全文获取类型
收费全文 | 235807篇 |
免费 | 2521篇 |
国内免费 | 649篇 |
专业分类
化学 | 110525篇 |
晶体学 | 3647篇 |
力学 | 7996篇 |
综合类 | 11篇 |
数学 | 19194篇 |
物理学 | 63324篇 |
无线电 | 34280篇 |
出版年
2020年 | 1951篇 |
2019年 | 2108篇 |
2018年 | 2484篇 |
2017年 | 2570篇 |
2016年 | 3849篇 |
2015年 | 2329篇 |
2014年 | 3880篇 |
2013年 | 9810篇 |
2012年 | 6898篇 |
2011年 | 8465篇 |
2010年 | 6252篇 |
2009年 | 6556篇 |
2008年 | 8261篇 |
2007年 | 8497篇 |
2006年 | 8177篇 |
2005年 | 7518篇 |
2004年 | 6923篇 |
2003年 | 6498篇 |
2002年 | 6177篇 |
2001年 | 7516篇 |
2000年 | 5900篇 |
1999年 | 4703篇 |
1998年 | 3883篇 |
1997年 | 3869篇 |
1996年 | 3701篇 |
1995年 | 3485篇 |
1994年 | 3371篇 |
1993年 | 3209篇 |
1992年 | 3886篇 |
1991年 | 3787篇 |
1990年 | 3661篇 |
1989年 | 3531篇 |
1988年 | 3457篇 |
1987年 | 3153篇 |
1986年 | 2983篇 |
1985年 | 3689篇 |
1984年 | 3715篇 |
1983年 | 2948篇 |
1982年 | 3017篇 |
1981年 | 3027篇 |
1980年 | 2819篇 |
1979年 | 3075篇 |
1978年 | 3076篇 |
1977年 | 3143篇 |
1976年 | 2984篇 |
1975年 | 2684篇 |
1974年 | 2622篇 |
1973年 | 2578篇 |
1972年 | 1806篇 |
1968年 | 1780篇 |
排序方式: 共有10000条查询结果,搜索用时 23 毫秒
141.
Y.K. Su H.C. Wang C.L. Lin W.B. Chen S.M. Chen 《Photonics Technology Letters, IEEE》2003,15(10):1345-1347
The brightness of AlGaInP light emitting diodes (LEDs) has been raised by a factor of 1.12 at 20 mA by sulfide passivation. Meanwhile, the sulfide also can decrease leakage current of AlGaInP LEDs at -2 V to nearly one thousandth of that in the as-fabricated device. The possible causes for the brightness increase of AlGaInP LEDs after sulfide treatment including surface roughness, reduction of Fresnel loss, and effective injection of carriers were demonstrated. 相似文献
142.
A new method has been developed for compressing the matrices that occur in most integral-equation-based computer programs. This method is easy to interface with existing computer programs, and allows them to run significantly faster and with significantly less memory. This method applies not only to electromagnetic and acoustic computation, but also to most programs involving a Green's function or any integral equation with a kernel having some smoothness properties. Our numerical computations, running on a high-end personal computer, have achieved compression ratios of fifty times, and compressed inversion of the matrices fifty times faster than by previous methods. For larger problems, solved on high-performance computers, these ratios would improve to about one thousand to one for larger moment method problems. 相似文献
143.
In this letter, bandpass filters with one or two tunable transmission zeros are proposed. The reconfigurable transmission zeros are implemented through varactors in combination with tapped quarter-wavelength stubs. Based on mixed mode simulations including EM simulation and circuit simulation, the proposed filters were designed and fabricated on low-cost FR4 board. The measurement results verified the design concepts. 相似文献
144.
We address the problem of global sensor fusion for the purpose of distributed decision-making, from a control-theoretic perspective. In particular, we introduce a quasi-linear stochastic distributed protocol, using which a network of sensing agents can reach agreement in order to take a collective action. Using control-theoretic methods, we design the parameters of our protocol - which include weights in the local update rules used by the agents and a finite stopping time - to achieve agreement in a fair and rapid manner. We show analytically that the developed protocol achieves fair agreement with certainty in the noise-free case and achieves fair agreement with high probability even in the presence of communication noise and assuming very little information storage capability for the agents. Our development is illustrated throughout with a canonical example motivated by autonomous vehicle control. 相似文献
145.
