首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   105353篇
  免费   3846篇
  国内免费   2679篇
化学   36120篇
晶体学   964篇
力学   7830篇
综合类   135篇
数学   33755篇
物理学   20793篇
综合类   12281篇
  2024年   114篇
  2023年   416篇
  2022年   709篇
  2021年   795篇
  2020年   745篇
  2019年   716篇
  2018年   11148篇
  2017年   10993篇
  2016年   7065篇
  2015年   1798篇
  2014年   1536篇
  2013年   1793篇
  2012年   5799篇
  2011年   12827篇
  2010年   7557篇
  2009年   7675篇
  2008年   8371篇
  2007年   10600篇
  2006年   1482篇
  2005年   2380篇
  2004年   2419篇
  2003年   2863篇
  2002年   1926篇
  2001年   1047篇
  2000年   906篇
  1999年   860篇
  1998年   769篇
  1997年   709篇
  1996年   748篇
  1995年   539篇
  1994年   475篇
  1993年   452篇
  1992年   373篇
  1991年   376篇
  1990年   309篇
  1989年   292篇
  1988年   230篇
  1987年   177篇
  1986年   166篇
  1985年   122篇
  1984年   99篇
  1983年   80篇
  1982年   73篇
  1981年   69篇
  1980年   76篇
  1979年   64篇
  1978年   58篇
  1977年   43篇
  1973年   52篇
  1914年   45篇
排序方式: 共有10000条查询结果,搜索用时 9 毫秒
991.
Keeping Vehicular Ad hoc Network(VANET) from attacks requires secure and efficient distribution of information about bad entities. Negative messages are pieces of information that define the negative attributes of vehicles. By formally defining the negative message, we observe that accuracy is essential for its efficient distribution. We formally define the coverage percentage and accurate coverage percentage to describe the availability and distribution efficiency of negative message. These two metrics can jointly evaluate the performance of a distribution method. To obtain both high coverage percentage and high accurate coverage percentage, we propose meet-cloud, a scheme based on meet-table and cloud computing to securely and accurately distribute negative messages in VANET. A meet-table in a Road Side Unit(RSU) records the vehicles it encounters. All meettables are sent to cloud service to aggregate a global meet-table. The algorithm for distributing and redistributing negative messages are designed. Security analysis shows that meet-cloud is secure against fake and holding on to negative message attacks. Simulations and analysis demonstrate that meet-cloud is secure under denial of service and fake meet-table attacks. The simulation results also justify that meet-cloud outperforms the RSU broadcast and epidemic model.  相似文献   
992.
Through molecular dynamics(MD)simulation,the dependencies of temperature,grain size and strain rate on the mechanical properties were studied.The simulation results demonstrated that the strain rate from 0.05 to 2 ns~(–1 )affected the Young’s modulus of nickel nanowires slightly,whereas the yield stress increased.The Young’s modulus decreased approximately linearly;however,the yield stress firstly increased and subsequently dropped as the temperature increased.The Young’s modulus and yield stress increased as the mean grain size increased from 2.66 to6.72 nm.Moreover,certain efforts have been made in the microstructure evolution with mechanical properties association under uniaxial tension.Certain phenomena such as the formation of twin structures,which were found in nanowires with larger grain size at higher strain rate and lower temperature,as well as the movement of grain boundaries and dislocation,were detected and discussed in detail.The results demonstrated that the plastic deformation was mainly accommodated by the motion of grain boundaries for smaller grain size.However,for larger grain size,the formations of stacking faults and twins were the main mechanisms of plastic deformation in the polycrystalline nickel nanowire.  相似文献   
993.
In this paper, a life-cycle model with retirement is set up to study how an individual chooses the optimal retiring age on account of wage growth rate, longevity and healthy state. It is proved that there exists optimal retiring age under given conditions. The numerical simulations are given to show how wage growth rate, longevity and healthy state affect retiring age.  相似文献   
994.
