全文获取类型
收费全文 | 391篇 |
免费 | 225篇 |
国内免费 | 82篇 |
专业分类
化学 | 160篇 |
晶体学 | 52篇 |
力学 | 22篇 |
综合类 | 20篇 |
数学 | 19篇 |
物理学 | 115篇 |
无线电 | 310篇 |
出版年
2024年 | 23篇 |
2023年 | 42篇 |
2022年 | 101篇 |
2021年 | 82篇 |
2020年 | 75篇 |
2019年 | 61篇 |
2018年 | 79篇 |
2017年 | 81篇 |
2016年 | 30篇 |
2015年 | 41篇 |
2014年 | 38篇 |
2013年 | 21篇 |
2012年 | 5篇 |
2011年 | 6篇 |
2010年 | 2篇 |
2009年 | 2篇 |
2007年 | 1篇 |
2006年 | 1篇 |
2005年 | 1篇 |
1999年 | 2篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1959年 | 2篇 |
排序方式: 共有698条查询结果,搜索用时 31 毫秒
1.
2.
提出了一款应用于Ku波段的宽带高增益基片集成腔(Substrate Integrated Cavity,SIC)圆极化阵列天线。通过引入沿SIC口径面对角线放置的一对半月形寄生贴片和SIC底部馈电纵缝,使SIC中的TM_(211)和TM_(121)谐振模式幅值相等、相位相差90°,产生高增益圆极化辐射。同时,双寄生贴片还引入了一种背腔缝隙耦合振子圆极化辐射模式,扩宽了天线高增益圆极化辐射带宽。在此基础上,设计了一款2×2单元顺序旋转馈电的SIC圆极化阵列天线。阵列天线采用双层基片集成波导顺序相移馈电网络进行馈电,进一步增大了天线的圆极化带宽。综合考虑天线的-10 dB反射系数带宽、3 dB轴比带宽和3 dB增益带宽,测试结果表明,圆极化阵列天线的有效带宽为10.74-13.30 GHz(21.3%),在通带范围内最大增益为14.50 dBi。 相似文献
4.
极化干涉合成孔径雷达(PolInSAR)在城市遥感领域中扮演着重要角色。它能够提高图像的相干性并提高反演结果的精度,所以对于其散射机制的解释往往受到许多研究人员的关注。相关的研究多从极化分解的角度考虑,却少有人从散射中心高度方面进行分析。本文使用Ku波段无人机载极化干涉SAR系统,实现了使用无人机SAR系统对地面进行成像,比较了极化干涉最优分解与Pauli分解作用在不同人造目标时散射中心的关系。我们初步分析了极化干涉SAR的物理意义,并使用C波段的机载极化干涉SAR系统对结论进行验证。 相似文献
5.
经过20多年的完善与发展,喷墨技术已经成为大幅面广告印刷行业的主要印刷技术。随着图书按需印刷需求的快速扩张以及国家环保政策的迅速落地,喷墨印刷技术作为一项高效环保的数字化印刷技术,得到越来越高的关注,业内普遍认为喷墨印刷技术将是数字化印刷的必然发展趋势。然而与已经成熟的多Pass喷墨印刷设备不同,单Pass喷墨印刷设备在数据带宽、数据在线重构、高精度同步控制、喷嘴在线补偿等方面有着极高的技术要求。本文首先简要介绍了喷墨技术,然后针对单Pass喷墨印刷设备需要解决的技术问题提出了相应的解决方案。依据本文技术设计的单Pass书刊喷墨印刷机已经投放市场,并且获得了用户的普遍认可。 相似文献
6.
HTML5 application cache (AppCache) allowed Web browser to access Web offline.But it also brought a new method of cache poisoning attack that was more persisting.As for websites which used the AppCache,a novel poisoning method RFTM (replace file twice method),in which the attacker replaced the manifest file twice to poison the client’s AppCache,was proposed.Compared with the original attack,the legal server would not receive abnormal HTTP requests from the client in the attack.Therefore,changing the server configuration could not prevent the client from the RFTM AppCache poisoning.To avoid the attack mentioned above,a lightweight signature defense scheme Sec-Cache in application layer was designed.Furthermore,experiments show that it has good performance and compatibility. 相似文献
7.
To detect copy-paste tampering, an im-proved SIFT (Scale invariant feature transform)-based al-gorithm was proposed. Maximum angle is defined and a maximum angle-based marked graph is constructed. The m arked graph feature vector is provided to each SIFT key point via discrete polar coordinate transformation. Key points are matched to detect the copy-paste tamper-ing regions. The experimental results show that the pro-posed algorithm can effectively identify and detect the ro-tated or scaled copy-paste regions, and in comparison with the methods reported previously, it is resistant to post-processing, such as blurring, Gaussian white noise and JPEG recompression. The proposed algorithm performs better than the existing algorithm to dealing with scaling transformation. 相似文献
8.
This work discusses efficient and automated methods for constructing a set of representative resonance structures for arbitrary chemical species, including radicals and biradicals, consisting of the elements H, C, O, N, and S. Determining the representative reactive structures of chemical species is crucial for identification of reactive sites and consequently applying the correct reaction templates to generate the set of important reactions during automated chemical kinetic model generation. We describe a fundamental set of resonance pathway types, accounting for simple resonating structures, as well as global approaches for polycyclic aromatic species. Automatically discovering potential localized structures along with filtration to identify the representative structures was shown to be robust and relatively fast. The algorithms discussed here were recently implemented in the Reaction Mechanism Generator (RMG) software. The final structures proposed by this method were found to be in reasonable agreement with quantum chemical computation results of localized structure contributions to the resonance hybrid. 相似文献
9.
10.
Mengjie ZHANG 《数学年刊B辑(英文版)》2022,43(3):425-442
In this paper, the author concerns two trace Trudinger-Moser inequalities and obtains the corresponding extremal functions on a compact Riemann surface (Σ, g) with smooth boundary ?Σ. Explicitly, let λ1(?Σ) = inf u∈W1,2 (Σ,g),R ?Σ udsg=0,u6≡0 R Σ(|?gu|2 + u2 )dvg R ?Σ u2 dsg and H = n u ∈ W1,2 (Σ, g) : Z Σ(|?gu|2 + u2 )dvg ? α Z ?Σ u2dsg ≤ 1 and Z ?Σ u dsg = 0o ,where W1,2 (Σ, g) denotes the usual Sobolev space and ?g stands for the gradient operator.By the method of blow-up analysis, we obtain sup u∈H Z ?Σ e πu2 dsg ( < +∞, 0 ≤ α < λ1(?Σ),= +∞, α ≥ λ1(?Σ).Moreover, the author proves the above supremum is attained by a function uα ∈ H∩C∞(Σ)for any 0 ≤ α < λ1(?Σ). Further, he extends the result to the case of higher order eigenvalues. The results generalize those of [Li, Y. and Liu, P., Moser-Trudinger inequality on the boundary of compact Riemannian surface, Math. Z., 250, 2005, 363–386], [Yang,Y., Moser-Trudinger trace inequalities on a compact Riemannian surface with boundary,Pacific J. Math., 227, 2006, 177–200] and [Yang, Y., Extremal functions for TrudingerMoser inequalities of Adimurthi-Druet type in dimension two, J. Diff. Eq., 258, 2015,3161–3193] 相似文献