全文获取类型
收费全文 | 5467篇 |
免费 | 438篇 |
国内免费 | 57篇 |
专业分类
电工技术 | 62篇 |
综合类 | 21篇 |
化学工业 | 1264篇 |
金属工艺 | 76篇 |
机械仪表 | 264篇 |
建筑科学 | 103篇 |
矿业工程 | 8篇 |
能源动力 | 347篇 |
轻工业 | 705篇 |
水利工程 | 65篇 |
石油天然气 | 34篇 |
武器工业 | 1篇 |
无线电 | 694篇 |
一般工业技术 | 1245篇 |
冶金工业 | 83篇 |
原子能技术 | 53篇 |
自动化技术 | 937篇 |
出版年
2024年 | 36篇 |
2023年 | 206篇 |
2022年 | 478篇 |
2021年 | 762篇 |
2020年 | 459篇 |
2019年 | 515篇 |
2018年 | 478篇 |
2017年 | 391篇 |
2016年 | 390篇 |
2015年 | 239篇 |
2014年 | 297篇 |
2013年 | 396篇 |
2012年 | 231篇 |
2011年 | 294篇 |
2010年 | 162篇 |
2009年 | 140篇 |
2008年 | 90篇 |
2007年 | 88篇 |
2006年 | 36篇 |
2005年 | 26篇 |
2004年 | 34篇 |
2003年 | 27篇 |
2002年 | 16篇 |
2001年 | 7篇 |
2000年 | 12篇 |
1999年 | 15篇 |
1998年 | 17篇 |
1997年 | 9篇 |
1996年 | 12篇 |
1995年 | 16篇 |
1994年 | 7篇 |
1993年 | 11篇 |
1992年 | 8篇 |
1991年 | 8篇 |
1989年 | 5篇 |
1988年 | 4篇 |
1987年 | 5篇 |
1985年 | 6篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 4篇 |
1981年 | 3篇 |
1980年 | 1篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1977年 | 4篇 |
1973年 | 1篇 |
1968年 | 1篇 |
1965年 | 2篇 |
1961年 | 1篇 |
排序方式: 共有5962条查询结果,搜索用时 0 毫秒
51.
Muhammad Taher Abuelma'atti 《International Journal of Electronics》2013,100(12):1229-1240
Large signal analysis of mixers excited by three tone signals is presented. The special case of two equal-amplitude sinusoids plus a difference-frequency injection is considered in detail and the results are compared, whenever possible, with previously published results. Contrary to previously published results, it is shown that even under large signal conditions and strong nonlinearity it is possible, at least in theory, to totally eliminate the third-order intermodulation when the amplitudes of the equal-amplitudes input sinusoids and the difference-frequency injection are equal. 相似文献
52.
Kresimir Dabcevic Muhammad Ozair Mughal Lucio Marcenaro Carlo S. Regazzoni 《Journal of Signal Processing Systems》2016,83(1):29-44
Throughout the 1990s, Software Defined Radio (SDR) technology was viewed almost exclusively as a solution for interoperability problems between various military standards, waveforms and devices. In the meantime, Cognitive Radio (CR) – a novel communication paradigm which embodies SDR with intelligence and self-reconfigurability properties – has emerged. Intelligence and on-the-fly self-reconfiguration abilities of CRs constitute an important next step in the Communications Electronic Warfare, as they may enable the jamming entities with the capabilities of devising and deploying advanced jamming tactics. Similarly, they may also aid the development of the advanced intelligent self-reconfigurable systems for jamming mitigation. This work outlines the development and implementation of the Spectrum Intelligence algorithm for Radio Frequency (RF) interference mitigation. The developed system is built upon the ideas of obtaining relevant spectrum-related data by using wideband energy detectors, performing narrowband waveform identification, extracting the waveforms’ parameters and properly classifying the waveforms. All relevant spectrum activities are continuously monitored and stored. Coupled with the self-reconfigurability of various transmission-related parameters, Spectrum Intelligence is the facilitator for the advanced interference mitigation strategies. The implementation is done on the Cognitive Radio test bed architecture which consists of two military Software Defined Radio terminals, each interconnected with the computationally powerful System-on-Module. 相似文献
53.
Sourabh Dongaonkar Muhammad A. Alam 《Progress in Photovoltaics: Research and Applications》2015,23(2):170-181
Partial shading in photovoltaic modules is an important reliability and performance concern for all photovoltaic technologies. In this paper, we show how cell geometry can be used as a design variable for improved shade tolerance and performance in monolithic thin film photovoltaic modules (TFPV). We use circuit simulations to illustrate the geometrical aspects of partial shading in typical monolithic TFPV modules with rectangular cells, and formulate rules for shade tolerant design. We show that the problem of partial shading can be overcome by modifying the cell shape and orientation, while preserving the module shape and output characteristics. We discuss two geometrical designs with cells arranged in radial and spiral patterns, which (i) prevent the reverse breakdown of partially shaded cells, (ii) improve the overall power output under partial shading, and (iii) in case of spiral design, may additionally improve the module efficiency by reducing sheet resistance losses. We compare these designs quantitatively using realistic parameters and discuss the practical aspects for their implementation. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
54.
