首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3480篇
  免费   419篇
  国内免费   374篇
化学   732篇
晶体学   21篇
力学   336篇
综合类   75篇
数学   1210篇
物理学   934篇
无线电   965篇
  2024年   11篇
  2023年   34篇
  2022年   62篇
  2021年   65篇
  2020年   71篇
  2019年   77篇
  2018年   75篇
  2017年   126篇
  2016年   116篇
  2015年   133篇
  2014年   225篇
  2013年   268篇
  2012年   260篇
  2011年   247篇
  2010年   163篇
  2009年   244篇
  2008年   250篇
  2007年   267篇
  2006年   210篇
  2005年   186篇
  2004年   158篇
  2003年   149篇
  2002年   127篇
  2001年   110篇
  2000年   86篇
  1999年   95篇
  1998年   79篇
  1997年   71篇
  1996年   61篇
  1995年   43篇
  1994年   34篇
  1993年   22篇
  1992年   29篇
  1991年   18篇
  1990年   14篇
  1989年   10篇
  1988年   17篇
  1987年   5篇
  1986年   11篇
  1985年   7篇
  1984年   10篇
  1983年   4篇
  1982年   6篇
  1981年   5篇
  1979年   2篇
  1975年   1篇
  1974年   2篇
  1973年   2篇
  1971年   1篇
  1966年   1篇
排序方式: 共有4273条查询结果,搜索用时 46 毫秒
71.
基于有限域GF上圆锥曲线的公钥密码算法   总被引:5,自引:0,他引:5       下载免费PDF全文
蔡永泉  赵磊  靳岩岩 《电子学报》2006,34(8):1464-1468
圆锥曲线密码学是一种新型的公钥密码学,迄今对圆锥曲线密码学的研究成果都是以有限域GF(p)上的圆锥曲线为基础的.本文将有限域GF(p)上的圆锥曲线C(GF(p))推广为有限域GF(2n)上的圆锥曲线C(GF(2n)),证明了圆锥曲线C(GF(2n))上的点和加法运算构成有限交换群(C(GF(2n)),),并给出了圆锥曲线群(C(GF(2n)),)的阶的计算.此外,提出了使用有限域GF(2n)上的圆锥曲线群构造公钥密码系统,并给出了ElGamal加密方案和数字签名算法(DSA)在圆锥曲线C(GF(2n))上模拟的算法,最后分析其安全性.  相似文献   
72.
一般增长曲线模型参数阵的BLU估计   总被引:4,自引:0,他引:4  
喻胜华  何灿芝 《数学杂志》1998,18(4):439-444
考虑一般增长曲线模型:Y=X1BX2+εE(Vec(ε))=0V(Vec(ε))=σ2VIn(V0)本文对任一可估函数KBL给出了它的BLU估计(最佳线性无偏估计),并得到了方差σ2的一个无偏估计.  相似文献   
73.
结合三线摆实验的基本过程,进行实验数据的采集。利用投影法来测量圆盘的转角大小,借助于matlab的cftool工具箱,对数据进行曲线拟合,对测出来的二组数据拟合,得到转角与百分差曲线图。通过误差的大小比较,得出圆盘转动惯量测量值与理论值的百分差随转角变化最接近于三次曲线。  相似文献   
74.
The unsaturable trap model, which attributes the increase of the electrical resistivity of fcc metals during electron irradiation in the temperature regime of Stage-II recovery to the trapping of Stage-IE interstitials at impurity atoms, is shown to be in serious disagreement with the experiments, contrary to opposite statements in the literature. As shown recently, the predictions of the unsaturable trap model are independent of the dimensionality of the diffusion of the Stage-IE interstitials. Previous attempts to rule out a one-dimensional migration of the Stage-IE interstitials (and hence the two-interstitial model) on the basis of the alleged agreement of the unsaturable trap model with Stage-II damage curves are thus meaningless. On the contrary, it is demonstrated that the two-interstitial model accounts for minute details of the measured Stage-II damage curves in a natural way.  相似文献   
75.
A polymer crystal with a noncrystalline surface layer formed by chain loops of different lengths is considered. It is assumed that the length of each loop can be changed by longitudinal diffusion of the molecule through the crystal lattice. From the condition that the free energy of the system is minimum, the loop length distribution and the average loop length as function of temperature are calculated. In contrast to the results for loops of equal length, for the present model, a substantial thickness of the noncrystalline surface layer and a broad melting range is obtained also for the case of adjacent reentry. In order to get this result one has to take into account that even an “ideal fold” consists of at least four rigidly arranged CH2 groups in energetically unfavored conformation.  相似文献   
76.
《代数通讯》2013,41(4):1637-1646
Abstract

We give an algorithm that describes the singularity of all but finitely-many germs in a pencil generated by two arbitrary germs of plane curve.  相似文献   
77.
78.
The purpose of this paper is to explain the basic theory of generalized nets (GNs) and their applications in the context of the differential diagnosis of neurological diseases. We define formally the concepts of a GN and transitions of a GN and also outline some remarks on their theory. The work here constructs an example which aims to trace the process of diagnosing different signs and symptoms in neurology. This will enable the interested reader to see the scope of nets in general as tools for the modelling, simulation, optimization and control of real processes.  相似文献   
79.
This paper introduces a new algorithm for Boolean operations on rasterized geometric shapes that are represented with chain codes. The algorithm works in three steps. Firstly, the chain code symbols are transformed in the Hilbert space, where the overlaid chain code symbols are recognised. After that, a suitable starting cell is determined. Finally, the walk-about through the sequence of the initial chain code symbols is performed to obtain the sequence of chain code symbols representing the shape of the required Boolean operation. The algorithm is demonstrated on Freeman chain code in four directions. The time and space complexity of the proposed algorithm is linear, which was proven theoretically and confirmed by experiments.  相似文献   
80.
Mathematical deconvolution methods can separate co-eluting peaks in samples for which (chromatographic) separation fail. However, these methods often heavily rely on manual user-input and interpretation. This is not only time-consuming but also error-prone and automation is needed if such methods are to be applied in a routine manner.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号