首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   378593篇
  免费   3411篇
  国内免费   1144篇
化学   164793篇
晶体学   5374篇
力学   15531篇
综合类   7篇
数学   38464篇
物理学   109746篇
无线电   49233篇
  2021年   3512篇
  2020年   3784篇
  2019年   4244篇
  2018年   5721篇
  2017年   5871篇
  2016年   8062篇
  2015年   4369篇
  2014年   7657篇
  2013年   17086篇
  2012年   13092篇
  2011年   15666篇
  2010年   11961篇
  2009年   12444篇
  2008年   15111篇
  2007年   15626篇
  2006年   14510篇
  2005年   12756篇
  2004年   11901篇
  2003年   10691篇
  2002年   10594篇
  2001年   12293篇
  2000年   9545篇
  1999年   7635篇
  1998年   6594篇
  1997年   6403篇
  1996年   5921篇
  1995年   5219篇
  1994年   5137篇
  1993年   4979篇
  1992年   5406篇
  1991年   5515篇
  1990年   5232篇
  1989年   4959篇
  1988年   4638篇
  1987年   4424篇
  1986年   4111篇
  1985年   5140篇
  1984年   5181篇
  1983年   4311篇
  1982年   4315篇
  1981年   4019篇
  1980年   3907篇
  1979年   4151篇
  1978年   4122篇
  1977年   4114篇
  1976年   4062篇
  1975年   3878篇
  1974年   3776篇
  1973年   3816篇
  1972年   2730篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
131.
132.
This paper describes an approach to design ESD protection for integrated low noise amplifier (LNA) circuits used in narrowband transceiver front-ends. The RF constraints on the implementation of ESD protection devices are relaxed by co-designing the RF and the ESD blocks, considering them as one single circuit to optimise. The method is applied for the design of 0.25 μm CMOS LNA. Circuit protection levels higher than 3 kV HBM stress are achieved using conventional highly capacitive ggNMOS snapback devices. The methodology can be extended to other RF-CMOS circuits requiring ESD protection by merging the ESD devices in the functionality of the corresponding matching blocks.  相似文献   
133.
134.
Considering the importance of the X-ray production cross sections for the determination of the element concentrations in a given material, we have measured them experimentally for Al Si, Sc, Ti, V, Fe, Co, Ni and Cu bombarded by protons with energies ranging from 40 to 180 keV. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   
135.
Glazebrook  K.D.  Lumley  R.R.  Ansell  P.S. 《Queueing Systems》2003,45(2):81-111
We consider the optimal service control of a multiclass M/G/1 queueing system in which customers are served nonpreemptively and the system cost rate is additive across classes and increasing convex in the numbers present in each class. Following Whittle's approach to a class of restless bandit problems, we develop a Langrangian relaxation of the service control problem which serves to motivate the development of a class of index heuristics. The index for a particular customer class is characterised as a fair charge for service of that class. The paper develops these indices and reports an extensive numerical investigation which exhibits strong performance of the index heuristics for both discounted and average costs.  相似文献   
136.
We address the problem of estimating the instantaneous frequency (IF) of a phase signal using its level-crossing (LC) information based on front-end auditory processing motivation. We show that the problem of IF estimation using LC information can be cast in the framework of estimation from irregularly sampled data. The formulation has the generality of estimating different types of IF without the need for a quasistationary assumption. We consider two types of IF-polynomial and bandlimited; we use polynomial interpolating functions for the former, and for the latter, we propose a novel "line plus sum of sines" model. The model parameters are estimated by linear regression. Considering the noisy case, LC data for different levels is analyzed, and methods for combining different estimators from LCs are discussed. Theoretical and extensive simulation results show that the performance of the zero-crossing (ZC) based IF estimator and the level-crossing based IF estimator with smaller level values is better than those obtained with higher level values or their combinations. The new technique reaches the Crame/spl acute/r-Rao bound (CRB) roughly above 4 dB signal-to-noise ratio (SNR), and its performance does not deteriorate rapidly with mismatch in the IF order compared with the other techniques in the literature.  相似文献   
137.
Motivated by the importance of Nakagami-n (Rice) and Nakagami-q (Hoyt) statistical models to describe channel fading in land, mobile, terrestrial, and satellite telecommunications, we present an alternative moments-based approach to the performance analysis of equal-gain combining (EGC) receivers over independent, not necessarily identically distributed Rice- and Hoyt-fading channels. Exact closed-form expressions for the moments of the signal-to-noise ratio (SNR) at the output of the combiner are derived and significant performance criteria such as, the average output SNR, the amount of fading and the spectral efficiency at the low power regime, are studied. Moreover, using Pade rational approximation to the moment-generating function of the output SNR, the average symbol error probability and the outage probability are evaluated. We also study the suitability of modeling a Hoyt-fading environment by a properly chosen Nakagami-m model, as far as the error performance of the EGC is concerned.  相似文献   
138.
Telecommunications operators are undergoing massive transformations in order to metamorphose themselves into the ICT world and compete with agile, lean IT organisations. The main challenges facing telecommunications operators, such as BT, are to reduce costs and increase agility in deploying software systems for provisioning ICT services. Despite using reusable capabilities and COTS packages, the major source of increased cost lies in the heavy integration tax we incur for integrating diverse systems implemented on diverse platforms and middleware, with heterogeneous data and process models. This paper looks at cost implications of lengthy and often manual migration to-and-from systems and platforms, and shows the clear business benefits of model-driven development (MDD) as defined by the Object Management Group (OMG). It is clearly demonstrated that model-driven development has matured into a practical, industrialised, scalable and evolvable technology, culminating from decades of R&D on specification and design languages, executable formalisms and domainspecific languages and language transformations.  相似文献   
139.
This paper looks at the concepts of entities, identities, identifiers and credentials, their definitions, and how they combine to authenticate an identity to an account, or function, within a service. Credentials can be divided into several different types on the basis of their use, origin and characteristics. In particular, types such as composite, dynamic and derived credentials will be considered, and their applicability within an identity management system. Each credential must be managed through its entire life cycle from initial registration, general use and suspension, to deletion. The notion of public (i.e. freely distributable) and private (i.e. known only to you) aspects of a credential is explored. The bindings, by trusted third parties, of identifiers and public credentials into permits and instruments of proof is explained along with the convenience, but greater exposure, of local information. Several scenarios are analysed in terms of how different types of credentials are employed during the authentication process.  相似文献   
140.
Security issues in hybrid networks with a satellite component   总被引:3,自引:0,他引:3  
Satellites are expected to play an increasingly important role in providing broadband Internet services over long distances in an efficient manner. Most future networks will be hybrid in nature - having terrestrial nodes interconnected by satellite links. Security is an important concern in such networks, since the satellite segment is susceptible to a host of attacks, including eavesdropping, session hijacking and data corruption. In this article we address the issue of securing communication in satellite networks. We discuss various security attacks that are possible in hybrid satellite networks, and survey the different solutions proposed to secure data communications in these networks. We look at the performance problems arising in hybrid networks due to security additions like Internet security protocol (IPSec) or secure socket layer (SSL), and suggest solutions to performance-related problems. We also point out important drawbacks in the proposed solutions, and suggest a hierarchical key-management approach for adding data security to group communication in hybrid networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号