全文获取类型
收费全文 | 25191篇 |
免费 | 2103篇 |
国内免费 | 1689篇 |
专业分类
化学 | 1583篇 |
晶体学 | 23篇 |
力学 | 2261篇 |
综合类 | 346篇 |
数学 | 21196篇 |
物理学 | 3574篇 |
出版年
2024年 | 49篇 |
2023年 | 225篇 |
2022年 | 320篇 |
2021年 | 383篇 |
2020年 | 525篇 |
2019年 | 553篇 |
2018年 | 629篇 |
2017年 | 708篇 |
2016年 | 737篇 |
2015年 | 509篇 |
2014年 | 1085篇 |
2013年 | 1984篇 |
2012年 | 1171篇 |
2011年 | 1277篇 |
2010年 | 1216篇 |
2009年 | 1522篇 |
2008年 | 1644篇 |
2007年 | 1712篇 |
2006年 | 1535篇 |
2005年 | 1313篇 |
2004年 | 1110篇 |
2003年 | 1168篇 |
2002年 | 1082篇 |
2001年 | 847篇 |
2000年 | 824篇 |
1999年 | 765篇 |
1998年 | 652篇 |
1997年 | 602篇 |
1996年 | 459篇 |
1995年 | 367篇 |
1994年 | 278篇 |
1993年 | 223篇 |
1992年 | 226篇 |
1991年 | 201篇 |
1990年 | 144篇 |
1989年 | 94篇 |
1988年 | 84篇 |
1987年 | 85篇 |
1986年 | 80篇 |
1985年 | 108篇 |
1984年 | 111篇 |
1983年 | 50篇 |
1982年 | 71篇 |
1981年 | 47篇 |
1980年 | 44篇 |
1979年 | 49篇 |
1978年 | 28篇 |
1977年 | 30篇 |
1976年 | 19篇 |
1974年 | 9篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
State-of-the-art speech watermarking techniques enable speech signals to be authenticated and protected against any malicious attack to ensure secure speech communication. In general, reliable speech watermarking methods must satisfy four requirements: inaudibility, robustness, blind-detectability, and confidentiality. We previously proposed a method of non-blind speech watermarking based on direct spread spectrum (DSS) using a linear prediction (LP) scheme to solve the first two issues (inaudibility and robustness) due to distortion by spread spectrum. This method not only effectively embeds watermarks with small distortion but also has the same robustness as the DSS method. There are, however, two remaining issues with blind-detectability and confidentiality. In this work, we attempt to resolve these issues by developing an approach called the LP-DSS scheme, which takes two forms of data embedding for blind detection and frame synchronization. We incorporate blind detection with frame synchronization into the scheme to satisfy blind-detectability and incorporate two forms of data embedding process, front-side and back-side embedding for blind detection and frame synchronization, to satisfy confidentiality. We evaluated these improved processes by carrying out four objective tests (PESQ, LSD, Bit-error-rate, and accuracy of frame synchronization) to determine whether inaudibility and blind-detectability could be satisfied. We also evaluated all combinations with the two forms of data embedding for blind detection with frame synchronization by carrying out BER tests to determine whether confidentiality could be satisfied. Finally, we comparatively evaluated the proposed method by carrying out ten robustness tests against various processing and attacks. Our findings showed that an inaudible, robust, blindly detectable, and confidential speech watermarking method based on the proposed LP-DSS scheme could be achieved. 相似文献
22.
Jesús Gutirrez-Gutirrez Fernando M. Villar-Rosety Xabier Insausti Marta Zrraga-Rodríguez 《Entropy (Basel, Switzerland)》2022,24(5)
In the era of the Internet of Things, there are many applications where numerous devices are deployed to acquire information and send it to analyse the data and make informed decisions. In these applications, the power consumption and price of the devices are often an issue. In this work, analog coding schemes are considered, so that an ADC is not needed, allowing the size and power consumption of the devices to be reduced. In addition, linear and DFT-based transmission schemes are proposed, so that the complexity of the operations involved is lowered, thus reducing the requirements in terms of processing capacity and the price of the hardware. The proposed schemes are proved to be asymptotically optimal among the linear ones for WSS, MA, AR and ARMA sources. 相似文献
23.
