全文获取类型
收费全文 | 1571624篇 |
免费 | 28726篇 |
国内免费 | 9880篇 |
专业分类
电工技术 | 34304篇 |
技术理论 | 16篇 |
综合类 | 10282篇 |
化学工业 | 241534篇 |
金属工艺 | 62231篇 |
机械仪表 | 50941篇 |
建筑科学 | 46868篇 |
矿业工程 | 12255篇 |
能源动力 | 41644篇 |
轻工业 | 128405篇 |
水利工程 | 16848篇 |
石油天然气 | 33331篇 |
武器工业 | 1292篇 |
无线电 | 173890篇 |
一般工业技术 | 287500篇 |
冶金工业 | 290541篇 |
原子能技术 | 29396篇 |
自动化技术 | 148952篇 |
出版年
2022年 | 11909篇 |
2021年 | 17419篇 |
2020年 | 13273篇 |
2019年 | 14781篇 |
2018年 | 22498篇 |
2017年 | 22909篇 |
2016年 | 23651篇 |
2015年 | 18987篇 |
2014年 | 28743篇 |
2013年 | 74835篇 |
2012年 | 43876篇 |
2011年 | 58413篇 |
2010年 | 47365篇 |
2009年 | 52013篇 |
2008年 | 53067篇 |
2007年 | 52352篇 |
2006年 | 47185篇 |
2005年 | 42676篇 |
2004年 | 39360篇 |
2003年 | 38648篇 |
2002年 | 37441篇 |
2001年 | 35934篇 |
2000年 | 34224篇 |
1999年 | 36176篇 |
1998年 | 84602篇 |
1997年 | 61043篇 |
1996年 | 48207篇 |
1995年 | 36534篇 |
1994年 | 32608篇 |
1993年 | 31668篇 |
1992年 | 23229篇 |
1991年 | 22026篇 |
1990年 | 21536篇 |
1989年 | 20931篇 |
1988年 | 20015篇 |
1987年 | 17797篇 |
1986年 | 17418篇 |
1985年 | 20139篇 |
1984年 | 18496篇 |
1983年 | 17044篇 |
1982年 | 15806篇 |
1981年 | 16044篇 |
1980年 | 15208篇 |
1979年 | 14928篇 |
1978年 | 14618篇 |
1977年 | 17533篇 |
1976年 | 23666篇 |
1975年 | 12900篇 |
1974年 | 12272篇 |
1973年 | 12289篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Results from applying the model on a sample of contractors, the majority of whom were international and operating in Egypt, reinforces the credibility of the developed methodology, claim the authors. 相似文献
992.
Graham A. Jullien Wenzhe Luo Neil M. Wigley 《The Journal of VLSI Signal Processing》1996,14(2):207-220
This paper discusses strategies for implementing DSP systems using residue replication. The theory, recently introduced by two of the authors, uses formal polynomial ring mappings, from binary representations, to direct product ring implementation of integer processing arrays. The mapping produces completely independent computational arrays each computing over the same ring. This paper describes an architecture and processing array to implement, and take advantage of, the special computational ring structures that result from the mapping. A brief review of the theory and mapping techniques, is followed by the discussion of the architecture and VLSI design of an efficient inner product processing array using Fermat Primes. 相似文献
993.
994.
We investigate the error probability bit error rate (BER) of minimum shift keying (MSK) modulation with differential detection in a two-path fading channel without noise (error floor). We develop a new method for the computation of the BER: we show that errors occur if the phasors of the instantaneous impulse response fall into certain regions of the complex plane; then we average over the statistics of the phasors to arrive at the mean BER. With this method, we derive analytical expressions for the BER for arbitrary amplitude statistics of the paths. For the special case of two Rayleigh-fading paths with small delay, we find that the BER is proportional to the square of the mean delay spread (normalized to the bit length) if we sample between the two pulses. This proves the qualitative behavior of previous estimates, but our results allow also a more exact quantitative formulation. The quadratic dependence of the BER on the delay spread breaks down if we have one Rayleigh-fading and one Rician-fading path. We find that the bit combinations 1-11 and -11-1 do not lead to errors in the two-path model. However, additional Monte Carlo simulations show that these bit combinations do lead to errors in a three-path model 相似文献
995.
996.
The authors present a brief history of the development of the Ilizarov external fixator, and the classic uses associated with it. A preliminary study of 3 patients using 56 frames is presented. The Ilizarov external fixator is successfully used in these cases in place of traditional fixation. 相似文献
997.
Dynamic Programming (DP) applies to many signal and image processing applications including boundary following, the Viterbi algorithm, dynamic time warping, etc. This paper presents an array processor implementation of generic dynamic programming. Our architecture is a SIMD array attached to a host computer. The processing element of the architecture is based on an ASIC design opting for maximum speed-up. By adopting a torus interconnection network, a dual buffer structure, and a multilevel pipeline, the performance of the DP chip is expected to reach the order of several GOPS. The paper discusses both the dedicated hardware design and the data flow control of the DP chip and the total array.This work was supported in part by the NATO, Scientific and Environmental Affairs Division, Collaborative Research Grant SA.5-2-05(CRG.960201)424/96/JARC-501. 相似文献
998.
Large signal analysis of the LCC-type parallel resonant converterusing discrete time domain modeling
A discrete time domain model for the LCC-type parallel resonant power converter has been derived. This model has been used to predict the large signal behavior of the power converter. The peak component stresses and the dynamic response of the key state variables, as obtained from the large signal analysis, using PRO-MATLAB software are plotted. SPICE results are included to verify the analytical results. Experimental results are also presented to verify the theory 相似文献
999.
Design of four Solar Ovens, box type, are described. All materials used in the latest design are locally available. This is one of the basis of considerations in designing beside simplicity and long life time. Solar oven of the latest design yielded 160°C without load and 50 units have been field tested in West Lombok regency since July 1995. Its cooking ability, materials used, size and shape, social acceptance and further activities are described. 相似文献
1000.
The author reviews encryption algorithms and standards, how they compare, how they differ, and where they are headed. Attention is given to secret-key cryptosystems, public-key cryptosystems, digital signature schemes, key-agreement algorithms, cryptographic hash functions, and authentication codes. Applications considered are secure electronic mail, secure communications, directory authentication and network management, banking, and escrowed encryption 相似文献