首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14030篇
  免费   1543篇
  国内免费   197篇
化学   1719篇
晶体学   15篇
力学   176篇
综合类   88篇
数学   1799篇
物理学   1904篇
无线电   10069篇
  2024年   37篇
  2023年   217篇
  2022年   301篇
  2021年   369篇
  2020年   384篇
  2019年   280篇
  2018年   298篇
  2017年   401篇
  2016年   487篇
  2015年   510篇
  2014年   845篇
  2013年   1021篇
  2012年   875篇
  2011年   842篇
  2010年   780篇
  2009年   820篇
  2008年   865篇
  2007年   969篇
  2006年   776篇
  2005年   699篇
  2004年   590篇
  2003年   592篇
  2002年   483篇
  2001年   449篇
  2000年   326篇
  1999年   262篇
  1998年   194篇
  1997年   189篇
  1996年   195篇
  1995年   163篇
  1994年   132篇
  1993年   80篇
  1992年   76篇
  1991年   48篇
  1990年   30篇
  1989年   34篇
  1988年   29篇
  1987年   17篇
  1986年   17篇
  1985年   20篇
  1984年   15篇
  1983年   3篇
  1982年   14篇
  1981年   15篇
  1980年   8篇
  1979年   7篇
  1978年   2篇
  1971年   1篇
  1969年   1篇
  1957年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
62.
Cognitive radio systems dynamically reconfigure the algorithms and parameters they use, in order to adapt to the changing environment conditions. However, reaching proper reconfiguration decisions presupposes a way of knowing, with high enough assurance, the capabilities of the alternate configurations, especially in terms of achievable transmission capacity and coverage. The present paper addresses this problem, firstly, by specifying a complete process for extracting estimations of the capabilities of candidate configurations, in terms of transmission capacity and coverage, and, secondly, by enhancing these estimations with the employment of a machine learning technique. The technique is based on the use of Bayesian Networks, in conjunction with an effective learning and adaptation strategy, and aims at extracting and exploiting knowledge and experience, in order to reach robust (i.e. stable and reliable) estimations of the configurations' capabilities. Comprehensive results of the proposed method are presented, in order to validate its functionality. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   
63.
To obtain a hydrogel‐like elastic membrane, we prepared semi‐interpenetrating polymer networks (IPNs) by the radical polymerization of methacrylates such as 2‐methacryloyloxyethyl phosphorylcholine (MPC), 2‐hydroxyethylmethacrylate, and triethyleneglycol dimethacrylate diffused into segmented polyurethane (SPU) membranes swollen with a monomer mixture. The values of Young's modulus for the hydrated semi‐IPN membranes were less than that for an SPU membrane because of higher hydration, but they were much higher than that for a hydrated MPC polymer gel (non‐SPU). According to a thermal analysis, the MPC polymer influenced the segment association of SPU. The diffusion coefficient of 8‐anilino‐1‐naphthalenesulfonic acid sodium salt from the semi‐IPN membrane could be controlled with different MPC unit concentrations in the membrane, and it was about 7 × 102 times higher than that of the SPU membrane. Fibroblast cell adhesion on the semi‐IPN membrane was effectively reduced by the MPC units. We concluded that semi‐IPNs composed of the MPC polymer and SPU may be novel polymer materials possessing attractive mechanical, diffusive‐release, and nonbiofouling properties. © 2002 Wiley Periodicals, Inc. J Polym Sci Part A: Polym Chem 41: 68–75, 2003  相似文献   
64.
