首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   25191篇
  免费   2103篇
  国内免费   1689篇
化学   1583篇
晶体学   23篇
力学   2261篇
综合类   346篇
数学   21196篇
物理学   3574篇
  2024年   49篇
  2023年   225篇
  2022年   320篇
  2021年   383篇
  2020年   525篇
  2019年   553篇
  2018年   629篇
  2017年   708篇
  2016年   737篇
  2015年   509篇
  2014年   1085篇
  2013年   1984篇
  2012年   1171篇
  2011年   1277篇
  2010年   1216篇
  2009年   1522篇
  2008年   1644篇
  2007年   1712篇
  2006年   1535篇
  2005年   1313篇
  2004年   1110篇
  2003年   1168篇
  2002年   1082篇
  2001年   847篇
  2000年   824篇
  1999年   765篇
  1998年   652篇
  1997年   602篇
  1996年   459篇
  1995年   367篇
  1994年   278篇
  1993年   223篇
  1992年   226篇
  1991年   201篇
  1990年   144篇
  1989年   94篇
  1988年   84篇
  1987年   85篇
  1986年   80篇
  1985年   108篇
  1984年   111篇
  1983年   50篇
  1982年   71篇
  1981年   47篇
  1980年   44篇
  1979年   49篇
  1978年   28篇
  1977年   30篇
  1976年   19篇
  1974年   9篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
State-of-the-art speech watermarking techniques enable speech signals to be authenticated and protected against any malicious attack to ensure secure speech communication. In general, reliable speech watermarking methods must satisfy four requirements: inaudibility, robustness, blind-detectability, and confidentiality. We previously proposed a method of non-blind speech watermarking based on direct spread spectrum (DSS) using a linear prediction (LP) scheme to solve the first two issues (inaudibility and robustness) due to distortion by spread spectrum. This method not only effectively embeds watermarks with small distortion but also has the same robustness as the DSS method. There are, however, two remaining issues with blind-detectability and confidentiality. In this work, we attempt to resolve these issues by developing an approach called the LP-DSS scheme, which takes two forms of data embedding for blind detection and frame synchronization. We incorporate blind detection with frame synchronization into the scheme to satisfy blind-detectability and incorporate two forms of data embedding process, front-side and back-side embedding for blind detection and frame synchronization, to satisfy confidentiality. We evaluated these improved processes by carrying out four objective tests (PESQ, LSD, Bit-error-rate, and accuracy of frame synchronization) to determine whether inaudibility and blind-detectability could be satisfied. We also evaluated all combinations with the two forms of data embedding for blind detection with frame synchronization by carrying out BER tests to determine whether confidentiality could be satisfied. Finally, we comparatively evaluated the proposed method by carrying out ten robustness tests against various processing and attacks. Our findings showed that an inaudible, robust, blindly detectable, and confidential speech watermarking method based on the proposed LP-DSS scheme could be achieved.  相似文献   
22.
In the era of the Internet of Things, there are many applications where numerous devices are deployed to acquire information and send it to analyse the data and make informed decisions. In these applications, the power consumption and price of the devices are often an issue. In this work, analog coding schemes are considered, so that an ADC is not needed, allowing the size and power consumption of the devices to be reduced. In addition, linear and DFT-based transmission schemes are proposed, so that the complexity of the operations involved is lowered, thus reducing the requirements in terms of processing capacity and the price of the hardware. The proposed schemes are proved to be asymptotically optimal among the linear ones for WSS, MA, AR and ARMA sources.  相似文献   
23.
This paper presents an exact solution for the transverse interface crack in the plane strain case. The crack is perpendicular to the interface and in one material. The exact complex stress functions are first obtained with some unknown constants. The satisfactions of all boundary conditions are then checked, the condition at infinity is considered and the unknown constants are determined. Further study may focus on the case with different shear moduli and the influence of the large deformation.The English text was polished by Keren Wang.  相似文献   
24.
Volatile organic compounds (VOCs) in urine are potential biomarkers of breast cancer. Previously, our group has investigated breast cancer through analysis of VOCs in mouse urine and identified a panel of VOCs with the ability to monitor tumor progression. However, an unanswered question is whether VOCs can be exploited similarly to monitor the efficacy of antitumor treatments over time. Herein, subsets of tumor-bearing mice were treated with pitavastatin at high (8 mg/kg) and low (4 mg/kg) concentrations, and urine was analyzed through solid-phase microextraction (SPME) coupled with gas chromatography-mass spectrometry (GC-MS). Previous investigations using X-ray and micro-CT analysis indicated pitavastatin administered at 8 mg/kg had a protective effect against mammary tumors, whereas 4 mg/kg treatments did not inhibit tumor-induced damage. VOCs from mice treated with pitavastatin were compared to the previously analyzed healthy controls and tumor-bearing mice using chemometric analyses, which revealed that mice treated with pitavastatin at high concentrations were significantly different than tumor-bearing untreated mice in the direction of healthy controls. Mice treated with low concentrations demonstrated significant differences relative to healthy controls and were reflective of tumor-bearing untreated mice. These results show that urinary VOCs can accurately and noninvasively predict the efficacy of pitavastatin treatments over time.  相似文献   
25.
In this paper, we improve the method for deriving Jacobi elliptic function solutions of nonlinear evolution equations given in Ref. [12] and apply it to the integrable higher-order Broer-Kaup system in (2 1)-dimensional spaces.Some new elliptic function solutions are obtained.  相似文献   
26.
In this paper, we consider the optimization of the quantum circuit for discrete logarithm of binary elliptic curves under a constrained connectivity, focusing on the resource expenditure and the optimal design for quantum operations such as the addition, binary shift, multiplication, squaring, inversion, and division included in the point addition on binary elliptic curves. Based on the space-efficient quantum Karatsuba multiplication, the number of CNOTs in the circuits of inversion and division has been reduced with the help of the Steiner tree problem reduction. The optimized size of the CNOTs is related to the minimum degree of the connected graph.  相似文献   
27.
电阻抗图像重建中Jacobi矩阵的快速算法   总被引:3,自引:0,他引:3  
秦世伦 《计算物理》2000,17(3):314-318
Jacobi矩阵是电阻抗图像重建中计算量最大的部份。利用摄动法导出该矩阵的快速算法,可以大幅度地减少计算量。算例表明,这种方法是有效的。  相似文献   
28.
构造了线性二次型最优控制的并行算法,介绍了这个并行算法在武汉大学“WUDP91”并行分布式处理系统上试算的数值应用软件的框图.本软件适用于既定动态系统的平衡问题.对于经济系统,可通过政策控制变量来调节和改善其状态和响应.对于自治系统可找出最优控制使得消耗函数达到最小值.通过对一系列例子进行试算,结果证实,所构造的并行算法和相应的数值软件是有效的,其加速比约为7.  相似文献   
29.
研究系数密集间断的边值问题,采用降维方法,使得在数值计算上可实现并行计算,并且收敛性的证明变得很简洁.  相似文献   
30.
本文证得:如果F是Cn中的一条种路,则G中同时通过k余弦e1,e2,...,ek而不通过F中的任一条边的圈最多只有一个且G中同时通过k条弦e1,e2,...,ek的圈最多只有2个,进而由之给出了M(k)的上界和m(k)的下界及m(k)=(k+1)(k+2)/2成立的一个条件,否定地回答了YapH.P.和TeoS.K.1984年提出的一个问题。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号