全文获取类型
收费全文 | 105353篇 |
免费 | 3846篇 |
国内免费 | 2679篇 |
专业分类
化学 | 36120篇 |
晶体学 | 964篇 |
力学 | 7830篇 |
综合类 | 135篇 |
数学 | 33755篇 |
物理学 | 20793篇 |
综合类 | 12281篇 |
出版年
2024年 | 114篇 |
2023年 | 416篇 |
2022年 | 709篇 |
2021年 | 795篇 |
2020年 | 745篇 |
2019年 | 716篇 |
2018年 | 11148篇 |
2017年 | 10993篇 |
2016年 | 7065篇 |
2015年 | 1798篇 |
2014年 | 1536篇 |
2013年 | 1793篇 |
2012年 | 5799篇 |
2011年 | 12827篇 |
2010年 | 7557篇 |
2009年 | 7675篇 |
2008年 | 8371篇 |
2007年 | 10600篇 |
2006年 | 1482篇 |
2005年 | 2380篇 |
2004年 | 2419篇 |
2003年 | 2863篇 |
2002年 | 1926篇 |
2001年 | 1047篇 |
2000年 | 906篇 |
1999年 | 860篇 |
1998年 | 769篇 |
1997年 | 709篇 |
1996年 | 748篇 |
1995年 | 539篇 |
1994年 | 475篇 |
1993年 | 452篇 |
1992年 | 373篇 |
1991年 | 376篇 |
1990年 | 309篇 |
1989年 | 292篇 |
1988年 | 230篇 |
1987年 | 177篇 |
1986年 | 166篇 |
1985年 | 122篇 |
1984年 | 99篇 |
1983年 | 80篇 |
1982年 | 73篇 |
1981年 | 69篇 |
1980年 | 76篇 |
1979年 | 64篇 |
1978年 | 58篇 |
1977年 | 43篇 |
1973年 | 52篇 |
1914年 | 45篇 |
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
991.
Keeping Vehicular Ad hoc Network(VANET) from attacks requires secure and efficient distribution of information about bad entities. Negative messages are pieces of information that define the negative attributes of vehicles. By formally defining the negative message, we observe that accuracy is essential for its efficient distribution. We formally define the coverage percentage and accurate coverage percentage to describe the availability and distribution efficiency of negative message. These two metrics can jointly evaluate the performance of a distribution method. To obtain both high coverage percentage and high accurate coverage percentage, we propose meet-cloud, a scheme based on meet-table and cloud computing to securely and accurately distribute negative messages in VANET. A meet-table in a Road Side Unit(RSU) records the vehicles it encounters. All meettables are sent to cloud service to aggregate a global meet-table. The algorithm for distributing and redistributing negative messages are designed. Security analysis shows that meet-cloud is secure against fake and holding on to negative message attacks. Simulations and analysis demonstrate that meet-cloud is secure under denial of service and fake meet-table attacks. The simulation results also justify that meet-cloud outperforms the RSU broadcast and epidemic model. 相似文献
992.
Through molecular dynamics(MD)simulation,the dependencies of temperature,grain size and strain rate on the mechanical properties were studied.The simulation results demonstrated that the strain rate from 0.05 to 2 ns~(–1 )affected the Young’s modulus of nickel nanowires slightly,whereas the yield stress increased.The Young’s modulus decreased approximately linearly;however,the yield stress firstly increased and subsequently dropped as the temperature increased.The Young’s modulus and yield stress increased as the mean grain size increased from 2.66 to6.72 nm.Moreover,certain efforts have been made in the microstructure evolution with mechanical properties association under uniaxial tension.Certain phenomena such as the formation of twin structures,which were found in nanowires with larger grain size at higher strain rate and lower temperature,as well as the movement of grain boundaries and dislocation,were detected and discussed in detail.The results demonstrated that the plastic deformation was mainly accommodated by the motion of grain boundaries for smaller grain size.However,for larger grain size,the formations of stacking faults and twins were the main mechanisms of plastic deformation in the polycrystalline nickel nanowire. 相似文献
993.
In this paper, a life-cycle model with retirement is set up to study how an individual chooses the optimal retiring age on account of wage growth rate, longevity and healthy state. It is proved that there exists optimal retiring age under given conditions. The numerical simulations are given to show how wage growth rate, longevity and healthy state affect retiring age. 相似文献
994.
