全文获取类型
收费全文 | 235970篇 |
免费 | 2520篇 |
国内免费 | 656篇 |
专业分类
化学 | 110630篇 |
晶体学 | 3650篇 |
力学 | 8001篇 |
综合类 | 11篇 |
数学 | 19213篇 |
物理学 | 63353篇 |
无线电 | 34288篇 |
出版年
2020年 | 1953篇 |
2019年 | 2109篇 |
2018年 | 2485篇 |
2017年 | 2570篇 |
2016年 | 3852篇 |
2015年 | 2337篇 |
2014年 | 3884篇 |
2013年 | 9816篇 |
2012年 | 6904篇 |
2011年 | 8475篇 |
2010年 | 6254篇 |
2009年 | 6558篇 |
2008年 | 8271篇 |
2007年 | 8507篇 |
2006年 | 8185篇 |
2005年 | 7523篇 |
2004年 | 6928篇 |
2003年 | 6502篇 |
2002年 | 6181篇 |
2001年 | 7518篇 |
2000年 | 5907篇 |
1999年 | 4705篇 |
1998年 | 3886篇 |
1997年 | 3874篇 |
1996年 | 3706篇 |
1995年 | 3491篇 |
1994年 | 3374篇 |
1993年 | 3216篇 |
1992年 | 3889篇 |
1991年 | 3789篇 |
1990年 | 3664篇 |
1989年 | 3534篇 |
1988年 | 3458篇 |
1987年 | 3155篇 |
1986年 | 2984篇 |
1985年 | 3693篇 |
1984年 | 3717篇 |
1983年 | 2949篇 |
1982年 | 3018篇 |
1981年 | 3027篇 |
1980年 | 2819篇 |
1979年 | 3076篇 |
1978年 | 3076篇 |
1977年 | 3144篇 |
1976年 | 2984篇 |
1975年 | 2684篇 |
1974年 | 2622篇 |
1973年 | 2579篇 |
1972年 | 1807篇 |
1968年 | 1780篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
81.
A study of the energy consumption characteristics of cryptographic algorithms and security protocols 总被引:2,自引:0,他引:2
Potlapally N.R. Ravi S. Raghunathan A. Jha N.K. 《Mobile Computing, IEEE Transactions on》2006,5(2):128-143
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices-battery life-and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems. 相似文献
82.
Single-polarization single-mode photonic crystal fibers 总被引:5,自引:0,他引:5
K. Saitoh M. Koshiba 《Photonics Technology Letters, IEEE》2003,15(10):1384-1386
A new structure of single-polarization single-mode (SPSM) photonic crystal fiber (PCF) is proposed and analyzed by using a full-vector finite element method with anisotropic perfectly matched layers. From the numerical results it is confirmed that the proposed fiber is low-loss SPSM-PCF within the wavelengths ranging from 1.48 to 1.6 /spl mu/m, where only the slow-axis mode exists and the confinement loss is less than 0.1 dB/km. 相似文献
83.
Borges J. Phelps K.T. Rifa J. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2003,49(8):2028-2034
A binary extended 1-perfect code of length n + 1 = 2/sup t/ is additive if it is a subgroup of /spl Zopf//sub 2//sup /spl alpha// /spl times/ /spl Zopf//sub 4//sup /spl beta//. The punctured code by deleting a /spl Zopf//sub 2/ coordinate (if there is one) gives a perfect additive code. 1-perfect additive codes were completely characterized and by using that characterization we compute the possible parameters /spl alpha/, /spl beta/, rank, and dimension of the kernel for extended 1-perfect additive codes. A very special case is that of extended 1-perfect /spl Zopf//sub 4/-linear codes. 相似文献
84.
Parameterisation of slant-Haar transforms 总被引:1,自引:0,他引:1
Agaian S. Tourshan K. Noonan J.P. 《Vision, Image and Signal Processing, IEE Proceedings -》2003,150(5):11
A parameterisation of the slant-Haar transform is presented, which includes an existing version of the slant-Haar transform. An efficient algorithm for the slant-Haar transform is developed and its computational complexity is estimated. The parametric slant-Haar transforms are compared to the Karhunen-Loeve transform. The parametric slant-Haar is shown to perform better than the commonly used slant-Haar and slant-Hadamard transforms for the first-order Markov model and also performs better than the discrete cosine transform for images approximated by the generalised image correlation model 相似文献
85.
A combination of 1,3-dihalo-5,5-dimethylhydantoin (X = Br, Cl) and sodium nitrite in the presence of wet SiO2 was used as an effective nitrosating agent for the nitrosation of N,N-dialkyl amines to their corresponding nitroso derivatives under mild and heterogeneous conditions in good to excellent yields. 相似文献
86.
The paper discusses the applicability of quasi-crystalline approximation to describing the thermal motion of water molecules in their normal and supercooled states. The problem is subjected to the critical analysis of experimental data on incoherent scattering of slow neutrons based on theories developed by Singwi-Sjolander [1] and Oskotsky [2] modified to duly take into account the limited applicability range of diffusion approximation. The applicability conditions of quasi-crystalline approximation are shown to be consistently satisfied only when water is in supercooled state and within a narrow temperature range above the melting temperature. 相似文献
87.
88.
The theory of characteristic modes for aperture problems is used in this paper to solve the equivalent magnetic current and aperture fields due to a conducting cylinder with multiple slots. It is assumed that these slots are illuminated by either a transverse electric (TE) or a transverse magnetic (TM) plane wave and the media inside and outside the cylinder exhibit different electromagnetic properties. The formulation is given for the general case and numerical results for a limited number of slots are presented 相似文献
89.
Mine K. Kubota N. Morimoto F. Sanada M. Zhang Qi 《Electromagnetic Compatibility, IEEE Transactions on》1994,36(3):253-255
This short paper discusses the method of effectively canceling equal status normal mode noise not only on a sensor line but also on a transmission line of an optical instrument using a sensor with a sensordummy resistance 相似文献
90.
Crosstalk between microstrip transmission lines 总被引:1,自引:0,他引:1
Hill D.A. Cavcey K.H. Johnk R.T. 《Electromagnetic Compatibility, IEEE Transactions on》1994,36(4):314-321
Methods for prediction of crosstalk between microstrip transmission lines are reviewed and simplified for the weak-coupling case. Classical coupled transmission line theory is used for uniform lines, and potential and induced EMF methods are used for crosstalk between nonuniform lines. It is shown that the potential method is equivalent to classical coupled transmission line theory for the case of uniform lines. An experiment was performed for uniform coupled microstrip lines for frequencies from 50 MHz to 5 GHz, and good agreement between theory and measurement was obtained for both near- and far-end crosstalk 相似文献