全文获取类型
收费全文 | 3480篇 |
免费 | 419篇 |
国内免费 | 374篇 |
专业分类
化学 | 732篇 |
晶体学 | 21篇 |
力学 | 336篇 |
综合类 | 75篇 |
数学 | 1210篇 |
物理学 | 934篇 |
无线电 | 965篇 |
出版年
2024年 | 11篇 |
2023年 | 34篇 |
2022年 | 62篇 |
2021年 | 65篇 |
2020年 | 71篇 |
2019年 | 77篇 |
2018年 | 75篇 |
2017年 | 126篇 |
2016年 | 116篇 |
2015年 | 133篇 |
2014年 | 225篇 |
2013年 | 268篇 |
2012年 | 260篇 |
2011年 | 247篇 |
2010年 | 163篇 |
2009年 | 244篇 |
2008年 | 250篇 |
2007年 | 267篇 |
2006年 | 210篇 |
2005年 | 186篇 |
2004年 | 158篇 |
2003年 | 149篇 |
2002年 | 127篇 |
2001年 | 110篇 |
2000年 | 86篇 |
1999年 | 95篇 |
1998年 | 79篇 |
1997年 | 71篇 |
1996年 | 61篇 |
1995年 | 43篇 |
1994年 | 34篇 |
1993年 | 22篇 |
1992年 | 29篇 |
1991年 | 18篇 |
1990年 | 14篇 |
1989年 | 10篇 |
1988年 | 17篇 |
1987年 | 5篇 |
1986年 | 11篇 |
1985年 | 7篇 |
1984年 | 10篇 |
1983年 | 4篇 |
1982年 | 6篇 |
1981年 | 5篇 |
1979年 | 2篇 |
1975年 | 1篇 |
1974年 | 2篇 |
1973年 | 2篇 |
1971年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有4273条查询结果,搜索用时 46 毫秒
71.
圆锥曲线密码学是一种新型的公钥密码学,迄今对圆锥曲线密码学的研究成果都是以有限域GF(p)上的圆锥曲线为基础的.本文将有限域GF(p)上的圆锥曲线C(GF(p))推广为有限域GF(2n)上的圆锥曲线C(GF(2n)),证明了圆锥曲线C(GF(2n))上的点和加法运算构成有限交换群(C(GF(2n)),),并给出了圆锥曲线群(C(GF(2n)),)的阶的计算.此外,提出了使用有限域GF(2n)上的圆锥曲线群构造公钥密码系统,并给出了ElGamal加密方案和数字签名算法(DSA)在圆锥曲线C(GF(2n))上模拟的算法,最后分析其安全性. 相似文献
72.
一般增长曲线模型参数阵的BLU估计 总被引:4,自引:0,他引:4
考虑一般增长曲线模型:Y=X1BX2+εE(Vec(ε))=0V(Vec(ε))=σ2VIn(V0)本文对任一可估函数KBL给出了它的BLU估计(最佳线性无偏估计),并得到了方差σ2的一个无偏估计. 相似文献
73.
74.
The unsaturable trap model, which attributes the increase of the electrical resistivity of fcc metals during electron irradiation in the temperature regime of Stage-II recovery to the trapping of Stage-IE interstitials at impurity atoms, is shown to be in serious disagreement with the experiments, contrary to opposite statements in the literature. As shown recently, the predictions of the unsaturable trap model are independent of the dimensionality of the diffusion of the Stage-IE interstitials. Previous attempts to rule out a one-dimensional migration of the Stage-IE interstitials (and hence the two-interstitial model) on the basis of the alleged agreement of the unsaturable trap model with Stage-II damage curves are thus meaningless. On the contrary, it is demonstrated that the two-interstitial model accounts for minute details of the measured Stage-II damage curves in a natural way. 相似文献
75.
A polymer crystal with a noncrystalline surface layer formed by chain loops of different lengths is considered. It is assumed that the length of each loop can be changed by longitudinal diffusion of the molecule through the crystal lattice. From the condition that the free energy of the system is minimum, the loop length distribution and the average loop length as function of temperature are calculated. In contrast to the results for loops of equal length, for the present model, a substantial thickness of the noncrystalline surface layer and a broad melting range is obtained also for the case of adjacent reentry. In order to get this result one has to take into account that even an “ideal fold” consists of at least four rigidly arranged CH2 groups in energetically unfavored conformation. 相似文献
76.
77.
78.
S. K. Kim K. T. Atanassov A. G. Shannon 《International Journal of Mathematical Education in Science & Technology》2013,44(2):173-179
The purpose of this paper is to explain the basic theory of generalized nets (GNs) and their applications in the context of the differential diagnosis of neurological diseases. We define formally the concepts of a GN and transitions of a GN and also outline some remarks on their theory. The work here constructs an example which aims to trace the process of diagnosing different signs and symptoms in neurology. This will enable the interested reader to see the scope of nets in general as tools for the modelling, simulation, optimization and control of real processes. 相似文献
79.
This paper introduces a new algorithm for Boolean operations on rasterized geometric shapes that are represented with chain codes. The algorithm works in three steps. Firstly, the chain code symbols are transformed in the Hilbert space, where the overlaid chain code symbols are recognised. After that, a suitable starting cell is determined. Finally, the walk-about through the sequence of the initial chain code symbols is performed to obtain the sequence of chain code symbols representing the shape of the required Boolean operation. The algorithm is demonstrated on Freeman chain code in four directions. The time and space complexity of the proposed algorithm is linear, which was proven theoretically and confirmed by experiments. 相似文献
80.
Mathematical deconvolution methods can separate co-eluting peaks in samples for which (chromatographic) separation fail. However, these methods often heavily rely on manual user-input and interpretation. This is not only time-consuming but also error-prone and automation is needed if such methods are to be applied in a routine manner. 相似文献