zafar Muhammad Naeem Ashiq Wei Tang Uzma Jabeen 《Ceramics International》2021,47(3):3760-3771
Ferrites are materials of interest due to their broad applications in high technological devices and a lot of research has been focused to synthesize new ferrites. In this regard, an effort has been devoted to synthesize spinel Pr–Ni co-substituted strontium ferrites with a nominal formula of Sr1-xPrxFe2-yNiyO4 (0.0 ≤ x ≤ 0.1, 0.0 ≤ y ≤ 1.0). The cubic structure of pure and Pr–Ni co-substituted strontium ferrite samples calcinated at 1073 K for 3 h has been confirmed through X-ray diffraction (XRD). Average sizes of crystallites (18–25 nm) have been estimated from XRD analysis and nanometer particle sizes of synthesized ferrites have been further verified by scanning electron microscopy (SEM). SEM results have also shown that particles are mostly agglomerated and all the samples possess porosity. It has been observed that at 298 K, the values of resistivity (ρ) increase, while that of AC conductivity, dielectric loss, and dielectric constants decrease with increasing amounts of Pr3+ and Ni2+ ions. The values of dielectric parameters initially decrease with frequency and later become constant and can be explained on the basis of dielectric polarization. Electrochemical impedance spectroscopy (EIS) studies show that the charge transport phenomenon in ferrite materials is mainly controlled via grain boundaries. Overall, synthesized ferrite materials own enhanced resistivity values in the range of 1.38 × 109–1.94 × 109 Ω cm and minimum dielectric losses, which makes them suitable candidates for high frequency devices applications. 相似文献
7.
8.
伴随着我国社会经济的稳固发展,人们的生活质量逐渐有了明显改善,而在生态问题趋于严重使人们的环境保护意识显著提高的过程中,森林抚育对于森林生态系统的作用和价值愈发凸显。对此,文章针对森林抚育,从提高森林利用率、维持森林动植物生态平衡、增加可利用水资源等多个方面就其对森林生态系统的影响进行了分析,旨在给予相关森林保护工作者可行的帮助,并以此促进我国森林开发工作的可持续发展。 相似文献
9.
10.
The existing analytical average bit error rate (ABER) expression of conventional generalised spatial modulation (CGSM) does not agree well with the Monte Carlo simulation results in the low signal‐to‐noise ratio (SNR) region. Hence, the first contribution of this paper is to derive a new and easy way to evaluate analytical ABER expression that improves the validation of the simulation results at low SNRs. Secondly, a novel system termed CGSM with enhanced spectral efficiency (CGSM‐ESE) is presented. This system is realised by applying a rotation angle to one of the two active transmit antennas. As a result, the overall spectral efficiency is increased by 1 bit/s/Hz when compared with the equivalent CGSM system. In order to validate the simulation results of CGSM‐ESE, the third contribution is to derive an analytical ABER expression. Finally, to improve the ABER performance of CGSM‐ESE, three link adaptation algorithms are developed. By assuming full knowledge of the channel at the receiver, the proposed algorithms select a subset of channel gain vector (CGV) pairs based on the Euclidean distance between all CGV pairs, CGV splitting, CGV amplitudes, or a combination of these. 相似文献