全文获取类型
收费全文 | 61150篇 |
免费 | 6101篇 |
国内免费 | 3382篇 |
专业分类
电工技术 | 4105篇 |
技术理论 | 2篇 |
综合类 | 4505篇 |
化学工业 | 9486篇 |
金属工艺 | 3730篇 |
机械仪表 | 4285篇 |
建筑科学 | 5124篇 |
矿业工程 | 1885篇 |
能源动力 | 1643篇 |
轻工业 | 4283篇 |
水利工程 | 1395篇 |
石油天然气 | 3148篇 |
武器工业 | 620篇 |
无线电 | 7600篇 |
一般工业技术 | 6769篇 |
冶金工业 | 2695篇 |
原子能技术 | 722篇 |
自动化技术 | 8636篇 |
出版年
2024年 | 304篇 |
2023年 | 1153篇 |
2022年 | 2223篇 |
2021年 | 2967篇 |
2020年 | 2250篇 |
2019年 | 1757篇 |
2018年 | 1838篇 |
2017年 | 2216篇 |
2016年 | 1946篇 |
2015年 | 2862篇 |
2014年 | 3500篇 |
2013年 | 4147篇 |
2012年 | 4404篇 |
2011年 | 4910篇 |
2010年 | 4292篇 |
2009年 | 4170篇 |
2008年 | 4089篇 |
2007年 | 3605篇 |
2006年 | 3316篇 |
2005年 | 2660篇 |
2004年 | 1703篇 |
2003年 | 1359篇 |
2002年 | 1279篇 |
2001年 | 1157篇 |
2000年 | 985篇 |
1999年 | 981篇 |
1998年 | 796篇 |
1997年 | 659篇 |
1996年 | 625篇 |
1995年 | 560篇 |
1994年 | 448篇 |
1993年 | 357篇 |
1992年 | 240篇 |
1991年 | 216篇 |
1990年 | 146篇 |
1989年 | 117篇 |
1988年 | 96篇 |
1987年 | 58篇 |
1986年 | 53篇 |
1985年 | 33篇 |
1984年 | 23篇 |
1983年 | 27篇 |
1982年 | 21篇 |
1981年 | 16篇 |
1980年 | 21篇 |
1979年 | 12篇 |
1976年 | 4篇 |
1967年 | 3篇 |
1959年 | 3篇 |
1951年 | 6篇 |
排序方式: 共有10000条查询结果,搜索用时 40 毫秒
991.
992.
为了满足数字通信及其他商业应用的需求,语音压缩编码技术得到迅速发展。近年来主流的低速率语音编码方案主要基于LPC-10,混合激励线性预测(MELP),多带激励编码(MBE),正弦变换编码(SCI),波形内插编码(WI)。大多都工作在2.4kb/s速率下。作为一种重要的低速率语音编码算法。MELP算法对LPC-10编码方案进行大量改进,引入混合激励,非周期脉冲,残差付氏幅度谱,脉冲散布和自适应谱滤波5个特征。实验结果表明,该混合激励线性预测编码在2.4kb/s上得到了更好的合成语音,并使得合成语音能更好地拟合自然语音。 相似文献
993.
用于白癜风治疗的308nm XeCl准分子激光系统 总被引:1,自引:0,他引:1
研制了一台用于白癜风治疗的308nm XeCl准分子激光系统。根据准分子激光器脉冲式放电的特点,设计了推挽式脉冲开关电源。实验研究了激光器脉冲重复频率、工作电压、气体寿命对激光输出能量的影响,并检测了激光输出脉冲能量的稳定性。通过自动反馈控制系统调整激光头放电工作电压实现输出激光能量的稳定。激光采用扩展型紫外液芯光纤传导,得到均匀性良好的治疗光斑,液芯光纤对308nm激光的传输效率约为70%。激光器脉冲重复频率1~200Hz,工作电压18~25kV,输出能量不稳定度小于4%。经光纤输出用于治疗的有效光斑直径22mm,脉冲能量密度2~3mJ/cm2。 相似文献
994.
995.
在介绍IPv6发展演进趋势的基础上,从业务透传、业务感知、IPv6协议栈支持等方面介绍了FTTx系统的IPv6改造阶段,最后给出了烽火通信FTTx系统IPv6的解决方案。 相似文献
996.
Liang Dong 《Wireless Networks》2012,18(8):949-965
In delay-tolerant mobile ad hoc networks, motion of network nodes, network sparsity and sporadic density can cause a lack of guaranteed connectivity. These networks experience significant link delay and their routing protocols must take a store-and-forward approach. In this paper, an opportunistic routing protocol is proposed, along with its compatible media access control, for non-real-time services in delay-tolerant networks. The scheme is mobility-aware such that each network node needs to know its own position and velocity. The media access control employs a four-fold handshake procedure to probe the wireless channel and cooperatively prioritize candidate nodes for packet replication. It exploits the broadcast characteristic of the wireless medium to utilize long-range but unreliable links. The routing process seizes opportunities of node contacts for data delivery. It takes a multiple-copy approach that is adaptive with node movements. Numerical results in mobile ad hoc networks and vehicular ad hoc networks show superior performance of the proposed protocol compared with other routing protocols. The mobility-aware media access control and routing scheme exhibits relatively small packet delivery delay and requires a modest amount of total packet replications/transmissions. 相似文献
997.
YIN Liang YIN Si-xing WANG Shuai ZHANG Er-qing HONG Wei-jun LIShu-fang 《中国邮电高校学报(英文版)》2012,19(3):122-128
Due to the usable frequency becomes more and more crowed,dynamic spectrum access (DSA) is a new hope to solve this problem.However,DSA in China requires a quantitative analysis of the current spectrum ... 相似文献
998.
In order to establish covert wireless communication in Rayleigh fading environment with noise uncertainty,a scheme of downlink covert wireless communication based on complex Gaussian random coding and beam forming was adopted,and more importantly,the performance of covert wireless communication was analysed.Firstly,the covert probability of communication was analyzed by using the hypothesis test theory.Secondly,the optimal detection threshold of the illegal detection party was given and proved,and the closed expressions of the average covert probability,connection interruption probability and covert throughput of the system were further obtained.Finally,by jointly designing the transmission power and target covert rate,the optimal goal of the maximum covert throughput of the system was achieved,and the corresponding algorithm based on step search was given.The simulation results show that the beam forming technology could provide some gain for covert wireless communication.Compared with the ideal case in which the legitimate receiver is not affected by the noise uncertainty,the covert throughput in non-ideal case is significantly reduced and almost not affected by the basic noise level of the environment. 相似文献
999.
Ad hoc wireless network traffic-self-similarity and forecasting 总被引:3,自引:0,他引:3
Qilian Liang 《Communications Letters, IEEE》2002,6(7):297-299
Lots of works have been carried out to discuss the self-similarity of Ethernet and World Wide Web traffic. In this letter, we study the ad hoc wireless network traffic collected in an ad hoc network (AHN) testbed and show that the ad hoc wireless network traffic is self-similar, which validates that AHN traffic is forecastable because self-similar time-series can be forecasted. We apply a fuzzy logic system to ad hoc wireless network traffic forecasting and simulation results show that it performs much better than does an LMS adaptive filter. All these studies are very important for evaluating network capacity and determining the battery power mode based on the forecasted traffic workload 相似文献
1000.