全文获取类型
收费全文 | 2455篇 |
免费 | 348篇 |
国内免费 | 99篇 |
专业分类
化学 | 73篇 |
晶体学 | 2篇 |
力学 | 62篇 |
综合类 | 23篇 |
数学 | 60篇 |
物理学 | 150篇 |
无线电 | 2532篇 |
出版年
2024年 | 5篇 |
2023年 | 32篇 |
2022年 | 53篇 |
2021年 | 65篇 |
2020年 | 74篇 |
2019年 | 51篇 |
2018年 | 65篇 |
2017年 | 94篇 |
2016年 | 119篇 |
2015年 | 142篇 |
2014年 | 246篇 |
2013年 | 212篇 |
2012年 | 234篇 |
2011年 | 251篇 |
2010年 | 207篇 |
2009年 | 204篇 |
2008年 | 197篇 |
2007年 | 195篇 |
2006年 | 185篇 |
2005年 | 69篇 |
2004年 | 58篇 |
2003年 | 37篇 |
2002年 | 25篇 |
2001年 | 12篇 |
2000年 | 22篇 |
1999年 | 12篇 |
1998年 | 3篇 |
1997年 | 6篇 |
1996年 | 7篇 |
1995年 | 4篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 4篇 |
1991年 | 3篇 |
1990年 | 1篇 |
1984年 | 1篇 |
1979年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有2902条查询结果,搜索用时 15 毫秒
61.
《Journal of Dispersion Science and Technology》2013,34(5):683-689
Abstract The effects of two metal complexes of 2,2′‐dipyridylamine (bpya) ligand, [(bpya)Cu]Cl2 and [(bpya)Zn]Cl2, in promoting the hydrolysis of bis(4‐nitrophenyl) phosphate (BNPP) have been kinetically investigated in Brij35 micellar solution and at 298 K, pH ranging from 6.41 to 8.6. In neutral micellar solution at 298 K, pH 7.02, the rate constants for the catalytic hydrolysis of BNPP by [(bpya)Cu]Cl2 and [(bpya)Zn]Cl2 are 1.2 × 106 times and 1.5 × 105 times higher than those for the spontaneous hydrolysis, respectively. Kinetic studies show that the active species in the catalytic hydrolysis of BNPP is the aquo‐hydroxy form, and the relative kinetic and thermodynamic parameters indicate that the mechanism of the reaction involves intramolecular nucleophilic attack on the metal center‐bound diester. 相似文献
62.
Süleyman Karda Serkan elik Muhammed Ali Bingl Mehmet Sabir Kiraz Hüseyin Demirci Albert Levi 《Wireless Communications and Mobile Computing》2015,15(18):2150-2166
This paper examines Vaudenay's privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary classes, k‐strong and k‐forward adversaries where the adversary is allowed to corrupt a tag at most k times. Moreover, we introduce an extended privacy definition that also covers all privacy classes of Vaudenay's model. In order to achieve highest privacy level, we study low cost primitives such as physically unclonable functions (PUFs). The common assumption of PUFs is that their physical structure is destroyed once tampered. This is an ideal assumption because the tamper resistance depends on the ability of the attacker and the quality of the PUF circuits. In this paper, we have weakened this assumption by introducing a new definition k‐resistant PUFs. k‐PUFs are tamper resistant against at most k attacks; that is, their physical structure remains still functional and correct until at most kth physical attack. Furthermore, we prove that strong privacy can be achieved without public‐key cryptography using k PUF‐based authentication. We finally prove that our extended proposal achieves both reader authentication and k‐strong privacy. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
63.
