首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   369068篇
  免费   4954篇
  国内免费   1197篇
化学   171036篇
晶体学   4465篇
力学   13036篇
综合类   7篇
数学   36279篇
物理学   94864篇
无线电   55532篇
  2020年   2155篇
  2019年   2115篇
  2018年   2176篇
  2017年   2068篇
  2016年   4219篇
  2015年   3463篇
  2014年   4857篇
  2013年   14824篇
  2012年   11313篇
  2011年   14101篇
  2010年   9094篇
  2009年   9696篇
  2008年   14323篇
  2007年   15039篇
  2006年   14576篇
  2005年   13614篇
  2004年   12345篇
  2003年   11023篇
  2002年   10846篇
  2001年   12299篇
  2000年   9809篇
  1999年   8012篇
  1998年   6816篇
  1997年   6588篇
  1996年   6563篇
  1995年   6147篇
  1994年   5854篇
  1993年   5669篇
  1992年   6105篇
  1991年   6003篇
  1990年   5539篇
  1989年   5180篇
  1988年   5386篇
  1987年   4420篇
  1986年   4297篇
  1985年   5963篇
  1984年   6019篇
  1983年   4958篇
  1982年   5306篇
  1981年   5281篇
  1980年   5025篇
  1979年   5077篇
  1978年   5074篇
  1977年   5042篇
  1976年   4968篇
  1975年   4855篇
  1974年   4719篇
  1973年   4848篇
  1972年   2819篇
  1971年   2125篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
121.
Most embedded systems have limited amount of memory. In contrast, the memory requirements of the digital signal processing (DSP) and video processing codes (in nested loops, in particular) running on embedded systems is significant. This paper addresses the problem of estimating and reducing the amount of memory needed for transfers of data in embedded systems. First, the problem of estimating the region associated with a statement or the set of elements referenced by a statement during the execution of nested loops is analyzed. For a fixed execution ordering, a quantitative analysis of the number of elements referenced is presented; exact expressions for uniformly generated references and a close upper and lower bound for nonuniformly generated references are derived. Second, in addition to presenting an algorithm that computes the total memory required, this paper also discusses the effect of transformations (that change the execution ordering) on the lifetimes of array variables, i.e., the time between the first and last accesses to a given array location. The term maximum window size is introduced, and quantitative expressions are derived to compute the maximum window size. A detailed analysis of the effect of unimodular transformations on data locality, including the calculation of the maximum window size, is presented.  相似文献   
122.
In this letter, bandpass filters with one or two tunable transmission zeros are proposed. The reconfigurable transmission zeros are implemented through varactors in combination with tapped quarter-wavelength stubs. Based on mixed mode simulations including EM simulation and circuit simulation, the proposed filters were designed and fabricated on low-cost FR4 board. The measurement results verified the design concepts.  相似文献   
123.
Nash equilibria of packet forwarding strategies in wireless ad hoc networks   总被引:8,自引:0,他引:8  
In self-organizing ad hoc networks, all the networking functions rely on the contribution of the participants. As a basic example, nodes have to forward packets for each other in order to enable multihop communication. In recent years, incentive mechanisms have been proposed to give nodes incentive to cooperate, especially in packet forwarding. However, the need for these mechanisms was not formally justified. In this paper, we address the problem of whether cooperation can exist without incentive mechanisms. We propose a model,based on game theory and graph theory to investigate equilibrium conditions of packet forwarding strategies. We prove theorems about the equilibrium conditions for both cooperative and noncooperative strategies. We perform simulations to estimate the probability that the conditions for a cooperative equilibrium hold in randomly generated network scenarios.. As the problem is involved, we deliberately restrict ourselves to a static configuration. We conclude that in static ad hoc networks where the relationships between the nodes are likely to be stab le-cooperation needs to be encouraged.  相似文献   
124.
