全文获取类型
收费全文 | 3427篇 |
免费 | 148篇 |
国内免费 | 38篇 |
专业分类
化学 | 336篇 |
晶体学 | 1篇 |
力学 | 29篇 |
综合类 | 10篇 |
数学 | 802篇 |
物理学 | 483篇 |
无线电 | 1952篇 |
出版年
2024年 | 4篇 |
2023年 | 40篇 |
2022年 | 52篇 |
2021年 | 108篇 |
2020年 | 52篇 |
2019年 | 48篇 |
2018年 | 66篇 |
2017年 | 118篇 |
2016年 | 122篇 |
2015年 | 103篇 |
2014年 | 250篇 |
2013年 | 269篇 |
2012年 | 198篇 |
2011年 | 173篇 |
2010年 | 148篇 |
2009年 | 201篇 |
2008年 | 143篇 |
2007年 | 187篇 |
2006年 | 163篇 |
2005年 | 171篇 |
2004年 | 145篇 |
2003年 | 110篇 |
2002年 | 123篇 |
2001年 | 94篇 |
2000年 | 57篇 |
1999年 | 67篇 |
1998年 | 58篇 |
1997年 | 78篇 |
1996年 | 63篇 |
1995年 | 33篇 |
1994年 | 24篇 |
1993年 | 28篇 |
1992年 | 19篇 |
1991年 | 20篇 |
1990年 | 13篇 |
1989年 | 10篇 |
1988年 | 11篇 |
1987年 | 7篇 |
1986年 | 8篇 |
1985年 | 7篇 |
1984年 | 2篇 |
1983年 | 3篇 |
1982年 | 3篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1973年 | 1篇 |
1969年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有3613条查询结果,搜索用时 750 毫秒
81.
In this paper, we proposed a novel adjustable data hiding method. Our proposed method, which is based on exploiting modification direction (EMD) method, is called the “multi-group exploiting modification direction” method. In the multi-group method, we combine several pixel-groups to embed secret data according to the constructed switch map to simply avoid the conversion redundancy of the EMD method and the spatial redundancy of the section-wise strategy, as well as to efficiently increase the probability of achieving larger embedding capacity. According to the experimental results and mathematical justification, we verified that the multi-group method can achieve higher embedding payload and better visual quality of the image than the EMD method and section-wise strategy for simulated and real secret data. 相似文献
82.
Copolymer composition, distribution and molecular size of the comonomer influence the final properties of polymer materials. Such influence can be followed from the effect on the chain conformation in solution determined from the scaling law between radius of gyration and molecular weight. 相似文献
83.
The main factor in the propagation of traffic noise is the road surface, where the vehicles generate noise due to the contact between tire and pavement, in addition to the noise produced by the engine. 相似文献
84.
《Mechatronics》2016
In the European manufacturing industry, production batches are decreasing, resulting in an increase in required changeovers. Companies are pushed to respond quickly and cost-efficient to changing markets. One way for Small and Medium sized Enterprises (SMEs) to become more agile, is to incorporate industrial robots in their production processes; larger enterprises already use this versatile piece of equipment for large batch sizes. To do so, a new perspective and approach is required, tailored to dynamic manufacturing systems in which production systems and components can be easily reconfigured, altered, swapped or replaced. A modular system architecture was developed within project SInBot upon which challenges in dynamic cooperation between robots and humans were projected. The developed system uses decentralized control and distributed intelligence, linked through an extensible, flexible, and fault-tolerant communication architecture. The rapidly growing complexity of traditional systems is compared to its decentralized counterpart to illustrate some of the many advantages of this new system architecture. A manufacturing scenario analogue is discussed and the approach to verify the performance of inner-system components, as well as the benefits of this approach. Key challenges that are encountered in implementing the cooperation into the current industrial environments are identified and projected upon the verification system. 相似文献
85.
