首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   609504篇
  免费   6482篇
  国内免费   1695篇
化学   269537篇
晶体学   8042篇
力学   24735篇
综合类   10篇
数学   75133篇
物理学   163489篇
无线电   76735篇
  2020年   3497篇
  2019年   3621篇
  2018年   12851篇
  2017年   13704篇
  2016年   11065篇
  2015年   5939篇
  2014年   7777篇
  2013年   21567篇
  2012年   19962篇
  2011年   31072篇
  2010年   20451篇
  2009年   20980篇
  2008年   29365篇
  2007年   33163篇
  2006年   19851篇
  2005年   24798篇
  2004年   20103篇
  2003年   18275篇
  2002年   16091篇
  2001年   16601篇
  2000年   13421篇
  1999年   10765篇
  1998年   9245篇
  1997年   8869篇
  1996年   8835篇
  1995年   8212篇
  1994年   7884篇
  1993年   7678篇
  1992年   8286篇
  1991年   8108篇
  1990年   7605篇
  1989年   7203篇
  1988年   7339篇
  1987年   6320篇
  1986年   6013篇
  1985年   8237篇
  1984年   8388篇
  1983年   7045篇
  1982年   7404篇
  1981年   7215篇
  1980年   6989篇
  1979年   7120篇
  1978年   7223篇
  1977年   7037篇
  1976年   7016篇
  1975年   6819篇
  1974年   6667篇
  1973年   6992篇
  1972年   4304篇
  1971年   3357篇
排序方式: 共有10000条查询结果,搜索用时 10 毫秒
201.
Nash equilibria of packet forwarding strategies in wireless ad hoc networks   总被引:8,自引:0,他引:8  
In self-organizing ad hoc networks, all the networking functions rely on the contribution of the participants. As a basic example, nodes have to forward packets for each other in order to enable multihop communication. In recent years, incentive mechanisms have been proposed to give nodes incentive to cooperate, especially in packet forwarding. However, the need for these mechanisms was not formally justified. In this paper, we address the problem of whether cooperation can exist without incentive mechanisms. We propose a model,based on game theory and graph theory to investigate equilibrium conditions of packet forwarding strategies. We prove theorems about the equilibrium conditions for both cooperative and noncooperative strategies. We perform simulations to estimate the probability that the conditions for a cooperative equilibrium hold in randomly generated network scenarios.. As the problem is involved, we deliberately restrict ourselves to a static configuration. We conclude that in static ad hoc networks where the relationships between the nodes are likely to be stab le-cooperation needs to be encouraged.  相似文献   
202.
This brief presents and compares several recursive and nonrecursive techniques for the efficient computation of the running average of discrete signals. First of all, the standard recursive algorithm is considered and its long-term accuracy is assessed when the floating-point arithmetic is employed. A cheap refreshing strategy is proposed as a means of keeping the computed value close enough to the exact one. Then, two alternative nonrecursive algorithms, requiring only log2N additions, are developed, which are as reliable and accurate as the direct implementation  相似文献   
203.
The variation of current density with bias or temperature is examined for DNA molecules of different configuration. To this end, the DNA molecule is represented as an equivalent electrical network whose behavior is then simulated with PSPICE. The results are found to be in close agreement with ones obtained within a physical model. It is established that the electrical response of a DNA molecule to an applied electric field depends on the boundary conditions and the potential profile along the molecule. This finding should contribute to the creation of a complete library of DNA-molecule configurations with prescribed electrical properties.  相似文献   
204.
This paper provides an overview of the main aspects of modern fluorescence microscopy. It covers the principles of fluorescence and highlights the key discoveries in the history of fluorescence microscopy. The paper also discusses the optics of fluorescence microscopes and examines the various types of detectors. It also discusses the signal and image processing challenges in fluorescence microscopy and highlights some of the present developments and future trends in the field.  相似文献   
205.
The continuing progression of Moore's Law has enabled the miniaturisation and dramatic cost reduction in electronics over the last ten years. For a truly pervasive communications environment the challenges of hiding key hardware technologies from the user are rapidly being overcome. This paper reviews the status of these hardware technology developments in the pervasive space and briefly discusses other contributing factors that will enable the pervasive vision to be realised.  相似文献   
206.