This brief presents and compares several recursive and nonrecursive techniques for the efficient computation of the running average of discrete signals. First of all, the standard recursive algorithm is considered and its long-term accuracy is assessed when the floating-point arithmetic is employed. A cheap refreshing strategy is proposed as a means of keeping the computed value close enough to the exact one. Then, two alternative nonrecursive algorithms, requiring only log2N additions, are developed, which are as reliable and accurate as the direct implementation  相似文献   
125.
The variation of current density with bias or temperature is examined for DNA molecules of different configuration. To this end, the DNA molecule is represented as an equivalent electrical network whose behavior is then simulated with PSPICE. The results are found to be in close agreement with ones obtained within a physical model. It is established that the electrical response of a DNA molecule to an applied electric field depends on the boundary conditions and the potential profile along the molecule. This finding should contribute to the creation of a complete library of DNA-molecule configurations with prescribed electrical properties.  相似文献   
126.
This paper provides an overview of the main aspects of modern fluorescence microscopy. It covers the principles of fluorescence and highlights the key discoveries in the history of fluorescence microscopy. The paper also discusses the optics of fluorescence microscopes and examines the various types of detectors. It also discusses the signal and image processing challenges in fluorescence microscopy and highlights some of the present developments and future trends in the field.  相似文献   
127.
Spectrum asked three IEEE members from the telecommunications sector to comment on the industry's current woes and prospects. Roch Guerin discusses bandwidth as a commodity and how to deal with it. The impact of technological change on telecommunications is enormous and calls for a shift in business models. Technology is making bandwidth a commodity and it should not matter who supplies it. Competition is vital and commodity providers must be decoupled from value providers. Frank Ferrante points out that the Year 2000 crisis resulted in manufacturers being deluged with orders for new upgraded systems. Vast sums were spent to meet the demand in time. However, when Y2K was over, production stayed high and inventories continued to build, while demand effectively stopped overnight. Dazzling new innovations are needed to compel the masses to spend and manufacturers must apply their resources to deliver quickly and efficiently. Jules A. Bellisio discusses the role of engineers in bringing new ideas to the market place. Many engineers have put together ventures for the sole purpose of attracting capital. The underlying technology and business propositions were there solely to lure the unsuspecting. By allowing engineers to use technology simply to cover for a scam, then the profession is also to blame for the current problems.  相似文献   
128.
A binary extended 1-perfect code of length n + 1 = 2/sup t/ is additive if it is a subgroup of /spl Zopf//sub 2//sup /spl alpha// /spl times/ /spl Zopf//sub 4//sup /spl beta//. The punctured code by deleting a /spl Zopf//sub 2/ coordinate (if there is one) gives a perfect additive code. 1-perfect additive codes were completely characterized and by using that characterization we compute the possible parameters /spl alpha/, /spl beta/, rank, and dimension of the kernel for extended 1-perfect additive codes. A very special case is that of extended 1-perfect /spl Zopf//sub 4/-linear codes.  相似文献   
129.
Parameterisation of slant-Haar transforms   总被引:1,自引:0,他引:1  
A parameterisation of the slant-Haar transform is presented, which includes an existing version of the slant-Haar transform. An efficient algorithm for the slant-Haar transform is developed and its computational complexity is estimated. The parametric slant-Haar transforms are compared to the Karhunen-Loeve transform. The parametric slant-Haar is shown to perform better than the commonly used slant-Haar and slant-Hadamard transforms for the first-order Markov model and also performs better than the discrete cosine transform for images approximated by the generalised image correlation model  相似文献   
130.
Performance enhancing proxies (PEPs) are widely used to improve the performance of TCP over high delay‐bandwidth product links and links with high error probability. In this paper we analyse the performance of using TCP connection splitting in combination with web caching via traces obtained from a commercial satellite system. We examine the resulting performance gain under different scenarios, including the effect of caching, congestion, random loss and file sizes. We show, via analysing our measurements, that the performance gain from using splitting is highly sensitive to random losses and the number of simultaneous connections, and that such sensitivity is alleviated by caching. On the other hand, the use of a splitting proxy enhances the value of web caching in that cache hits result in much more significant performance improvement over cache misses when TCP splitting is used. We also compare the performance of using different versions of HTTP in such a system. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号