首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   528篇
  免费   21篇
化学   279篇
晶体学   3篇
力学   15篇
数学   23篇
物理学   114篇
无线电   115篇
  2023年   3篇
  2022年   8篇
  2021年   6篇
  2020年   12篇
  2019年   16篇
  2018年   9篇
  2017年   14篇
  2016年   27篇
  2015年   10篇
  2014年   23篇
  2013年   42篇
  2012年   35篇
  2011年   31篇
  2010年   17篇
  2009年   22篇
  2008年   29篇
  2007年   23篇
  2006年   24篇
  2005年   25篇
  2004年   17篇
  2003年   9篇
  2002年   18篇
  2001年   5篇
  2000年   10篇
  1999年   9篇
  1998年   4篇
  1997年   13篇
  1996年   10篇
  1995年   3篇
  1994年   4篇
  1993年   5篇
  1992年   3篇
  1991年   8篇
  1989年   4篇
  1988年   7篇
  1986年   6篇
  1985年   6篇
  1984年   5篇
  1983年   2篇
  1982年   2篇
  1981年   2篇
  1978年   2篇
  1977年   2篇
  1973年   1篇
  1972年   2篇
  1970年   1篇
  1969年   1篇
  1966年   1篇
  1965年   3篇
  1936年   4篇
排序方式: 共有549条查询结果,搜索用时 15 毫秒
61.
Proceedings - Mathematical Sciences - Benzophenone and paranitrotoluene have been studied in the solid and fused states. Their solutions in methyl alcohol have also been investigated and the...  相似文献   
62.
63.
Network survivability is a crucial requirement in high-speed optical networks. Typical approaches of providing survivability have considered the failure of a single component such as a link or a node. We motivate the need for considering double-link failures and present three loopback methods for handling such failures. In the first two methods, two edge-disjoint backup paths are computed for each link for rerouting traffic when a pair of links fails. These methods require the identification of the failed links before recovery can be completed. The third method requires the precomputation of a single backup path and does not require link identification before recovery. An algorithm that precomputes backup paths for links in order to tolerate double-link failures is then presented. Numerical results comparing the performance of our algorithm with other approaches suggest that it is possible to achieve almost 100% recovery from double-link failures with a moderate increase in backup capacity. A remarkable feature of our approach is that it is possible to trade off capacity for restorability by choosing a subset of double-link failures and designing backup paths using our algorithm for only those failure scenarios.  相似文献   
64.
Integrated resonant interband tunneling (RIT) and Schottky diode structures, based on the InAs/GaSb/AlSb heterostructure system, are demonstrated for the first time. The RIT diodes are advantageous for logic circuits due to the relatively low bias voltages (~100 mV) required to attain peak current densities in the mid-104 A/cm 2 range. The use of n-type InAs/AlSb superlattices for the semiconducting side of Schottky barrier devices provides a means for tailoring the barrier height for a given circuit architecture. The monolithically integrated RIT/Schottky structure is suitable for fabrication of a complete diode logic family (AND, OR, XOR, INV)  相似文献   
65.
The unique structural, adsorptive, and catalytic properties of zeolites are particularly amenable to illustration by computer (especially color) graphics. The siting of cations, the accommodation of guest reactant or product species, as well as the occurrence of various kinds of intergrowths (e.g. twin planes and coincidence boundaries) within these microporous solids can all be effectively portrayed by graphical means in such a manner as to emphasize the shape-selective character of the host zeolite. The dynamics of translational and angular motion of guest species (for example benzene) in a channel of molecular dimensions within a typical zeolitic solid (for example silicalite) can also be probed interactively using appropriate potential functions.  相似文献   
66.
Discrete-time analysis of two schemes for multiplexing voice and data is presented. In each scheme voice and data are multiplexed using the movable boundary frame allocation scheme. In the first scheme, speech activity detectors (SAD's) are not used, and hence, the variations in the voice traffic are only due to the on/off characteristics of voice. In the second scheme, SAD's are employed so that talker silences can he utilized for transmission of additional voice and/or data. In this scheme, the multiplexer performs digital speech interpolation as well as movable boundary frame allocation. The performance measures considered are probability of loss for voice calls, probability of speech clipping, speech packet rejection ratio, and the expected data message delay. In the case of the multiplexer with SAD, a tradeoff exists between data message delay and speech interpolation advantage. Some numerical examples are presented which illustrate the performance of the two multiplexers.  相似文献   
67.
68.
Belavin, Zamlodochikov and Polyakov have recently proposed a class of conformally invariant field theories in two dimension with exactly determined rational critical indices. We establish a tentative identification of a subset of these theories in terms of the O(n) model and theq-state Potts model in 2-dimensions for appropriaten andq. The results of this work were reported in the conference on “Structural Similarities in Exactly Solved Models” at I.T.P. Santa Barbara, August 1984.  相似文献   
69.
Sudarshan's semi-classical treatment of correlation functions is applied to the study of quantum corrections to the Van Hove function. In its generalised form, it enables one to choose the best correlation function for a given potential. Higher-order correlations are also sketched briefly and the details are similar to those considered by Oppenheim and Bloom.  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号