全文获取类型
收费全文 | 9114篇 |
免费 | 1008篇 |
国内免费 | 289篇 |
专业分类
化学 | 795篇 |
晶体学 | 16篇 |
力学 | 426篇 |
综合类 | 54篇 |
数学 | 995篇 |
物理学 | 1359篇 |
无线电 | 6766篇 |
出版年
2024年 | 35篇 |
2023年 | 127篇 |
2022年 | 183篇 |
2021年 | 273篇 |
2020年 | 230篇 |
2019年 | 162篇 |
2018年 | 212篇 |
2017年 | 306篇 |
2016年 | 316篇 |
2015年 | 370篇 |
2014年 | 615篇 |
2013年 | 708篇 |
2012年 | 619篇 |
2011年 | 644篇 |
2010年 | 498篇 |
2009年 | 522篇 |
2008年 | 529篇 |
2007年 | 592篇 |
2006年 | 554篇 |
2005年 | 474篇 |
2004年 | 409篇 |
2003年 | 371篇 |
2002年 | 335篇 |
2001年 | 245篇 |
2000年 | 163篇 |
1999年 | 140篇 |
1998年 | 134篇 |
1997年 | 131篇 |
1996年 | 107篇 |
1995年 | 77篇 |
1994年 | 57篇 |
1993年 | 52篇 |
1992年 | 41篇 |
1991年 | 32篇 |
1990年 | 26篇 |
1989年 | 19篇 |
1988年 | 23篇 |
1987年 | 10篇 |
1986年 | 11篇 |
1985年 | 16篇 |
1984年 | 5篇 |
1983年 | 5篇 |
1982年 | 9篇 |
1981年 | 4篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1978年 | 3篇 |
1974年 | 3篇 |
1969年 | 2篇 |
1957年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 187 毫秒
1.
本文结合HTH电路的复杂性等特征分析与实际应用现状,研究了HTH电路的具体检测技术方法并对当前热点技术进行对比分析,探讨了HTH电路检测方法的技术发展趋势。 相似文献
2.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors. 相似文献
3.
4.
This paper considers the state‐dependent interference relay channel (SIRC) in which one of the two users may operate as a secondary user and the relay has a noncausal access to the signals from both users. For discrete memoryless SIRC, we first establish the achievable rate region by carefully merging Han‐Kobayashi rate splitting encoding technique, superposition encoding, and Gelfand‐Pinsker encoding technique. Then, based on the achievable rate region that we derive, the capacity of the SIRC is established in many different scenarios including (a) the weak interference regime, (b) the strong interference regime, and (c) the very strong interference regime. This means that our capacity results contain all available known results in the literature. Next, the achievable rate region and the associated capacity results are also evaluated in the case of additive Gaussian noise. Additionally, many numerical examples are investigated to show the value of our theoretical derivations. 相似文献
5.
The identification rate of UHF RFID system was restricted by multipath propagation effects.The system identification performance was studied considering the correlation coefficient between forward and reverse channels.Based on the generalized Rician fading channel model,the analytical expression of identification rate was derived under independent,full correlation and correlation cases.Compared with the existing analysis,the proposed uniform calculation formula of identification rate was for any correlation coefficient and kinds of channel conditions.The numerical computation and Monte-carlo simulations show that the influences of different correlation coefficients,channel conditions,sensitivity and distance on the identification rate. 相似文献
6.
介绍了一种基于高性能浮点DSP芯片TMS320C32、CPLD芯片XC95288和A/D采样芯片AD976组成的多路采集系统的工作原理以及设计方法。通过对第一路施加特殊的电压量,在CCS开发环境下读取采样缓冲区的值,并利用Matlab对采样数据进行了全波傅氏变换。此外,该系统已在继电保护中得到广泛应用,实践表明,该系统能较好地解决多路模拟量的采集,并确保了采样数据的安全可靠性。 相似文献
7.
8.
9.
Discrete time queueing systems have been successfully used to model packet queues in computer and digital communications systems. In this article we introduce a novel approach to analyzing the GeoX/GeoY/∞ queueing system, which is suitable for modelling high speed computer and communications systems. The approach is based on characterizing the system by a functional equation which is then solved recursively to give identical results to those obtained using other approaches. 相似文献
10.
多业务移动通信系统中的呼叫接入控制 总被引:4,自引:0,他引:4
在多业务无线移动通信系统的呼叫接入控制中,不仅要考虑业务之间的优先级,同时也必须考虑切换呼叫的优先级。本文结合可移动边界算法和保护信道策略,提出了一种有效的多业务呼叫接入控制算法。为了方便地分析方案的性能,设计了一个二维的Markov链对方案的性能进行理论上的分析。通过数值分析结果表明,提出的算法同时保证了两种优先级,并提高了系统的性能。1 相似文献