全文获取类型
收费全文 | 4528篇 |
免费 | 736篇 |
国内免费 | 189篇 |
专业分类
化学 | 311篇 |
晶体学 | 19篇 |
力学 | 164篇 |
综合类 | 59篇 |
数学 | 763篇 |
物理学 | 984篇 |
无线电 | 3153篇 |
出版年
2024年 | 20篇 |
2023年 | 72篇 |
2022年 | 114篇 |
2021年 | 145篇 |
2020年 | 135篇 |
2019年 | 141篇 |
2018年 | 132篇 |
2017年 | 205篇 |
2016年 | 222篇 |
2015年 | 236篇 |
2014年 | 380篇 |
2013年 | 318篇 |
2012年 | 306篇 |
2011年 | 302篇 |
2010年 | 224篇 |
2009年 | 286篇 |
2008年 | 312篇 |
2007年 | 306篇 |
2006年 | 273篇 |
2005年 | 231篇 |
2004年 | 175篇 |
2003年 | 169篇 |
2002年 | 124篇 |
2001年 | 119篇 |
2000年 | 98篇 |
1999年 | 67篇 |
1998年 | 64篇 |
1997年 | 54篇 |
1996年 | 47篇 |
1995年 | 38篇 |
1994年 | 19篇 |
1993年 | 21篇 |
1992年 | 17篇 |
1991年 | 16篇 |
1990年 | 9篇 |
1989年 | 7篇 |
1988年 | 10篇 |
1987年 | 9篇 |
1986年 | 7篇 |
1985年 | 2篇 |
1984年 | 12篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1981年 | 4篇 |
1980年 | 1篇 |
排序方式: 共有5453条查询结果,搜索用时 15 毫秒
61.
鉴于当前学生化学意志素质缺乏的问题,探讨以认知、情绪唤醒、情感、意志为主控目标,在预习、尝试学习、交错搭配合作学习中,开展CAFP教学研究,以促成情意因素对认知的调动、动力、强化等功能。 相似文献
62.
63.
64.
65.
《Communications in Nonlinear Science & Numerical Simulation》2014,19(9):3313-3322
This paper addresses the bipartite flock control problem where a multi-agent system splits into two clusters upon internal or external excitations. Using structurally balanced signed graph theory, LaSalle’s invariance principle and Barbalat’s Lemma, we prove that the proposed algorithm guarantees a bipartite flocking behavior. In each of the two disjoint clusters, all individuals move with the same direction. Meanwhile, every pair of agents in different clusters moves with opposite directions. Moreover, all agents in the two separated clusters approach a common velocity magnitude, and collision avoidance among all agents is ensured as well. Finally, the proposed bipartite flock control method is examined by numerical simulations. The bipartite flocking motion addressed by this paper has its references in both natural collective motions and human group behaviors such as predator–prey and panic escaping scenarios. 相似文献
66.
67.
Due to the relatively large structures in the Oil and Gas industry, original equipment manufacturers (OEMs) have been implementing custom-designed laser vision sensor (LVS) surface profiling systems as part of quality control in their manufacturing processes. The rough manufacturing environment and the continuous movement and misalignment of these custom-designed tools adversely affect the accuracy of laser-based vision surface profiling applications. Accordingly, Oil and Gas businesses have been raising the demand from the OEMs to implement practical and robust LVS calibration techniques prior to running any visual inspections. This effort introduces an LVS calibration technique representing a simplified version of two known calibration techniques, which are commonly implemented to obtain a calibrated LVS system for surface profiling applications. Both calibration techniques are implemented virtually and experimentally to scan simulated and three-dimensional (3D) printed features of known profiles, respectively. Scanned data is transformed from the camera frame to points in the world coordinate system and compared with the input profiles to validate the introduced calibration technique capability against the more complex approach and preliminarily assess the measurement technique for weld profiling applications. Moreover, the sensitivity to stand-off distances is analyzed to illustrate the practicality of the presented technique. 相似文献
68.
The Grover's a1gorithm was used for fau1t attack against the pub1ic key cryptography.A fixed phase rotation based Grover's a1gorithm was proposed,and the probabi1ity of success achieved 99.23% with 0.1π phase rotation.Combined with the fau1t attack further,ECC(e11iptic curve cryptography)vo1tage burr attack a1gorithm based on Grover a1gorithm with 0.1π phase rotation was proposed.Then a safety Kob1itz curve,K-163,pub1ished successfu11y attacked by NIST on binary domain in simu1ation and the success rate was 100%.The comp1exity of the attack great1y reduces on the exponentia1.It was a new effective way,except the Shor's a1gorithm,to attack pub1ic key cryptography by quantum computing,and it contributed to extend the attack ways to the other pub1ic key cryptography. 相似文献
69.
70.
Sehie Park 《Numerical Functional Analysis & Optimization》2013,34(1-2):101-110
In this paper we use fixed point and coincidence theorems due to Park [8] to give matching theorems concerning closed coverings of nonempty convex sets in a real topological vector space. Our new results extend previously given ones due to Ky Fan [2], [3], Shih [10], Shih and Tan [11], and Park [7]. 相似文献