Tianhu Hao 《Acta Mechanica Sinica》2006,22(5):455-468
This paper presents an exact solution for the transverse interface crack in the plane strain case. The crack is perpendicular to the interface and in one material. The exact complex stress functions are first obtained with some unknown constants. The satisfactions of all boundary conditions are then checked, the condition at infinity is considered and the unknown constants are determined. Further study may focus on the case with different shear moduli and the influence of the large deformation.The English text was polished by Keren Wang. 相似文献
24.
Paul Grocki Mark Woollam Luqi Wang Shengzhi Liu Maitri Kalra Amanda P. Siegel Bai-Yan Li Hiroki Yokota Mangilal Agarwal 《Molecules (Basel, Switzerland)》2022,27(13)
Volatile organic compounds (VOCs) in urine are potential biomarkers of breast cancer. Previously, our group has investigated breast cancer through analysis of VOCs in mouse urine and identified a panel of VOCs with the ability to monitor tumor progression. However, an unanswered question is whether VOCs can be exploited similarly to monitor the efficacy of antitumor treatments over time. Herein, subsets of tumor-bearing mice were treated with pitavastatin at high (8 mg/kg) and low (4 mg/kg) concentrations, and urine was analyzed through solid-phase microextraction (SPME) coupled with gas chromatography-mass spectrometry (GC-MS). Previous investigations using X-ray and micro-CT analysis indicated pitavastatin administered at 8 mg/kg had a protective effect against mammary tumors, whereas 4 mg/kg treatments did not inhibit tumor-induced damage. VOCs from mice treated with pitavastatin were compared to the previously analyzed healthy controls and tumor-bearing mice using chemometric analyses, which revealed that mice treated with pitavastatin at high concentrations were significantly different than tumor-bearing untreated mice in the direction of healthy controls. Mice treated with low concentrations demonstrated significant differences relative to healthy controls and were reflective of tumor-bearing untreated mice. These results show that urinary VOCs can accurately and noninvasively predict the efficacy of pitavastatin treatments over time. 相似文献
25.
LI De-Sheng LUO Cheng-Xin 《理论物理通讯》2006,46(8)
In this paper, we improve the method for deriving Jacobi elliptic function solutions of nonlinear evolution equations given in Ref. [12] and apply it to the integrable higher-order Broer-Kaup system in (2 1)-dimensional spaces.Some new elliptic function solutions are obtained. 相似文献
26.
Jianmei Liu Hong Wang Zhi Ma Qianheng Duan Yangyang Fei Xiangdong Meng 《Entropy (Basel, Switzerland)》2022,24(7)
In this paper, we consider the optimization of the quantum circuit for discrete logarithm of binary elliptic curves under a constrained connectivity, focusing on the resource expenditure and the optimal design for quantum operations such as the addition, binary shift, multiplication, squaring, inversion, and division included in the point addition on binary elliptic curves. Based on the space-efficient quantum Karatsuba multiplication, the number of CNOTs in the circuits of inversion and division has been reduced with the help of the Steiner tree problem reduction. The optimized size of the CNOTs is related to the minimum degree of the connected graph. 相似文献
27.
电阻抗图像重建中Jacobi矩阵的快速算法 总被引:3,自引:0,他引:3
Jacobi矩阵是电阻抗图像重建中计算量最大的部份。利用摄动法导出该矩阵的快速算法,可以大幅度地减少计算量。算例表明,这种方法是有效的。 相似文献
28.
朱方生 《武汉大学学报(理学版)》1995,(3)
构造了线性二次型最优控制的并行算法,介绍了这个并行算法在武汉大学“WUDP91”并行分布式处理系统上试算的数值应用软件的框图.本软件适用于既定动态系统的平衡问题.对于经济系统,可通过政策控制变量来调节和改善其状态和响应.对于自治系统可找出最优控制使得消耗函数达到最小值.通过对一系列例子进行试算,结果证实,所构造的并行算法和相应的数值软件是有效的,其加速比约为7. 相似文献
29.
研究系数密集间断的边值问题,采用降维方法,使得在数值计算上可实现并行计算,并且收敛性的证明变得很简洁. 相似文献
30.
赖春晖 《新疆大学学报(理工版)》1995,12(2):33-38
本文证得:如果F是Cn中的一条种路,则G中同时通过k余弦e1,e2,...,ek而不通过F中的任一条边的圈最多只有一个且G中同时通过k条弦e1,e2,...,ek的圈最多只有2个,进而由之给出了M(k)的上界和m(k)的下界及m(k)=(k+1)(k+2)/2成立的一个条件,否定地回答了YapH.P.和TeoS.K.1984年提出的一个问题。 相似文献