全文获取类型
收费全文 | 15209篇 |
免费 | 1732篇 |
国内免费 | 666篇 |
专业分类
化学 | 4251篇 |
晶体学 | 31篇 |
力学 | 920篇 |
综合类 | 189篇 |
数学 | 1987篇 |
物理学 | 2575篇 |
无线电 | 7654篇 |
出版年
2024年 | 26篇 |
2023年 | 168篇 |
2022年 | 380篇 |
2021年 | 506篇 |
2020年 | 580篇 |
2019年 | 364篇 |
2018年 | 327篇 |
2017年 | 563篇 |
2016年 | 694篇 |
2015年 | 689篇 |
2014年 | 1108篇 |
2013年 | 898篇 |
2012年 | 1057篇 |
2011年 | 1015篇 |
2010年 | 785篇 |
2009年 | 857篇 |
2008年 | 858篇 |
2007年 | 992篇 |
2006年 | 867篇 |
2005年 | 744篇 |
2004年 | 622篇 |
2003年 | 601篇 |
2002年 | 465篇 |
2001年 | 402篇 |
2000年 | 337篇 |
1999年 | 247篇 |
1998年 | 247篇 |
1997年 | 184篇 |
1996年 | 171篇 |
1995年 | 182篇 |
1994年 | 132篇 |
1993年 | 109篇 |
1992年 | 106篇 |
1991年 | 59篇 |
1990年 | 48篇 |
1989年 | 35篇 |
1988年 | 21篇 |
1987年 | 18篇 |
1986年 | 20篇 |
1985年 | 34篇 |
1984年 | 24篇 |
1983年 | 10篇 |
1982年 | 10篇 |
1981年 | 3篇 |
1980年 | 6篇 |
1979年 | 15篇 |
1978年 | 6篇 |
1977年 | 7篇 |
1976年 | 5篇 |
1971年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 203 毫秒
111.
集群移动通信系统的组网设计 总被引:1,自引:0,他引:1
本文对集群移动通信系统在组网设计时应考虑的问题进行了分析,并提出了具体步骤和方法,可供集群系统组网设计时参考。 相似文献
112.
以行波半导体光放大器速度方程为基础,采用传输矩阵方法,对锥形结构半导体光放大器的增益和饱和特性进行理论研究。讨论了不同锥形长度,不同结构时的增益和饱和特性差异。理论研究表明,锥形结构能改善半导体光放大器的偏振灵敏度。在同一锥度下,长锥形长度能提高饱和增益,降低偏振度。在进行半导体光放大器有源条结构设计时要综合考虑锥度及锥形长度的影响,以实现结构优化 。 相似文献
113.
Giuseppe Ferri 《Analog Integrated Circuits and Signal Processing》2002,33(3):249-262
In this paper the author will present the working principle and the applications of a novel adaptive biasing topology, designed to decrease the stand-by power dissipation without affecting the transient performance of low-power amplifiers. The proposed circuit, whose principle and circuit topology can be implemented both in CMOS and in bipolar standard technologies, gives a biasing current whose value depends on the applied input differential voltage and can be set according to the requested transient performance constraints. The adaptive architecture can be utilized in the design of high-efficient low-power operational amplifiers, for the biasing of both the input stage (where the input source current is dynamically increased) and the output stage (where the output current can be controlled and limited). These amplifiers show a very good behaviour, evaluated in terms of two efficiency factors, if compared with those of other adaptive solutions and class-AB topologies, proposed in the literature. Simulation results and also measurements on a chip prototype, fabricated in a standard CMOS technology, are finally presented. 相似文献
114.
Summary We discuss a null experiment to search for the fifth force at ranges around 10 km. It is proposed to use a three-axis gravity
gradiometer to measure the trace of the Earth gravity tensor from a freely falling elevator dropped by a balloon. The main
error sources are considered to some extent.
Paper presented at the V Cosmic Physics National Conference, S. Miniato, November 27–30, 1990. 相似文献
115.
116.
117.
随着计算机技术的发展和水平的提高,图像,声音,图形等多媒体信息逐步应用于管理信息系统之中。文章中提出了图文数据库系统设计中存在的三个基本问题。讨论了介绍了图文数据库系统的设计方法和实现技术。 相似文献
118.
Andrea Vietri 《Graphs and Combinatorics》2007,23(1):111-121
We analyse 3-subset difference families of Z2d+1⊕Z2d+1 arising as reductions (mod 2d+1) of particular families of 3-subsets of Z⊕Z. The latter structures, namely perfect d-families, can be viewed as 2-dimensional analogues of difference triangle sets having the least scope. Indeed, every perfect d-family is a set of base blocks which, under the natural action of the translation group Z⊕Z, cover all edges {(x,y),(x′,y′)} such that |x−x′|, |y−y′|≤d. In particular, such a family realises a translation invariant (G,K3)-design, where V(G)=Z⊕Z and the edges satisfy the above constraint. For that reason, we regard perfect families as part of the hereby defined translation designs, which comprise and slightly generalise many structures already existing in the literature. The geometric context allows
some suggestive additional definitions. The main result of the paper is the construction of two infinite classes of d-families. Furthermore, we provide two sporadic examples and show that a d-family may exist only if d≡0,3,8,11 (mod 12). 相似文献
119.
A scheme for vehicle density and velocity estimation in a stretch of highway based on a modified cell transmission model [C.
F. Daganzo, Transportation Research, Part B, 28B(4),269–287, 1994. Elsevier is presented. The scheme is intended for use with on-ramp metering control algorithms, providing
local knowledge of densities and velocities that is helpful to improve on-ramp metering control performance. Estimation of
density is obtained by nonlinear estimators, while velocity estimation is obtained by gradient algorithms. There is one density–velocity
estimator for free traffic flow and other for congested traffic flow. Both estimator schemes work in parallel. The final estimation
of density and velocity results from a convex combination of the predictions of the two estimators. This combination depends
on occupancy or density measurements at the boundaries of the stretch and is produced by a fuzzy inference system. Stability
and convergence of the density and velocity estimation scheme is proved by Lyapunov based techniques. Simulation results comparing
measured and estimated traffic data are presented. They confirm good performance of the estimators.
Research sponsored by grants UNAM PAPIIT IN110403 and CONACYT 47583. 相似文献
120.
We examine the problem of building or fortifying a network to defend against enemy attacks in various scenarios. In particular,
we examine the case in which an enemy can destroy any portion of any arc that a designer constructs on the network, subject
to some interdiction budget. This problem takes the form of a three-level, two-player game, in which the designer acts first
to construct a network and transmit an initial set of flows through the network. The enemy acts next to destroy a set of constructed
arcs in the designer’s network, and the designer acts last to transmit a final set of flows in the network. Most studies of
this nature assume that the enemy will act optimally; however, in real-world scenarios one cannot necessarily assume rationality
on the part of the enemy. Hence, we prescribe optimal network design algorithms for three different profiles of enemy action:
an enemy destroying arcs based on capacities, based on initial flows, or acting optimally to minimize our maximum profits
obtained from transmitting flows. 相似文献