全文获取类型
收费全文 | 33772篇 |
免费 | 2599篇 |
国内免费 | 1560篇 |
专业分类
电工技术 | 4452篇 |
技术理论 | 3篇 |
综合类 | 3453篇 |
化学工业 | 626篇 |
金属工艺 | 297篇 |
机械仪表 | 1496篇 |
建筑科学 | 1158篇 |
矿业工程 | 698篇 |
能源动力 | 320篇 |
轻工业 | 488篇 |
水利工程 | 324篇 |
石油天然气 | 439篇 |
武器工业 | 371篇 |
无线电 | 11027篇 |
一般工业技术 | 1382篇 |
冶金工业 | 1061篇 |
原子能技术 | 139篇 |
自动化技术 | 10197篇 |
出版年
2024年 | 83篇 |
2023年 | 317篇 |
2022年 | 549篇 |
2021年 | 751篇 |
2020年 | 791篇 |
2019年 | 530篇 |
2018年 | 553篇 |
2017年 | 791篇 |
2016年 | 942篇 |
2015年 | 1246篇 |
2014年 | 2170篇 |
2013年 | 1870篇 |
2012年 | 2567篇 |
2011年 | 2743篇 |
2010年 | 2033篇 |
2009年 | 1897篇 |
2008年 | 2148篇 |
2007年 | 2335篇 |
2006年 | 2212篇 |
2005年 | 2039篇 |
2004年 | 1702篇 |
2003年 | 1735篇 |
2002年 | 1180篇 |
2001年 | 1005篇 |
2000年 | 737篇 |
1999年 | 651篇 |
1998年 | 417篇 |
1997年 | 380篇 |
1996年 | 339篇 |
1995年 | 284篇 |
1994年 | 217篇 |
1993年 | 129篇 |
1992年 | 91篇 |
1991年 | 56篇 |
1990年 | 39篇 |
1989年 | 54篇 |
1988年 | 38篇 |
1987年 | 14篇 |
1986年 | 14篇 |
1985年 | 21篇 |
1984年 | 28篇 |
1983年 | 17篇 |
1982年 | 22篇 |
1981年 | 14篇 |
1979年 | 14篇 |
1977年 | 14篇 |
1964年 | 13篇 |
1959年 | 11篇 |
1956年 | 12篇 |
1955年 | 13篇 |
排序方式: 共有10000条查询结果,搜索用时 689 毫秒
11.
针对空空宽带高速通信的需求,设计了小型化机载激光通信系统。仿真分析了300 km、2.5 Gb/s无线激光链路性能,并通过运动仿真台模拟机动环境测试了系统的跟踪与通信性能,其中粗跟踪误差为533.2 μrad(1σ),精跟踪误差为3.6 μrad(1σ),测试数据传输240 s,通信误码率为2.82×10-9。仿真与实验验证了该系统用于远距离空空无线激光通信的可行性。 相似文献
12.
In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one bit secret information. Given our using state is much easier to prepare for multiqubit states and our protocol needs less measurement resource, it makes this protocol more convenient from an applied point of view. 相似文献
13.
以用户为中心的可见光通信协作传输是近年来出现的新架构,这导致虚拟小区之间出现重叠。为避免导频污染问题,每个虚拟小区中的光接入点(AP)或者虚拟小区中选择相同AP的用户发送的训练序列应该是正交的。针对可见光通信中以用户为中心的协作网络,研究训练资源的正交分配问题,提出了一种新的导频分配算法,联合导频分配和用户选择问题,以期最大限度地增加虚拟小区内可被接入的用户数。分析和仿真结果表明,该导频分配方案可以有效改善导频污染问题,提高训练资源利用率,并且相比已有的导频分配方案,性能有所改进。 相似文献
14.
针对煤矿发生事故后传统救援监控系统无法实时对井下人员进行动态定位,导致矿井救援盲目性大、救援效率差、救援难度大等技术难题,为了进一步提高煤矿救援效率,通过技术研究,设计了一套以通信基站为核心的智能化救援监控系统,分析了该系统结构组成、工作原理,通过在担水沟煤矿井下实际应用效果来看,智能化救援监控系统对人员定位精准度达95%,实现人员动态位置三维成像,救援效率提高至80%以上,有效缩短了煤矿事故救援时间,取得了显著应用成效。 相似文献
15.
