首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   892063篇
  免费   7498篇
  国内免费   2758篇
化学   385785篇
晶体学   11294篇
力学   42216篇
综合类   20篇
数学   125481篇
物理学   236060篇
无线电   101463篇
  2021年   7203篇
  2020年   7816篇
  2019年   8817篇
  2018年   22214篇
  2017年   21926篇
  2016年   22614篇
  2015年   9818篇
  2014年   15630篇
  2013年   35504篇
  2012年   30454篇
  2011年   42260篇
  2010年   30377篇
  2009年   31482篇
  2008年   38206篇
  2007年   40856篇
  2006年   30070篇
  2005年   28325篇
  2004年   26692篇
  2003年   24729篇
  2002年   23456篇
  2001年   24608篇
  2000年   19712篇
  1999年   15715篇
  1998年   13848篇
  1997年   13440篇
  1996年   12560篇
  1995年   11316篇
  1994年   11266篇
  1993年   10887篇
  1992年   11379篇
  1991年   11833篇
  1990年   11223篇
  1989年   10864篇
  1988年   10282篇
  1987年   9585篇
  1986年   9083篇
  1985年   11399篇
  1984年   11757篇
  1983年   9874篇
  1982年   9997篇
  1981年   9429篇
  1980年   9062篇
  1979年   9601篇
  1978年   9804篇
  1977年   9611篇
  1976年   9484篇
  1975年   9115篇
  1974年   8928篇
  1973年   9243篇
  1972年   6624篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
31.
A recent approach to solution of 2D scattering problems for electromagnetic waves scattered by thin screens is analyzed. With the use of examples of scattering by a strip and an unclosed cylindrical surface, it is shown that the proposed approach has no advantages in terms of the efficiency of numerical solution over a well-known approach based on exact integral equations for currents that have singular kernels and that are solved with the Krylov-Bogoliubov method.  相似文献   
32.
Routing Correlated Data with Fusion Cost in Wireless Sensor Networks   总被引:1,自引:0,他引:1  
In this paper, we propose a routing algorithm called minimum fusion Steiner tree (MFST) for energy efficient data gathering with aggregation (fusion) in wireless sensor networks. Different from existing schemes, MFST not only optimizes over the data transmission cost, but also incorporates the cost for data fusion, which can be significant for emerging sensor networks with vectorial data and/or security requirements. By employing a randomized algorithm that allows fusion points to be chosen according to the nodes' data amounts, MFST achieves an approximation ratio of 5/4log(k + 1), where k denotes the number of source nodes, to the optimal solution for extremely general system setups, provided that fusion cost and data aggregation are nondecreasing against the total input data. Consequently, in contrast to algorithms that only excel in full or nonaggregation scenarios without considering fusion cost, MFST can thrive in a wide range of applications  相似文献   
33.
The objective of this work was to determine the significant parameters of a 3-GW 200-kV dc superconducting cable system which influence the transient voltage distribution in the various parts of the cable. The cable system consists of four coaxial metallic cylinders. It was found that the dielectric constant and the electrical resistivity of the soil significantly affect the severity of the transient voltages; lower dielectric constant and higher resistivity of the soil will increase the magnitudes of the transient voltages by increasing the earth-return impedance. It was also found that the effect of the conductor internal impedances of the cable is insignificant. Shorting the coaxial cylinders of the cryogen flow and the cryostat will lessen the severity of the transient voltages. Grounding the second, third, and fourth cylinders at regular intervals with low-impedance grounding impedance will also improve the transient performance of the cable. More research is needed to evaluate these procedures.  相似文献   
34.
A new type of sigma-delta modulator that operates in a special mode named limit-cycle mode (LCM) is proposed. In this mode, most of the SDM building blocks operate at a frequency that is an integer fraction of the applied sampling frequency. That brings several very attractive advantages: a reduction of the required power consumption per converted bandwidth, an immunity to excessive loop delays and to digital-analog converter waveform asymmetry and a higher tolerance to clock imperfections. The LCMs are studied via a graphical application of the describing function theory. A second-order continuous time SDM with 5 MHz conversion bandwidth, 1 GHz sampling frequency and 125 MHz limit-cycle frequency is used as a test case for the evaluation of the performance of the proposed type of modulators. High level and transistor simulations are presented and compared with the traditional SDM designs.  相似文献   
35.
One of the ultimate miniaturizations in nanotechnology is molecular electronics, where devices will consist of individual molecules. There are many complications associated with the use of molecules in electronic devices, such as the electronic perturbations in the molecule associated with being bonded to an electrode, how electrons traverse the metal-molecule junction, and the difficulty of macroscopically addressing single to very few molecules. Whether fabricating a test structure or a usable device, the use of self-assembly is fundamental to the fabrication of molecular electronic devices. We will discuss how to fabricate self-assembled monolayers into test assemblies and how to use intermolecular interactions to direct molecules into desired positions to create nanostructures and to connect functional molecules to the outside world. These assemblies serve as test structures for measurements on single or bundled molecules. The development of several experimental techniques, including various scanning probes, mercury drop junctions, break junctions, nanopores, crossed wires, and other techniques using nanoparticles have enabled the ability to test these structures and make reproducible measurements on single molecules. Many of these methods have been developed to test molecules with potential for integration into devices such as oligo (phenylene-ethynylene) molecules and other /spl pi/-conjugated molecules, in ensemble or single-molecule measurements.  相似文献   
36.
This paper considers several aspects of the sequential prediction problem for unbounded, nonstationary processes under pth power loss /spl lscr//sub p/(u,v)=|u-v|/sup p/, 1相似文献   
37.
Self-organized public-key management for mobile ad hoc networks   总被引:6,自引:0,他引:6  
In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. We propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication regardless of the network partitions and without any centralized services. Furthermore, our approach does not require any trusted authority, not even in the system initialization phase.  相似文献   
38.
The interference issues related to ultrawideband (UWB) radio pose tight restrictions on the maximum data rate of UWB radio telecommunication systems. A possible solution is to reduce the required signal to interference ratio (SIR) that gives satisfactory performance to the UWB system. In this letter, we propose coded M-ary UWB radio communication systems. Two classes of convolutional codes, namely, low-rate superorthogonal codes and high-rate punctured codes are considered for this purpose. Simulation results on the bit error rate of the proposed system indicates that the system is capable to work in lower SIR's and therefore supports higher data transmission rates in a real interference environment compared to the previously proposed UWB communication systems.  相似文献   
39.
This paper presents the evolution of low-frequency, high-power transcontinental transmission, starting from the first successful transatlantic link from Poldhu up to the Italian transcontinental station of Coltano. The trend toward higher and higher transmitting power, and the dead end into which wireless was heading if it were not for research in the higher frequency ranges, are pointed out.  相似文献   
40.
Reducible rank codes and their applications to cryptography   总被引:2,自引:0,他引:2  
We present a new family of so-called reducible rank codes which are a generalization of rank product codes . This family includes maximal rank distance (MRD) codes for lengths n>N in the field F/sub N/. We give methods for encoding and decoding reducible rank codes. A public key cryptosystem based on these codes and on the idea of a column scrambler is proposed. The column scrambler "mixes" columns of a generator (parity-check) matrix of a code. It makes the system more resistant to structural attacks such as Gibson's attacks. Possible attacks on the system are thoroughly studied. The system is found to be secure against known attacks for public keys of about 16 kbits and greater.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号