全文获取类型
收费全文 | 89208篇 |
免费 | 1123篇 |
国内免费 | 429篇 |
专业分类
电工技术 | 841篇 |
综合类 | 2323篇 |
化学工业 | 12490篇 |
金属工艺 | 4963篇 |
机械仪表 | 3177篇 |
建筑科学 | 2279篇 |
矿业工程 | 569篇 |
能源动力 | 1537篇 |
轻工业 | 4086篇 |
水利工程 | 1328篇 |
石油天然气 | 428篇 |
武器工业 | 2篇 |
无线电 | 9845篇 |
一般工业技术 | 17398篇 |
冶金工业 | 3365篇 |
原子能技术 | 314篇 |
自动化技术 | 25815篇 |
出版年
2023年 | 102篇 |
2022年 | 201篇 |
2021年 | 235篇 |
2020年 | 213篇 |
2019年 | 189篇 |
2018年 | 14633篇 |
2017年 | 13520篇 |
2016年 | 10123篇 |
2015年 | 741篇 |
2014年 | 433篇 |
2013年 | 632篇 |
2012年 | 3350篇 |
2011年 | 9644篇 |
2010年 | 8454篇 |
2009年 | 5737篇 |
2008年 | 6966篇 |
2007年 | 7918篇 |
2006年 | 267篇 |
2005年 | 1299篇 |
2004年 | 1201篇 |
2003年 | 1250篇 |
2002年 | 605篇 |
2001年 | 149篇 |
2000年 | 246篇 |
1999年 | 139篇 |
1998年 | 267篇 |
1997年 | 171篇 |
1996年 | 170篇 |
1995年 | 103篇 |
1994年 | 91篇 |
1993年 | 91篇 |
1992年 | 73篇 |
1991年 | 82篇 |
1990年 | 49篇 |
1989年 | 60篇 |
1988年 | 55篇 |
1986年 | 52篇 |
1985年 | 66篇 |
1984年 | 48篇 |
1983年 | 55篇 |
1982年 | 57篇 |
1981年 | 56篇 |
1980年 | 50篇 |
1979年 | 44篇 |
1976年 | 46篇 |
1968年 | 43篇 |
1966年 | 45篇 |
1965年 | 45篇 |
1955年 | 63篇 |
1954年 | 68篇 |
排序方式: 共有10000条查询结果,搜索用时 12 毫秒
991.
L. Hobbs I. Eddie G. Erwin A. C. Bryce R. M. De La Rue J. S. Roberts T. F. Krauss D. W. Mccomb M. Mackenzie 《Journal of Electronic Materials》2005,34(3):232-239
Annealing or processing of AlAs that has been subjected to a wet thermal oxidation process can result in severe delamination
of material at the oxidation front. This paper reports a procedure for preventing this delamination and presents a possible
cause for the delamination. 相似文献
992.
Singh V.K. Sharma R.K. Singh A.K. Bhaskar D.R. Senani R. 《Circuits and Systems II: Express Briefs, IEEE Transactions on》2005,52(12):860-864
Although a number of single current feedback op-amps (CFOA)-based single-resistance-controlled oscillators (SRCO) have appeared in earlier literature, only six of them are canonic (i.e., requiring only two capacitors and only three resistors). The object of this brief is to add to this list two new canonic single-CFOA-based SRCO configurations. An evaluation of these two new circuits has been carried out and their workability of has been confirmed by experimental results based upon AD844 CFOAs. 相似文献
993.
994.
As an attractive technique for peak-to-average power ratio (PAPR) reduction in orthogonal frequency division multiplexing (OFDM) systems, time domain interleaved partitioning partial transmit sequence (TD-IP-PTS) scheme uses circular convolution property of discrete Fourier transforms (DFT) so as to need only one inverse fast Fourier transform (IFFT) operation. However, the search and combination of phase factors still need higher computational complexity. In order to improve the problem, this paper detailedly analyzes the independence of phase factor vectors and optimizes the phase factor vectors in TD-IP-PTS. Furthermore, we find the characteristic of combination of phase factors and propose three methods respectively based on storage-unit, pipeline and select-path to implement the combination of phase factors in TD-IP-PTS. The simulation results show that TD-IP-PTS using independent and effective phase factor vectors has better PAPR performance and lower complexity than traditional IP-PTS. Moreover, among three proposed methods for combination of phase factors, the method based on select-path requires the least registers and delay time. This method is the most promising in practical applications. 相似文献
995.
Chi-Li Yu Jung-Sub Kim Lanping Deng Srinidhi Kestur Vijaykrishnan Narayanan Chaitali Chakrabarti 《Journal of Signal Processing Systems》2011,64(1):109-122
Applications based on Discrete Fourier Transforms (DFT) are extensively used in several areas of signal and digital image
processing. Of particular interest is the two-dimensional (2D) DFT which is more computation- and bandwidth-intensive than
the one-dimensional (1D) DFT. Traditionally, a 2D DFT is computed using Row-Column (RC) decomposition, where 1D DFTs are computed
along the rows followed by 1D DFTs along the columns. Both application specific and reconfigurable hardware have utilized
this scheme for high-performance implementations of 2D DFT. However, architectures based on RC decomposition are not efficient
for large input size data due to memory bandwidth constraints. In this paper, we propose an efficient architecture to implement
2D DFT for large-sized input data based on a novel 2D decomposition algorithm. This architecture achieves very high throughput
by exploiting the inherent parallelism due to the algorithm decomposition and by utilizing the row-wise burst access pattern
of the external memory. A high throughput memory interface has been designed to enable maximum utilization of the memory bandwidth.
