首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   235970篇
  免费   2520篇
  国内免费   656篇
化学   110630篇
晶体学   3650篇
力学   8001篇
综合类   11篇
数学   19213篇
物理学   63353篇
无线电   34288篇
  2020年   1953篇
  2019年   2109篇
  2018年   2485篇
  2017年   2570篇
  2016年   3852篇
  2015年   2337篇
  2014年   3884篇
  2013年   9816篇
  2012年   6904篇
  2011年   8475篇
  2010年   6254篇
  2009年   6558篇
  2008年   8271篇
  2007年   8507篇
  2006年   8185篇
  2005年   7523篇
  2004年   6928篇
  2003年   6502篇
  2002年   6181篇
  2001年   7518篇
  2000年   5907篇
  1999年   4705篇
  1998年   3886篇
  1997年   3874篇
  1996年   3706篇
  1995年   3491篇
  1994年   3374篇
  1993年   3216篇
  1992年   3889篇
  1991年   3789篇
  1990年   3664篇
  1989年   3534篇
  1988年   3458篇
  1987年   3155篇
  1986年   2984篇
  1985年   3693篇
  1984年   3717篇
  1983年   2949篇
  1982年   3018篇
  1981年   3027篇
  1980年   2819篇
  1979年   3076篇
  1978年   3076篇
  1977年   3144篇
  1976年   2984篇
  1975年   2684篇
  1974年   2622篇
  1973年   2579篇
  1972年   1807篇
  1968年   1780篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices-battery life-and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems.  相似文献   
82.
Single-polarization single-mode photonic crystal fibers   总被引:5,自引:0,他引:5  
A new structure of single-polarization single-mode (SPSM) photonic crystal fiber (PCF) is proposed and analyzed by using a full-vector finite element method with anisotropic perfectly matched layers. From the numerical results it is confirmed that the proposed fiber is low-loss SPSM-PCF within the wavelengths ranging from 1.48 to 1.6 /spl mu/m, where only the slow-axis mode exists and the confinement loss is less than 0.1 dB/km.  相似文献   
83.
A binary extended 1-perfect code of length n + 1 = 2/sup t/ is additive if it is a subgroup of /spl Zopf//sub 2//sup /spl alpha// /spl times/ /spl Zopf//sub 4//sup /spl beta//. The punctured code by deleting a /spl Zopf//sub 2/ coordinate (if there is one) gives a perfect additive code. 1-perfect additive codes were completely characterized and by using that characterization we compute the possible parameters /spl alpha/, /spl beta/, rank, and dimension of the kernel for extended 1-perfect additive codes. A very special case is that of extended 1-perfect /spl Zopf//sub 4/-linear codes.  相似文献   
84.
Parameterisation of slant-Haar transforms   总被引:1,自引:0,他引:1  
A parameterisation of the slant-Haar transform is presented, which includes an existing version of the slant-Haar transform. An efficient algorithm for the slant-Haar transform is developed and its computational complexity is estimated. The parametric slant-Haar transforms are compared to the Karhunen-Loeve transform. The parametric slant-Haar is shown to perform better than the commonly used slant-Haar and slant-Hadamard transforms for the first-order Markov model and also performs better than the discrete cosine transform for images approximated by the generalised image correlation model  相似文献   
85.
A combination of 1,3-dihalo-5,5-dimethylhydantoin (X = Br, Cl) and sodium nitrite in the presence of wet SiO2 was used as an effective nitrosating agent for the nitrosation of N,N-dialkyl amines to their corresponding nitroso derivatives under mild and heterogeneous conditions in good to excellent yields.  相似文献   
86.
The paper discusses the applicability of quasi-crystalline approximation to describing the thermal motion of water molecules in their normal and supercooled states. The problem is subjected to the critical analysis of experimental data on incoherent scattering of slow neutrons based on theories developed by Singwi-Sjolander [1] and Oskotsky [2] modified to duly take into account the limited applicability range of diffusion approximation. The applicability conditions of quasi-crystalline approximation are shown to be consistently satisfied only when water is in supercooled state and within a narrow temperature range above the melting temperature.  相似文献   
87.
88.
The theory of characteristic modes for aperture problems is used in this paper to solve the equivalent magnetic current and aperture fields due to a conducting cylinder with multiple slots. It is assumed that these slots are illuminated by either a transverse electric (TE) or a transverse magnetic (TM) plane wave and the media inside and outside the cylinder exhibit different electromagnetic properties. The formulation is given for the general case and numerical results for a limited number of slots are presented  相似文献   
89.
This short paper discusses the method of effectively canceling equal status normal mode noise not only on a sensor line but also on a transmission line of an optical instrument using a sensor with a sensordummy resistance  相似文献   
90.
Crosstalk between microstrip transmission lines   总被引:1,自引:0,他引:1  
Methods for prediction of crosstalk between microstrip transmission lines are reviewed and simplified for the weak-coupling case. Classical coupled transmission line theory is used for uniform lines, and potential and induced EMF methods are used for crosstalk between nonuniform lines. It is shown that the potential method is equivalent to classical coupled transmission line theory for the case of uniform lines. An experiment was performed for uniform coupled microstrip lines for frequencies from 50 MHz to 5 GHz, and good agreement between theory and measurement was obtained for both near- and far-end crosstalk  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号