首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15209篇
  免费   1732篇
  国内免费   666篇
化学   4251篇
晶体学   31篇
力学   920篇
综合类   189篇
数学   1987篇
物理学   2575篇
无线电   7654篇
  2024年   26篇
  2023年   168篇
  2022年   380篇
  2021年   506篇
  2020年   580篇
  2019年   364篇
  2018年   327篇
  2017年   563篇
  2016年   694篇
  2015年   689篇
  2014年   1108篇
  2013年   898篇
  2012年   1057篇
  2011年   1015篇
  2010年   785篇
  2009年   857篇
  2008年   858篇
  2007年   992篇
  2006年   867篇
  2005年   744篇
  2004年   622篇
  2003年   601篇
  2002年   465篇
  2001年   402篇
  2000年   337篇
  1999年   247篇
  1998年   247篇
  1997年   184篇
  1996年   171篇
  1995年   182篇
  1994年   132篇
  1993年   109篇
  1992年   106篇
  1991年   59篇
  1990年   48篇
  1989年   35篇
  1988年   21篇
  1987年   18篇
  1986年   20篇
  1985年   34篇
  1984年   24篇
  1983年   10篇
  1982年   10篇
  1981年   3篇
  1980年   6篇
  1979年   15篇
  1978年   6篇
  1977年   7篇
  1976年   5篇
  1971年   2篇
排序方式: 共有10000条查询结果,搜索用时 203 毫秒
111.
集群移动通信系统的组网设计   总被引:1,自引:0,他引:1  
傅为民 《电信科学》1995,11(4):35-41
本文对集群移动通信系统在组网设计时应考虑的问题进行了分析,并提出了具体步骤和方法,可供集群系统组网设计时参考。  相似文献   
112.
以行波半导体光放大器速度方程为基础,采用传输矩阵方法,对锥形结构半导体光放大器的增益和饱和特性进行理论研究。讨论了不同锥形长度,不同结构时的增益和饱和特性差异。理论研究表明,锥形结构能改善半导体光放大器的偏振灵敏度。在同一锥度下,长锥形长度能提高饱和增益,降低偏振度。在进行半导体光放大器有源条结构设计时要综合考虑锥度及锥形长度的影响,以实现结构优化 。  相似文献   
113.
In this paper the author will present the working principle and the applications of a novel adaptive biasing topology, designed to decrease the stand-by power dissipation without affecting the transient performance of low-power amplifiers. The proposed circuit, whose principle and circuit topology can be implemented both in CMOS and in bipolar standard technologies, gives a biasing current whose value depends on the applied input differential voltage and can be set according to the requested transient performance constraints. The adaptive architecture can be utilized in the design of high-efficient low-power operational amplifiers, for the biasing of both the input stage (where the input source current is dynamically increased) and the output stage (where the output current can be controlled and limited). These amplifiers show a very good behaviour, evaluated in terms of two efficiency factors, if compared with those of other adaptive solutions and class-AB topologies, proposed in the literature. Simulation results and also measurements on a chip prototype, fabricated in a standard CMOS technology, are finally presented.  相似文献   
114.
Summary We discuss a null experiment to search for the fifth force at ranges around 10 km. It is proposed to use a three-axis gravity gradiometer to measure the trace of the Earth gravity tensor from a freely falling elevator dropped by a balloon. The main error sources are considered to some extent. Paper presented at the V Cosmic Physics National Conference, S. Miniato, November 27–30, 1990.  相似文献   
115.
讲述了一个军工产品承制单位基于ISO9000体系,建立质量管理信息系统的概况。  相似文献   
116.
文中讨论的是多功能键盘,它是以AT89C2051单片机为控制器,带有本地键盘和远程无线遥控键盘,适用于特殊场合的一种微机系统智能键盘。文中较详细地介绍了多功能键盘的设计思想、工作原理及软件控制过程等。  相似文献   
117.
随着计算机技术的发展和水平的提高,图像,声音,图形等多媒体信息逐步应用于管理信息系统之中。文章中提出了图文数据库系统设计中存在的三个基本问题。讨论了介绍了图文数据库系统的设计方法和实现技术。  相似文献   
118.
We analyse 3-subset difference families of Z2d+1Z2d+1 arising as reductions (mod 2d+1) of particular families of 3-subsets of ZZ. The latter structures, namely perfect d-families, can be viewed as 2-dimensional analogues of difference triangle sets having the least scope. Indeed, every perfect d-family is a set of base blocks which, under the natural action of the translation group ZZ, cover all edges {(x,y),(x′,y′)} such that |xx′|, |yy′|≤d. In particular, such a family realises a translation invariant (G,K3)-design, where V(G)=ZZ and the edges satisfy the above constraint. For that reason, we regard perfect families as part of the hereby defined translation designs, which comprise and slightly generalise many structures already existing in the literature. The geometric context allows some suggestive additional definitions. The main result of the paper is the construction of two infinite classes of d-families. Furthermore, we provide two sporadic examples and show that a d-family may exist only if d≡0,3,8,11 (mod 12).  相似文献   
119.
A scheme for vehicle density and velocity estimation in a stretch of highway based on a modified cell transmission model [C. F. Daganzo, Transportation Research, Part B, 28B(4),269–287, 1994. Elsevier is presented. The scheme is intended for use with on-ramp metering control algorithms, providing local knowledge of densities and velocities that is helpful to improve on-ramp metering control performance. Estimation of density is obtained by nonlinear estimators, while velocity estimation is obtained by gradient algorithms. There is one density–velocity estimator for free traffic flow and other for congested traffic flow. Both estimator schemes work in parallel. The final estimation of density and velocity results from a convex combination of the predictions of the two estimators. This combination depends on occupancy or density measurements at the boundaries of the stretch and is produced by a fuzzy inference system. Stability and convergence of the density and velocity estimation scheme is proved by Lyapunov based techniques. Simulation results comparing measured and estimated traffic data are presented. They confirm good performance of the estimators. Research sponsored by grants UNAM PAPIIT IN110403 and CONACYT 47583.  相似文献   
120.
We examine the problem of building or fortifying a network to defend against enemy attacks in various scenarios. In particular, we examine the case in which an enemy can destroy any portion of any arc that a designer constructs on the network, subject to some interdiction budget. This problem takes the form of a three-level, two-player game, in which the designer acts first to construct a network and transmit an initial set of flows through the network. The enemy acts next to destroy a set of constructed arcs in the designer’s network, and the designer acts last to transmit a final set of flows in the network. Most studies of this nature assume that the enemy will act optimally; however, in real-world scenarios one cannot necessarily assume rationality on the part of the enemy. Hence, we prescribe optimal network design algorithms for three different profiles of enemy action: an enemy destroying arcs based on capacities, based on initial flows, or acting optimally to minimize our maximum profits obtained from transmitting flows.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号