首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   283840篇
  免费   3216篇
  国内免费   981篇
化学   131506篇
晶体学   3694篇
力学   9948篇
综合类   2篇
数学   27542篇
物理学   75529篇
无线电   39816篇
  2020年   2062篇
  2019年   2295篇
  2018年   2751篇
  2017年   2649篇
  2016年   4230篇
  2015年   2809篇
  2014年   4322篇
  2013年   12027篇
  2012年   8673篇
  2011年   10640篇
  2010年   7222篇
  2009年   7501篇
  2008年   10330篇
  2007年   10776篇
  2006年   10030篇
  2005年   9495篇
  2004年   8594篇
  2003年   7723篇
  2002年   7660篇
  2001年   8649篇
  2000年   6887篇
  1999年   5594篇
  1998年   4900篇
  1997年   4952篇
  1996年   4555篇
  1995年   4353篇
  1994年   4246篇
  1993年   4290篇
  1992年   4478篇
  1991年   4537篇
  1990年   4290篇
  1989年   4116篇
  1988年   4084篇
  1987年   3545篇
  1986年   3386篇
  1985年   4476篇
  1984年   4640篇
  1983年   3882篇
  1982年   4180篇
  1981年   4022篇
  1980年   3868篇
  1979年   3878篇
  1978年   4093篇
  1977年   3899篇
  1976年   4099篇
  1975年   3662篇
  1974年   3772篇
  1973年   4109篇
  1972年   2547篇
  1971年   1998篇
排序方式: 共有10000条查询结果,搜索用时 640 毫秒
161.
Security is becoming an everyday concern for a wide range of electronic systems that manipulate, communicate, and store sensitive data. An important and emerging category of such electronic systems are battery-powered mobile appliances, such as personal digital assistants (PDAs) and cell phones, which are severely constrained in the resources they possess, namely, processor, battery, and memory. This work focuses on one important constraint of such devices-battery life-and examines how it is impacted by the use of various security mechanisms. In this paper, we first present a comprehensive analysis of the energy requirements of a wide range of cryptographic algorithms that form the building blocks of security mechanisms such as security protocols. We then study the energy consumption requirements of the most popular transport-layer security protocol: Secure Sockets Layer (SSL). We investigate the impact of various parameters at the protocol level (such as cipher suites, authentication mechanisms, and transaction sizes, etc.) and the cryptographic algorithm level (cipher modes, strength) on the overall energy consumption for secure data transactions. To our knowledge, this is the first comprehensive analysis of the energy requirements of SSL. For our studies, we have developed a measurement-based experimental testbed that consists of an iPAQ PDA connected to a wireless local area network (LAN) and running Linux, a PC-based data acquisition system for real-time current measurement, the OpenSSL implementation of the SSL protocol, and parameterizable SSL client and server test programs. Based on our results, we also discuss various opportunities for realizing energy-efficient implementations of security protocols. We believe such investigations to be an important first step toward addressing the challenges of energy-efficient security for battery-constrained systems.  相似文献   
162.
Globally asynchronous, locally synchronous (GALS) systems-on-chip (SoCs) may be prone to synchronization failures if the delay of their locally-generated clock tree is not considered. This paper presents an in-depth analysis of the problem and proposes a novel solution. The problem is analyzed considering the magnitude of clock tree delays, the cycle times of the GALS module, and the complexity of the asynchronous interface controllers using a timed signal transition graph (STG) approach. In some cases, the problem can be solved by extracting all the delays and verifying whether the system is susceptible to metastability. In other cases, when high data bandwidth is not required, matched-delay asynchronous ports may be employed. A novel architecture for synchronizing inter-modular communications in GALS, based on locally delayed latching (LDL), is described. LDL synchronization does not require pausable clocking, is insensitive to clock tree delays, and supports high data rates. It replaces complex global timing constraints with simpler localized ones. Three different LDL ports are presented. The risk of metastability in the synchronizer is analyzed in a technology-independent manner  相似文献   
163.
A new multi-spectral laser radar (ladar) system based on the time-correlated single photon counting, time-of-flight technique has been designed to detect and characterise distributed targets at ranges of several kilometres. The system uses six separated laser channels in the visible and near infrared part of the electromagnetic spectrum. The authors present a method to detect the numbers, positions, heights and shape parameters of returns from this system, used for range profiling and target classification. The algorithm has two principal stages: non-parametric bump hunting based on an analysis of the smoothed derivatives of the photon count histogram in scale space, and maximum likelihood estimation using Poisson statistics. The approach is demonstrated on simulated and real data from a multi-spectral ladar system, showing that the return parameters can be estimated to a high degree of accuracy.  相似文献   
164.
