全文获取类型
收费全文 | 9786篇 |
免费 | 723篇 |
国内免费 | 100篇 |
专业分类
电工技术 | 128篇 |
综合类 | 30篇 |
化学工业 | 2134篇 |
金属工艺 | 189篇 |
机械仪表 | 368篇 |
建筑科学 | 209篇 |
矿业工程 | 36篇 |
能源动力 | 572篇 |
轻工业 | 1029篇 |
水利工程 | 107篇 |
石油天然气 | 72篇 |
武器工业 | 1篇 |
无线电 | 1210篇 |
一般工业技术 | 2222篇 |
冶金工业 | 619篇 |
原子能技术 | 111篇 |
自动化技术 | 1572篇 |
出版年
2024年 | 47篇 |
2023年 | 267篇 |
2022年 | 606篇 |
2021年 | 1009篇 |
2020年 | 614篇 |
2019年 | 685篇 |
2018年 | 687篇 |
2017年 | 577篇 |
2016年 | 570篇 |
2015年 | 378篇 |
2014年 | 464篇 |
2013年 | 762篇 |
2012年 | 453篇 |
2011年 | 533篇 |
2010年 | 331篇 |
2009年 | 284篇 |
2008年 | 236篇 |
2007年 | 214篇 |
2006年 | 147篇 |
2005年 | 105篇 |
2004年 | 97篇 |
2003年 | 104篇 |
2002年 | 77篇 |
2001年 | 60篇 |
2000年 | 58篇 |
1999年 | 75篇 |
1998年 | 171篇 |
1997年 | 137篇 |
1996年 | 110篇 |
1995年 | 89篇 |
1994年 | 67篇 |
1993年 | 66篇 |
1992年 | 44篇 |
1991年 | 49篇 |
1990年 | 36篇 |
1989年 | 36篇 |
1988年 | 28篇 |
1987年 | 34篇 |
1986年 | 34篇 |
1985年 | 36篇 |
1984年 | 29篇 |
1983年 | 31篇 |
1982年 | 16篇 |
1981年 | 16篇 |
1980年 | 12篇 |
1979年 | 11篇 |
1978年 | 18篇 |
1977年 | 20篇 |
1976年 | 23篇 |
1972年 | 8篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
991.
在许多不同的民用和军用领域,调制样式自动分类都是一个非常有趣的问题。本文提出了一种基于K个最近邻点(K-Nearest Neighbor,KNN)的遗传程序(Genetic Programming,GP)算法。该算法采用了基于K个最近邻点的遗传程序,用来识别BPSK、QPSK、16QAM和64QAM调制信号。该算法用高阶累积量作为输入特征,并使用一种分两个阶段的分类方法来改善分类精度。计算机仿真将所提出算法与已有的算法进行了比较,从而证明了该算法的优异性能。 相似文献
992.
In this paper, several simple and efficient sign based normalized adaptive filters, which are computationally superior having multiplier free weight update loops are used for cancelation of noise in electrocardiographic (ECG) signals. The proposed implementation is suitable for applications such as biotelemetry, where large signal to noise ratios with less computational complexity are required. These schemes mostly employ simple addition, shift operations and achieve considerable speed up over the other least mean square (LMS) based realizations. Simulation studies shows that the proposed realization gives better performance compared to existing realizations in terms of signal to noise ratio and computational complexity. 相似文献
993.
Muhammad Taufiq Mohd Fikri Azli bin Abdullah Deokjai Choi 《Wireless Personal Communications》2011,60(3):431-440
In a wide area campus, a university provides Wireless Local Area Network (WLAN) for users to connect to the Internet. Most
users take advantage of this WLAN benefit by using their laptops. However, the number of smart phone users is growing fast.
Since a smart phone is able to get an Internet connection using WLAN, users can use their smart phones without having to pay
for a cellular operator. Users tend to use their smart phones more, due to their higher mobility compared to a laptop. This
capability enables new services in the market, such as Fixed-Mobile Convergence (FMC), which integrates a fixed network (traditional
telephony, WLAN) and a mobile network (cellular) to provide seamless voice communications anytime, anywhere. These new applications
require a WLAN connection availability nearly everywhere. However, due to limited budgets, a university can only install APs
in places with a high connection demand. We propose a novel WLAN AP placement technique that takes user mobility into consideration.
This new approach is more complete than previous approaches, which mainly focus on coverage area and throughput data. Our
technique has been implemented in our university. The results show the suitability of the WLAN access point locations in our
university campus based on user mobility and activities. 相似文献
994.
The effects of doping of MgAl2O4 by a binary mixture of Co and Zn ions on the absorbance, electrical resistivity, capacitance, thermal conductivity, heat capacity and thermal diffusivity are reported in this paper. The materials with the nominal composition Mg1−2x(Co,Zn)xAl2O4 (x = 0.0-0.5) are synthesized by solution combustion synthesis assisted by microwave irradiation. The substituted spinels are produced with a Scherrer crystallite size of 18-23 nm, as opposed to 45 nm for undoped samples, indicated by X-ray diffraction and confirmed by transmission electron microscopy. These materials also show better thermal stability in the temperature range of 298-1773 K. Three strong absorption bands at 536, 577 and 630 nm are observed for the doped samples which are attributed to the three spin allowed (4A2 (F) → 4T1 (P)) electronic transitions of Co2+ at tetrahedral lattice sites while pure magnesium aluminate remains transparent in the whole spectral range. The semiconducting behavior of the materials is evident from the temperature dependence of the electrical resistivity. Resistivity and activation energy are higher for the substituted samples. Fitting of the resistivity data is achieved according to the hopping polaron model of solids. Both dielectric constant and loss increase on account of doping. The dielectric data are explained on the basis of space charge polarization. The thermal conductivity and diffusivity are lowered and the heat capacity is increased in the doped materials. Wiedemann-Franz's law is used to compute the electronic and lattice contributions towards the total thermal conductivity. 相似文献
995.
