首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   399416篇
  免费   3465篇
  国内免费   1185篇
化学   177485篇
晶体学   5885篇
力学   15512篇
综合类   7篇
数学   40433篇
物理学   111911篇
无线电   52833篇
  2021年   2976篇
  2020年   3300篇
  2019年   3686篇
  2018年   4758篇
  2017年   4700篇
  2016年   7018篇
  2015年   4126篇
  2014年   6794篇
  2013年   16666篇
  2012年   12693篇
  2011年   15217篇
  2010年   11117篇
  2009年   11566篇
  2008年   15181篇
  2007年   15575篇
  2006年   14987篇
  2005年   13609篇
  2004年   12753篇
  2003年   11494篇
  2002年   11114篇
  2001年   12458篇
  2000年   9933篇
  1999年   8029篇
  1998年   6842篇
  1997年   6712篇
  1996年   6272篇
  1995年   5968篇
  1994年   5718篇
  1993年   5528篇
  1992年   6064篇
  1991年   5932篇
  1990年   5709篇
  1989年   5352篇
  1988年   5265篇
  1987年   4848篇
  1986年   4485篇
  1985年   5773篇
  1984年   6032篇
  1983年   5125篇
  1982年   5337篇
  1981年   5121篇
  1980年   4990篇
  1979年   5124篇
  1978年   5232篇
  1977年   5188篇
  1976年   5265篇
  1975年   4994篇
  1974年   4936篇
  1973年   5241篇
  1972年   3425篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence. When the user departs, the token and device lose contact and the device secures itself. We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep. Our evaluation shows this is done without inconveniencing the user, while imposing a minimal performance overhead  相似文献   
42.
High-performance circular probe-fed stacked patch antenna designs are explored through the use of numerical optimization. New trends are sought to aid understanding and to suggest novel solutions. We describe the optimization technique, present a new design trend relating efficiency and bandwidth to the choice of substrate dielectric, and propose and demonstrate a novel, optimized antenna achieving 33% bandwidth whilst maintaining greater than 80% surface wave efficiency.  相似文献   
43.
Quality of service has become today a major concern for operators of mobile communication networks. The massive development of networks and strong competition between operators has lead to the necessary and daily follow-up of network quality of service, a key factor for its subscriber’s fidelity. This article aims at presenting the optimization methodology and proposes its illustration with a case of RNO (Radio Network Optimisation) software usage, one of the Alcatel optimization toolchain component. After a short presentation of cellular network, the optimization basic principles are described. RNO software and its main functionnalities are then detailed before a last part dedicated to a real case of optimization done with RNO software.  相似文献   
44.
On the capacities of bipartite Hamiltonians and unitary gates   总被引:2,自引:0,他引:2  
We consider interactions as bidirectional channels. We investigate the capacities for interaction Hamiltonians and nonlocal unitary gates to generate entanglement and transmit classical information. We give analytic expressions for the entanglement generating capacity and entanglement-assisted one-way classical communication capacity of interactions, and show that these quantities are additive, so that the asymptotic capacities equal the corresponding 1-shot capacities. We give general bounds on other capacities, discuss some examples, and conclude with some open questions.  相似文献   
45.
Variants are considered of palarizational frequency-selective multipath interference devices for millimetric- and submillimetric- wave receivers. Main expressions are presented that describe their characteristics. Advantages are pointed out of the devices as compared with Fabry-Perot interferometers when solving problems of received frequency-band shaping, heterodyne noise rejection, and signal- and heterodyne-radiation transfer to mixer.  相似文献   
46.
A review of Distributed Infrastructure Support for Electronic Commerce Applications by Hans-Arno Jacobsen.  相似文献   
47.
In this letter, the concept of pseudorandom active reflector, based on the ultra-wideband (UWB) technology, is introduced. It consists of a simple device that repeats a slightly delayed version of the received UWB signal only in certain time intervals according to a suitable pseudorandom time-hopping sequence. An example of application of this device for accurate ranging in precise location systems is given. The advantages of this solution are in the hardware simplicity (only the analog section is present), in the low power consumption of the reflector and in the low timing constraint regarding the relative transmitter and reflector clock rates.  相似文献   
48.
The European Physical Journal E - The isothermal gas adsorption of two hexane isomers (n-hexane and cyclohexane) in the mesopores of MCM-41 silica have been investigated by small angle neutron...  相似文献   
49.
Analogue switch for very low-voltage applications   总被引:2,自引:0,他引:2  
A new analogue switch suitable for operation at very low-voltage supply in a standard CMOS technology is presented. The proposed switch is based on 'quasi-floating-gate' transistors and has a simple and compact structure. For illustrative purposes, two sample-and-hold circuits operating from a single supply voltage close to the threshold voltage of a transistor, and using the proposed technique, are presented. Experimental results obtained from prototypes in a 1.5 /spl mu/m CMOS technology are provided.  相似文献   
50.
Algebraic theory of optimal filterbanks   总被引:1,自引:0,他引:1  
We introduce an optimality theory for finite impulse response (FIR) filterbanks using a general algebraic point of view. We consider an admissible set /spl Lscr/ of FIR filterbanks and use scalability as the main notion based on which performance of the elements in /spl Lscr/are compared. We show that quantification of scalability leads naturally to a partial ordering on the set /spl Lscr/. An optimal solution is, therefore, represented by the greatest element in /spl Lscr/. It turns out that a greatest element does not necessarily exist in /spl Lscr/. Hence, one has to settle with one of the maximal elements that exist in /spl Lscr/. We provide a systematic way of finding a maximal element by embedding the partial ordering at hand in a total ordering. This is done by using a special class of order-preserving functions known as Schur-convex. There is, however, a price to pay for achieving a total ordering: there are infinitely many possible choices for Schur-convex functions, and the optimal solution specified in /spl Lscr/ depends on this (subjective) choice. An interesting aspect of the presented algebraic theory is that the connection between several concepts, namely, principal component filterbanks (PCFBs), filterbanks with maximum coding gain, and filterbanks with good scalability, is clearly revealed. We show that these are simply associated with different extremal elements of the partial ordering induced on /spl Lscr/ by scalability.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号