首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   59792篇
  免费   4657篇
  国内免费   3603篇
化学   19772篇
晶体学   391篇
力学   3750篇
综合类   502篇
数学   10452篇
物理学   19300篇
无线电   13885篇
  2024年   120篇
  2023年   664篇
  2022年   1140篇
  2021年   1466篇
  2020年   1502篇
  2019年   1320篇
  2018年   1194篇
  2017年   1478篇
  2016年   1851篇
  2015年   1514篇
  2014年   2481篇
  2013年   3731篇
  2012年   2820篇
  2011年   2966篇
  2010年   2282篇
  2009年   3359篇
  2008年   3638篇
  2007年   4093篇
  2006年   3484篇
  2005年   2756篇
  2004年   2321篇
  2003年   2589篇
  2002年   2874篇
  2001年   2193篇
  2000年   2050篇
  1999年   1704篇
  1998年   1633篇
  1997年   976篇
  1996年   931篇
  1995年   817篇
  1994年   860篇
  1993年   642篇
  1992年   724篇
  1991年   491篇
  1990年   468篇
  1989年   347篇
  1988年   287篇
  1987年   277篇
  1986年   245篇
  1985年   231篇
  1984年   230篇
  1983年   148篇
  1982年   189篇
  1981年   184篇
  1980年   123篇
  1979年   150篇
  1978年   127篇
  1977年   118篇
  1976年   75篇
  1973年   57篇
排序方式: 共有10000条查询结果,搜索用时 734 毫秒
151.
3G认证和密钥分配协议的形式化分析及改进   总被引:4,自引:0,他引:4  
介绍了第三代移动通信系统所采用的认证和密钥分配(AKA)协议,网络归属位置寄存器/访问位置寄存器(HLR/VLR)对用户UE(用户设备)的认证过程和用户UE对网络HLR/VLR的认证过程分别采用了两种不同的认证方式,前者采用基于"询问-应答"式的认证过程,后者采用基于"知识证明"式的认证过程.使用BAN形式化逻辑分析方法分别对这两种认证过程进行了分析,指出在假定HLR与VLR之间系统安全的前提下,基于"知识证明"式的认证过程仍然存在安全漏洞.3GPP采取基于顺序号的补充措施;同时,文中指出了另一种改进方案.  相似文献   
152.
介绍了基于西门子楼宇自控系统的空调计费系统的软硬件设计和具体实现.该系统的特点是借助西门子S600系统强大的数据处理和控制能力,采用时间记录和能量测量相结合的方法进行计费,具有实时监测和定时输出报表功能.该系统计量准确、计费合理、安全可靠、性价比高,满足了现代物业管理的需要.  相似文献   
153.
This paper derives the optimal trajectories in a general fluid network with server control. The stationary optimal policy in the complete state space is constructed. The optimal policy is constant on polyhedral convex cones. An algorithm is derived that computes these cones and the optimal policy. Generalized Klimov indices are introduced, they are used for characterizing myopic and time-uniformly optimal policies.Received: November 2004 / Revised: February 2005The research of this author has been supported by the project ‘‘Stochastic Networks’’ of the Netherlands Organisation for Scientific Research NWO.  相似文献   
154.
Early stages of rare-earth metal (Yb and Eu) growth on a vicinal, single-domain Si(1 0 0)2 × 1 surface have been studied in the coverage range of 0.1-0.3 monolayer (ML) by low energy electron diffraction, scanning tunneling microscopy, and synchrotron radiation photoemission spectroscopy. We show that Yb induces the 2 × 3 periodicity in the whole range of coverage studied. The 2 × 3 reconstruction coexists with the local 3 × 2/4 × 2 structure at about 0.2 ML of Yb. In contrast, Eu forms the 3 × 2 periodicity at 0.1-0.2 ML, whereas this structure is converted into the 2 × 3 phase at about 0.3 ML. The atomic arrangement and electronic properties of these reconstructions and the adsorbate-mediated modification of surface morphology are investigated.  相似文献   
155.
