全文获取类型
收费全文 | 3066篇 |
免费 | 462篇 |
国内免费 | 263篇 |
专业分类
电工技术 | 456篇 |
综合类 | 391篇 |
化学工业 | 140篇 |
金属工艺 | 85篇 |
机械仪表 | 229篇 |
建筑科学 | 83篇 |
矿业工程 | 107篇 |
能源动力 | 58篇 |
轻工业 | 44篇 |
水利工程 | 41篇 |
石油天然气 | 491篇 |
武器工业 | 46篇 |
无线电 | 674篇 |
一般工业技术 | 143篇 |
冶金工业 | 78篇 |
原子能技术 | 6篇 |
自动化技术 | 719篇 |
出版年
2024年 | 10篇 |
2023年 | 39篇 |
2022年 | 84篇 |
2021年 | 86篇 |
2020年 | 136篇 |
2019年 | 101篇 |
2018年 | 97篇 |
2017年 | 114篇 |
2016年 | 146篇 |
2015年 | 148篇 |
2014年 | 197篇 |
2013年 | 165篇 |
2012年 | 253篇 |
2011年 | 244篇 |
2010年 | 214篇 |
2009年 | 173篇 |
2008年 | 185篇 |
2007年 | 233篇 |
2006年 | 195篇 |
2005年 | 208篇 |
2004年 | 136篇 |
2003年 | 107篇 |
2002年 | 100篇 |
2001年 | 88篇 |
2000年 | 57篇 |
1999年 | 49篇 |
1998年 | 33篇 |
1997年 | 43篇 |
1996年 | 38篇 |
1995年 | 17篇 |
1994年 | 19篇 |
1993年 | 14篇 |
1992年 | 13篇 |
1991年 | 15篇 |
1990年 | 15篇 |
1989年 | 8篇 |
1988年 | 3篇 |
1986年 | 1篇 |
1985年 | 3篇 |
1984年 | 1篇 |
1982年 | 2篇 |
1979年 | 1篇 |
排序方式: 共有3791条查询结果,搜索用时 46 毫秒
31.
设计了一个可重用、可升级的基四流水线结构Viterbi译码器.设计中采用了基四流水、前向追踪、同址写回和分块管理技术,并利用处理单元(PE: Process Element)互联技术,对译码器的结构进行了抽象和参数化处理,使卷积码生成多项式、PE个数和回溯深度等可根据实际需要重新配置.在TSMC 0.18 μm CMOS 工艺下, 成功地实现了带删除的64状态(4,1,6) Viterbi 译码器,电路规模仅3万门,译码速率可达12.5 Mbps,功耗为15 mW;在ST 0.13 μm CMOS工艺下,也获得了同样的性能,功耗仅为4.7 mW.该Viterbi译码器已被应用于DAB接收机芯片中. 相似文献
32.
In this paper, we study scheduling schemes for two‐user two‐way wireless relaying systems. Two transmission modes are considered: point‐to‐point direct transmission and two‐way amplify‐and‐forward relaying. An optimal scheduling scheme that opportunistically selects the best transmission mode for each user is proposed to minimize the sum bit error rate (BER). The performance lower bound of the optimal scheduling scheme is analyzed, and closed‐form expression of the lower‐bound BER is derived. However, for optimal scheduling, the scheduler requires the knowledge of channel state information (CSI) of all links. To reduce the feedback information of CSI, we also propose a suboptimal scheduling scheme that selects the transmission mode using only the CSI of two direct links. Simulation results show that there are 4 dB to 8 dB gains for the proposed optimal and suboptimal schemes over the fixed direct transmission and fixed two‐way relayed transmission scheme. The performance gap between the optimal and suboptimal scheduling schemes is small, which implies a good trade‐off between implementation complexity and system performance. 相似文献
33.
34.
35.
40Gb/s(STM-2 5 6)高速时分复用传输技术前景展望 总被引:3,自引:1,他引:3
随着技术的发展 ,4 0 Gb/ s(STM- 2 5 6 )作为 10 Gb/ s(STM- 6 4)传输业务颗粒的后续者 ,开始逐渐为业界熟悉。就 4 0 Gb/ s这一新兴技术的市场推动因素、应用场合以及影响 4 0 Gb/ s传输的一些关键技术作了介绍 ,并对其将来的应用前景作出展望 相似文献
36.
In physical layer security,considering imperfect time synchronization,a power allocation scheme was proposed to maximize the system secrecy capacity.By analyzing the residual interference power at the authorized receiver caused by imperfect time synchronization,the optimal power distribution method was given,and the relationship between the optimal interference power and the relative channel quality was discussed.Theory and simulation analysis show that when the synchronization error is small,the synchronization error consumes extra power to reach the preset secrecy capacity,and the interference power increases with its increase.As the synchronization error increases,the secrecy capacity of the system gradually fails to reach the preset target,and may even drop to zero. 相似文献
37.
Aleksandra Panajotovi Nikola Sekulovi Aleksandra Cvetkovi Daniela Milovi 《International Journal of Communication Systems》2020,33(14)
In this paper, the closed‐form expressions for outage probability, channel capacity, and average symbol error probability are derived for amplify‐and‐forward multihop relay network. Based on approximation of multihop relay by dual‐hop relay systems, the analytical expressions are obtained for the case when maximal ratio combining technique is employed at each relay while destination node uses selection combining technique. The impact of system and channel parameters on the system performances is investigated, and numerical results are graphically presented. The derived analytical expressions are verified by numerical simulation. 相似文献
38.
Hoc Phan Hans‐Jürgen Zepernick Trung Q. Duong Hung Tran Thi My Chinh Chu 《Wireless Communications and Mobile Computing》2015,15(1):56-70
In this paper, we analyze the performance of cognitive amplify‐and‐forward (AF) relay networks with beamforming under the peak interference power constraint of the primary user (PU). We focus on the scenario that beamforming is applied at the multi‐antenna secondary transmitter and receiver. Also, the secondary relay network operates in channel state information‐assisted AF mode, and the signals undergo independent Nakagami‐m fading. In particular, closed‐form expressions for the outage probability and symbol error rate (SER) of the considered network over Nakagami‐m fading are presented. More importantly, asymptotic closed‐form expressions for the outage probability and SER are derived. These tractable closed‐form expressions for the network performance readily enable us to evaluate and examine the impact of network parameters on the system performance. Specifically, the impact of the number of antennas, the fading severity parameters, the channel mean powers, and the peak interference power is addressed. The asymptotic analysis manifests that the peak interference power constraint imposed on the secondary relay network has no effect on the diversity gain. However, the coding gain is affected by the fading parameters of the links from the primary receiver to the secondary relay network. Copyright © 2012 John Wiley & Sons, Ltd. 相似文献
39.
In group key management systems adopting lazy updating, the overhead of key updating might be amortized. In this paper, a Dynamic-tree based Lazy group key updating scheme (DT-LGKU) is presented, which consists of four algorithms Init, Update, Derive and Extract. DT-LGKU supports lazy join events and lazy leave events with unbounded number of time intervals, and provides the forward secrecy and the backward secrecy. DT-LGKU is secure if both the Large Integer Factoring problem and RSA problem are hard. The performance evaluation shows that the worst-case complexity of the cryptographic operations used in the Extract algorithms is logarithmic in the number of time intervals, and those of Init, Update, Derive are constant. 相似文献
40.
探讨在短波数字通信网络中的自适应差错控制系统,对第二代ALE(2^ndALE)和第三代ALE(3^rdALE)系统中的差错控制系统进行计算机仿真,并分析它们在相同通信条件下性能的优劣。 相似文献