首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   588232篇
  免费   4729篇
  国内免费   1465篇
化学   269079篇
晶体学   7646篇
力学   25992篇
综合类   17篇
数学   67789篇
物理学   163613篇
无线电   60290篇
  2021年   5478篇
  2020年   6051篇
  2019年   6905篇
  2018年   9134篇
  2017年   9232篇
  2016年   12519篇
  2015年   6532篇
  2014年   11296篇
  2013年   24949篇
  2012年   19345篇
  2011年   22967篇
  2010年   17655篇
  2009年   18194篇
  2008年   22979篇
  2007年   23246篇
  2006年   21301篇
  2005年   19244篇
  2004年   18020篇
  2003年   16329篇
  2002年   16194篇
  2001年   16899篇
  2000年   13585篇
  1999年   10773篇
  1998年   9583篇
  1997年   9331篇
  1996年   8551篇
  1995年   7805篇
  1994年   7878篇
  1993年   7577篇
  1992年   7822篇
  1991年   8275篇
  1990年   7904篇
  1989年   7680篇
  1988年   7389篇
  1987年   6769篇
  1986年   6460篇
  1985年   8013篇
  1984年   8307篇
  1983年   7021篇
  1982年   7187篇
  1981年   6718篇
  1980年   6391篇
  1979年   6823篇
  1978年   7065篇
  1977年   6938篇
  1976年   6858篇
  1975年   6557篇
  1974年   6394篇
  1973年   6699篇
  1972年   4891篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
The nonlocal enhancement in the velocities of charge carriers to ionization is shown to outweigh the opposing effects of dead space, increasing the avalanche speed of short avalanche photodiodes (APDs) over the predictions of a conventional local model which ignores both of these effects. The trends in the measured gain-bandwidth product of two short InAlAs APDs reported in the literature support this result. Relatively large speed benefits are predicted to result from further small reductions in the lengths of short multiplication regions.  相似文献   
42.
Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence. When the user departs, the token and device lose contact and the device secures itself. We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep. Our evaluation shows this is done without inconveniencing the user, while imposing a minimal performance overhead  相似文献   
43.
44.
First-order polarization-mode dispersion (PMD) compensation by means of a polarization controller and a differential delay line is not sufficient to guarantee error-free transmission for 40-Gb/s channels when higher order effects severely increase signal distortion. Higher order mitigation is possible by cascading more than one first-order block. However, only two-stage or three-stage devices remain simple enough to be actually controlled. The performance of such higher order PMD compensators is evaluated by means of numerical simulations. Two different feedback signals have been used, demonstrating that first-order and higher order PMD distortion of nonreturn-to-zero (NRZ) pulses at 40 Gb/s can be strongly mitigated for instantaneous values of the differential group delay (DGD) up to the bit slot, when the compensator is properly controlled.  相似文献   
45.
High-performance circular probe-fed stacked patch antenna designs are explored through the use of numerical optimization. New trends are sought to aid understanding and to suggest novel solutions. We describe the optimization technique, present a new design trend relating efficiency and bandwidth to the choice of substrate dielectric, and propose and demonstrate a novel, optimized antenna achieving 33% bandwidth whilst maintaining greater than 80% surface wave efficiency.  相似文献   
46.
Object segmentation and labeling by learning from examples   总被引:1,自引:0,他引:1  
We propose a system that employs low-level image segmentation followed by color and two-dimensional (2-D) shape matching to automatically group those low-level segments into objects based on their similarity to a set of example object templates presented by the user. A hierarchical content tree data structure is used for each database image to store matching combinations of low-level regions as objects. The system automatically initializes the content tree with only "elementary nodes" representing homogeneous low-level regions. The "learning" phase refers to labeling of combinations of low-level regions that have resulted in successful color and/or 2-D shape matches with the example template(s). These combinations are labeled as "object nodes" in the hierarchical content tree. Once learning is performed, the speed of second-time retrieval of learned objects in the database increases significantly. The learning step can be performed off-line provided that example objects are given in the form of user interest profiles. Experimental results are presented to demonstrate the effectiveness of the proposed system with hierarchical content tree representation and learning by color and 2-D shape matching on collections of car and face images.  相似文献   
47.