刘树新 《中国物理 C》2005,29(9):871-874
通过系统研究A~190区超形变核中转动带的转动惯量、角动量顺排、旋称分裂随转动频率的变化规律, 结合我们用处理对力的粒子数守恒方法的计算结果, 对A~190区所有转动带的组态结构给出了一个整体的描述. 绝大多数超形变带都建立在强耦合轨道上, 例如中子[512]5/2, [624]9/2. 少数超形变带则建立在高j闯入轨道上, 即中子[761]3/2, [752]5/2. 根据我们提出的组态结构所进行的理论计算结果表明, A~190区所有转动带的一般行为、反常变化和带交叉都得到了满意的解释.  相似文献   
156.
林涛  胡国平 《应用光学》2003,24(5):1-4,7
在综述光电对抗内涵的基础上,论述光电对抗在现代战争作战平台中的具体应用,并着重从电子战的角度论述了光电对抗在现代防空作战中的最新应用。最后指出光电对抗技术在未来电子战中的作用和发展方向。  相似文献   
157.
Binzhong Li  Baida Lü   《Optik》2003,113(12):535-540
Based on the beam coherence-polarization (BCP) matrix, the polarization property of coherent and incoherent Gaussian beam combinations is studied in detail. The general expressions for the degree of polarization P of the resulting beam in case of incoherent and coherent combinations are derived. It is shown that P is dependent on the incoherent or coherent combination, propagation distance, separation, azimuth of the polarization plane and numbers of beamlets in general. The irradiance distribution of the resulting beam for the coherent cases depends on the azimuth of the polarization plane of beamlets. However, for the incoherent case it does not.  相似文献   
158.
We show that the optomechanical coupling between an optical cavity mode and two movable cavity mirrors is able to entangle two different macroscopic oscillation modes of the mirrors. This continuous variable entanglement is maintained by the light bouncing between the mirrors and is robust against thermal noise. In fact, it could be experimentally demonstrated using present technology. Received 2 September 2002 / Received in final form 10 October 2002 Published online 7 January 2003  相似文献   
159.
We derive a test problem for evaluating the ability of time-steppingmethods to preserve the statistical properties of systems inmolecular dynamics. We consider a family of deterministic systemsconsisting of a finite number of particles interacting on acompact interval. The particles are given random initial conditionsand interact through instantaneous energy- and momentum-conservingcollisions. As the number of particles, the particle density,and the mean particle speed go to infinity, the trajectory ofa tracer particle is shown to converge to a stationary Gaussianstochastic process. We approximate this system by one describedby a system of ordinary differential equations and provide numericalevidence that it converges to the same stochastic process. Wesimulate the latter system with a variety of numerical integrators,including the symplectic Euler method, a fourth-order Runge-Kuttamethod, and an energyconserving step-and-project method. Weassess the methods' ability to recapture the system's limitingstatistics and observe that symplectic Euler performs significantlybetter than the others for comparable computational expense.  相似文献   
160.
Redundant data transfers over the Web, can be mainly attributed to the repeated transfers of unchanged data. Web caches and Web proxies are some of the solutions that have been proposed, to deal with the issue of redundant data transfers. In this paper we focus on the efficient estimation and reduction of redundant data transfers over the Web. We first prove that a vast amount of redundant data is transferred in Web pages that are considered to carry fresh data. We show this by following an approach based on Web page fragmentation and manipulation. Web pages are broken down to fragments, based on specific criteria. We then deal with these fragments as independent constructors of the Web page and study their change patterns independently and in the context of the whole Web page. After the fragmentation process, we propose solutions for dealing with redundant data transfers. This paper has been based on our previous work on ‘Web Components’ but also on related work by other researchers. It utilises a proxy based, client/server architecture, and imposes changes to the algorithms executed on the Proxy server and on clients. We show that our proposed solution can considerably reduce the amount of redundant data transferred on the Web. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号