This paper presents a simple alternative for an electronic ballast operating in self-sustained oscillating mode with dimming capability for fluorescent lamps. A simple modification in one of the gate drivers side circuit allows the lamp to dim without compromising the simplicity, reliability, and low cost which characterize the self-oscillating electronic ballast (SOEB). A qualitative analysis is presented to explain the behavior of the proposed self-oscillating electronic ballast with dimming feature. In addition, the stability and the key equations for the design are derived using the extended Nyquist criterion and describing function method. Experimental results from two 40-W electronic ballasts are presented to demonstrate the performance and to validate the analysis carried out.  相似文献   
165.
The continuing progression of Moore's Law has enabled the miniaturisation and dramatic cost reduction in electronics over the last ten years. For a truly pervasive communications environment the challenges of hiding key hardware technologies from the user are rapidly being overcome. This paper reviews the status of these hardware technology developments in the pervasive space and briefly discusses other contributing factors that will enable the pervasive vision to be realised.  相似文献   
166.
In order to provide the necessary mechanical aperture for the LHC beam, the main dipole cold masses have to match precisely the nominal circular trajectory of the particles beam. The requirements on the dipole cold mass geometry are dictated by the LHC beam optics and by the allowed limits of mechanical deformation of the interconnection bellows. Keeping the tight tolerances that are imposed necessitates a well controlled bending process and the use of a high accuracy 3D measuring instrument for checking the geometry of the cold mass throughout many manufacturing stages up to the final inspection. The dipole cold mass pre-series production started in 2000. It is almost completed at the three sites. In this paper, we report on the problems encountered to shape correctly the cold masses, their effect on interconnection of the dipole cold masses and on the mechanical aperture. On one side measures to improve the production process in terms of accuracy and reproducibility were taken, on the other side the assembly tolerances could be relaxed following a thorough review of the machine requirements. The summary of the encountered problems, corrective actions and results obtained on the pre-series cold masses are presented and discussed.  相似文献   
167.
In this paper a digital filter is proposed for the generation of smooth set points for motion control systems. The proposed nonlinear filter produces profiles with bounded velocity and acceleration starting from rough reference signals (steps and ramps). An actual implementation of the filter for a tile printing machine is presented and experimental results are reported.  相似文献   
168.
The virtual agency concept is now used within the United States Government as an alliance approach to manage large research and development (R&D) processes across departments. This paper examines the history of the virtual agency concept and its important characteristics. The paper identifies the potential benefits and associated risks involved in managing R&D within a virtual agency. Three cases are examined where the virtual agency concept has been applied to R&D programs: the High Performance Computing and Communications initiative, the Next Generation Internet, and the Partnership for a New Generation of Vehicles. The case studies indicate that the R&D process is attempting to balance formal process controls with the agility to adapt rapidly to new research opportunities. Virtual agencies can be used to improve organizational efficiency, improve knowledge transfer, increase interoperability through standards, provide better alignment of agency missions with national policy, and introduce increased flexibility into the R&D process. At the same time, the virtual agency concept has major risks including inefficiencies due to organizational complexity, the danger of collective myopia, the problem of adopting standards too early, the difficulty of reaching objectives in a loose organizational structure, and the problem of properly balancing the tension between agency mission objectives and national policy agendas.  相似文献   
169.
Spectrum asked three IEEE members from the telecommunications sector to comment on the industry's current woes and prospects. Roch Guerin discusses bandwidth as a commodity and how to deal with it. The impact of technological change on telecommunications is enormous and calls for a shift in business models. Technology is making bandwidth a commodity and it should not matter who supplies it. Competition is vital and commodity providers must be decoupled from value providers. Frank Ferrante points out that the Year 2000 crisis resulted in manufacturers being deluged with orders for new upgraded systems. Vast sums were spent to meet the demand in time. However, when Y2K was over, production stayed high and inventories continued to build, while demand effectively stopped overnight. Dazzling new innovations are needed to compel the masses to spend and manufacturers must apply their resources to deliver quickly and efficiently. Jules A. Bellisio discusses the role of engineers in bringing new ideas to the market place. Many engineers have put together ventures for the sole purpose of attracting capital. The underlying technology and business propositions were there solely to lure the unsuspecting. By allowing engineers to use technology simply to cover for a scam, then the profession is also to blame for the current problems.  相似文献   
170.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号