首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3427篇
  免费   148篇
  国内免费   38篇
化学   336篇
晶体学   1篇
力学   29篇
综合类   10篇
数学   802篇
物理学   483篇
无线电   1952篇
  2024年   4篇
  2023年   40篇
  2022年   52篇
  2021年   108篇
  2020年   52篇
  2019年   48篇
  2018年   66篇
  2017年   118篇
  2016年   122篇
  2015年   103篇
  2014年   250篇
  2013年   269篇
  2012年   198篇
  2011年   173篇
  2010年   148篇
  2009年   201篇
  2008年   143篇
  2007年   187篇
  2006年   163篇
  2005年   171篇
  2004年   145篇
  2003年   110篇
  2002年   123篇
  2001年   94篇
  2000年   57篇
  1999年   67篇
  1998年   58篇
  1997年   78篇
  1996年   63篇
  1995年   33篇
  1994年   24篇
  1993年   28篇
  1992年   19篇
  1991年   20篇
  1990年   13篇
  1989年   10篇
  1988年   11篇
  1987年   7篇
  1986年   8篇
  1985年   7篇
  1984年   2篇
  1983年   3篇
  1982年   3篇
  1981年   2篇
  1980年   2篇
  1979年   3篇
  1978年   2篇
  1973年   1篇
  1969年   1篇
  1966年   1篇
排序方式: 共有3613条查询结果,搜索用时 750 毫秒
81.
In this paper, we proposed a novel adjustable data hiding method. Our proposed method, which is based on exploiting modification direction (EMD) method, is called the “multi-group exploiting modification direction” method. In the multi-group method, we combine several pixel-groups to embed secret data according to the constructed switch map to simply avoid the conversion redundancy of the EMD method and the spatial redundancy of the section-wise strategy, as well as to efficiently increase the probability of achieving larger embedding capacity. According to the experimental results and mathematical justification, we verified that the multi-group method can achieve higher embedding payload and better visual quality of the image than the EMD method and section-wise strategy for simulated and real secret data.  相似文献   
82.
Copolymer composition, distribution and molecular size of the comonomer influence the final properties of polymer materials. Such influence can be followed from the effect on the chain conformation in solution determined from the scaling law between radius of gyration and molecular weight.  相似文献   
83.
The main factor in the propagation of traffic noise is the road surface, where the vehicles generate noise due to the contact between tire and pavement, in addition to the noise produced by the engine.  相似文献   
84.
In the European manufacturing industry, production batches are decreasing, resulting in an increase in required changeovers. Companies are pushed to respond quickly and cost-efficient to changing markets. One way for Small and Medium sized Enterprises (SMEs) to become more agile, is to incorporate industrial robots in their production processes; larger enterprises already use this versatile piece of equipment for large batch sizes. To do so, a new perspective and approach is required, tailored to dynamic manufacturing systems in which production systems and components can be easily reconfigured, altered, swapped or replaced. A modular system architecture was developed within project SInBot upon which challenges in dynamic cooperation between robots and humans were projected. The developed system uses decentralized control and distributed intelligence, linked through an extensible, flexible, and fault-tolerant communication architecture. The rapidly growing complexity of traditional systems is compared to its decentralized counterpart to illustrate some of the many advantages of this new system architecture. A manufacturing scenario analogue is discussed and the approach to verify the performance of inner-system components, as well as the benefits of this approach. Key challenges that are encountered in implementing the cooperation into the current industrial environments are identified and projected upon the verification system.  相似文献   
85.
This paper presents a link adaptation algorithm dedicated for 100 Gbps wireless transmission. Interleaved Reed-Solomon codes are selected as forward error correction (FEC) algorithms. The redundancy of the codes is selected according to the channel bit error rate (BER). The uncomplicated FEC scheme allows implementing a complete data link layer processor in an FPGA (field programmable gate array). In our case, we use the Virtex7 FPGA to validate the functionality of our implementation. The proposed FPGA-processor achieves 169 Gbps throughput. Moreover, the implementation is synthesized into 40 nm CMOS technology and the described link adaptation algorithm allows reducing consumed energy per bit to values below 1 pJ/bit at BER <1e−4. With higher BER, the energy increases up to ∼13 pJ/bit.  相似文献   
86.
根据自己多年的工作经验,从系统的观念来阐述激烈市场竞争中PCB企业应对之道,管理心得。  相似文献   
87.
This paper develops theory missing in the sizable literature that uses data envelopment analysis to construct return-risk ratios for investment funds. It explores the production possibility set of the investment funds to identify an appropriate form of returns to scale. It discusses what risk and return measures can justifiably be combined and how to deal with negative risks, and identifies suitable sets of measures. It identifies the problems of failing to deal with diversification and develops an iterative approximation procedure to deal with it. It identifies relationships between diversification, coherent measures of risk and stochastic dominance. It shows how the iterative procedure makes a practical difference using monthly returns of 30 hedge funds over the same time period. It discusses possible shortcomings of the procedure and offers directions for future research.  相似文献   
88.
Typical questionnaires administered by financial advisors to assess financial risk tolerance mostly contain stereotypes of people, have seemingly unscientific scoring approaches and often treat risk as a one-dimensional concept. In this work, a mathematical tool was developed to assess relative risk tolerance using Data Envelopment Analysis (DEA). At its core, it is a novel questionnaire that characterizes risk by its four distinct elements: propensity, attitude, capacity, and knowledge. Over 180 individuals were surveyed and their responses were analyzed using the Slacks-based measure type of DEA efficiency model. Results show that the multidimensionality of risk must be considered for complete assessment of risk tolerance. This approach also provides insight into the relationship between risk, its elements and other variables. Specifically, the perception of risk varies by gender as men are generally less risk averse than women. In fact, risk attitude and knowledge scores are consistently lower for women, while there is no statistical difference in their risk capacity and propensity compared to men. The tool can also serve as a “risk calculator” for an appropriate and defensible method to meet legal compliance requirements, known as the “Know Your Client” rule, that exist for Canadian financial institutions and their advisors.  相似文献   
89.
The intracellular brain pH in phosphorus magnetic resonance spectroscopy is calculated using the chemical shift between the inorganic phosphate and phosphocreatine with the Henderson–Hasselbalch equations. Researchers use various mathematical formulas that have different parameters and get various results for the same input data as a consequence. Thus, the aim of this article was to determine the mathematical formulas that allow the conversion of the pH values obtained by the most popular analysis methods to each other. To determine the relationships between pH results and the applied mathematical formula, the pH values were calculated using two algorithms for the theoretical chemical shift values. The pH results were compared with each other using the appropriate t-tests. Mathematical formulas were designed to simplify the conversion of pH values obtained by two data analysis methods to each other. The pH values with were obtained this way did not differ significantly from the pH values calculated directly from the given formula. The computed mathematical formulas will make it possible to simplify pH conversions without knowing the chemical shift between inorganic phosphate and phosphocreatine but only basing on the final pH values obtained by one of the formulas.  相似文献   
90.
首先介绍电信运营商的业务转型及IT所面临的挑战,分析互联网企业的成功经验及支撑其核心业务的革新式IT基础架构,进而探讨互联网企业的革新式IT基础架构在电信运营商数据中心应用的有效性,最后阐述互联网企业典型的两个解决方案(模块化数据中心和定制化服务器)对于运营商发展互联网业务的有效性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号