首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3448篇
  免费   349篇
  国内免费   147篇
化学   676篇
晶体学   5篇
力学   194篇
综合类   39篇
数学   184篇
物理学   502篇
无线电   2344篇
  2024年   8篇
  2023年   42篇
  2022年   71篇
  2021年   122篇
  2020年   119篇
  2019年   76篇
  2018年   59篇
  2017年   115篇
  2016年   179篇
  2015年   136篇
  2014年   250篇
  2013年   276篇
  2012年   241篇
  2011年   242篇
  2010年   174篇
  2009年   171篇
  2008年   173篇
  2007年   179篇
  2006年   215篇
  2005年   164篇
  2004年   159篇
  2003年   137篇
  2002年   201篇
  2001年   105篇
  2000年   64篇
  1999年   52篇
  1998年   37篇
  1997年   29篇
  1996年   28篇
  1995年   25篇
  1994年   25篇
  1993年   12篇
  1992年   9篇
  1991年   10篇
  1990年   6篇
  1989年   6篇
  1988年   7篇
  1987年   1篇
  1986年   3篇
  1985年   4篇
  1984年   1篇
  1983年   1篇
  1982年   3篇
  1981年   3篇
  1980年   1篇
  1979年   2篇
  1975年   1篇
排序方式: 共有3944条查询结果,搜索用时 593 毫秒
1.
以电信用户入网协议为切入点,电信用户的携号转网行为应受到《合同法》《消费者权益保护法》等私法规范的保护与限制。该行为引起的格式条款解释、合同终止、违约责任、损失赔偿等问题,不能仅靠《电信条例》等公法规范来调整。应当积极引导广大消费者用户以私法领域相关规定为依据,转变争议解决思维,拓宽纠纷处理途径,合理选择维权手段,以保护自身合法民事权益,与行业监管部门共同推动电信行业有序发展。  相似文献   
2.
We relate the distribution characters and the wave front sets of unitary representation for real reductive dual pairs of type I in the stable range.  相似文献   
3.
The interaction of weak noise and regular signals with a shock wave having a finite width is studied in the framework of the Burgers equation model. The temporal realization of the random process located behind the front approaches it at supersonic speed. In the process of moving to the front, the intensity of noise decreases and the correlation time increases. In the central region of the shock front, noise reveals non-trivial behaviour. For large acoustic Reynolds numbers the average intensity can increase and reach a maximum value at a definite distance. The behaviour of statistical characteristics is studied using linearized Burgers equation with variable coefficients reducible to an autonomous equation. This model allows one to take into account not only the finite width of the front, but the attenuation and diverse character of initial profiles and spectra as well. Analytical solutions of this equation are derived. Interaction of regular signals of complex shape with the front is studied by numerical methods. Some illustrative examples of ongoing processes are given. Among possible applications, the controlling the spectra of signals, in particular, noise suppression by irradiating it with shocks or sawtooth waves can be mentioned.  相似文献   
4.
A double optimal projection method that involves projections for intra-cluster and inter-cluster dimensionality reduction are proposed for video fingerprinting. The video is initially set as a graph with frames as its vertices in a high-dimensional space. A similarity measure that can compute the weights of the edges is then proposed. Subsequently, the video frames are partitioned into different clusters based on the graph model. Double optimal projection is used to explore the optimal mapping points in a low-dimensional space to reduce the video dimensions. The statistics and geometrical fingerprints are generated to determine whether a query video is copied from one of the videos in the database. During matching, the video can be roughly matched by utilizing the statistics fingerprint. Further matching is thereafter performed in the corresponding group using geometrical fingerprints. Experimental results show the good performance of the proposed video fingerprinting method in robustness and discrimination.  相似文献   
5.
数字水印技术的发展为解决图像认证和完整性保护问题提供了新的思路。对用于篡改检测和图像认证的水印技术做了综述。数字水印技术根据其识别差错的能力分为四种类型:易损水印、半易损水印、混合水印和自嵌入水印。最后还对水印认证技术的安全性问题进行了讨论。  相似文献   
6.
介绍有源电力滤波器设计中EXB841型绝缘栅场效应晶体管(IGBT)驱动器的驱动原理和电路特点,对IGBT的栅极驱动特性、栅极串联电阻进行了探讨,给出过流保护和过压吸收的有效办法。样机试运行证明此种设计方案可靠、有效。  相似文献   
7.
IKE协议的安全性分析   总被引:1,自引:0,他引:1  
袁鑫  何大可 《通信技术》2003,(11):103-105
在简略介绍IKE协议RFC2409工作机制的基础上,对协议现有的安全问题进行了分析,并针对协议阶段1中主模式与积极模式下身份保护存在的问题提出了协议修改建议,对阶段1中安全联盟建立的可靠性进行了探讨以加强协议抵御DoS攻击的能力。  相似文献   
8.
Resilient optical networks are predominately designed to protect against single failures of fiber links. But in larger networks, operators also see dual failures. As the capacity was planned for single failures, disconnections can occur by dual failures even if enough topological connectivity is provided. In our approach the design of the network minimizes the average loss caused by dual failures, while single failures are still fully survived. High dual failure restorability is the primary aim, capacity is optimized in a second step. For WDM networks with full wavelength conversion, we formulate mixed integer linear programming models for dedicated path protection, shared (backup) path protection, and path rerouting with and without stub-release. For larger problem instances in path rerouting, we propose two heuristics. Computational results indicate that the connectivity is of much more importance for high restorability values than the overall protection capacity. Shared protection has similar restorability levels as dedicated protection while the capacity is comparable to rerouting. Rerouting surpasses the protection mechanisms in restorability and comes close to 100% dual failure survivability. Compared to single failure planning, both shared path protection and rerouting need significantly more capacity in dual failure planning.  相似文献   
9.
In this letter, a new sharing mechanism, SRLG sharing, is proposed, which allows the links of the same shared risk link group (SRLG) in a primary light tree to share protections in WDM optical networks. In previous studies, how to share spare resources with SRLG constraints has not been studied in multicast optical networks. In this letter, considering SRLG sharing, we propose a novel algorithm –multicast with SRLG sharing (MSS)– to establish a protection light tree. Finally, the algorithm MSS and the algorithm multicast with no SRLG sharing (MNSS) are compared through a simulation to show that our new sharing scheme of SRLG sharing is more efficient than that of no SRLG sharing in terms of spare resource utilization and blocking probability.  相似文献   
10.
介绍了在城域波分网络中应用的四种环形保护倒换方案及其实现方式,并对各种保护倒换方案的特性进行了分析比较。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号