This study proposes an analytical and flexible terrain risk assessment method for military surveillance applications for mobile assets. Considering the risk as the degree of possibility of insurgent presence, the assessment method offers an efficient evaluation of risk in the surrounding terrain for military combat operating posts or observation posts. The method is designed for unmanned aerial vehicles as the surveillance assets of choice to improve the effectiveness of their use. Starting with the area map and geographical data, the target terrain is first digitized for space representation. Then the data of nine geographical parameters are used to formulate five contributing risk factors. These factors are incorporated in an analytical framework to generate a composite map with risk scores that reveal the potential high-risk spots in the terrain. The proposed method is also applied to a real-life case study of COP Kahler in Afghanistan, which was a target for insurgent attacks in 2008. The results confirm that when evaluated with the developed method, the region that the insurgents used to approach COP Kahler has high concentration of high-risk cells. 相似文献
16.
Although previous research has investigated widespread use of social media, especially Facebook, by youth attending college, the conditions under which these media foster adjustment to college remain unclear. This study tested a model illuminating pathways linking social competence to college adjustment via students’ perceptions about the usefulness of Facebook and ways in which they used the medium. Self-report survey data from 321 college students (M age = 20.09; 58% female; 84% Caucasian) attending a major Midwestern university supported the proposed model, indicating that higher social competence could foster or impede college adjustment, depending upon how it was related to beliefs about the usefulness of different Facebook functions and how these perceptions, in turn, were associated with patterns of Facebook use. Findings underscore the importance of considering connections among personal attributes, perception of media effectiveness, and media behaviors in assessing the implications of social media for users’ psychosocial well-being. 相似文献
17.
18.
Jianhuai Dong Zhixuan Dong 《International Journal of Adaptive Control and Signal Processing》2020,34(10):1466-1482
This article studies the optimal filtering and control for wireless networked control systems (WNCSs). In WNCSs, packets may be lost in both control and feedback channels and user datagram protocol is usually used to improve the performance of the real-time control. Relevant literature indicates that the conventional optimal filtering for such a system cannot be applied in practice due to the complex calculation with Gaussian mixtures. This paper proposes a novel scheme to realize the optimal filtering and the linear quadratic Gaussian control for WNCSs, in which the controlled node performs a local estimation and the remote-control node performs the final estimation and control, and a synchronization of two estimators is guaranteed by a communication mechanism. An optimal filtering algorithm is developed, the stability condition of the filtering error covariance is obtained, optimal finite-horizon and infinite-horizon control are derived, and the stability of the closed-loop control system is proved. Numerical simulations show the validity and feasibility of the theoretical results. 相似文献
19.
Risk allocation decisions are of critical importance in project management. The present study proposes an explanation for how risk allocation in a contract motivates a contractor to cooperate with a project owner. Theories of risk allocation and trust were used to motivate the research. Using a survey methodology, we collected data concerning 124 construction projects in China. We found that risk allocation influenced the contractor’s role behavior through the contractor’s feeling of being trusted but not the contractor’s trust in the owner. Feeling of being trusted partially mediated the effect of risk allocation on the contractor’s in-role (i.e., contractual) behavior and fully mediated the effect on extra-role behavior. The study introduces a social and psychological view of the impacts of risk allocation to the project and engineering management literature. We contribute to theory by arguing and demonstrating the mediating effect of trust on the relationship between risk allocation and contractor behavior. From a practical standpoint, we conclude that contractual risk allocation has a significant impact on building a trusting relationship between owners and contractors and that contractors who feel trusted perform both contractually mandated actions and actions external to the contract more diligently, resulting in the likelihood of improved outcomes for both parties. 相似文献
20.
多带OFDM-UWB系统峰均功率比降低方法研究 总被引:1,自引:0,他引:1
针对多带OFDM—UWB信号存在高峰均功率比的问题,提出了利用扩展与交织降低系统信号峰均功率比的方法。该方法通过对传输数据进行正交扩展与交织,使得进入多载波调制的数据趋于高斯分布,减小了传输数据自相关函数的旁瓣峰值,降低了OFDM-UWB信号的峰均功率比。由于采用正交矩阵进行扩展,扩展前后的数据传输速率保持不变。仿真结果表明,扩展与交织可以有效地降低信号峰均功率比2-5dB左右。同时该方法还具有抗窄带干扰的鲁棒性。 相似文献