首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   195068篇
  免费   18276篇
  国内免费   11652篇
电工技术   14126篇
技术理论   7篇
综合类   15765篇
化学工业   29342篇
金属工艺   11661篇
机械仪表   12631篇
建筑科学   15684篇
矿业工程   6003篇
能源动力   5456篇
轻工业   15557篇
水利工程   4556篇
石油天然气   10201篇
武器工业   1821篇
无线电   22174篇
一般工业技术   21109篇
冶金工业   8638篇
原子能技术   2973篇
自动化技术   27292篇
  2024年   1008篇
  2023年   3185篇
  2022年   6144篇
  2021年   8270篇
  2020年   6265篇
  2019年   4948篇
  2018年   5393篇
  2017年   6177篇
  2016年   5310篇
  2015年   7871篇
  2014年   9713篇
  2013年   11619篇
  2012年   13415篇
  2011年   14291篇
  2010年   13092篇
  2009年   12517篇
  2008年   12327篇
  2007年   11919篇
  2006年   11368篇
  2005年   9409篇
  2004年   7008篇
  2003年   6309篇
  2002年   6432篇
  2001年   5819篇
  2000年   4698篇
  1999年   3991篇
  1998年   2962篇
  1997年   2486篇
  1996年   2294篇
  1995年   1991篇
  1994年   1582篇
  1993年   1128篇
  1992年   936篇
  1991年   733篇
  1990年   540篇
  1989年   489篇
  1988年   384篇
  1987年   266篇
  1986年   182篇
  1985年   114篇
  1984年   81篇
  1983年   64篇
  1982年   74篇
  1981年   56篇
  1980年   56篇
  1979年   26篇
  1978年   4篇
  1965年   5篇
  1959年   25篇
  1951年   13篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
介绍了座舱LCD器件的军事应用,并对这类器件的一些技术动态作了说明。  相似文献   
992.
基于支持多级业务的多码CDMA系统,本文设计了一种适合于多级业务接入的两层控制方案,借助于该方案,实时业务用户一旦被接纳就立刻进行通信,而非实时数据用户的通信过程要受到呼叫层和突发层双重的皎皎接入控制,这样,前者的QoS能够得到保证,而后者则可以充分利用网络暂时闲置的信道容量。  相似文献   
993.
RCE光电探测器顶部DBR的优化   总被引:2,自引:4,他引:2  
对研制的 VCSEL 结构外延片制成的谐振腔增强型 (简称 RCE)光电探测器进行了物理分析和实验研究 ,由于 VCSEL 与 RCE光电探测器对谐振腔反射镜的反射率要求不同 ,通过腐蚀 VCSEL 器件顶部 DBR,改变顶镜反射率 ,能够得到量子效率峰值和半宽优化兼容的 RCE光电探测器 ,实现 VCSEL 与 RCE探测器的单片集成 .  相似文献   
994.
垂直排列一扭曲向列液晶显示的阈值特性   总被引:1,自引:3,他引:1  
从液晶体系的总自由能出发,通过欧拉-拉格朗日方程组的推导,得到了手性向列相液晶从垂直排列状态转变成平面扭曲排列时的Freedericksz转变阈值电压公式Vth=π×  相似文献   
995.
使用小波变换的MPSK信号调制类型识别   总被引:4,自引:0,他引:4  
信号的数字调制类型识别在电子战、电子侦察和威胁告警等领域有广泛的应用前景.本文对小波变换应用于MPSK信号的调制类型识别进行了研究,并提出了一种基于小波变换的提取MPSK信号相位信息的方法.通过对相位信息进行统计处理,可以有效地识别MPSK信号的调制类型.计算机仿真结果表明本文所述方法的有效性和正确性.  相似文献   
996.
Finding a disjoint path pair is an important component in survivable networks. Since the traffic is carried on the active (working) path most of the time, it is useful to find a disjoint path pair such that the length of the shorter path (to be used as the active path) is minimized. In this paper, we first address such a Min-Min problem. We prove that this problem is NP-complete in either single link cost (e.g., dedicated backup bandwidth) or dual link cost (e.g., shared backup bandwidth) networks. In addition, it is NP-hard to obtain a K-approximation to the optimal solution for any K>1. Our proof is extended to another open question regarding the computational complexity of a restricted version of the Min-Sum problem in an undirected network with ordered dual cost links (called the MSOD problem). To solve the Min-Min problem efficiently, we introduce a novel concept called conflicting link set which provides insights into the so-called trap problem, and develop a divide-and-conquer strategy. The result is an effective heuristic for the Min-Min problem called COnflicting Link Exclusion (COLE), which can outperform other approaches in terms of both the optimality and running time. We also apply COLE to the MSOD problem to efficiently provide shared path protection and conduct comprehensive performance evaluation as well as comparison of various schemes for shared path protection. We show that COLE not only processes connection requests much faster than existing integer linear programming (ILP)-based approaches but also achieves a good balance among the active path length, bandwidth efficiency, and recovery time.  相似文献   
997.
We consider a special growth-curve (SGC) model with a known steering matrix and generalized waveform in the presence of unknown interference and noise. Several estimators of the complex amplitude based on this model are derived, including the methods of approximate maximum likelihood (AML), minimum variance distortionless response (MVDR), and amplitude and phase estimation (APES). We analyze the statistical properties of these estimators and show that in the presence of temporally white but spatially correlated noise and interference, AML is asymptotically statistically efficient for a large snapshot number while MVDR and APES are asymptotically equivalent but not statistically efficient. Via several numerical examples, we also show that when the noise and interference are both spatially and temporally correlated, the APES estimator can achieve better estimation accuracy and exhibit greater robustness than the other methods.  相似文献   
998.
Jamming sensor networks: attack and defense strategies   总被引:1,自引:0,他引:1  
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduct radio interference, or jamming, attacks that effectively cause a denial of service of either transmission or reception functionalities. These attacks can easily be accomplished by an adversary by either bypassing MAC-layer protocols or emitting a radio signal targeted at jamming a particular channel. In this article we survey different jamming attacks that may be employed against a sensor network. In order to cope with the problem of jamming, we discuss a two-phase strategy involving the diagnosis of the attack, followed by a suitable defense strategy. We highlight the challenges associated with detecting jamming. To cope with jamming, we propose two different but complementary approaches. One approach is to simply retreat from the interferer which may be accomplished by either spectral evasion (channel surfing) or spatial evasion (spatial retreats). The second approach aims to compete more actively with the interferer by adjusting resources, such as power levels and communication coding, to achieve communication in the presence of the jammer.  相似文献   
999.
Global synchronization and asymptotic stability of complex dynamical networks are investigated in this paper. Based on a reference state, a sufficient condition for global synchronization and stability is derived. Unlike other approaches where only local results were obtained, the complex network is not linearized in this paper. Instead, the sufficient condition for the global synchronization and asymptotical stability is obtained here by introducing a reference state with the Lyapunov stability theorem rather than the Lyapunov exponents, and this condition is simply given in terms of the network coupling matrix therefore is very convenient to use. Furthermore, the developed technique is applied to networks consisting of nodes with unknown but bounded nonlinear functions. A typical example of a complex network with chaotic nodes is finally used to verify the theoretical results and the effectiveness of the proposed synchronization scheme.  相似文献   
1000.
介绍了正在编写的《电工学习题精解》一书的内容结构、主要特色及编写思路。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号