全文获取类型
收费全文 | 326387篇 |
免费 | 14224篇 |
国内免费 | 9433篇 |
专业分类
化学 | 148255篇 |
晶体学 | 3970篇 |
力学 | 13840篇 |
综合类 | 520篇 |
数学 | 30824篇 |
物理学 | 93276篇 |
无线电 | 59359篇 |
出版年
2022年 | 3803篇 |
2021年 | 5029篇 |
2020年 | 5111篇 |
2019年 | 5187篇 |
2018年 | 5579篇 |
2017年 | 5282篇 |
2016年 | 7656篇 |
2015年 | 6225篇 |
2014年 | 8533篇 |
2013年 | 15634篇 |
2012年 | 14631篇 |
2011年 | 16254篇 |
2010年 | 11735篇 |
2009年 | 11984篇 |
2008年 | 14513篇 |
2007年 | 14488篇 |
2006年 | 13952篇 |
2005年 | 12476篇 |
2004年 | 10909篇 |
2003年 | 9584篇 |
2002年 | 8959篇 |
2001年 | 9629篇 |
2000年 | 8121篇 |
1999年 | 7093篇 |
1998年 | 6019篇 |
1997年 | 5769篇 |
1996年 | 5439篇 |
1995年 | 5104篇 |
1994年 | 4792篇 |
1993年 | 4469篇 |
1992年 | 4697篇 |
1991年 | 4435篇 |
1990年 | 4167篇 |
1989年 | 3760篇 |
1988年 | 3569篇 |
1987年 | 3229篇 |
1986年 | 2968篇 |
1985年 | 3666篇 |
1984年 | 3788篇 |
1983年 | 3133篇 |
1982年 | 3241篇 |
1981年 | 3167篇 |
1980年 | 2992篇 |
1979年 | 3020篇 |
1978年 | 3104篇 |
1977年 | 3107篇 |
1976年 | 3125篇 |
1975年 | 2933篇 |
1974年 | 2900篇 |
1973年 | 3067篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
102.
The prohibitive - exponential in the number of users - computational complexity of the maximum-likelihood multiuser detector for direct-sequence code-division multiple-access communications has fueled an extensive research effort for the development of low-complexity multiuser detection alternatives. We show that we can efficiently and effectively approach the error rate performance of the optimum multiuser detector as follows. We utilize a multiuser zero-forcing or minimum mean-square error (MMSE) linear filter as a preprocessor and we establish that the output magnitudes, when properly scaled, provide a reliability measure for each user bit decision. Then, we prepare an ordered, reliability-based error search sequence of length linear in the number of users; it returns the most likely user bit vector among all visited options. Numerical and simulation studies for moderately loaded systems that permit exact implementation of the optimum detector indicate that the error rate performance of the optimum and the proposed detector are nearly indistinguishable over the whole predetection. signal-to-noise ratio range of practical interest. Similar studies for higher user loads (that prohibit comparisons with the optimum detector) demonstrate error rate performance gains of orders of magnitude in comparison with straight decorrelating or MMSE multiuser detection. 相似文献
103.
Shiao-Shien Chen Tung-Yang Chen Tien-Hao Tang Jin-Lian Su Tzer-Min Shen Jen-Kon Chen 《Electron Devices, IEEE Transactions on》2003,50(7):1683-1689
This paper proposes a novel low-leakage BiCMOS deep-trench (DT) diode in a 0.18-/spl mu/m silicon germanium (SiGe) BiCMOS process. By means of the DT and an n/sup +/ buried layer in the SiGe BiCMOS process, a parasitic vertical p-n-p bipolar transistor with an open-base configuration is formed in the BiCMOS DT diode. Based on the two-dimensional (2-D) simulation and measured results, the BiCMOS DT diode indeed has the lowest substrate leakage current as compared to the conventional p/sup +//n-well diode even at high temperature conditions, which mainly results from the existence of the parasitic open-base bipolar transistor. Considering the applications of the diode string in electrostatic discharge (ESD) protection circuit designs, the BiCMOS DT diode string also provides a good ESD performance. Owing to the characteristics of the low leakage current and high ESD robustness, it is very convenient for circuit designers to use the BiCMOS DT diode string in their IC designs. 相似文献
104.
105.
Mobile devices are vulnerable to theft and loss due to their small size and the characteristics of their common usage environment. Since they allow users to work while away from their desk, they are most useful in public locations and while traveling. Unfortunately, this is also where they are most at risk. Existing schemes for securing data either do not protect the device after it is stolen or require bothersome reauthentication. Transient Authentication lifts the burden of authentication from the user by use of a wearable token that constantly attests to the user's presence. When the user departs, the token and device lose contact and the device secures itself. We show how to leverage this authentication framework to secure all the memory and storage locations on a device into which secrets may creep. Our evaluation shows this is done without inconveniencing the user, while imposing a minimal performance overhead 相似文献
106.
H.W. Choi C.W. Jeon M.D. Dawson 《Photonics Technology Letters, IEEE》2004,16(1):33-35
The fabrication and performance of an InGaN light-emitting diode (LED) array based on a microring device geometry is reported. This design has been adopted in order to increase the surface area for light extraction and to minimize losses due to internal reflections and reabsorption. Electrical characteristics of these devices are similar to those of a conventional large-area LED, while the directed light extraction proves to be superior. In fact, these devices are found to be more efficient when operated at higher currents. This may be attributed to improved heat sinking due to the large surface area to volume ratio. The potential applications of these devices are also discussed. 相似文献
107.
Mitchell A. Lech M. Kokotoff D.M. Waterhouse R.B. 《Antennas and Propagation, IEEE Transactions on》2003,51(2):249-255
High-performance circular probe-fed stacked patch antenna designs are explored through the use of numerical optimization. New trends are sought to aid understanding and to suggest novel solutions. We describe the optimization technique, present a new design trend relating efficiency and bandwidth to the choice of substrate dielectric, and propose and demonstrate a novel, optimized antenna achieving 33% bandwidth whilst maintaining greater than 80% surface wave efficiency. 相似文献
108.
针对电信运营商在构建内部数据通信网(DCN)时遇到的各应用系统的隔离问题,详细介绍了目前几种主流的虚拟专用网(VPN)技术,并进行分析比较,最后提出了运营商内部数据通信网的VPN解决方案。 相似文献
109.
On the capacities of bipartite Hamiltonians and unitary gates 总被引:2,自引:0,他引:2
Bennett C.H. Harrow A.W. Leung D.W. Smolin J.A. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2003,49(8):1895-1911
We consider interactions as bidirectional channels. We investigate the capacities for interaction Hamiltonians and nonlocal unitary gates to generate entanglement and transmit classical information. We give analytic expressions for the entanglement generating capacity and entanglement-assisted one-way classical communication capacity of interactions, and show that these quantities are additive, so that the asymptotic capacities equal the corresponding 1-shot capacities. We give general bounds on other capacities, discuss some examples, and conclude with some open questions. 相似文献
110.
In this letter, the concept of pseudorandom active reflector, based on the ultra-wideband (UWB) technology, is introduced. It consists of a simple device that repeats a slightly delayed version of the received UWB signal only in certain time intervals according to a suitable pseudorandom time-hopping sequence. An example of application of this device for accurate ranging in precise location systems is given. The advantages of this solution are in the hardware simplicity (only the analog section is present), in the low power consumption of the reflector and in the low timing constraint regarding the relative transmitter and reflector clock rates. 相似文献