全文获取类型
收费全文 | 3448篇 |
免费 | 349篇 |
国内免费 | 147篇 |
专业分类
化学 | 676篇 |
晶体学 | 5篇 |
力学 | 194篇 |
综合类 | 39篇 |
数学 | 184篇 |
物理学 | 502篇 |
无线电 | 2344篇 |
出版年
2024年 | 8篇 |
2023年 | 42篇 |
2022年 | 71篇 |
2021年 | 122篇 |
2020年 | 119篇 |
2019年 | 76篇 |
2018年 | 59篇 |
2017年 | 115篇 |
2016年 | 179篇 |
2015年 | 136篇 |
2014年 | 250篇 |
2013年 | 276篇 |
2012年 | 241篇 |
2011年 | 242篇 |
2010年 | 174篇 |
2009年 | 171篇 |
2008年 | 173篇 |
2007年 | 179篇 |
2006年 | 215篇 |
2005年 | 164篇 |
2004年 | 159篇 |
2003年 | 137篇 |
2002年 | 201篇 |
2001年 | 105篇 |
2000年 | 64篇 |
1999年 | 52篇 |
1998年 | 37篇 |
1997年 | 29篇 |
1996年 | 28篇 |
1995年 | 25篇 |
1994年 | 25篇 |
1993年 | 12篇 |
1992年 | 9篇 |
1991年 | 10篇 |
1990年 | 6篇 |
1989年 | 6篇 |
1988年 | 7篇 |
1987年 | 1篇 |
1986年 | 3篇 |
1985年 | 4篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1975年 | 1篇 |
排序方式: 共有3944条查询结果,搜索用时 593 毫秒
1.
冯鹏一 《信息通信技术与政策》2020,(1):12-15
以电信用户入网协议为切入点,电信用户的携号转网行为应受到《合同法》《消费者权益保护法》等私法规范的保护与限制。该行为引起的格式条款解释、合同终止、违约责任、损失赔偿等问题,不能仅靠《电信条例》等公法规范来调整。应当积极引导广大消费者用户以私法领域相关规定为依据,转变争议解决思维,拓宽纠纷处理途径,合理选择维权手段,以保护自身合法民事权益,与行业监管部门共同推动电信行业有序发展。 相似文献
2.
Tomasz Przebinda 《Journal of Functional Analysis》2018,274(5):1284-1305
We relate the distribution characters and the wave front sets of unitary representation for real reductive dual pairs of type I in the stable range. 相似文献
3.
Evolution of weak noise and regular waves on dissipative shock fronts described by the Burgers model
《Wave Motion》2018
The interaction of weak noise and regular signals with a shock wave having a finite width is studied in the framework of the Burgers equation model. The temporal realization of the random process located behind the front approaches it at supersonic speed. In the process of moving to the front, the intensity of noise decreases and the correlation time increases. In the central region of the shock front, noise reveals non-trivial behaviour. For large acoustic Reynolds numbers the average intensity can increase and reach a maximum value at a definite distance. The behaviour of statistical characteristics is studied using linearized Burgers equation with variable coefficients reducible to an autonomous equation. This model allows one to take into account not only the finite width of the front, but the attenuation and diverse character of initial profiles and spectra as well. Analytical solutions of this equation are derived. Interaction of regular signals of complex shape with the front is studied by numerical methods. Some illustrative examples of ongoing processes are given. Among possible applications, the controlling the spectra of signals, in particular, noise suppression by irradiating it with shocks or sawtooth waves can be mentioned. 相似文献
4.
A double optimal projection method that involves projections for intra-cluster and inter-cluster dimensionality reduction are proposed for video fingerprinting. The video is initially set as a graph with frames as its vertices in a high-dimensional space. A similarity measure that can compute the weights of the edges is then proposed. Subsequently, the video frames are partitioned into different clusters based on the graph model. Double optimal projection is used to explore the optimal mapping points in a low-dimensional space to reduce the video dimensions. The statistics and geometrical fingerprints are generated to determine whether a query video is copied from one of the videos in the database. During matching, the video can be roughly matched by utilizing the statistics fingerprint. Further matching is thereafter performed in the corresponding group using geometrical fingerprints. Experimental results show the good performance of the proposed video fingerprinting method in robustness and discrimination. 相似文献
5.
数字水印技术的发展为解决图像认证和完整性保护问题提供了新的思路。对用于篡改检测和图像认证的水印技术做了综述。数字水印技术根据其识别差错的能力分为四种类型:易损水印、半易损水印、混合水印和自嵌入水印。最后还对水印认证技术的安全性问题进行了讨论。 相似文献
6.
7.
IKE协议的安全性分析 总被引:1,自引:0,他引:1
在简略介绍IKE协议RFC2409工作机制的基础上,对协议现有的安全问题进行了分析,并针对协议阶段1中主模式与积极模式下身份保护存在的问题提出了协议修改建议,对阶段1中安全联盟建立的可靠性进行了探讨以加强协议抵御DoS攻击的能力。 相似文献
8.
Resilient optical networks are predominately designed to protect against single failures of fiber links. But in larger networks, operators also see dual failures. As the capacity was planned for single failures, disconnections can occur by dual failures even if enough topological connectivity is provided. In our approach the design of the network minimizes the average loss caused by dual failures, while single failures are still fully survived. High dual failure restorability is the primary aim, capacity is optimized in a second step. For WDM networks with full wavelength conversion, we formulate mixed integer linear programming models for dedicated path protection, shared (backup) path protection, and path rerouting with and without stub-release. For larger problem instances in path rerouting, we propose two heuristics. Computational results indicate that the connectivity is of much more importance for high restorability values than the overall protection capacity. Shared protection has similar restorability levels as dedicated protection while the capacity is comparable to rerouting. Rerouting surpasses the protection mechanisms in restorability and comes close to 100% dual failure survivability. Compared to single failure planning, both shared path protection and rerouting need significantly more capacity in dual failure planning. 相似文献
9.
In this letter, a new sharing mechanism, SRLG sharing, is proposed, which allows the links of the same shared risk link group (SRLG) in a primary light tree to share protections in WDM optical networks. In previous studies, how to share spare resources with SRLG constraints has not been studied in multicast optical networks. In this letter, considering SRLG sharing, we propose a novel algorithm –multicast with SRLG sharing (MSS)– to establish a protection light tree. Finally, the algorithm MSS and the algorithm multicast with no SRLG sharing (MNSS) are compared through a simulation to show that our new sharing scheme of SRLG sharing is more efficient than that of no SRLG sharing in terms of spare resource utilization and blocking probability. 相似文献
10.