首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   840242篇
  免费   12457篇
  国内免费   2479篇
电工技术   15006篇
综合类   849篇
化学工业   126973篇
金属工艺   30200篇
机械仪表   23633篇
建筑科学   22039篇
矿业工程   2988篇
能源动力   22813篇
轻工业   78883篇
水利工程   7562篇
石油天然气   10792篇
武器工业   53篇
无线电   98909篇
一般工业技术   157648篇
冶金工业   165643篇
原子能技术   14383篇
自动化技术   76804篇
  2021年   7354篇
  2020年   5426篇
  2019年   6703篇
  2018年   11361篇
  2017年   11220篇
  2016年   11884篇
  2015年   8624篇
  2014年   13909篇
  2013年   39788篇
  2012年   22744篇
  2011年   31136篇
  2010年   24380篇
  2009年   27112篇
  2008年   28353篇
  2007年   28107篇
  2006年   24745篇
  2005年   22686篇
  2004年   21824篇
  2003年   21469篇
  2002年   20436篇
  2001年   20216篇
  2000年   18793篇
  1999年   20058篇
  1998年   51154篇
  1997年   36162篇
  1996年   27822篇
  1995年   21181篇
  1994年   18570篇
  1993年   18121篇
  1992年   12979篇
  1991年   12376篇
  1990年   11934篇
  1989年   11582篇
  1988年   10911篇
  1987年   9489篇
  1986年   9369篇
  1985年   10923篇
  1984年   10206篇
  1983年   8945篇
  1982年   8413篇
  1981年   8494篇
  1980年   8033篇
  1979年   7808篇
  1978年   7407篇
  1977年   9011篇
  1976年   12198篇
  1975年   6345篇
  1974年   6028篇
  1973年   6031篇
  1972年   4901篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
FIRE: fractal indexing with robust extensions for image databases   总被引:3,自引:0,他引:3  
As already documented in the literature, fractal image encoding is a family of techniques that achieves a good compromise between compression and perceived quality by exploiting the self-similarities present in an image. Furthermore, because of its compactness and stability, the fractal approach can be used to produce a unique signature, thus obtaining a practical image indexing system. Since fractal-based indexing systems are able to deal with the images in compressed form, they are suitable for use with large databases. We propose a system called FIRE, which is then proven to be invariant under three classes of pixel intensity transformations and under geometrical isometries such as rotations by multiples of /spl pi//2 and reflections. This property makes the system robust with respect to a large class of image transformations that can happen in practical applications: the images can be retrieved even in the presence of illumination and/or color alterations. Additionally, the experimental results show the effectiveness of FIRE in terms of both compression and retrieval accuracy.  相似文献   
82.
Self-organized public-key management for mobile ad hoc networks   总被引:6,自引:0,他引:6  
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase.  相似文献   
83.
A general theoretical model of statistical Raman crosstalk and its impact on system performance in a multiwavelength bidirectionally pumped Raman fiber amplifier (RFA) is developed for the first time, where we have taken modulation statistics, dispersion-induced pulse walk-off and signal-induced pump depletion into account. Two kinds of statistical Raman crosstalk, from signal-induced forward-pump depletion and from signal-signal Raman interaction, are included in one model. Formulas for normalized Raman crosstalk, Raman crosstalk-induced relative intensity noise spectral density, and its variance and system performance impact in terms of Q penalty are presented for both a single-span system and a dispersion-compensated multispan wavelength-division-multiplexed (WDM) link. Based on these formulas, we numerically investigate the impact of Raman crosstalk on system performance in a three-wavelengths bidirectionally pumped 40 /spl times/ 40-Gb/s WDM system for various fiber types. In addition, Raman crosstalk in a four-wavelength bidirectionally pumped RFA was experimentally measured. The results agree well with our theory.  相似文献   
84.
A series of small–capacity units has recently been constructed in regions of oil field development and crude oil and gas condensate production to satisfy the requirements for such petroleum products as naphtha, diesel fuel, kerosene, and boiler fuel and to reduce costs for delivery of these products. There are almost no data in the technical literature, particularly in periodicals, on the construction and operation of small–capacity units. We attempt to generalize the experience of Orgeneftekhimzavody Trust in this area. We hope that this experience will be useful to specialists in the development and management of small–capacity plants.  相似文献   
85.
The interference issues related to ultrawideband (UWB) radio pose tight restrictions on the maximum data rate of UWB radio telecommunication systems. A possible solution is to reduce the required signal to interference ratio (SIR) that gives satisfactory performance to the UWB system. In this letter, we propose coded M-ary UWB radio communication systems. Two classes of convolutional codes, namely, low-rate superorthogonal codes and high-rate punctured codes are considered for this purpose. Simulation results on the bit error rate of the proposed system indicates that the system is capable to work in lower SIR's and therefore supports higher data transmission rates in a real interference environment compared to the previously proposed UWB communication systems.  相似文献   
86.
Reducible rank codes and their applications to cryptography   总被引:2,自引:0,他引:2  
We present a new family of so-called reducible rank codes which are a generalization of rank product codes . This family includes maximal rank distance (MRD) codes for lengths n>N in the field F/sub N/. We give methods for encoding and decoding reducible rank codes. A public key cryptosystem based on these codes and on the idea of a column scrambler is proposed. The column scrambler "mixes" columns of a generator (parity-check) matrix of a code. It makes the system more resistant to structural attacks such as Gibson's attacks. Possible attacks on the system are thoroughly studied. The system is found to be secure against known attacks for public keys of about 16 kbits and greater.  相似文献   
87.
88.
This paper presents a method to obtain an electric model for transformers and inductors, including both frequency and geometry effects in the windings, which can be linked with existing core models. One-dimensional distributions for magnetic and electric fields are assumed, and from Maxwell's equations an equivalent electric circuit is easily obtained. This equivalent circuit has been included in analog simulators (Spice, AnalogWorkBench, Saber ...), and comparisons between measured and simulated results are shown, both in time domain and in AC sweep, which verify the model accuracy. The model described in this paper allows designers to deal with key issues in the design of high-frequency magnetic components (copper losses, leakage inductance, skin and proximity effects) by using analog simulators, which are usually more familiar to them than finite-element analysis tools.  相似文献   
89.
Many issues in signal processing involve the inverses of Toeplitz matrices. One widely used technique is to replace Toeplitz matrices with their associated circulant matrices, based on the well-known fact that Toeplitz matrices asymptotically converge to their associated circulant matrices in the weak sense. This often leads to considerable simplification. However, it is well known that such a weak convergence cannot be strengthened into strong convergence. It is this fact that severely limits the usefulness of the close relation between Toeplitz matrices and circulant matrices. Observing that communication receiver design often needs to seek optimality in regard to a data sequence transmitted within finite duration, we define the finite-term strong convergence regarding two families of matrices. We present a condition under which the inverses of a Toeplitz matrix converges in the strong sense to a circulant matrix for finite-term quadratic forms. This builds a critical link in the application of the convergence theorems for the inverses of Toeplitz matrices since the weak convergence generally finds its usefulness in issues associated with minimum mean squared error and the finite-term strong convergence is useful in issues associated with the maximum-likelihood or maximum a posteriori principles.  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号