首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   369717篇
  免费   4952篇
  国内免费   1199篇
化学   171146篇
晶体学   4470篇
力学   13085篇
综合类   7篇
数学   36368篇
物理学   95213篇
无线电   55579篇
  2020年   2172篇
  2019年   2131篇
  2018年   2193篇
  2017年   2083篇
  2016年   4249篇
  2015年   3472篇
  2014年   4876篇
  2013年   14858篇
  2012年   11352篇
  2011年   14145篇
  2010年   9138篇
  2009年   9722篇
  2008年   14354篇
  2007年   15073篇
  2006年   14600篇
  2005年   13640篇
  2004年   12355篇
  2003年   11039篇
  2002年   10860篇
  2001年   12323篇
  2000年   9820篇
  1999年   8020篇
  1998年   6824篇
  1997年   6605篇
  1996年   6576篇
  1995年   6163篇
  1994年   5860篇
  1993年   5690篇
  1992年   6106篇
  1991年   5994篇
  1990年   5544篇
  1989年   5188篇
  1988年   5382篇
  1987年   4430篇
  1986年   4286篇
  1985年   5960篇
  1984年   6021篇
  1983年   4962篇
  1982年   5312篇
  1981年   5285篇
  1980年   5031篇
  1979年   5078篇
  1978年   5073篇
  1977年   5041篇
  1976年   4962篇
  1975年   4854篇
  1974年   4714篇
  1973年   4849篇
  1972年   2822篇
  1971年   2126篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
121.
We propose a definition of the discrete Lyapunov exponent for an arbitrary permutation of a finite lattice. For discrete-time dynamical systems, it measures the local (between neighboring points) average spreading of the system. We justify our definition by proving that, for large classes of chaotic maps, the corresponding discrete Lyapunov exponent approaches the largest Lyapunov exponent of a chaotic map when M/spl rarr//spl infin/, where M is the cardinality of the discrete phase space. In analogy with continuous systems, we say the system has discrete chaos if its discrete Lyapunov exponent tends to a positive number, when M/spl rarr//spl infin/. We present several examples to illustrate the concepts being introduced.  相似文献   
122.
Most embedded systems have limited amount of memory. In contrast, the memory requirements of the digital signal processing (DSP) and video processing codes (in nested loops, in particular) running on embedded systems is significant. This paper addresses the problem of estimating and reducing the amount of memory needed for transfers of data in embedded systems. First, the problem of estimating the region associated with a statement or the set of elements referenced by a statement during the execution of nested loops is analyzed. For a fixed execution ordering, a quantitative analysis of the number of elements referenced is presented; exact expressions for uniformly generated references and a close upper and lower bound for nonuniformly generated references are derived. Second, in addition to presenting an algorithm that computes the total memory required, this paper also discusses the effect of transformations (that change the execution ordering) on the lifetimes of array variables, i.e., the time between the first and last accesses to a given array location. The term maximum window size is introduced, and quantitative expressions are derived to compute the maximum window size. A detailed analysis of the effect of unimodular transformations on data locality, including the calculation of the maximum window size, is presented.  相似文献   
123.
In this letter, bandpass filters with one or two tunable transmission zeros are proposed. The reconfigurable transmission zeros are implemented through varactors in combination with tapped quarter-wavelength stubs. Based on mixed mode simulations including EM simulation and circuit simulation, the proposed filters were designed and fabricated on low-cost FR4 board. The measurement results verified the design concepts.  相似文献   
124.
Nash equilibria of packet forwarding strategies in wireless ad hoc networks   总被引:8,自引:0,他引:8  
In self-organizing ad hoc networks, all the networking functions rely on the contribution of the participants. As a basic example, nodes have to forward packets for each other in order to enable multihop communication. In recent years, incentive mechanisms have been proposed to give nodes incentive to cooperate, especially in packet forwarding. However, the need for these mechanisms was not formally justified. In this paper, we address the problem of whether cooperation can exist without incentive mechanisms. We propose a model,based on game theory and graph theory to investigate equilibrium conditions of packet forwarding strategies. We prove theorems about the equilibrium conditions for both cooperative and noncooperative strategies. We perform simulations to estimate the probability that the conditions for a cooperative equilibrium hold in randomly generated network scenarios.. As the problem is involved, we deliberately restrict ourselves to a static configuration. We conclude that in static ad hoc networks where the relationships between the nodes are likely to be stab le-cooperation needs to be encouraged.  相似文献   
125.
