全文获取类型
收费全文 | 3493篇 |
免费 | 444篇 |
国内免费 | 44篇 |
专业分类
化学 | 173篇 |
晶体学 | 2篇 |
力学 | 175篇 |
综合类 | 47篇 |
数学 | 411篇 |
物理学 | 541篇 |
无线电 | 2632篇 |
出版年
2024年 | 28篇 |
2023年 | 93篇 |
2022年 | 141篇 |
2021年 | 166篇 |
2020年 | 184篇 |
2019年 | 105篇 |
2018年 | 107篇 |
2017年 | 130篇 |
2016年 | 152篇 |
2015年 | 175篇 |
2014年 | 324篇 |
2013年 | 308篇 |
2012年 | 312篇 |
2011年 | 272篇 |
2010年 | 196篇 |
2009年 | 136篇 |
2008年 | 144篇 |
2007年 | 140篇 |
2006年 | 139篇 |
2005年 | 130篇 |
2004年 | 88篇 |
2003年 | 81篇 |
2002年 | 78篇 |
2001年 | 75篇 |
2000年 | 29篇 |
1999年 | 35篇 |
1998年 | 21篇 |
1997年 | 24篇 |
1996年 | 19篇 |
1995年 | 18篇 |
1994年 | 24篇 |
1993年 | 15篇 |
1992年 | 20篇 |
1991年 | 13篇 |
1990年 | 4篇 |
1989年 | 5篇 |
1988年 | 4篇 |
1987年 | 6篇 |
1986年 | 6篇 |
1985年 | 3篇 |
1984年 | 3篇 |
1983年 | 1篇 |
1982年 | 3篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1978年 | 3篇 |
1977年 | 3篇 |
1976年 | 6篇 |
1975年 | 2篇 |
1974年 | 3篇 |
排序方式: 共有3981条查询结果,搜索用时 15 毫秒
61.
僵尸网络需要在控制者和受控主机之间维持周期性通信,如果能够有效识别僵尸网络的周期性通信行为,就能够以此为基础实现僵尸网络检测。尽管一些算法提出了基于周期性通信行为的僵尸网络检测方法,但是如何在海量数据中实现僵尸网络的快速检测仍然是一个问题。基于量子计算的僵尸网络周期性通信行为检测算法,是在已有算法的基础上引入量子计算来提高周期性通信检测算法的速度。实验结果表明,改进后的算法与已有算法相比,拥有相同的检测精度,与此同时,能够使用较少的查询次数完成僵尸网络检测,能够有效提高僵尸网络检测的速度。 相似文献
62.
63.
智能电网数据处理系统需要存储从巨量设备端点周期性采集到的海量数据,处理高度并发的读写请求,并要求系统具有良好的可扩展性.新兴的云数据服务系统为我们提供了很好的选择.但是现在云数据服务系统种类繁多,各方面的性能存在差异,如何选择合适的云数据服务系统成为关键问题.基于智能用电场景,提出了一种对云数据服务系统的性能评价和分析方法,并利用该方法评测HBase、Voldemort和Cassandra三者的性能. 相似文献
64.
为了提高云计算任务调度效率,提出一种改进人工免疫算法的云计算任务调度方法。首先建立云计算任务调度的数学模型,并以任务总时间最短作为目标函数,然后采用人工免疫算法进行求解,并将粒子群优化算法作为算子嵌入人工免疫算法中,保持种群的多样性,防止局部最优解的出现,最后采用仿真实验对算法的性能进行测试。结果表明,相对于其它算法,改进人工免疫算法减少了任务的完成时间,提高了用户满意度。 相似文献
65.
66.
The privacy protection in big data is a research hotspot in the field of cyberspace security.As a strict and provable definition of privacy protection,studying application status of differential privacy protection in big data environment can provide reference and guidance for its subsequent system applications.Based on the analysis of the related concepts and technical characteristics of differential privacy protection,the application of differential privacy protection technology was reviewed in data distribution and analysis,cloud computing and big data computing,location and trajectory services and social networks,which expounded the current representative research results and analyzed its existing problems.The research shows that the existing results have made effective innovation and exploration of differential privacy protection applications from the aspects of differential privacy protection mechanism,noise addition mechanism and location,and data processing methods,and the related results have been cross-applied in different scenarios.Finally,four major problems that need to be studied in the further systematic application of differential privacy protection in the big data environment are proposed. 相似文献
67.
Security has been the focus of grid systems recently. As a kind of tool, grid security infrastructure (GSI) provides the authentication and authorization services and so on. These mechanisms mostly belong to the objective factors, which have not met the needs of security. As the subjective factor, trust model plays an important role in security field. A new two-level reputation trust architecture for grid is given to reduce the costs of system management largely, in which trust relationships amongst virtual organizations (VOs) are built on domain trust managers (DTMs) rather than resource nodes (RNs). Taking inter-domain trust propagation for example, trust model is improved by integrating global reputation and the subjective trust concept of each recommender into synthesizing final trust value. Moreover, before the grid starts to interact with the trustworthy entities, the pre-measure scheme is presented to filter distrustful entities further, which is based on accuracy and honesty. Experimental results indicate that the model can prevent from the malicious attacks better. 相似文献
68.
To resolve the excessive system overhead and serious traffic congestion in user-oriented service function chain (SFC) embedding in mobile edge computing (MEC) networks,a content-oriented joint wireless multicast and SFC embedding algorithm was proposed for the multi-base station and multi-user edge networks with MEC servers.By involving four kinds of system overhead,including service flow,server function sustaining power,server function service power and wireless transmission power,an optimization model was proposed to jointly design SFC embedding with multicast beamforming.Firstly,with Lagrangian dual decomposition,the problem was decoupled into two independent subproblems,namely,SFC embedding and multicast beamforming.Secondly,with the Lp norm penalty term-based successive convex approximation algorithm,the integer programming-based SFC embedding problem was relaxed to an equivalent linear programming one.Finally,the non-convex beamforming optimization problem was transformed into a series of convex ones via the path following technique.Simulation results revealed that the proposed algorithm has good convergence,and is superior to both the optimal SFC embedding with unicasting and random SFC embedding with multicasting in terms of system overhead. 相似文献
69.
激光大气传输数值模拟中对计算参量的选取 总被引:3,自引:2,他引:3
根据数值计算的抽样原则、传输介质的特性及传输效应等,对激光大气传输数值模拟中计算参量的选取进行了比较全面的分析,总结了选取计算参量时应遵循的基本要求.针对湍流效应、稳态热晕效应数值模拟中横向抽样网格间距和传输步长的选取分别进行了分析,并得到了这些计算参量与大气传输效应特征参量的关系,从而为激光大气传输的数值仿真提供依据. 相似文献
70.