首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   61634篇
  免费   4809篇
  国内免费   3836篇
化学   20236篇
晶体学   393篇
力学   3867篇
综合类   505篇
数学   10619篇
物理学   20058篇
无线电   14601篇
  2024年   192篇
  2023年   761篇
  2022年   1369篇
  2021年   1603篇
  2020年   1663篇
  2019年   1429篇
  2018年   1255篇
  2017年   1549篇
  2016年   1945篇
  2015年   1594篇
  2014年   2583篇
  2013年   3804篇
  2012年   2898篇
  2011年   3053篇
  2010年   2347篇
  2009年   3430篇
  2008年   3700篇
  2007年   4175篇
  2006年   3551篇
  2005年   2814篇
  2004年   2380篇
  2003年   2629篇
  2002年   2921篇
  2001年   2232篇
  2000年   2089篇
  1999年   1726篇
  1998年   1647篇
  1997年   992篇
  1996年   939篇
  1995年   825篇
  1994年   866篇
  1993年   648篇
  1992年   728篇
  1991年   495篇
  1990年   471篇
  1989年   354篇
  1988年   292篇
  1987年   282篇
  1986年   251篇
  1985年   238篇
  1984年   235篇
  1983年   148篇
  1982年   194篇
  1981年   185篇
  1980年   125篇
  1979年   155篇
  1978年   128篇
  1977年   122篇
  1976年   75篇
  1973年   58篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
151.
3G认证和密钥分配协议的形式化分析及改进   总被引:4,自引:0,他引:4  
介绍了第三代移动通信系统所采用的认证和密钥分配(AKA)协议,网络归属位置寄存器/访问位置寄存器(HLR/VLR)对用户UE(用户设备)的认证过程和用户UE对网络HLR/VLR的认证过程分别采用了两种不同的认证方式,前者采用基于"询问-应答"式的认证过程,后者采用基于"知识证明"式的认证过程.使用BAN形式化逻辑分析方法分别对这两种认证过程进行了分析,指出在假定HLR与VLR之间系统安全的前提下,基于"知识证明"式的认证过程仍然存在安全漏洞.3GPP采取基于顺序号的补充措施;同时,文中指出了另一种改进方案.  相似文献   
152.
介绍了基于西门子楼宇自控系统的空调计费系统的软硬件设计和具体实现.该系统的特点是借助西门子S600系统强大的数据处理和控制能力,采用时间记录和能量测量相结合的方法进行计费,具有实时监测和定时输出报表功能.该系统计量准确、计费合理、安全可靠、性价比高,满足了现代物业管理的需要.  相似文献   
153.
This paper derives the optimal trajectories in a general fluid network with server control. The stationary optimal policy in the complete state space is constructed. The optimal policy is constant on polyhedral convex cones. An algorithm is derived that computes these cones and the optimal policy. Generalized Klimov indices are introduced, they are used for characterizing myopic and time-uniformly optimal policies.Received: November 2004 / Revised: February 2005The research of this author has been supported by the project ‘‘Stochastic Networks’’ of the Netherlands Organisation for Scientific Research NWO.  相似文献   
154.
Early stages of rare-earth metal (Yb and Eu) growth on a vicinal, single-domain Si(1 0 0)2 × 1 surface have been studied in the coverage range of 0.1-0.3 monolayer (ML) by low energy electron diffraction, scanning tunneling microscopy, and synchrotron radiation photoemission spectroscopy. We show that Yb induces the 2 × 3 periodicity in the whole range of coverage studied. The 2 × 3 reconstruction coexists with the local 3 × 2/4 × 2 structure at about 0.2 ML of Yb. In contrast, Eu forms the 3 × 2 periodicity at 0.1-0.2 ML, whereas this structure is converted into the 2 × 3 phase at about 0.3 ML. The atomic arrangement and electronic properties of these reconstructions and the adsorbate-mediated modification of surface morphology are investigated.  相似文献   
155.
