首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   629237篇
  免费   5713篇
  国内免费   1748篇
化学   265067篇
晶体学   8678篇
力学   28095篇
综合类   12篇
数学   77517篇
物理学   178198篇
无线电   79131篇
  2021年   4746篇
  2020年   5156篇
  2019年   5776篇
  2018年   13871篇
  2017年   14400篇
  2016年   13783篇
  2015年   6773篇
  2014年   10514篇
  2013年   24349篇
  2012年   21711篇
  2011年   31298篇
  2010年   22223篇
  2009年   22891篇
  2008年   29499篇
  2007年   32798篇
  2006年   21441篇
  2005年   23857篇
  2004年   20066篇
  2003年   18478篇
  2002年   16645篇
  2001年   17772篇
  2000年   14260篇
  1999年   11283篇
  1998年   9716篇
  1997年   9488篇
  1996年   9004篇
  1995年   8075篇
  1994年   7925篇
  1993年   7619篇
  1992年   8281篇
  1991年   8307篇
  1990年   7977篇
  1989年   7518篇
  1988年   7185篇
  1987年   6744篇
  1986年   6310篇
  1985年   7898篇
  1984年   8114篇
  1983年   6733篇
  1982年   6884篇
  1981年   6606篇
  1980年   6402篇
  1979年   6657篇
  1978年   6757篇
  1977年   6682篇
  1976年   6719篇
  1975年   6306篇
  1974年   6230篇
  1973年   6432篇
  1972年   4409篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
We report on the demonstration of optically pumped photonic crystal lasers with InAs quantum dot active regions operating at room temperature near 1310 nm. Absorbed threshold pump powers as low as 25 /spl mu/W are observed. We also extract a characteristic temperature of 17 K, which is attributed to limitations caused by surface recombination.  相似文献   
992.
We address the problem of estimating the instantaneous frequency (IF) of a phase signal using its level-crossing (LC) information based on front-end auditory processing motivation. We show that the problem of IF estimation using LC information can be cast in the framework of estimation from irregularly sampled data. The formulation has the generality of estimating different types of IF without the need for a quasistationary assumption. We consider two types of IF-polynomial and bandlimited; we use polynomial interpolating functions for the former, and for the latter, we propose a novel "line plus sum of sines" model. The model parameters are estimated by linear regression. Considering the noisy case, LC data for different levels is analyzed, and methods for combining different estimators from LCs are discussed. Theoretical and extensive simulation results show that the performance of the zero-crossing (ZC) based IF estimator and the level-crossing based IF estimator with smaller level values is better than those obtained with higher level values or their combinations. The new technique reaches the Crame/spl acute/r-Rao bound (CRB) roughly above 4 dB signal-to-noise ratio (SNR), and its performance does not deteriorate rapidly with mismatch in the IF order compared with the other techniques in the literature.  相似文献   
993.
Motivated by the importance of Nakagami-n (Rice) and Nakagami-q (Hoyt) statistical models to describe channel fading in land, mobile, terrestrial, and satellite telecommunications, we present an alternative moments-based approach to the performance analysis of equal-gain combining (EGC) receivers over independent, not necessarily identically distributed Rice- and Hoyt-fading channels. Exact closed-form expressions for the moments of the signal-to-noise ratio (SNR) at the output of the combiner are derived and significant performance criteria such as, the average output SNR, the amount of fading and the spectral efficiency at the low power regime, are studied. Moreover, using Pade rational approximation to the moment-generating function of the output SNR, the average symbol error probability and the outage probability are evaluated. We also study the suitability of modeling a Hoyt-fading environment by a properly chosen Nakagami-m model, as far as the error performance of the EGC is concerned.  相似文献   
994.
Towards real-time business intelligence   总被引:1,自引:0,他引:1  
Analysing data to predict market trends of products and services and to improve performances of enterprise business systems has always been part of running a competitive business. But it is becoming essential nowadays that not only is the analysis done on real-time data, but also actions in response to analysis results can be performed in real time and instantaneously change parameters of business processes. This paper discusses issues and problems of current business intelligence systems, and then outlines our vision of future real-time business intelligence. We present a list of emerging technologies which could contribute to the realisation of real-time business intelligence and some examples of applying them to improve BT’s systems and services.  相似文献   
995.