Basit Abdul Qaisar Saad Ali Mudassar Naeem Muhammad Bruyere Marc Rodrigues Joel J. P. C. 《Telecommunication Systems》2020,73(2):223-239
Telecommunication Systems - A recent trend of peering at geo-diversified Internet exchange points (IXPs) has empowered decades-old proposal of inter-networking and opened up new avenues of business... 相似文献
55.
Muhammad Maqbool Alruwaili Amani Milinovic Dunja Khan Tahirzeb Ali Ghafar Ahmad Iftikhar 《Semiconductors》2018,52(16):2039-2045
Semiconductors - Thin films of AlN:Tm are deposited on a Si(111) and Si(100) substrates and optical fiber by rf magnetron sputtering method. 200–400 nm thick films are deposited at various... 相似文献
56.
Qureshi Rehan Mehboob Syed Haris Aamir Muhammad 《Wireless Personal Communications》2021,116(2):1379-1406
Wireless Personal Communications - Medical Body Area Networks or MBANs are gaining popularity in healthcare circles because of the convenience they provide to patients and caregivers and assist in... 相似文献
57.
In present work, a hetero-junction of n-silicon (n-Si) with copper phthalocyanine (CuPc) has been fabricated. The current-voltage characteristics were investigated to explain the rectification and conduction mechanism. The effect of temperature and humidity on electrical properties of n-Si/CuPc hetero-junction has also been investigated. The characteristics of the junction have been observed to be temperature and humidity dependent so it is suggested that this junction can be used as temperature and humidity sensor. 相似文献
58.
Imran Memon Qasim Ali Arain Muhammad Hammad Memon Farman Ali Mangi Rizwan Akhtar 《International Journal of Communication Systems》2017,30(16)
The mobile vehicle is gaining popularity nowadays using map services like Google Maps and other mapping services. However, map services users have to expose sensitive information like geographic locations (GPS coordinates) or address to personal privacy concerns as users share their locations and queries to obtain desired services. Existing mix zones location privacy protection methods are most general purposed and theoretical value while not applicable when applied to provide location privacy for map service users. In this paper, we present new (multiple mix zones location privacy protection) MMLPP method specially designed for map services on mobile vehicles over the road network. This method enables mobile vehicle users to query a route between 2 endpoints on the map, without revealing any confidential location and queries information. The basic idea is to strategically endpoints to nearby ones, such that (1) the semantic meanings encoded in these endpoints (eg, their GPS coordinates) change much, ie, location privacy is protected; (2) the routes returned by map services little change, ie, services usability are maintained. Specifically, a mobile client first privately retrieves point of interest close to the original endpoints, and then selects 2 points of interest as the shifted endpoints satisfying the property of geoindistinguishability. We evaluate our MMLPP approach road network application for GTMobiSim on different scales of map services and conduct experiments with real traces. Results show that MMLPP strikes a good balance between location privacy and service usability. 相似文献
59.
Muhammad Taher Abuelma’ati 《Analog Integrated Circuits and Signal Processing》2010,65(3):419-428
Using a unified representation for a class of the two current-feedback operational amplifier (CFOA) sinusoidal oscillators,
new circuits of this type can be systematically discovered. A catalogue of two circuit structures, each structure realizing
18 oscillator circuits, is presented. Moreover, using the RC:CR transformation, additional 18 oscillator circuits can be obtained
from each structure. A third structure realizing additional two oscillator circuits is also presented. Some of the circuits
enjoy one or more of the following attractive features: use of grounded capacitors, feasibility of absorbing the parasitic
components of the CFOAs, availability of a buffered output voltage and orthogonal tuning of the frequency and the startup
condition of oscillation. Moreover, it is shown that the use of the Barkhausen criterion for the determination of the startup
condition of oscillation and the frequency of oscillation yields inaccurate results with relatively large errors depending
on the selected component values. Furthermore, it is shown that using the roots of the characteristic equation of a specific
oscillator structure will result in a startup condition that cannot be adjusted without disturbing the frequency of oscillation. 相似文献
60.
Muhammad Nasir Mumtaz Bhutta Haitham S. Cruickshank Zhili Sun 《Wireless Networks》2014,20(6):1597-1609
In the past, security protocols including key transport protocols are designed with the assumption that there are two parties communication with each other and an adversary tries to intercept this communication. In Delay/Disruption Tolerant Networking (DTN), packet delivery relies on intermediate parties in the communication path to store and forward the packets. DTN security architecture requires that integrity and authentication should be verified at intermediate nodes as well as at end nodes and confidentiality should be maintained for end communicating parties. This requires new security protocols and key management to be defined for DTN as traditional end-to-end security protocols will not work with DTN. To contribute towards solving this problem, we propose a novel Efficient and Scalable Key Transport Scheme (ESKTS) to transport the symmetric key generated at a DTN node to other communicating body securely using public key cryptography and proxy signatures. It is unique effort to design a key transport protocol in compliance with DTN architecture. ESKTS ensures that integrity and authentication is achieved at hop-by-hop level as well as end-to-end level. It also ensures end-to-end confidentiality and freshness for end communicating parties. This scheme provides a secure symmetric key transport mechanism based on public key cryptography to exploit the unique bundle buffering characteristics of DTN to reduce communication and computation cost . 相似文献