全文获取类型
收费全文 | 2038篇 |
免费 | 142篇 |
国内免费 | 80篇 |
专业分类
电工技术 | 134篇 |
综合类 | 269篇 |
化学工业 | 56篇 |
金属工艺 | 76篇 |
机械仪表 | 313篇 |
建筑科学 | 62篇 |
矿业工程 | 24篇 |
能源动力 | 29篇 |
轻工业 | 22篇 |
水利工程 | 20篇 |
石油天然气 | 14篇 |
武器工业 | 33篇 |
无线电 | 283篇 |
一般工业技术 | 295篇 |
冶金工业 | 145篇 |
原子能技术 | 59篇 |
自动化技术 | 426篇 |
出版年
2024年 | 6篇 |
2023年 | 21篇 |
2022年 | 17篇 |
2021年 | 32篇 |
2020年 | 39篇 |
2019年 | 39篇 |
2018年 | 42篇 |
2017年 | 55篇 |
2016年 | 65篇 |
2015年 | 98篇 |
2014年 | 99篇 |
2013年 | 159篇 |
2012年 | 128篇 |
2011年 | 132篇 |
2010年 | 74篇 |
2009年 | 80篇 |
2008年 | 97篇 |
2007年 | 138篇 |
2006年 | 106篇 |
2005年 | 111篇 |
2004年 | 99篇 |
2003年 | 95篇 |
2002年 | 69篇 |
2001年 | 57篇 |
2000年 | 50篇 |
1999年 | 41篇 |
1998年 | 39篇 |
1997年 | 37篇 |
1996年 | 23篇 |
1995年 | 27篇 |
1994年 | 31篇 |
1993年 | 18篇 |
1992年 | 21篇 |
1991年 | 11篇 |
1990年 | 10篇 |
1989年 | 11篇 |
1988年 | 12篇 |
1987年 | 4篇 |
1986年 | 10篇 |
1985年 | 6篇 |
1983年 | 3篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1980年 | 4篇 |
1978年 | 3篇 |
1975年 | 3篇 |
1965年 | 6篇 |
1964年 | 3篇 |
1963年 | 3篇 |
1956年 | 3篇 |
排序方式: 共有2260条查询结果,搜索用时 15 毫秒
21.
衍射光学半导体激光器线阵消像散准直器系统误差分析 总被引:3,自引:0,他引:3
分析了衍射光学半导体激光器线阵消像散准直器误差的来源 ,推导了相应的计算公式 ,并对设计制作的准直器进行了误差计算与分析 ,指出减小误差的措施。 相似文献
22.
根据子空间的基本原理,提出一种新的阵列天线幅相误差校正算法,该方法利用粗略已知的校正源方位角信息进行优化,使用迭代的方法逼近幅相误差的真实值.由于不需要其他的迭代初始值,从而保证该方法能收敛到最优解.计算机仿真实验证明了该方法的有效性. 相似文献
23.
非制冷红外焦平面的非均匀性对红外系统的图像质量造成严重影响。神经网络的自适应调节性优于传统的定标校正方法,成为研究热点。但是传统的神经网络存在期望值不准确、误差函数精度不高和学习速度不适应网络变化的缺点。本文将目标像元与其4邻近像元的像素值进行比较,按偏差值的大小进行排序,再增加权系数来计算期望值;文章又分析了神经网络出现的局部极小问题,在原有的误差函数基础上引入了隐层饱和度的计算式;并提出了根据总误差值之比来调节学习速度。经仿真实验表明,新算法较好地降低了非均匀度。 相似文献
24.
Synthetic bandwidth technique is used to increase frequency bandwidth of the system and provides an effective way to achieve the ultra high resolution in the field of Synthetic Aperture Radar (SAR). But in the actual SAR system, the synthesis result will be seriously deteriorated by the inner-channel and inter-channel phase error. A frequency domain synthetic bandwidth method based on transfer function extracting technique is proposed in an actual SAR system which consists of single wideband transmit channel and 8-way down-conversion receive sub-channels. The method can accurately get the amplitude and phase characteristics of the sub-channel and compensate the amplitude-phase errors. The final experimental results demonstrate the validity and feasibility of the method and the range resolution down to 0.1 m is obtained. 相似文献
25.