This brief presents and compares several recursive and nonrecursive techniques for the efficient computation of the running average of discrete signals. First of all, the standard recursive algorithm is considered and its long-term accuracy is assessed when the floating-point arithmetic is employed. A cheap refreshing strategy is proposed as a means of keeping the computed value close enough to the exact one. Then, two alternative nonrecursive algorithms, requiring only log2N additions, are developed, which are as reliable and accurate as the direct implementation  相似文献   
126.
The variation of current density with bias or temperature is examined for DNA molecules of different configuration. To this end, the DNA molecule is represented as an equivalent electrical network whose behavior is then simulated with PSPICE. The results are found to be in close agreement with ones obtained within a physical model. It is established that the electrical response of a DNA molecule to an applied electric field depends on the boundary conditions and the potential profile along the molecule. This finding should contribute to the creation of a complete library of DNA-molecule configurations with prescribed electrical properties.  相似文献   
127.
This paper provides an overview of the main aspects of modern fluorescence microscopy. It covers the principles of fluorescence and highlights the key discoveries in the history of fluorescence microscopy. The paper also discusses the optics of fluorescence microscopes and examines the various types of detectors. It also discusses the signal and image processing challenges in fluorescence microscopy and highlights some of the present developments and future trends in the field.  相似文献   
128.
Spectrum asked three IEEE members from the telecommunications sector to comment on the industry's current woes and prospects. Roch Guerin discusses bandwidth as a commodity and how to deal with it. The impact of technological change on telecommunications is enormous and calls for a shift in business models. Technology is making bandwidth a commodity and it should not matter who supplies it. Competition is vital and commodity providers must be decoupled from value providers. Frank Ferrante points out that the Year 2000 crisis resulted in manufacturers being deluged with orders for new upgraded systems. Vast sums were spent to meet the demand in time. However, when Y2K was over, production stayed high and inventories continued to build, while demand effectively stopped overnight. Dazzling new innovations are needed to compel the masses to spend and manufacturers must apply their resources to deliver quickly and efficiently. Jules A. Bellisio discusses the role of engineers in bringing new ideas to the market place. Many engineers have put together ventures for the sole purpose of attracting capital. The underlying technology and business propositions were there solely to lure the unsuspecting. By allowing engineers to use technology simply to cover for a scam, then the profession is also to blame for the current problems.  相似文献   
129.
A binary extended 1-perfect code of length n + 1 = 2/sup t/ is additive if it is a subgroup of /spl Zopf//sub 2//sup /spl alpha// /spl times/ /spl Zopf//sub 4//sup /spl beta//. The punctured code by deleting a /spl Zopf//sub 2/ coordinate (if there is one) gives a perfect additive code. 1-perfect additive codes were completely characterized and by using that characterization we compute the possible parameters /spl alpha/, /spl beta/, rank, and dimension of the kernel for extended 1-perfect additive codes. A very special case is that of extended 1-perfect /spl Zopf//sub 4/-linear codes.  相似文献   
130.
Parameterisation of slant-Haar transforms   总被引:1,自引:0,他引:1  
A parameterisation of the slant-Haar transform is presented, which includes an existing version of the slant-Haar transform. An efficient algorithm for the slant-Haar transform is developed and its computational complexity is estimated. The parametric slant-Haar transforms are compared to the Karhunen-Loeve transform. The parametric slant-Haar is shown to perform better than the commonly used slant-Haar and slant-Hadamard transforms for the first-order Markov model and also performs better than the discrete cosine transform for images approximated by the generalised image correlation model  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号