Quantitative analysis has always been a difficult problem in security analysis of intrusion tolerance systems. An intrusion tolerance model based on multiple recovery mechanisms is introduced in this paper and how to quantify the security attributes of the model is proposed. A state transition model with recovery states more accurately describes the dynamic behavior of the system. Considering that recovery mechanisms have a great impact on the security performance of the system, we set up the cost models corresponding to different recovery mechanisms. We propose a feasible security measure based on mean cost to security failure in order to evaluate the system cost during the recovery phase. The experimental results confirmed the feasibility of the proposed methods. 相似文献
995.
This paper described an improved underwater confrontation simulation method of naval amphibious operational training system. The initial position of submarine forces on the enemy is generated automatically, and the attacking distance model of torpedoes is established based on the kinematics theory, which is more flexible and reasonable to judge the launch condition compared to traditional method. The two kinds of confrontation behavior models on the enemy submarine are created to depict its tactical action from the defensive to the offensive as well as the contrary, ensuring that operational style is simulated more comprehensively and properly. The existing motion trajectory estimation and collision detection algorithms on operational platforms are also improved to reduce the iteration error and further enhance the detection accuracy of target hit. 相似文献
996.
End-use energy consumption can reflect the industrial development of a country and the living standards of its residents. The study of end-use energy consumption can provide a solid basis for industrial restructuring, energy saving, and emission reduction. In this paper, we analyzed the end-use energy consumption of a region in Northwestern China, and applied the Markov prediction method to forecast the future demand of different types of end-use energy. This provides a reference for the energy structure optimization in the Northwestern China. 相似文献
997.
Cloud storage service reduces the burden of data users by storing users’ data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost. 相似文献
998.
Lili Tian Feng Zhang Juntao Liu Xinguang Wang Yongzhou Ti 《Journal of Radioanalytical and Nuclear Chemistry》2018,315(1):51-56
A prompt gamma neutron activation analysis borehole logging method for copper, nickel and iron grade estimation is proposed. The performance of the method was simulated by MCNP5 code. Based on the theory of neutron–gamma distribution on the borehole condition, the BGO scintillator and 3He neutron tube are adopted to record gamma ray spectrum and thermal neutron simultaneously, and least square method is used for the characteristic gamma ray counts calculation in the high energy range. The results of detection limit of metal grade in borehole condition indicate that the effectiveness of this logging method. 相似文献
999.
Anthony D. Appelhans John E. Olson David A. Dahl Michal B. Ward Troy A. Robinson James E. Delmore 《Journal of Radioanalytical and Nuclear Chemistry》2018,315(2):207-209
A new isotope separator has been designed, constructed, and put into routine operation for separation of 133Xe providing a major advancement and significant cost reduction in preparation of this radioactive isotope. The design features and advantages are discussed that expedite high purity separation of relatively small quantities of this isotope. These advantages could be easily used to expedite separation of other shorter-lived radioactive isotopes. 相似文献
1000.
A. A. Naqvi F. Z. Khiari Fatai A. Liadi Khateeb-ur-Rehman M. Raashid A. A. Isab 《Journal of Radioanalytical and Nuclear Chemistry》2018,315(3):475-480
Prompt gamma ray analysis of soil samples contaminated with petroleum hydrocarbons(PHC) like benzene was carried out using 14 MeV neutron beams. Intensities of silicon, carbon, oxygen, and hydrogen gamma rays were measured for soil samples containing 2.20–10.4 wt% benzene. With increasing benzene concentration, the intensity of the C gamma rays increased while those of Si, H, and O gamma rays decreased. The reduction in Si, H, and O gamma ray intensities may be due to increasing neutron moderation effect in benzene-contaminated soil samples. The experimental intensities of gamma rays are in good agreement with the calculated intensities.The neutron moderation effects in benzene contaminated soil samples are about 26% weaker than those reported for soil samples containing moisture. From the slopes of silicon gamma ray intensity as a function of benzene concentration as well as moisture concentration, a simple scheme has been suggested to correct for the loss in carbon counts caused by neutron moderation from PHC and moisture in the soil samples. 相似文献