Quantitative analysis has always been a difficult problem in security analysis of intrusion tolerance systems. An intrusion tolerance model based on multiple recovery mechanisms is introduced in this paper and how to quantify the security attributes of the model is proposed. A state transition model with recovery states more accurately describes the dynamic behavior of the system. Considering that recovery mechanisms have a great impact on the security performance of the system, we set up the cost models corresponding to different recovery mechanisms. We propose a feasible security measure based on mean cost to security failure in order to evaluate the system cost during the recovery phase. The experimental results confirmed the feasibility of the proposed methods.  相似文献   
995.
This paper described an improved underwater confrontation simulation method of naval amphibious operational training system. The initial position of submarine forces on the enemy is generated automatically, and the attacking distance model of torpedoes is established based on the kinematics theory, which is more flexible and reasonable to judge the launch condition compared to traditional method. The two kinds of confrontation behavior models on the enemy submarine are created to depict its tactical action from the defensive to the offensive as well as the contrary, ensuring that operational style is simulated more comprehensively and properly. The existing motion trajectory estimation and collision detection algorithms on operational platforms are also improved to reduce the iteration error and further enhance the detection accuracy of target hit.  相似文献   
996.
End-use energy consumption can reflect the industrial development of a country and the living standards of its residents. The study of end-use energy consumption can provide a solid basis for industrial restructuring, energy saving, and emission reduction. In this paper, we analyzed the end-use energy consumption of a region in Northwestern China, and applied the Markov prediction method to forecast the future demand of different types of end-use energy. This provides a reference for the energy structure optimization in the Northwestern China.  相似文献   
997.
Cloud storage service reduces the burden of data users by storing users’ data files in the cloud. But, the files might be modified in the cloud. So, data users hope to check data files integrity periodically. In a public auditing protocol, there is a trusted auditor who has certain ability to help users to check the integrity of data files. With the advantages of no public key management and verification, researchers focus on public auditing protocol in ID-based cryptography recently. However, some existing protocols are vulnerable to forgery attack. In this paper, based on ID-based signature technology, by strengthening information authentication and the computing power of the auditor, we propose an ID-based public auditing protocol for cloud data integrity checking. We also prove that the proposed protocol is secure in the random oracle model under the assumption that the Diffie-Hellman problem is hard. Furthermore, we compare the proposed protocol with other two ID-based auditing protocols in security features, communication efficiency and computation cost. The comparisons show that the proposed protocol satisfies more security features with lower computation cost.  相似文献   
998.
A prompt gamma neutron activation analysis borehole logging method for copper, nickel and iron grade estimation is proposed. The performance of the method was simulated by MCNP5 code. Based on the theory of neutron–gamma distribution on the borehole condition, the BGO scintillator and 3He neutron tube are adopted to record gamma ray spectrum and thermal neutron simultaneously, and least square method is used for the characteristic gamma ray counts calculation in the high energy range. The results of detection limit of metal grade in borehole condition indicate that the effectiveness of this logging method.  相似文献   
999.
A new isotope separator has been designed, constructed, and put into routine operation for separation of 133Xe providing a major advancement and significant cost reduction in preparation of this radioactive isotope. The design features and advantages are discussed that expedite high purity separation of relatively small quantities of this isotope. These advantages could be easily used to expedite separation of other shorter-lived radioactive isotopes.  相似文献   
1000.
Prompt gamma ray analysis of soil samples contaminated with petroleum hydrocarbons(PHC) like benzene was carried out using 14 MeV neutron beams. Intensities of silicon, carbon, oxygen, and hydrogen gamma rays were measured for soil samples containing 2.20–10.4 wt% benzene. With increasing benzene concentration, the intensity of the C gamma rays increased while those of Si, H, and O gamma rays decreased. The reduction in Si, H, and O gamma ray intensities may be due to increasing neutron moderation effect in benzene-contaminated soil samples. The experimental intensities of gamma rays are in good agreement with the calculated intensities.The neutron moderation effects in benzene contaminated soil samples are about 26% weaker than those reported for soil samples containing moisture. From the slopes of silicon gamma ray intensity as a function of benzene concentration as well as moisture concentration, a simple scheme has been suggested to correct for the loss in carbon counts caused by neutron moderation from PHC and moisture in the soil samples.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号