全文获取类型
收费全文 | 73827篇 |
免费 | 6003篇 |
国内免费 | 2725篇 |
专业分类
电工技术 | 3982篇 |
技术理论 | 6篇 |
综合类 | 4429篇 |
化学工业 | 12716篇 |
金属工艺 | 3971篇 |
机械仪表 | 5026篇 |
建筑科学 | 5191篇 |
矿业工程 | 2407篇 |
能源动力 | 2249篇 |
轻工业 | 4803篇 |
水利工程 | 1001篇 |
石油天然气 | 5283篇 |
武器工业 | 460篇 |
无线电 | 7928篇 |
一般工业技术 | 9524篇 |
冶金工业 | 3933篇 |
原子能技术 | 750篇 |
自动化技术 | 8896篇 |
出版年
2024年 | 508篇 |
2023年 | 1354篇 |
2022年 | 2134篇 |
2021年 | 2932篇 |
2020年 | 2246篇 |
2019年 | 2004篇 |
2018年 | 2398篇 |
2017年 | 2573篇 |
2016年 | 2171篇 |
2015年 | 2750篇 |
2014年 | 3491篇 |
2013年 | 4269篇 |
2012年 | 4354篇 |
2011年 | 4856篇 |
2010年 | 4173篇 |
2009年 | 3953篇 |
2008年 | 3852篇 |
2007年 | 3711篇 |
2006年 | 3796篇 |
2005年 | 3431篇 |
2004年 | 2287篇 |
2003年 | 2085篇 |
2002年 | 1871篇 |
2001年 | 1636篇 |
2000年 | 1799篇 |
1999年 | 2051篇 |
1998年 | 1767篇 |
1997年 | 1425篇 |
1996年 | 1407篇 |
1995年 | 1186篇 |
1994年 | 957篇 |
1993年 | 717篇 |
1992年 | 546篇 |
1991年 | 428篇 |
1990年 | 327篇 |
1989年 | 255篇 |
1988年 | 226篇 |
1987年 | 142篇 |
1986年 | 120篇 |
1985年 | 96篇 |
1984年 | 66篇 |
1983年 | 40篇 |
1982年 | 42篇 |
1981年 | 30篇 |
1980年 | 25篇 |
1979年 | 13篇 |
1977年 | 7篇 |
1976年 | 8篇 |
1975年 | 5篇 |
1945年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
993.
994.
Shry-Sann Liao Hsien-Ku Chen Pou-Tou Sun Chen-Yen Lai Hsien-Yuan Liao Yin-Cheng Chang 《Microwave and Wireless Components Letters, IEEE》2003,13(12):529-531
This letter presents a novel design for a small-size coplanar waveguide frequency tripler. In this study, a new BPF has been replaced the conventional stub lines in the output termination of the multiplier. Not only enhance the performance of the tripler, but also reduce the whole circuit size. to 2.125/spl times/2.275 cm/sup 2/ in the frequency 0.8/2.4 GHz, The spurious suppressions are 37.48, 33.38, and 32.08 dBc for the 1st, 2nd, and 4th harmonics, respectively. It reveals the best output power of -1.92 dBm for a 0 dBm input signal and maximum conversion gain of -1.92 dB. It is very useful for applications in the wireless communication and radar systems. 相似文献
995.
Yongfei Ye Suqin Feng Minghe Liu Xinghua Sun Ting Xu Xuming Tong 《International Journal of Wireless Information Networks》2018,25(3):348-357
In mobile Ad Hoc network, nodes move freely, this can lead to frequent changes of network topology. Routing protocol algorithm is the strategy to establish communication links for network nodes, and its performance influences the availability of Ad Hoc network directly. By using wireless channel to transmit data in Ad Hoc network, the invaded malicious nodes will cause various attacks, aim to steal the transmission data or destroy the network. Based on the traditional proactive routing protocol for Ad Hoc network, an improved safe routing strategy SDSDV is put forward to resist attacks against routing protocols. The safe proactive routing protocol includes route request and route response two stages. When the network initialization is complete, after successful identity authentication by each other, secure communication paths are established between nodes and the encrypted data will be transmission through the path. The protocol integrates distributed authentication, encryption algorithm, hash check, and other security policy together. SDSDV protocol reduces the risk of malicious manipulation of routing information and ensures the safe and reliable routing between the source and destination nodes. 相似文献
996.
Qing Qian Hongxia Wang Xingming Sun Yunhe Cui Huan Wang Canghong Shi 《Telecommunication Systems》2018,67(4):635-649
With the rapid development of Internet, it brings a lot of conveniences. However, the data transmission and storage are faced with some security issues that seem to be obstacles to overcome, such as privacy protection and integrity authentication. In this paper, an efficient speech watermarking algorithm is proposed for content authentication and recovery in encrypted domain. The proposed system consists of speech encryption, watermark generation and embedding, content authentication and recovery. In the encryption process, chaotic and block cipher are combined to eliminate the positional correlation and conceal the statistical feature. In the watermark embedding process, approximation coefficients of integer wavelet transform are used to generate watermark and the detail coefficients are reserved to carry watermark. Theoretical analysis and simulation results show that the proposed scheme has high security and excellent inaudibility. Compared with previous works, the proposed scheme has strong ability to detect de-synchronization attacks and locate the corresponding tampered area without using synchronization codes. Meanwhile, the selective encryption will not influence the selective watermarking operation. Similarly, the operation of watermarking will not affect the decryption of the encrypted speech. Additionally, the tampered samples can be recovered without any auxiliary watermark information. 相似文献
997.
998.
数字家庭网络发展分析 总被引:4,自引:0,他引:4
随着宽带接入业务、智能家电等电子产品的普及以及用户对家庭电子产品的监控和资源共享需求的上升,数字家庭网络的概念和应用受到电信运营业和IT、家电产业的关注.本文介绍了不同行业对数字家庭网络概念的理解,对数字家庭网络相关的关键技术发展现状进行了分析,并总结了目前国际上数字家庭网络的市场发展现状. 相似文献
999.
本项目打破传统的虚拟"车间式教学"模式,将我校模具设计与制造技术的专业核心课——《冲压工艺与模具设计》的教育基地定在长春市一汽模具制造有限公司,进行现地现物教学。根据岗位职业能力需求,与企业共同制定课程标准。将专业课程与企业的生产任务深入融合,形成产教融合,工学结合的教学模式。 相似文献
1000.
传统的小型漏电保护期没有故障自检功能,即使产品出现问题也没有告警。在这种情况下,如果真的有了漏电故障,就可能造成人身伤害,设备故障或者火灾。本设计利用常用的逻辑器件实现自动检测产品出现的故障功能,并给出故障报警。故障检测包括脱扣线圈检测,机械故障检测和内部的直流电源电路检测。 相似文献