全文获取类型
收费全文 | 9263篇 |
免费 | 571篇 |
国内免费 | 344篇 |
专业分类
电工技术 | 470篇 |
技术理论 | 1篇 |
综合类 | 452篇 |
化学工业 | 251篇 |
金属工艺 | 316篇 |
机械仪表 | 698篇 |
建筑科学 | 434篇 |
矿业工程 | 206篇 |
能源动力 | 73篇 |
轻工业 | 107篇 |
水利工程 | 51篇 |
石油天然气 | 35篇 |
武器工业 | 98篇 |
无线电 | 2080篇 |
一般工业技术 | 648篇 |
冶金工业 | 81篇 |
原子能技术 | 112篇 |
自动化技术 | 4065篇 |
出版年
2024年 | 14篇 |
2023年 | 141篇 |
2022年 | 135篇 |
2021年 | 241篇 |
2020年 | 179篇 |
2019年 | 92篇 |
2018年 | 97篇 |
2017年 | 140篇 |
2016年 | 206篇 |
2015年 | 189篇 |
2014年 | 410篇 |
2013年 | 395篇 |
2012年 | 501篇 |
2011年 | 674篇 |
2010年 | 474篇 |
2009年 | 536篇 |
2008年 | 545篇 |
2007年 | 740篇 |
2006年 | 620篇 |
2005年 | 660篇 |
2004年 | 584篇 |
2003年 | 490篇 |
2002年 | 430篇 |
2001年 | 288篇 |
2000年 | 230篇 |
1999年 | 212篇 |
1998年 | 178篇 |
1997年 | 133篇 |
1996年 | 107篇 |
1995年 | 93篇 |
1994年 | 81篇 |
1993年 | 68篇 |
1992年 | 73篇 |
1991年 | 50篇 |
1990年 | 34篇 |
1989年 | 28篇 |
1988年 | 26篇 |
1987年 | 16篇 |
1986年 | 5篇 |
1985年 | 21篇 |
1984年 | 7篇 |
1983年 | 11篇 |
1982年 | 7篇 |
1981年 | 5篇 |
1980年 | 4篇 |
1979年 | 4篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1975年 | 1篇 |
1973年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 250 毫秒
91.
Enrico Saggese Giuseppe Chiassarini 《International Journal of Satellite Communications and Networking》1989,7(4):295-306
One key technology, for the implementation of future on-board processing payloads, is the multicarrier demodulator (MCD). The MCD is instrumental in allowing FDMA/TDM access schemes which optimize the use of on-board and ground resources in VSAT networks. This paper deals with the analogue and digital implementations of MCD, trying to assess the fields of application of each of the two technologies. 相似文献
92.
陈明志 《数字社区&智能家居》2006,1(12):159-160
本文对数字图像中几种具有代表性的边缘检测算子进行了理论分析,并通过VC编程实验,对各种算法进行实现,通过比较得出了各自的优缺点和适用范围。 相似文献
93.
Chun-I Fan 《Information Sciences》2006,176(3):263-284
In an untraceable electronic cash protocol based on blind signatures, an identified customer can withdraw a blinded electronic cash from the bank and the unblinding operation is adopted by the customer to transform the blinded electronic cash into a valid one. Before performing the operation, the blinded electronic cash is protected well since attackers cannot convert it into a valid electronic cash without the blinding factor corresponding to the operation. However, after unblinding, the electronic cash will suffer from the theft attacks since it is not protected by any security mechanism. This paper introduces a new unblinding operation called ownership-attached unblinding which attaches the identities of a designated payee and a specified transaction to the blinded electronic cash and then produces an ownership-attached electronic cash other than a bare one such that the cash can withstand the theft attacks during the entire transaction because it is valid for the designated payee and the specified transaction only. Furthermore, the proposed scheme does not largely increase the computation cost required for each customer so that it also is a customer efficient protection solution for untraceable electronic cash and especially suitable for mobile clients and smart-card users. 相似文献
94.
95.
Kammrath Lara K.; Mendoza-Denton Rodolfo; Mischel Walter 《Canadian Metallurgical Quarterly》2005,88(4):605
Three studies investigated conditions in which perceivers view dispositions and situations as interactive, rather than independent, causal forces when making judgments about another's personality. Study 1 showed that perceivers associated 5 common trait terms (e.g., friendly and shy) with characteristic if...then... (if situation a, then the person does x, but if situation b, then the person does y) personality signatures. Study 2 demonstrated that perceivers used information about a target's stable if...then... signature to infer the target's motives and traits; dispositional judgments were mediated by inferences about the target's motivations. Study 3 tested whether perceivers draw on if...then... signatures when making judgments about Big Five trait dimensions. Together, the findings indicate that perceivers take account of person-situation interactions (reflected in if...then... signatures) in everyday explanations of social behavior and personality dispositions. Boundary conditions are also discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
96.
为了提高E^2PROM中N管源漏穿通电压,用实验的方法对制造工艺进行了研究。结果表明,高能量注入是提高VPT的有效手段,但受到pn结击穿的限制,只适用于低区短沟N管;DDD工艺大幅度高VPT,但pn结击穿电压低于20V,不能应用于高压MOS管;采用适量的防穿通注入和适当增大沟道长度为最理想的工艺途径。 相似文献
97.
98.
99.
数字绘画技术主要应用在商业插画、科普插画、少儿插画、游戏人物及场景设定等方面,其中又是在动画与游戏中应用最广,让数字绘画艺术更好地为我国的文化创意产业服务,向世界展示出具有本民族特色的文化艺术产品,中国的传统装饰艺术将是其取之不尽的艺术宝库。 相似文献
100.
《浙江大学学报:C卷英文版》2012,(8):573-584
We propose a robust digital watermarking algorithm for copyright protection.A stable feature is obtained by utilizing QR factorization and discrete cosine transform(DCT) techniques,and a meaningful watermark image is embedded into an image by modifying the stable feature with a quantization index modulation(QIM) method.The combination of QR factorization,DCT,and QIM techniques guarantees the robustness of the algorithm.Furthermore,an embedding location selection method is exploited to select blocks with small modifications as the embedding locations.This can minimize the embedding distortion and greatly improve the imperceptibility of our scheme.Several standard images were tested and the experimental results were compared with those of other published schemes.The results demonstrate that our proposed scheme can achieve not only better imperceptibility,but also stronger robustness against common signal processing operations and lossy compressions,such as filtering,noise addition,scaling,sharpening,rotation,cropping,and JPEG/JPEG2000 compression. 相似文献