全文获取类型
收费全文 | 59792篇 |
免费 | 4657篇 |
国内免费 | 3603篇 |
专业分类
化学 | 19772篇 |
晶体学 | 391篇 |
力学 | 3750篇 |
综合类 | 502篇 |
数学 | 10452篇 |
物理学 | 19300篇 |
无线电 | 13885篇 |
出版年
2024年 | 120篇 |
2023年 | 664篇 |
2022年 | 1140篇 |
2021年 | 1466篇 |
2020年 | 1502篇 |
2019年 | 1320篇 |
2018年 | 1194篇 |
2017年 | 1478篇 |
2016年 | 1851篇 |
2015年 | 1514篇 |
2014年 | 2481篇 |
2013年 | 3731篇 |
2012年 | 2820篇 |
2011年 | 2966篇 |
2010年 | 2282篇 |
2009年 | 3359篇 |
2008年 | 3638篇 |
2007年 | 4093篇 |
2006年 | 3484篇 |
2005年 | 2756篇 |
2004年 | 2321篇 |
2003年 | 2589篇 |
2002年 | 2874篇 |
2001年 | 2193篇 |
2000年 | 2050篇 |
1999年 | 1704篇 |
1998年 | 1633篇 |
1997年 | 976篇 |
1996年 | 931篇 |
1995年 | 817篇 |
1994年 | 860篇 |
1993年 | 642篇 |
1992年 | 724篇 |
1991年 | 491篇 |
1990年 | 468篇 |
1989年 | 347篇 |
1988年 | 287篇 |
1987年 | 277篇 |
1986年 | 245篇 |
1985年 | 231篇 |
1984年 | 230篇 |
1983年 | 148篇 |
1982年 | 189篇 |
1981年 | 184篇 |
1980年 | 123篇 |
1979年 | 150篇 |
1978年 | 127篇 |
1977年 | 118篇 |
1976年 | 75篇 |
1973年 | 57篇 |
排序方式: 共有10000条查询结果,搜索用时 734 毫秒
151.
3G认证和密钥分配协议的形式化分析及改进 总被引:4,自引:0,他引:4
介绍了第三代移动通信系统所采用的认证和密钥分配(AKA)协议,网络归属位置寄存器/访问位置寄存器(HLR/VLR)对用户UE(用户设备)的认证过程和用户UE对网络HLR/VLR的认证过程分别采用了两种不同的认证方式,前者采用基于"询问-应答"式的认证过程,后者采用基于"知识证明"式的认证过程.使用BAN形式化逻辑分析方法分别对这两种认证过程进行了分析,指出在假定HLR与VLR之间系统安全的前提下,基于"知识证明"式的认证过程仍然存在安全漏洞.3GPP采取基于顺序号的补充措施;同时,文中指出了另一种改进方案. 相似文献
152.
介绍了基于西门子楼宇自控系统的空调计费系统的软硬件设计和具体实现.该系统的特点是借助西门子S600系统强大的数据处理和控制能力,采用时间记录和能量测量相结合的方法进行计费,具有实时监测和定时输出报表功能.该系统计量准确、计费合理、安全可靠、性价比高,满足了现代物业管理的需要. 相似文献
153.
This paper derives the optimal trajectories in a general fluid network with server control. The stationary optimal policy in the complete state space is constructed. The optimal policy is constant on polyhedral convex cones. An algorithm is derived that computes these cones and the optimal policy. Generalized Klimov indices are introduced, they are used for characterizing myopic and time-uniformly optimal policies.Received: November 2004 / Revised: February 2005The research of this author has been supported by the project ‘‘Stochastic Networks’’ of the Netherlands Organisation for Scientific Research NWO. 相似文献
154.
Early stages of rare-earth metal (Yb and Eu) growth on a vicinal, single-domain Si(1 0 0)2 × 1 surface have been studied in the coverage range of 0.1-0.3 monolayer (ML) by low energy electron diffraction, scanning tunneling microscopy, and synchrotron radiation photoemission spectroscopy. We show that Yb induces the 2 × 3 periodicity in the whole range of coverage studied. The 2 × 3 reconstruction coexists with the local 3 × 2/4 × 2 structure at about 0.2 ML of Yb. In contrast, Eu forms the 3 × 2 periodicity at 0.1-0.2 ML, whereas this structure is converted into the 2 × 3 phase at about 0.3 ML. The atomic arrangement and electronic properties of these reconstructions and the adsorbate-mediated modification of surface morphology are investigated. 相似文献
155.