A 41-GHz 4-b adder-accumulator test circuit implemented in InP double heterojunction bipolar transistor (DHBT) technology using 624 transistors is reported. High clock rates are obtained by combining the logic functions into pipelined latches. The adder-accumulator contains a single-level parallel-gated carry circuit that is used as a step toward reduced power consumption. The carry circuit has a maximum clock frequency of 55 GHz. The accumulator architecture employs modular, pipelined 2-b adders and is cascadable to 2 N-bits. The test circuit includes a 4-b digital to analog converter (DAC) that facilitates demonstration of high-speed operation.  相似文献   
996.
Telecommunications operators are undergoing massive transformations in order to metamorphose themselves into the ICT world and compete with agile, lean IT organisations. The main challenges facing telecommunications operators, such as BT, are to reduce costs and increase agility in deploying software systems for provisioning ICT services. Despite using reusable capabilities and COTS packages, the major source of increased cost lies in the heavy integration tax we incur for integrating diverse systems implemented on diverse platforms and middleware, with heterogeneous data and process models. This paper looks at cost implications of lengthy and often manual migration to-and-from systems and platforms, and shows the clear business benefits of model-driven development (MDD) as defined by the Object Management Group (OMG). It is clearly demonstrated that model-driven development has matured into a practical, industrialised, scalable and evolvable technology, culminating from decades of R&D on specification and design languages, executable formalisms and domainspecific languages and language transformations.  相似文献   
997.
This paper looks at the concepts of entities, identities, identifiers and credentials, their definitions, and how they combine to authenticate an identity to an account, or function, within a service. Credentials can be divided into several different types on the basis of their use, origin and characteristics. In particular, types such as composite, dynamic and derived credentials will be considered, and their applicability within an identity management system. Each credential must be managed through its entire life cycle from initial registration, general use and suspension, to deletion. The notion of public (i.e. freely distributable) and private (i.e. known only to you) aspects of a credential is explored. The bindings, by trusted third parties, of identifiers and public credentials into permits and instruments of proof is explained along with the convenience, but greater exposure, of local information. Several scenarios are analysed in terms of how different types of credentials are employed during the authentication process.  相似文献   
998.
Security issues in hybrid networks with a satellite component   总被引:3,自引:0,他引:3  
Satellites are expected to play an increasingly important role in providing broadband Internet services over long distances in an efficient manner. Most future networks will be hybrid in nature - having terrestrial nodes interconnected by satellite links. Security is an important concern in such networks, since the satellite segment is susceptible to a host of attacks, including eavesdropping, session hijacking and data corruption. In this article we address the issue of securing communication in satellite networks. We discuss various security attacks that are possible in hybrid satellite networks, and survey the different solutions proposed to secure data communications in these networks. We look at the performance problems arising in hybrid networks due to security additions like Internet security protocol (IPSec) or secure socket layer (SSL), and suggest solutions to performance-related problems. We also point out important drawbacks in the proposed solutions, and suggest a hierarchical key-management approach for adding data security to group communication in hybrid networks.  相似文献   
999.
There is an analogy between single-chip color cameras and the human visual system in that these two systems acquire only one limited wavelength sensitivity band per spatial location. We have exploited this analogy, defining a model that characterizes a one-color per spatial position image as a coding into luminance and chrominance of the corresponding three colors per spatial position image. Luminance is defined with full spatial resolution while chrominance contains subsampled opponent colors. Moreover, luminance and chrominance follow a particular arrangement in the Fourier domain, allowing for demosaicing by spatial frequency filtering. This model shows that visual artifacts after demosaicing are due to aliasing between luminance and chrominance and could be solved using a preprocessing filter. This approach also gives new insights for the representation of single-color per spatial location images and enables formal and controllable procedures to design demosaicing algorithms that perform well compared to concurrent approaches, as demonstrated by experiments.  相似文献   
1000.
The effect of low-power laser radiation on the formation of oriented cadmium sulfide layers from a vapor phase on a substrate cooled with liquid nitrogen (highly nonequilibrium conditions) is studied. The results of technological experiments, the results of a study of electron diffraction (electron diffraction patterns), and condensation diagram data are reported. It is found that, depending on the substrate temperature, laser radiation can both improve and worsen the crystal quality of films. It is shown that a condensation diagram of cadmium sulfide layers formed on a substrate exposed to low-power laser radiation is shifted to higher temperatures relative to a condensation diagram obtained without laser radiation. The experimental results are interpreted in the context of a solitonic heteroepitaxy model.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号