刘树新 《中国物理 C》2005,29(9):871-874
通过系统研究A~190区超形变核中转动带的转动惯量、角动量顺排、旋称分裂随转动频率的变化规律, 结合我们用处理对力的粒子数守恒方法的计算结果, 对A~190区所有转动带的组态结构给出了一个整体的描述. 绝大多数超形变带都建立在强耦合轨道上, 例如中子[512]5/2, [624]9/2. 少数超形变带则建立在高j闯入轨道上, 即中子[761]3/2, [752]5/2. 根据我们提出的组态结构所进行的理论计算结果表明, A~190区所有转动带的一般行为、反常变化和带交叉都得到了满意的解释.  相似文献   
156.
林涛  胡国平 《应用光学》2003,24(5):1-4,7
在综述光电对抗内涵的基础上,论述光电对抗在现代战争作战平台中的具体应用,并着重从电子战的角度论述了光电对抗在现代防空作战中的最新应用。最后指出光电对抗技术在未来电子战中的作用和发展方向。  相似文献   
157.
Binzhong Li  Baida Lü   《Optik》2003,113(12):535-540
Based on the beam coherence-polarization (BCP) matrix, the polarization property of coherent and incoherent Gaussian beam combinations is studied in detail. The general expressions for the degree of polarization P of the resulting beam in case of incoherent and coherent combinations are derived. It is shown that P is dependent on the incoherent or coherent combination, propagation distance, separation, azimuth of the polarization plane and numbers of beamlets in general. The irradiance distribution of the resulting beam for the coherent cases depends on the azimuth of the polarization plane of beamlets. However, for the incoherent case it does not.  相似文献   
158.
We show that the optomechanical coupling between an optical cavity mode and two movable cavity mirrors is able to entangle two different macroscopic oscillation modes of the mirrors. This continuous variable entanglement is maintained by the light bouncing between the mirrors and is robust against thermal noise. In fact, it could be experimentally demonstrated using present technology. Received 2 September 2002 / Received in final form 10 October 2002 Published online 7 January 2003  相似文献   
159.
We derive a test problem for evaluating the ability of time-steppingmethods to preserve the statistical properties of systems inmolecular dynamics. We consider a family of deterministic systemsconsisting of a finite number of particles interacting on acompact interval. The particles are given random initial conditionsand interact through instantaneous energy- and momentum-conservingcollisions. As the number of particles, the particle density,and the mean particle speed go to infinity, the trajectory ofa tracer particle is shown to converge to a stationary Gaussianstochastic process. We approximate this system by one describedby a system of ordinary differential equations and provide numericalevidence that it converges to the same stochastic process. Wesimulate the latter system with a variety of numerical integrators,including the symplectic Euler method, a fourth-order Runge-Kuttamethod, and an energyconserving step-and-project method. Weassess the methods' ability to recapture the system's limitingstatistics and observe that symplectic Euler performs significantlybetter than the others for comparable computational expense.  相似文献   
160.
Redundant data transfers over the Web, can be mainly attributed to the repeated transfers of unchanged data. Web caches and Web proxies are some of the solutions that have been proposed, to deal with the issue of redundant data transfers. In this paper we focus on the efficient estimation and reduction of redundant data transfers over the Web. We first prove that a vast amount of redundant data is transferred in Web pages that are considered to carry fresh data. We show this by following an approach based on Web page fragmentation and manipulation. Web pages are broken down to fragments, based on specific criteria. We then deal with these fragments as independent constructors of the Web page and study their change patterns independently and in the context of the whole Web page. After the fragmentation process, we propose solutions for dealing with redundant data transfers. This paper has been based on our previous work on ‘Web Components’ but also on related work by other researchers. It utilises a proxy based, client/server architecture, and imposes changes to the algorithms executed on the Proxy server and on clients. We show that our proposed solution can considerably reduce the amount of redundant data transferred on the Web. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号