On the capacities of bipartite Hamiltonians and unitary gates   总被引:2,自引:0,他引:2  
We consider interactions as bidirectional channels. We investigate the capacities for interaction Hamiltonians and nonlocal unitary gates to generate entanglement and transmit classical information. We give analytic expressions for the entanglement generating capacity and entanglement-assisted one-way classical communication capacity of interactions, and show that these quantities are additive, so that the asymptotic capacities equal the corresponding 1-shot capacities. We give general bounds on other capacities, discuss some examples, and conclude with some open questions.  相似文献   
48.
    
The reaction of [{(η5-C5Me5)M(μ-Cl)Cl}2] {where M = Rh (1), Ir (2)} with functionalized phosphine viz., diphenyl-2-pyridylphosphine (PPh2Py) in dichloromethane solvent yield neutral ϰ1-P-coordinated rhodium and iridium complexes [(η5-C5Me5)RhCl21-P-PPh2Py)]3 and [(η5-C5Me5) IrCl21-P-PPh2Py)]4. Reaction of complexes 1 and 2 with the ligand PPh2Py in methanol under reflux give bis-substituted complexes such as [(η5-C5Me5)RhCl(ϰ1-P-PPh2Py)2]+ 5 and [(η5-C5Me5)IrCl(ϰ1-P-PPh2Py)2]+ 6, whereas stirring in methanol at room temperature gives P-, N-chelating complexes of the type [(η5-C5Me5)RhCl(ϰ2-P-N-PPh2Py)]+ 7 and [(η5-C5Me5)IrCl(ϰ2-P-N-PPh2Py)]+ 8. Neutral ϰ1-P-coordinated complexes [(η5-C5Me5)RhCl21-P-PPh2Py)]3 and [(η5-C5Me5)IrCl21-P-PPh2Py)]4 easily undergo conversion to the cationic P-, N-chelating complexes [(η5-C5Me5)RhCl(ϰ2-P-N-PPh2Py)]+ 7 and [(η5-C5Me5) IrCl(ϰ2-P, N-PPh2Py)]+ 8 on stirring in methanol at room temperature. These complexes are characterized by FT-IR and FT-NMR spectroscopy as well as analytical methods. The molecular structures of the representative complexes [(η5-C5Me5)RhCl21-P-PPh2Py)]3, [(η5-C5Me5)IrCl21-P-PPh2Py)]4 and hexafluorophosphate salt of complex [(η5-C5Me5)IrCl(ϰ2-P-PPh2Py)2]+ 6 are established by single-crystal X-ray diffraction methods  相似文献   
49.
A new topology for a photonic signal processor, which overcomes the basic recursive frequency response problem that limits the passband range, is presented. The structure is based on a new multiple-wavelength offset-cavity structure that is cascaded with a series of unbalanced delay line structures. This not only can synthesize a very narrow notch response with good shape factor but also permits a multifold extension of the free spectral range (FSR) and passband width. Results on the interference mitigation filter demonstrate a stopband of 1% of center frequency and a fourfold increase in the FSR and passband width, while also having a very small shape factor, in excellent agreement with predictions.  相似文献   
50.
The expectation-maximization (EM) algorithm is well established as a computationally efficient method for separable signal parameter estimation. Here, a new geometric derivation and interpretation of the EM algorithm is given that facilitates the understanding of EM convergence properties. Geometric considerations lead to an alternative separable signal parameter estimator based on successive cancellation. The new generalized successive interference cancellation (GSIC) algorithm is then applied to multiuser delay and channel estimation for code-division multiple access (CDMA) radiolocation and communication. The radiolocation application uses a handshaking protocol in which multiple reference nodes transmit acknowledge (ACK) CDMA packets to a master node, which then computes round-trip travel times (RTTs). Simulation results comparing EM and GSIC are presented for the CDMA channel-estimation problem.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号