首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5280篇
  免费   569篇
  国内免费   291篇
化学   3383篇
力学   188篇
综合类   14篇
数学   1684篇
物理学   871篇
  2024年   19篇
  2023年   146篇
  2022年   224篇
  2021年   266篇
  2020年   255篇
  2019年   217篇
  2018年   168篇
  2017年   195篇
  2016年   299篇
  2015年   255篇
  2014年   431篇
  2013年   478篇
  2012年   327篇
  2011年   402篇
  2010年   312篇
  2009年   367篇
  2008年   328篇
  2007年   316篇
  2006年   209篇
  2005年   155篇
  2004年   133篇
  2003年   110篇
  2002年   69篇
  2001年   52篇
  2000年   53篇
  1999年   51篇
  1998年   44篇
  1997年   36篇
  1996年   30篇
  1995年   30篇
  1994年   27篇
  1993年   12篇
  1992年   17篇
  1991年   9篇
  1990年   7篇
  1989年   10篇
  1988年   11篇
  1987年   2篇
  1986年   4篇
  1985年   9篇
  1984年   10篇
  1983年   3篇
  1982年   3篇
  1981年   7篇
  1980年   8篇
  1979年   7篇
  1978年   4篇
  1977年   7篇
  1976年   3篇
  1966年   1篇
排序方式: 共有6140条查询结果,搜索用时 15 毫秒
41.
SUMMARY: In recent years, the multiparametric approach for evaluating perceptual rating of voice quality has been advocated. This study evaluates the accuracy of predicting perceived overall severity of voice quality with a minimal set of aerodynamic, voice range profile (phonetogram), and acoustic perturbation measures. One hundred and twelve dysphonic persons (93 women and 19 men) with laryngeal pathologies and 41 normal controls (35 women and six men) with normal voices participated in this study. Perceptual severity judgement was carried out by four listeners rating the G (overall grade) parameter of the GRBAS scale. The minimal set of instrumental measures was selected based on the ability of the measure to discriminate between dysphonic and normal voices, and to attain at least a moderate correlation with perceived overall severity. Results indicated that perceived overall severity was best described by maximum phonation time of sustained /a/, peak intraoral pressure of the consonant-vowel /pi/ strings production, voice range profile area, and acoustic jitter. Direct-entry discriminant function analysis revealed that these four voice measures in combination correctly predicted 67.3% of perceived overall severity levels.  相似文献   
42.
43.
The paper is concerned with the state estimation problem for a class of time-delayed complex networks with event-triggering communication protocol. A novel event generator function, which is dependent not only on the measurement output but also on a predefined positive constant, is proposed with hope to reduce the communication burden. A new concept of exponentially ultimate boundedness is provided to quantify the estimation performance. By means of the comparison principle, some sufficient conditions are obtained to guarantee that the estimation error is exponentially ultimately bounded, and then the estimator gains are obtained in terms of the solution of certain matrix inequalities. Furthermore, a rigorous proof is proposed to show that the designed triggering condition is free of the Zeno behavior. Finally, a numerical example is given to illustrate the effectiveness of the proposed event-based estimator.  相似文献   
44.
A novel multiple information encryption by user-image-based gyrator transform hologram is proposed. In encryption process, each channel of the user image is phase encoded, modulated by random phase function and then gyrator transformed to get the gyrator spectrum of user image. Subsequently, each channel of the secret image is normalized, phase encoded, multiplied by modulated user image, and then gyrator transformed to obtain the gyrator spectrum of secret image. The encrypted digital hologram is recorded by the interference between the gyrator spectrum of user image and the spherical wave function. Similarly, the digital hologram for decryption is recorded by the interference between the gyrator spectrum of secret image and the spherical wave function. The multiple encrypted digital holograms are multiplexed into a final encoded hologram and the corresponding digital holograms for decryption are multiplexed into a final hologram for decryption. The wavelength and radius of the spherical wave function, and angle of gyrator transform are all essential keys for decryption. The proposed system has two main features. First, the encrypted hologram has no information about secret image. Second, the hologram for decryption used as identification key. Consequently the two marked security layers of information protection are achieved. The proposal can be realized by optoelectronic system. Numerical simulation results demonstrate the feasibility and security of the proposed technique.  相似文献   
45.
We apply the theory of fuzzy subsets to the multiple objective decision problem of stock selection. We allow our objectives to have varying degrees of importance. We discuss various criteria used in selecting stocks. We indicate some procedures for subjectively evaluating the membership functions associated with these criteria.  相似文献   
46.
Some aspects concerning the subfringe integration method in interferogram analysis have been investigated and modified. The modified algorithm, introduced in this paper, is capable of reconstructing the phase in the presence of noise or errors in carrier frequency. The subfringe integration method was applied to analyze two computer simulated patterns of equispaced Fizeau fringes using N bucket integration. Also, it is used to analyze the multiple-beam Fizeau fringe. The refractive index profile of polyethylene fiber is obtained by using two methods, subfringe integration method, and Fourier transform method. A comparison between the obtained results using the maintained methods is presented.  相似文献   
47.
辛云宏  杨万海  曹正文 《光子学报》2005,34(10):1451-1455
利用IRST(红外搜索与跟踪)系统所获取的各目标的角度及其红外光谱辐射功率和信息,通过对红外光谱辅射功率和的相关处理,运用选优的JPDA(联合概率数据关联)算法与IMM(交互多模型)算法实现了IRST系统的单站多目标跟踪,并通过两个仿真场景对算法性能进行了检验.仿真结果表明:在跟踪开始阶段,两个场景中的每个目标都能获得高精度的跟踪;当目标编队飞行时,算法能对各目标进行有效的跟踪,而且跟踪精确度也是令人满意的;当目标交叉飞行时,跟踪的误差明显加大,随着时间的延续,对远距离目标会失去跟踪能力,但对近距离目标仍能进行有效的跟踪.  相似文献   
48.
We present a study of time-delay effects on a two-actor conflict model based on nonlinear differential equations. The state of each actor depends on its own state in isolation, its previous state, its inertia to change, the positive or negative feedback and a time delay in the state of the other actor. We use both theoretical and numerical approaches to characterize the evolution of the system for several values of time delays. We find that, under particular conditions, a time delay leads to the appearance of oscillations in the states of the actors. Besides, phase portraits for the trajectories are presented to illustrate the evolution of the system for different time delays. Finally, we discuss our results in the context of social conflict models.  相似文献   
49.
We report the first successful deposition of triacetate-pullulan polysaccharide thin films by matrix assisted pulsed laser evaporation. We used a KrF* excimer laser source (λ = 248 nm, τ ≈ 20 ns) operated at a repetition rate of 10 Hz. We demonstrated by FTIR that our thin films are composed of triacetate-pullulan maintaining its chemical structure and functionality. The dependence on incident laser fluence of the induced surface morphology is analysed.  相似文献   
50.
用多焦点全息透镜实现多重谱分数傅里叶变换   总被引:1,自引:0,他引:1  
提出用多焦点全息透镜实现多重谱分数傅里叶变换.利用全息方法通过一次曝光制作出多焦点的全息透镜,分析了用此全息元件实现这种变换的条件,并在实验上实现了多重谱分数傅里叶变换. 实验结果表明这种变换方法简便可行,可广泛应用于多通道光学信息处理系统及多目标图像识别系统中.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号