全文获取类型
收费全文 | 3106篇 |
免费 | 223篇 |
国内免费 | 251篇 |
专业分类
电工技术 | 192篇 |
综合类 | 458篇 |
化学工业 | 33篇 |
金属工艺 | 6篇 |
机械仪表 | 59篇 |
建筑科学 | 32篇 |
矿业工程 | 37篇 |
能源动力 | 8篇 |
轻工业 | 8篇 |
水利工程 | 17篇 |
石油天然气 | 5篇 |
武器工业 | 14篇 |
无线电 | 1807篇 |
一般工业技术 | 104篇 |
冶金工业 | 45篇 |
原子能技术 | 4篇 |
自动化技术 | 751篇 |
出版年
2024年 | 10篇 |
2023年 | 31篇 |
2022年 | 36篇 |
2021年 | 48篇 |
2020年 | 73篇 |
2019年 | 49篇 |
2018年 | 57篇 |
2017年 | 61篇 |
2016年 | 70篇 |
2015年 | 92篇 |
2014年 | 191篇 |
2013年 | 194篇 |
2012年 | 225篇 |
2011年 | 264篇 |
2010年 | 164篇 |
2009年 | 200篇 |
2008年 | 218篇 |
2007年 | 185篇 |
2006年 | 162篇 |
2005年 | 149篇 |
2004年 | 116篇 |
2003年 | 123篇 |
2002年 | 116篇 |
2001年 | 104篇 |
2000年 | 105篇 |
1999年 | 80篇 |
1998年 | 63篇 |
1997年 | 55篇 |
1996年 | 69篇 |
1995年 | 57篇 |
1994年 | 36篇 |
1993年 | 12篇 |
1992年 | 9篇 |
1991年 | 11篇 |
1990年 | 20篇 |
1989年 | 15篇 |
1988年 | 12篇 |
1987年 | 4篇 |
1986年 | 5篇 |
1985年 | 9篇 |
1984年 | 13篇 |
1983年 | 12篇 |
1982年 | 17篇 |
1981年 | 4篇 |
1980年 | 3篇 |
1977年 | 3篇 |
1976年 | 4篇 |
1964年 | 6篇 |
1961年 | 3篇 |
1960年 | 3篇 |
排序方式: 共有3580条查询结果,搜索用时 15 毫秒
81.
Paulo S. André António L. Teixeira Armando N. Pinto Lara P. Pellegrino Berta B. Neto José F. Rocha Joäo L. Pinto Paulo N. Monteiro 《ETRI Journal》2006,28(2):257-259
In this letter, we will evaluate the performance degradation of a 40 km high‐speed (40 Gb/s) optical system, induced by optical fiber variations of the chromatic dispersion induced by temperature changes. The chromatic dispersion temperature sensitivity will be estimated based on the signal quality parameters. 相似文献
82.
This paper presents an approach to power-conserving routing of ad hoc mobile wireless networks. This approach relies on entropy-constrained routing algorithms, which were developed by utilizing the information-theoretic concept of the entropy to gradually reduce the uncertainty associated with route discovery through a deterministic annealing process. Entropy-constrained routing algorithms were tested using a single performance metric related to the distance between the nodes and to the power consumption associated with packet transmission. This paper also expands the versatility of entropy-constrained routing algorithms by making them capable of discovering routes based on multiple performance metrics. In this study, the second performance metric employed for route discovery relied on the power availability in the nodes of the network. The proposed routing approach was evaluated in terms of the power consumption associated with the routing of packets over an ad hoc mobile network in a variety of operating conditions. 相似文献
83.
84.
As one of secure communication means, chaotic communication systems has been well-developed during the past three decades. Technical papers, both for theoretical and practical investigations, have reached a huge amount in number. On the other hand, fractional chaos, as a parallel ongoing research topic, also attracts many researchers to investigate. As far as the IT field is concerned, the research on control systems by using fractional chaos known as FOC (fractional order control) has been a hot issue for quite a long time. As a comparison, interesting enough, up to now we have not found any research result related to Fractional Chaos Communi- cation (FCC) system, i.e., a system based on fractional chaos. The motivation of the present article is to reveal the feasibility of realizing communication systems based upon FCC and their superiority over the conventional integer chaotic communication systems. Principles of FCC and its advantages over integer chaotic communication systems are also discussed. 相似文献
85.
86.
星间相干光通信中的光学锁相环 总被引:3,自引:0,他引:3
在相干体制下,二进制相移键控(BPSK)信号调制的零差接收机可实现理论上的最高灵敏度,是星间相干光通信的研究和应用重点.零差接收机要求本振波和信号波严格相位同步,常用的相位同步技术是光学锁相环(OPLL).阐述了光学锁相环的基本原理,介绍了近20年来光学锁相环的发展,在此基础上总结了各种类型锁相环的性能和适用范围.回顾了欧洲国家在星间相干光通信计划中通信终端使用光学锁相环的情况.最后对光学锁相环技术进行了总结,对该技术的前景进行了展望. 相似文献
87.
OFDM多频波调制技术是未来高速数字通信系统的核心技术.在其实现中,必须结合优秀的前向纠错码(Forward-error Correction Code)以降低误码率.卷积码、里德-所罗门码以及Turbo码都已相继使用在OFDM系统中.文章提出将LDPC码与OFDM系统相结合,通过分析可以发现它具有比Turbo码与OFDM系统的结合更好的性能.文章的最后还将给出一个LDFC与OFDM系统结合的概念性通信系统一LDFC-COFDM系统. 相似文献
88.
89.
Lu Weifeng Zhu Mingqi Xu Jia Chen Siguang Yang Lijun Xu Jian 《International Journal of Communication Systems》2020,33(9)
Content sharing via device‐to‐device (D2D) communications has become a promising method to increase system throughput and reduce traffic load. Due to the characteristic of spectrum sharing in D2D network, confidentiality is becoming a key issue in content transmission. Secure communication in D2D networks is generally guaranteed by a physical‐layer security mechanism. However, this method sacrifices the system transmission rate while ensuring security. Since mobile devices are carried by humans, we can leverage their trust relations to enhance the security of communications. As much, considering the psychology structure and social attributes of mobile users, we build a multidimensional trust evaluation mechanism to evaluate the trust relationship between users, and we pick out the trusted users based on the decision‐theoretic rough sets. By sharing content only between trust users, we can enhance the security of content transmissions without relying on physical‐layer security measures. Meanwhile, content caching is now widely used to improve accessing efficiency and reduce traffic load on cellular networks. However, caching content for other users incurs additional cost, which results in selfish and noncooperative behavior in users. Considering such selfishness, we introduce a cooperative caching game based on multidimensional trust relations to motivate users to cache contents for other devices. In this game, the trust relations and physical distance between two users are considered to formulate the cost function. Furthermore, we introduce an incentive caching algorithm based on social trust to minimize the total cost in the D2D network. 相似文献
90.
Device-to-device (D2D) communications allow proximate cellular user equipments (UEs) to communicate with each other directly under the control of base station (BS). In this paper, considering the selection relaying (SR) rule which allows a subset of potential relays to forward the source’s data to the corresponding destination, we first establish a multi-relay system model where a D2D UE can act as not only a source but also a potential relay for another D2D link, and then analyze the cooperation behaviors among selfish UEs. Next a simple strategy is proposed to deal with the relay selection problem, and then the fair and efficient resource sharing problem among cooperating D2D UEs is formulated as a bargaining game. Since the game function is non-convex, we turn to an iterative method by introducing an auxiliary function to get the proportional fair resource allocation results. The system efficiency and fairness are proved by numeral simulation results. 相似文献