A study of the energy consumption characteristics of cryptographic algorithms and security protocols 总被引:2,自引:0,他引:2
Potlapally N.R. Ravi S. Raghunathan A. Jha N.K. 《Mobile Computing, IEEE Transactions on》2006,5(2):128-143
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices-battery life-and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems. 相似文献
146.
Castro M. Foster R.S. Gunn K. Roberts E.B. 《Engineering Management, IEEE Transactions on》2003,50(3):297-306
The virtual agency concept is now used within the United States Government as an alliance approach to manage large research and development (R&D) processes across departments. This paper examines the history of the virtual agency concept and its important characteristics. The paper identifies the potential benefits and associated risks involved in managing R&D within a virtual agency. Three cases are examined where the virtual agency concept has been applied to R&D programs: the High Performance Computing and Communications initiative, the Next Generation Internet, and the Partnership for a New Generation of Vehicles. The case studies indicate that the R&D process is attempting to balance formal process controls with the agility to adapt rapidly to new research opportunities. Virtual agencies can be used to improve organizational efficiency, improve knowledge transfer, increase interoperability through standards, provide better alignment of agency missions with national policy, and introduce increased flexibility into the R&D process. At the same time, the virtual agency concept has major risks including inefficiencies due to organizational complexity, the danger of collective myopia, the problem of adopting standards too early, the difficulty of reaching objectives in a loose organizational structure, and the problem of properly balancing the tension between agency mission objectives and national policy agendas. 相似文献
147.
Single-polarization single-mode photonic crystal fibers 总被引:5,自引:0,他引:5
K. Saitoh M. Koshiba 《Photonics Technology Letters, IEEE》2003,15(10):1384-1386
A new structure of single-polarization single-mode (SPSM) photonic crystal fiber (PCF) is proposed and analyzed by using a full-vector finite element method with anisotropic perfectly matched layers. From the numerical results it is confirmed that the proposed fiber is low-loss SPSM-PCF within the wavelengths ranging from 1.48 to 1.6 /spl mu/m, where only the slow-axis mode exists and the confinement loss is less than 0.1 dB/km. 相似文献
148.
Borges J. Phelps K.T. Rifa J. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2003,49(8):2028-2034
A binary extended 1-perfect code of length n + 1 = 2/sup t/ is additive if it is a subgroup of /spl Zopf//sub 2//sup /spl alpha// /spl times/ /spl Zopf//sub 4//sup /spl beta//. The punctured code by deleting a /spl Zopf//sub 2/ coordinate (if there is one) gives a perfect additive code. 1-perfect additive codes were completely characterized and by using that characterization we compute the possible parameters /spl alpha/, /spl beta/, rank, and dimension of the kernel for extended 1-perfect additive codes. A very special case is that of extended 1-perfect /spl Zopf//sub 4/-linear codes. 相似文献
149.
Parameterisation of slant-Haar transforms 总被引:1,自引:0,他引:1
Agaian S. Tourshan K. Noonan J.P. 《Vision, Image and Signal Processing, IEE Proceedings -》2003,150(5):11
A parameterisation of the slant-Haar transform is presented, which includes an existing version of the slant-Haar transform. An efficient algorithm for the slant-Haar transform is developed and its computational complexity is estimated. The parametric slant-Haar transforms are compared to the Karhunen-Loeve transform. The parametric slant-Haar is shown to perform better than the commonly used slant-Haar and slant-Hadamard transforms for the first-order Markov model and also performs better than the discrete cosine transform for images approximated by the generalised image correlation model 相似文献
150.
W. L. Liang B. K. A. Ngoi L. E. N. Lim K. Venkatakrishnan C. W. Hee 《Optics & Laser Technology》2003,35(4):285-290
In this paper, integration of interference phenomenon into femtosecond laser micromachining was reported as the femtosecond laser pulses were reshaped spatially to perform ablation. The generation of circular interference pattern was demonstrated by overlapping infrared femtosecond laser pulses. The interference pattern was subsequently focused on a copper substrate to ablate microstructures of concentric circular rings. The present technique is expected to open up new applications in the areas of rapid fabrication of micro-Fresnel lenses, hybrid microlenses and lens arrays. 相似文献