研究了共相位望远镜阵列的两种重要光束耦合误差——光瞳面平移(piston)误差和光瞳面倾斜(tilt)误差。设piston误差和tilt误差都服从均值为零但标准差待定的正态分布,根据中心点亮度判据,通过迭代方法计算了piston误差和tilt误差所允许的最大标准差,揭示了这两类光束耦合误差所允许的最大标准差与子望远镜个数和遮光比的关系。Piston误差所允许的最大标准差与子望远镜的遮光比无关,但随着子望远镜个数不断增加,在0.11λ~0.08λ范围内缓慢减小。Tilt误差所允许的的最大标准差在子望远镜出瞳大小已知的情况下,随遮光比不断增加而逐渐减小,而与子望远镜个数无明显的相关性。 相似文献
26.
《Journal of Visual Communication and Image Representation》2014,25(6):1425-1431
In this paper, we present an efficient histogram shifting (HS) based reversible data hiding scheme for copyright protection of multimedia. Firstly, an improved HS based multi-layer embedding process for rhombus prediction is employed by introducing a control parameter to explore the correlation of prediction errors. A rate-distortion model for HS embedding is then developed for optimal side information selection, which is especially suitable for low payload reversible data hiding when only a single layer embedding is required. Finally, a modified location map is constructed to facilitate the compression of location map and further increase the embedding capacity. Compared with similar schemes, experimental results demonstrate the superior performance of the proposed scheme in the terms of embedding capacity and stego-image quality. 相似文献
27.
Sampling Errors for Water Resources Design: The Need for Improved Hydrometry in Developing Countries
In recent years, there has been a marked decline in the amount of hydrological data being collected in many parts of the developing world. This paper reviews some of the arguments in favour of the continued collection of hydrological data. The technical case is based on the need for long record lengths in order to obtain a reasonable estimate for the mean and variability of river flows. Estimates are presented for the dependence of the standard error on record length for the case of the main sample statistics, for reservoir design and for flood estimation. Typical values are presented both in general terms and for some specific historical time series. The current status of hydrological data collection in Africa is then contrasted with the situation in Europe before concluding with the results of several case studies of schemes in Africa and Asia whose operational performance has been affected due to insufficient hydrological data. 相似文献
28.
Dharminder Dharminder Pradeep Kumar Dadsena Pratik Gupta Sathya Sankaran 《International Journal of Satellite Communications and Networking》2023,41(1):14-28
Satellite's communication system is used to communicate under significant distance and circumstances where the other communication systems are not comfortable. Since all the data are exchanged over a public channel, so the security of the data is an essential component for the communicating parties. Both key exchange and authentication are two cryptographic tools to establish a secure communication between two parties. Currently, various kinds of authentication protocols are available to establish a secure network, but all of them depend on number–theoretical (discrete logarithm problem/factorization assumption) hard assumptions. Due to Shor's and Grover's computing algorithm number theoretic assumptions are breakable by quantum computers. Although Kumar and Garg have proposed a quantum attack-resistant protocol for satellite communication, it cannot resist stolen smart card attack. We have analyzed that how Kumar and Garg is vulnerable to the stolen smart card attack using differential power analysis attack described in He et al and Chen and Chen. We have also analyzed the modified version of signal leakage attack and sometimes called improved signal leakage attack on Kumar and Garg's protocol. We have tried to construct a secure and efficient authentication protocol for satellites communication that is secure against quantum computing. This is more efficient as it requires only three messages of exchange. This paper includes security proof and performance of the proposed authentication and key agreement protocol. 相似文献
29.
30.