In addition, an automatic system generator is provided for mapping this architecture onto a reconfigurable platform of Xilinx
Virtex-5 devices. For a 2K ×2K input size, the proposed architecture is 1.96 times faster than RC decomposition based implementation under the same memory
constraints, and also outperforms other existing implementations. 相似文献
996.
In this paper, we describe HW and SW features of the developed prototype of a hybrid 3G mobile phone and wireless terminal,
which provides integral video projection onto two VGA/2 displays that, when put side-by-side, form the integrated display
with the ratio of the overall width to its overall height, equal to 4:3, so providing the integral video VGA format and enabling
visual presentation of standard full-size web pages, PC mainstream SW screens (such as e.g. the ones of e-mail clients), multi-media
content etc. When not in use, the displays can be fold back one onto each other, so preserving the industry-standard dimensions
of the device. The two displays that share the image provide it with overall resolution of 640 x 480 pixels per inch. The
device is driven by Texas Instruments OMAP 2420 multimedia processor with ARM1136 core and Linux operating system. In addition,
the device is equipped with specially developped prototypes of unique spring/microgenerator-based battery charger as well
as with ultra-thin mountable foil-based QWERTY keyboard. 相似文献
997.
In Hwan Park Yoon Hyun Kim Jae Sang Cha Yeong Min Jang Jin Young Kim 《Wireless Personal Communications》2011,60(3):533-545
In this paper, effects of reader-to-reader interference are investigated for LED identification (LED-ID) system in a multi-reader
environment. The LED-ID readers typically use different channels to avoid collision between readers. However, in-channel collision
usually happens in terms of interrogation range. A reader-to-reader interference scenario is proposed, and nominal interrogation
range of a desired reader is derived from this model. In order to evaluate the LED-ID reader-to-reader interference quantitatively,
an efficient detection scheme is proposed and simulated by employing spreading sequence. The spreading sequence is inserted
between each user’s frame formats. In the receiver, the desired signal is detected by using correlation among inserted spreading
sequences. From simulation results, it is confirmed that the proposed scheme is very effective to enhance reliability of LED-ID
communication systems. 相似文献
998.
In this paper, we present a blind steganalysis based on feature fusion. Features based on Short Time Fourier Transform (STFT),
which consists of second-order derivative spectrum features of audio and Mel-frequency cepstrum coefficients, audio quality
metrics and features on linear prediction residue are extracted separately. Then feature fusion is conducted. The performance
of the proposed steganalysis is evaluated against 4 steganographic schemes: Direct Sequence Spread Spectrum (DSSS), Quantization
Index Modulation (QIM), ECHO embedding (ECHO), and Least Significant Bit embedding (LSB). Experiment results show that the
classifying performance of the proposed detector is much superior to the previous work. Even more exciting is that the proposed
methodology could detect the four steganography, with 85%+ classification accuracy achieved in all the detections, which makes
the proposed steganalysis methodology capable of being regarded as a blind steganalysis, and especially useful when the steganalyzer
are without the knowledge of the steganographic scheme employed in data embedding. 相似文献
999.
The Asymptotic Waveform Evaluation (AWE) technique is an extrapolation method that provides a reduced-order model of linear system and has already been successfully used to analyze wideband electromagnetic scattering problems. As the number of unknowns increases, the size of Method Of Moments (MOM) impedance matrix grows very rapidly, so it is a prohibitive task for the computation of wideband Radar Cross Section (RCS) from electrically large object or multi-objects using the traditional AWE technique that needs to solve directly matrix inversion. In this paper, an AWE technique based on the Characteristic Basis Function (CBF) method, which can reduce the matrix size to a manageable size for direct matrix inversion, is proposed to analyze electromagnetic scattering from multi-objects over a given frequency band. Numerical examples are presented to illustrate the computational accuracy and efficiency of the proposed method. 相似文献
1000.
Optical burst switching (OBS) is a promising technology for bridging the gap between optical wavelength switching and optical
packet switching. Optical signal transmission quality is subject to various types of physical impairment introduced by optical
fibers, switching elements, or other network components. The signal degradation due to physical impairment may be significant
enough such that the bit-error rate of received signals is unacceptably high at the destination, rendering the signal to not
usable. In this article, based on earlier study, we study the burst-scheduling problem in OBS networks using two control packets
for each data burst, taking into account physical impairment effects. We propose a burst-scheduling algorithm that accommodates
incoming bursts by primary path routing, deflection routing, and burst scheduling. We design an admission control mechanism
to use network resources efficiently. At an OBS node, the proposed algorithm schedules bursts for transmission by searching
for available resources as well as verifying signal quality. Our simulation results demonstrate that the proposed algorithm
is effective in terms of reducing the burst-blocking probability. 相似文献