Yingyot Poo‐arporn Surachai Thachepan Rungtiva Palangsuntikul 《Journal of synchrotron radiation》2015,22(1):86-90
Evidence of internal sulfate attack in field exposure was demonstrated by the damaged interior wall of a three‐year‐old house situated in Nakhon Ratchasima Province, Thailand. Partial distension of the mortar was clearly observed together with an expansion of a black substance. Removal of the black substance revealed a dense black layer. This layer was only found in the vicinity of the damaged area, suggesting that this black material is possibly involved in the wall cracking. By employing synchrotron‐based X‐ray photoelectron spectroscopy (XPS) and X‐ray absorption near‐edge structure (XANES) techniques, the unknown sample was chemically identified. The S 2p and O 1s XPS results mutually indicated the existence of sulfate species in the materials collected from the damaged area. The XANES results indicated the presence of ferrous (II) sulfate, confirming sulfate‐induced expansion and cracking. The sulfate attack in the present case appeared to physically affect the structure whereas the chemical integrity at the molecular level of the calcium silicate hydrate phase was retained since there was a lack of spectroscopic evidence for calcium sulfate. It was speculated that internal sulfate probably originated from the contaminated aggregates used during the construction. The current findings would be beneficial for understanding the sulfate‐attack mechanism as well as for future prevention against sulfate attack during construction. 相似文献
64.
论述了基于DSP技术的RFID读写器设计方法。在描述RFID系统组成的基础上,给出了读写器的软硬件设计流程。重点阐述了DSP对接收信号的软件处理以及反冲撞功能的实现方法。该读写器已应用于开放式门禁系统中,实际应用结果表明其性能良好。 相似文献
65.
基于RFID专用读写模块和IC卡的手机支付新方案的研究 总被引:2,自引:0,他引:2
本文首先研究了移动支付业务需求、业务模式、技术背景与实现方式,然后描述了将RFID技术与移动通信技术相结合实现移动支付业务的技术方案,最后针对国内移动支付的发展现状,详细介绍了基于RFID专用读写模块和IC卡的手机移动支付新方案. 相似文献
66.
67.
空对空多目标攻击载机攻击航线求解逻辑 总被引:1,自引:1,他引:0
介绍了空对空多目标攻击载机攻击航线的基本要求、航线选择和求解方法,以及载机航线、瞄准偏差、操纵指令的计算逻辑图.同时还介绍了多目标攻击"可能攻击扇形区"交集的概念和在载机航线求解中的应用等问题. 相似文献
68.
传统湿度传感器制造工艺复杂、需有线连接信号,对此,文中提出一种纸基无芯片射频识别(Radio Frequency Identification, RFID)湿度传感器。为提升传感器谐振特性,选择非对称开口环内部分布式加载金属碎片作为传感器结构,聚乙烯醇(PVA)作为湿敏材料,使用遗传算法和HFSS射频仿真软件来设计并优化传感器结构。以喷墨打印技术制作传感器样品,采用滴涂法在传感器表面分别制备了5%、10%、15%三种质量浓度比的PVA薄膜。湿敏特性仿真及测试结果一致表明:PVA与纸基底协同作用可显著提高传感器灵敏度。随PVA浓度增加灵敏度增加,15%PVA传感器灵敏度最高,高湿灵敏度达到12.22 MHz/%RH,但随PVA浓度增加恢复特性变差,5%PVA湿度传感器具有良好的恢复特性,恢复度达83.87%。通过长期多次实验验证了PVA纸基湿度传感器具有良好的温度稳定性与中长期稳定性。与同类研究成果对比,文中设计在感湿范围及灵敏度方面有优势且制造工艺更简单,为低成本湿度传感器的大规模使用提供了可能。 相似文献
69.
70.
Inspired by the promising potential of re-configurable intelligent surface (RIS)-aided transmission in achieving the vision of 6th Generation (6G) network, we analyze the security model for a vehicular-to-infrastructure (V2I) network by considering multiple RISs (M-RIS) on buildings to act as passive relays at fixed distances from a source. In addition, multiple eavesdroppers are presented in the vicinity of the intended destination. Our aim is to enhance the secrecy capacity (SC) and to minimize secrecy outage probability (SOP) in presence of multiple eavesdroppers with the help of M-RIS in V2I communications. We propose a key-less physical layer security using beam-forming by exploiting M-RIS. The proposed approach assumes the concept of detecting eavesdroppers before the information can be transmitted via beam-forming by utilizing M-RIS. The results reveal that with consideration of M-RIS and beam-forming, the achievable SC and SOP performance is significantly improved while imposing minimum power consumption and fewer RIS reflectors. 相似文献