Diabetic macular edema(DME)is a retinal thickening involving the center of the macula.It is one of the serious eye diseases which affects the central vision and can lead to partial or even complete visual loss.The only cure is timely diagnosis,prevention,and treatment of the disease.This paper presents an automated system for the diagnosis and classification of DME using color fundus image.In the proposed technique,first the optic disc is removed by applying some preprocessing steps.The preprocessed image is then passed through a classifier for segmentation of the image to detect exudates.The classifier uses dynamic thresholding technique by using some input parameters of the image.The stage classification is done on the basis of an early treatment diabetic retinopathy study(ETDRS)given criteria to assess the severity of disease.The proposed technique gives a sensitivity,specificity,and accuracy of 98.27%,96.58%,and 96.54%,respectively on publically available database. 相似文献
996.
997.
998.
Mobile WiMAX is a 3rd generation broadband wireless technology that enables the convergence of mobile and fixed broadband networks through a wide area radio-access. Since January 2007, the IEEE 802.16 working group has been developing a new amendment the IEEE 802.16 standard i.e. IEEE 802.16 m as an advanced air interface to meet the requirements of ITU-R/IMT-Advanced for 4G systems. The mobile WiMAX air interface adopts orthogonal frequency division multiple access (OFDMA) as multiple access technique for its uplink and downlink to improve signal performance affected by multipath distortion. All OFDMA based networks, including mobile WiMAX, experience the problem of high peak-to-average power ratio (PAPR). This paper presents a discrete-sine-transform precoding technique based random-interleaved OFDMA (RI-OFDMA) uplink system for PAPR reduction in mobile WiMAX. The PAPR of proposed system is analyzed with root-raised-cosine pulse shaping filter to keep out of band radiation low and to fulfill the spectrum mask requirements. Simulation results show that, the proposed system has low PAPR compared to the Hadamard transform precoded RI-OFDMA uplink systems and the conventional RI-OFDMA uplink systems. 相似文献
999.
Muhammad Nasir Mumtaz Bhutta Haitham S. Cruickshank Zhili Sun 《Wireless Networks》2014,20(6):1597-1609
In the past, security protocols including key transport protocols are designed with the assumption that there are two parties communication with each other and an adversary tries to intercept this communication. In Delay/Disruption Tolerant Networking (DTN), packet delivery relies on intermediate parties in the communication path to store and forward the packets. DTN security architecture requires that integrity and authentication should be verified at intermediate nodes as well as at end nodes and confidentiality should be maintained for end communicating parties. This requires new security protocols and key management to be defined for DTN as traditional end-to-end security protocols will not work with DTN. To contribute towards solving this problem, we propose a novel Efficient and Scalable Key Transport Scheme (ESKTS) to transport the symmetric key generated at a DTN node to other communicating body securely using public key cryptography and proxy signatures. It is unique effort to design a key transport protocol in compliance with DTN architecture. ESKTS ensures that integrity and authentication is achieved at hop-by-hop level as well as end-to-end level. It also ensures end-to-end confidentiality and freshness for end communicating parties. This scheme provides a secure symmetric key transport mechanism based on public key cryptography to exploit the unique bundle buffering characteristics of DTN to reduce communication and computation cost . 相似文献
1000.
Cryptanalysis and improvement of ‘a robust smart‐card‐based remote user password authentication scheme’ 下载免费PDF全文
Saru Kumari Muhammad Khurram Khan 《International Journal of Communication Systems》2014,27(12):3939-3955
With the use of smart card in user authentication mechanisms, the concept of two‐factor authentication came into existence. This was a forward move towards more secure and reliable user authentication systems. It elevated the security level by requiring a user to possess something in addition to know something. In 2010, Sood et al. and Song independently examined a smart‐card‐based authentication scheme proposed by Xu et al. They showed that in the scheme of Xu et al., an internal user of the system can turn hostile to impersonate other users of the system. Both of them also proposed schemes to improve the scheme of Xu et al. Recently, Chen et al. identified some security problems in the improved schemes proposed by Sood et al. and Song. To fix these problems, Chen et al. presented another scheme, which they claimed to provide mutual authentication and withstand lost smart card attack. Undoubtedly, in their scheme, a user can also verify the legitimacy of server, but we find that the scheme fails to resist impersonation attacks and privileged insider attack. We also show that the scheme does not provide important features such as user anonymity, confidentiality to air messages, and revocation of lost/stolen smart card. Besides, the scheme defies the very purpose of two‐factor security. Furthermore, an attacker can guess a user's password from his or her lost/stolen smart card. To meet these challenges, we propose a user authentication method with user anonymity. We show through analysis and comparison that the proposed scheme exhibits enhanced efficiency in contrast to related schemes, including the scheme of Chen et al. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献