通过系统研究A~190区超形变核中转动带的转动惯量、角动量顺排、旋称分裂随转动频率的变化规律, 结合我们用处理对力的粒子数守恒方法的计算结果, 对A~190区所有转动带的组态结构给出了一个整体的描述. 绝大多数超形变带都建立在强耦合轨道上, 例如中子[512]5/2, [624]9/2. 少数超形变带则建立在高j闯入轨道上, 即中子[761]3/2, [752]5/2. 根据我们提出的组态结构所进行的理论计算结果表明, A~190区所有转动带的一般行为、反常变化和带交叉都得到了满意的解释. 相似文献
156.
在综述光电对抗内涵的基础上,论述光电对抗在现代战争作战平台中的具体应用,并着重从电子战的角度论述了光电对抗在现代防空作战中的最新应用。最后指出光电对抗技术在未来电子战中的作用和发展方向。 相似文献
157.
Based on the beam coherence-polarization (BCP) matrix, the polarization property of coherent and incoherent Gaussian beam combinations is studied in detail. The general expressions for the degree of polarization P of the resulting beam in case of incoherent and coherent combinations are derived. It is shown that P is dependent on the incoherent or coherent combination, propagation distance, separation, azimuth of the polarization plane and numbers of beamlets in general. The irradiance distribution of the resulting beam for the coherent cases depends on the azimuth of the polarization plane of beamlets. However, for the incoherent case it does not. 相似文献
158.
S. Mancini D. Vitali V. Giovannetti P. Tombesi 《The European Physical Journal D - Atomic, Molecular, Optical and Plasma Physics》2003,22(3):417-422
We show that the optomechanical coupling between an optical cavity mode and two movable cavity mirrors is able to entangle
two different macroscopic oscillation modes of the mirrors. This continuous variable entanglement is maintained by the light
bouncing between the mirrors and is robust against thermal noise. In fact, it could be experimentally demonstrated using present
technology.
Received 2 September 2002 / Received in final form 10 October 2002 Published online 7 January 2003 相似文献
159.
We derive a test problem for evaluating the ability of time-steppingmethods to preserve the statistical properties of systems inmolecular dynamics. We consider a family of deterministic systemsconsisting of a finite number of particles interacting on acompact interval. The particles are given random initial conditionsand interact through instantaneous energy- and momentum-conservingcollisions. As the number of particles, the particle density,and the mean particle speed go to infinity, the trajectory ofa tracer particle is shown to converge to a stationary Gaussianstochastic process. We approximate this system by one describedby a system of ordinary differential equations and provide numericalevidence that it converges to the same stochastic process. Wesimulate the latter system with a variety of numerical integrators,including the symplectic Euler method, a fourth-order Runge-Kuttamethod, and an energyconserving step-and-project method. Weassess the methods' ability to recapture the system's limitingstatistics and observe that symplectic Euler performs significantlybetter than the others for comparable computational expense. 相似文献
160.
Christos Bouras Agisilaos Konidaris 《International Journal of Communication Systems》2005,18(2):119-142
Redundant data transfers over the Web, can be mainly attributed to the repeated transfers of unchanged data. Web caches and Web proxies are some of the solutions that have been proposed, to deal with the issue of redundant data transfers. In this paper we focus on the efficient estimation and reduction of redundant data transfers over the Web. We first prove that a vast amount of redundant data is transferred in Web pages that are considered to carry fresh data. We show this by following an approach based on Web page fragmentation and manipulation. Web pages are broken down to fragments, based on specific criteria. We then deal with these fragments as independent constructors of the Web page and study their change patterns independently and in the context of the whole Web page. After the fragmentation process, we propose solutions for dealing with redundant data transfers. This paper has been based on our previous work on ‘Web Components’ but also on related work by other researchers. It utilises a proxy based, client/server architecture, and imposes changes to the algorithms executed on the Proxy server and on clients. We show that our proposed solution can considerably reduce the amount of redundant data transferred on the Web. Copyright © 2004 John Wiley & Sons, Ltd. 相似文献