Verifiable Distributed Oblivious Transfer and Mobile Agent Security   总被引:1,自引:0,他引:1  
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect the agent’s privacy and the hosts’ privacy. In this paper, we introduce a new cryptographic primitive called Verifiable Distributed Oblivious Transfer (VDOT), which allows us to replace a single trusted party with a group of threshold trusted servers. The design of VDOT uses a novel technique called consistency verification of encrypted secret shares. VDOT protects the privacy of both the sender and the receiver against malicious attacks of the servers. We also show the design of a system to apply VDOT to protect the privacy of mobile agents. Our design partitions an agent into the general portion and the security-sensitive portion. We also implement the key components of our system. As far as we know, this is the first effort to implement a system that protects the privacy of mobile agents. Our preliminary evaluation shows that protecting mobile agents not only is possible, but also can be implemented efficiently. This work was supported in part by the DoD University Research Initiative (URI) program administered by the Office of Naval Research under grant N00014-01-1-0795. Sheng Zhong was supported by ONR grant N00014-01-1-0795 and NSF grants ANI-0207399 and CCR-TC-0208972. Yang Richard Yang was supported in part by NSF grant ANI-0207399. A preliminary version of this paper was presented at the DialM-POMC Joint Workshop on Foundations of Mobile Computing in 2003. Sheng Zhong received his Ph.D. in computer science from Yale University in the year of 2004. He holds an assistant professor position at SUNY Buffalo and is currently on leave for postdoctoral research at the Center for Discrete Mathematics and Theoretical Computer Science (DIMACS). His research interests, on the practical side, are security and incentives in data mining, databases, and wireless networks. On the theoretical side, he is interested in cryptography and game theory. Yang Richard Yang is an Assistant Professor of Computer Science at Yale University. His research interests include computer networks, mobile computing, wireless networking, sensor networks, and network security. He leads the LAboratory of Networked Systems (LANS) at Yale. His recent awards include a Schlumberger Fellowship and a CAREER Award from the National Science Foundation. He received his B.E. degree from Tsinghua University (1993), and his M.S. and Ph.D. degrees from the University of Texas at Austin (1998 and 2001).  相似文献   
65.
A compact, cleavable acylal dimethacrylate cross‐linker, 1,1‐ethylenediol dimethacrylate (EDDMA), was synthesized from the anhydrous iron(III) chloride‐catalyzed reaction between methacrylic anhydride and acetaldehyde. The ability of EDDMA to act as cross‐linker was demonstrated by using it for the preparation of one neat cross‐linker network, four star polymers of methyl methacrylate (MMA), and four randomly cross‐linked MMA polymer networks using group transfer polymerization (GTP). For comparison, the corresponding polymer structures based on the commercially available ethylene glycol dimethacrylate (EGDMA) cross‐linker (isomer of EDDMA) were also prepared via GTP. The number of arms of the EDDMA‐based star polymers was lower than that of the corresponding EGDMA polymers, whereas the degrees of swelling in tetrahydrofuran of the EDDMA‐based MMA networks were higher than those of their EGDMA‐based counterparts. Although none of the EDDMA‐containing polymers could be cleanly hydrolyzed under basic or acidic conditions, they could be thermolyzed at 200 °C within 1 day giving lower molecular weight products. © 2007 Wiley Periodicals, Inc. J Polym Sci Part A: Polym Chem 45: 5811–5823, 2007  相似文献   
66.
本文根据实地考察内容,结合宽带网络技术和业务重点及实施策略,全面介绍了日本关西宽带实验网发展背景,通信与广播电视综合应用实验和B-ISDN实用化实验的进展以及NTT所起作用。文章最后就关西宽带实验网的借鉴意义提出了几方面意见。  相似文献   
67.
Ross.  AH Gilh.  KS 《电信科学》1996,12(3):6-17
本文主要讨论数字移动通信中扩频码分多址技术,阐明了CDMA体制的优越之外,分析了CDMA的关键技术,全面介绍了CDMA系统设计的基本原则和IS-95-A空中接口标准的含义。  相似文献   
68.
萧振华 《世界电信》1998,11(4):17-18
运用接入新技术组建农村用户接入网已势在必行。本文针对我国经济水平低、地区间发展不平衡等实际情况,对组建我国农村用户接入网的有关策略进行了论述。  相似文献   
69.
无向网络K终端可靠度的分解算法中,包括多边形→链简化在内的等可靠度简化和分解定理结合,可以降低算法的复杂度。本文完善了边随机无向网络和混合随机无向网络的4#,6#,7#型多边形→链简化定理。计算机编程验证了其正确性。  相似文献   
70.
A statistical theory of light scattering from deformed isotropic and textured heterogeneous polymer materials is formulated. Two types of textured structures are analyzed: assemblies of optically isotropic and anisotropic rods and a spatially anisotropic distribution of isotropic spherical inclusion centers. The small-angle Hv light-scattering patterns are calculated. The appearance of scattering from isotropic rods and spheres in deformed materials has been demonstrated. The changes of the Hv scattering patterns as a function of elongation and strucuture parameters are discussed. © 1993 John Wiley & Sons, Inc.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号