Spectrum asked three IEEE members from the telecommunications sector to comment on the industry's current woes and prospects. Roch Guerin discusses bandwidth as a commodity and how to deal with it. The impact of technological change on telecommunications is enormous and calls for a shift in business models. Technology is making bandwidth a commodity and it should not matter who supplies it. Competition is vital and commodity providers must be decoupled from value providers. Frank Ferrante points out that the Year 2000 crisis resulted in manufacturers being deluged with orders for new upgraded systems. Vast sums were spent to meet the demand in time. However, when Y2K was over, production stayed high and inventories continued to build, while demand effectively stopped overnight. Dazzling new innovations are needed to compel the masses to spend and manufacturers must apply their resources to deliver quickly and efficiently. Jules A. Bellisio discusses the role of engineers in bringing new ideas to the market place. Many engineers have put together ventures for the sole purpose of attracting capital. The underlying technology and business propositions were there solely to lure the unsuspecting. By allowing engineers to use technology simply to cover for a scam, then the profession is also to blame for the current problems.  相似文献   
207.
A binary extended 1-perfect code of length n + 1 = 2/sup t/ is additive if it is a subgroup of /spl Zopf//sub 2//sup /spl alpha// /spl times/ /spl Zopf//sub 4//sup /spl beta//. The punctured code by deleting a /spl Zopf//sub 2/ coordinate (if there is one) gives a perfect additive code. 1-perfect additive codes were completely characterized and by using that characterization we compute the possible parameters /spl alpha/, /spl beta/, rank, and dimension of the kernel for extended 1-perfect additive codes. A very special case is that of extended 1-perfect /spl Zopf//sub 4/-linear codes.  相似文献   
208.
Parameterisation of slant-Haar transforms   总被引:1,自引:0,他引:1  
A parameterisation of the slant-Haar transform is presented, which includes an existing version of the slant-Haar transform. An efficient algorithm for the slant-Haar transform is developed and its computational complexity is estimated. The parametric slant-Haar transforms are compared to the Karhunen-Loeve transform. The parametric slant-Haar is shown to perform better than the commonly used slant-Haar and slant-Hadamard transforms for the first-order Markov model and also performs better than the discrete cosine transform for images approximated by the generalised image correlation model  相似文献   
209.
Performance enhancing proxies (PEPs) are widely used to improve the performance of TCP over high delay‐bandwidth product links and links with high error probability. In this paper we analyse the performance of using TCP connection splitting in combination with web caching via traces obtained from a commercial satellite system. We examine the resulting performance gain under different scenarios, including the effect of caching, congestion, random loss and file sizes. We show, via analysing our measurements, that the performance gain from using splitting is highly sensitive to random losses and the number of simultaneous connections, and that such sensitivity is alleviated by caching. On the other hand, the use of a splitting proxy enhances the value of web caching in that cache hits result in much more significant performance improvement over cache misses when TCP splitting is used. We also compare the performance of using different versions of HTTP in such a system. Copyright © 2003 John Wiley & Sons, Ltd.  相似文献   
210.
A 43-Gb/s receiver (Rx) and transmitter (Tx) chip set for SONET OC-768 transmission systems is reported. Both ICs are implemented in a 0.18-/spl mu/m SiGe BiCMOS technology featuring 120-GHz f/sub T/ and 100 GHz f/sub max/. The Rx includes a limiting amplifier, a half-rate clock and data recovery unit, a 1:4 demultiplexer, a frequency acquisition aid, and a frequency lock detector. Input sensitivity for a bit-error rate less than 10/sup -9/ is 40 mV and jitter generation better than 230 fs rms. The IC dissipates 2.4 W from a -3.6-V supply voltage. The Tx integrates a half-rate clock multiplier unit with a 4:1 multiplexer. Measured clock jitter generation is better than 170 fs rms. The IC consumes 2.3 W from a -3.6-V supply voltage.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号