首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   408761篇
  免费   5206篇
  国内免费   1982篇
化学   195432篇
晶体学   5781篇
力学   15190篇
综合类   64篇
数学   42320篇
物理学   110299篇
无线电   46863篇
  2020年   3223篇
  2019年   3537篇
  2018年   4505篇
  2017年   4617篇
  2016年   6851篇
  2015年   4316篇
  2014年   6790篇
  2013年   16499篇
  2012年   13140篇
  2011年   15875篇
  2010年   11670篇
  2009年   11997篇
  2008年   15949篇
  2007年   16293篇
  2006年   15528篇
  2005年   14112篇
  2004年   12952篇
  2003年   11599篇
  2002年   11380篇
  2001年   12651篇
  2000年   9938篇
  1999年   7724篇
  1998年   6643篇
  1997年   6508篇
  1996年   6240篇
  1995年   5698篇
  1994年   5719篇
  1993年   5558篇
  1992年   5937篇
  1991年   5956篇
  1990年   5682篇
  1989年   5485篇
  1988年   5276篇
  1987年   4769篇
  1986年   4619篇
  1985年   6008篇
  1984年   6109篇
  1983年   5220篇
  1982年   5485篇
  1981年   5123篇
  1980年   4867篇
  1979年   5127篇
  1978年   5348篇
  1977年   5297篇
  1976年   5360篇
  1975年   5009篇
  1974年   5067篇
  1973年   5275篇
  1972年   3860篇
  1971年   3140篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
This paper considers several aspects of the sequential prediction problem for unbounded, nonstationary processes under pth power loss /spl lscr//sub p/(u,v)=|u-v|/sup p/, 1相似文献   
92.
Self-organized public-key management for mobile ad hoc networks   总被引:6,自引:0,他引:6  
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase.  相似文献   
93.
This paper reports on the stability analysis of one member of a dual-channel resonant DC-DC converter family. The study is confined to the buck configuration in symmetrical operation. The output voltage of the converter is controlled by a closed loop applying constant-frequency pulsewidth modulation. The dynamic analysis reveals that a bifurcation cascade develops as a result of increasing the loop gain. The trajectory of the variable-structure piecewise-linear nonlinear system pierces through the Poincare plane at the fixed point in state space when the loop gain is small. For stability criterion the positions of the characteristic multipliers of the Jacobian matrix belonging to the Poincare map function defined around the fixed point located in the Poincare plane is applied. In addition to the stability analysis, a bifurcation diagram is developed showing the four possible states of the feedback loop: the periodic, the quasi-periodic, the subharmonic, and the chaotic states. Simulation and test results verify the theory.  相似文献   
94.
This paper presents the evolution of low-frequency, high-power transcontinental transmission, starting from the first successful transatlantic link from Poldhu up to the Italian transcontinental station of Coltano. The trend toward higher and higher transmitting power, and the dead end into which wireless was heading if it were not for research in the higher frequency ranges, are pointed out.  相似文献   
95.
Reducible rank codes and their applications to cryptography   总被引:2,自引:0,他引:2  
We present a new family of so-called reducible rank codes which are a generalization of rank product codes . This family includes maximal rank distance (MRD) codes for lengths n>N in the field F/sub N/. We give methods for encoding and decoding reducible rank codes. A public key cryptosystem based on these codes and on the idea of a column scrambler is proposed. The column scrambler "mixes" columns of a generator (parity-check) matrix of a code. It makes the system more resistant to structural attacks such as Gibson's attacks. Possible attacks on the system are thoroughly studied. The system is found to be secure against known attacks for public keys of about 16 kbits and greater.  相似文献   
96.
97.
Passivated single damascene copper SiO2 damascene lines were evaluated in combination with TiSiN and Ta(N)/Ta diffusion barriers. Leakage current, breakdown and time-dependent dielectric breakdown properties were investigated on a wafer level basis for temperatures ranging between room temperature and 150 °C. It is found that the leakage performance of the wafers with a TiSiN barrier is better at room temperature, but at 150 °C the performance levels out with Ta(N)/Ta. Time-dependent dielectric breakdown measurements at 150 °C show that the lifetime of the interconnect is higher with the selected Ta(N)/Ta barrier than for TiSiN.  相似文献   
98.
Efficient blue‐, green‐, and red‐light‐emitting organic diodes are fabricated using binuclear platinum complexes as phosphorescent dopants. The series of complexes used here have pyrazolate bridging ligands and the general formula CNPt(μ‐pz)2PtCN (where CN = 2‐(4′,6′‐difluorophenyl)pyridinato‐N,C2′, pz = pyrazole ( 1 ), 3‐methyl‐5‐tert‐butylpyrazole ( 2 ), and 3,5‐bis(tert‐butyl)pyrazole ( 3 )). The Pt–Pt distance in the complexes, which decreases in the order 1 > 2 > 3 , solely determines the electroluminescence color of the organic light‐emitting diodes (OLEDs). Blue OLEDs fabricated using 8 % 1 doped into a 3,5‐bis(N‐carbazolyl)benzene (mCP) host have a quantum efficiency of 4.3 % at 120 Cd m–2, a brightness of 3900 Cd m–2 at 12 V, and Commission Internationale de L'Eclairage (CIE) coordinates of (0.11, 0.24). Green and red OLEDs fabricated with 2 and 3 , respectively, also give high quantum efficiencies (~ 6.7 %), with CIE coordinates of (0.31, 0.63) and (0.59, 0.46), respectively. The current‐density–voltage characteristics of devices made using dopants 2 and 3 indicate that hole trapping is enhanced by short Pt–Pt distances (< 3.1 Å). Blue electrophosphorescence is achieved by taking advantage of the binuclear molecular geometry in order to suppress dopant intermolecular interactions. No evidence of low‐energy emission from aggregate states is observed in OLEDs made with 50 % 1 doped into mCP. OLEDs made using 100 % 1 as an emissive layer display red luminescence, which is believed to originate from distorted complexes with compressed Pt–Pt separations located in defect sites within the neat film. White OLEDs are fabricated using 1 and 3 in three different device architectures, either with one or two dopants in dual emissive layers or both dopants in a single emissive layer. All the white OLEDs have high quantum efficiency (~ 5 %) and brightness (~ 600 Cd m–2 at 10 V).  相似文献   
99.
Many organisations use decision models in their processes such as tables or trees to provide decision support to their operational divisions. For example, in fault management, customer contact centre operators usually use a decision model in the form of prescribed interviews. Based on the answers given by customers, the operator navigates through the decision model to reach an assessment of the problem. In order to achieve customer satisfaction and operational excellence, it is very important to constantly monitor the performance of a decision model not only on an overall level, but also on the level of individual decisions. In this paper we present a configurable business process analytics tool, known as the intelligent Universal Service Management System, that constantly monitors decision data and is capable of optimising the decisions based on high-level business objectives. We explain the various features of the software and show how it can be used to optimise decision processes. We also show how we can easily provide a customised version to monitor the performance of provision processes.  相似文献   
100.
The growth of the Internet and of various intranets has spawned a wealth of online services, most of which are implemented on local-area clusters using remote invocation (for example, remote procedure call/remote method invocation) among manually placed application components. Component placement can be a significant challenge for large-scale services, particularly when application resource needs are workload dependent. Automatic component placement has the potential to maximize overall system throughput. The key idea is to construct (offline) a mapping between input workload and individual-component resource consumption. Such mappings, called component profiles, then support high-performance placement. Preliminary results on an online auction benchmark based on J2EE (Java 2 Platform, Enterprise Edition) suggest that profile-driven tools can identify placements that achieve near-optimal overall throughput.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号