This paper presents a link adaptation algorithm dedicated for 100 Gbps wireless transmission. Interleaved Reed-Solomon codes are selected as forward error correction (FEC) algorithms. The redundancy of the codes is selected according to the channel bit error rate (BER). The uncomplicated FEC scheme allows implementing a complete data link layer processor in an FPGA (field programmable gate array). In our case, we use the Virtex7 FPGA to validate the functionality of our implementation. The proposed FPGA-processor achieves 169 Gbps throughput. Moreover, the implementation is synthesized into 40 nm CMOS technology and the described link adaptation algorithm allows reducing consumed energy per bit to values below 1 pJ/bit at BER <1e−4. With higher BER, the energy increases up to ∼13 pJ/bit. 相似文献
86.
根据自己多年的工作经验,从系统的观念来阐述激烈市场竞争中PCB企业应对之道,管理心得。 相似文献
87.
This paper develops theory missing in the sizable literature that uses data envelopment analysis to construct return-risk ratios for investment funds. It explores the production possibility set of the investment funds to identify an appropriate form of returns to scale. It discusses what risk and return measures can justifiably be combined and how to deal with negative risks, and identifies suitable sets of measures. It identifies the problems of failing to deal with diversification and develops an iterative approximation procedure to deal with it. It identifies relationships between diversification, coherent measures of risk and stochastic dominance. It shows how the iterative procedure makes a practical difference using monthly returns of 30 hedge funds over the same time period. It discusses possible shortcomings of the procedure and offers directions for future research. 相似文献
88.
Typical questionnaires administered by financial advisors to assess financial risk tolerance mostly contain stereotypes of people, have seemingly unscientific scoring approaches and often treat risk as a one-dimensional concept. In this work, a mathematical tool was developed to assess relative risk tolerance using Data Envelopment Analysis (DEA). At its core, it is a novel questionnaire that characterizes risk by its four distinct elements: propensity, attitude, capacity, and knowledge. Over 180 individuals were surveyed and their responses were analyzed using the Slacks-based measure type of DEA efficiency model. Results show that the multidimensionality of risk must be considered for complete assessment of risk tolerance. This approach also provides insight into the relationship between risk, its elements and other variables. Specifically, the perception of risk varies by gender as men are generally less risk averse than women. In fact, risk attitude and knowledge scores are consistently lower for women, while there is no statistical difference in their risk capacity and propensity compared to men. The tool can also serve as a “risk calculator” for an appropriate and defensible method to meet legal compliance requirements, known as the “Know Your Client” rule, that exist for Canadian financial institutions and their advisors. 相似文献
89.
Monika Cichocka 《光谱学快报》2018,51(2):118-121
The intracellular brain pH in phosphorus magnetic resonance spectroscopy is calculated using the chemical shift between the inorganic phosphate and phosphocreatine with the Henderson–Hasselbalch equations. Researchers use various mathematical formulas that have different parameters and get various results for the same input data as a consequence. Thus, the aim of this article was to determine the mathematical formulas that allow the conversion of the pH values obtained by the most popular analysis methods to each other. To determine the relationships between pH results and the applied mathematical formula, the pH values were calculated using two algorithms for the theoretical chemical shift values. The pH results were compared with each other using the appropriate t-tests. Mathematical formulas were designed to simplify the conversion of pH values obtained by two data analysis methods to each other. The pH values with were obtained this way did not differ significantly from the pH values calculated directly from the given formula. The computed mathematical formulas will make it possible to simplify pH conversions without knowing the chemical shift between inorganic phosphate and phosphocreatine but only basing on the final pH values obtained by one of the formulas. 相似文献
90.
首先介绍电信运营商的业务转型及IT所面临的挑战,分析互联网企业的成功经验及支撑其核心业务的革新式IT基础架构,进而探讨互联网企业的革新式IT基础架构在电信运营商数据中心应用的有效性,最后阐述互联网企业典型的两个解决方案(模块化数据中心和定制化服务器)对于运营商发展互联网业务的有效性。 相似文献