全文获取类型
收费全文 | 28668篇 |
免费 | 3386篇 |
国内免费 | 681篇 |
专业分类
化学 | 2777篇 |
晶体学 | 35篇 |
力学 | 653篇 |
综合类 | 324篇 |
数学 | 3254篇 |
物理学 | 3644篇 |
无线电 | 22048篇 |
出版年
2024年 | 106篇 |
2023年 | 430篇 |
2022年 | 896篇 |
2021年 | 1146篇 |
2020年 | 1088篇 |
2019年 | 654篇 |
2018年 | 589篇 |
2017年 | 988篇 |
2016年 | 1143篇 |
2015年 | 1163篇 |
2014年 | 2149篇 |
2013年 | 1861篇 |
2012年 | 2135篇 |
2011年 | 2033篇 |
2010年 | 1567篇 |
2009年 | 1470篇 |
2008年 | 1670篇 |
2007年 | 1652篇 |
2006年 | 1520篇 |
2005年 | 1296篇 |
2004年 | 1137篇 |
2003年 | 1123篇 |
2002年 | 856篇 |
2001年 | 743篇 |
2000年 | 669篇 |
1999年 | 490篇 |
1998年 | 416篇 |
1997年 | 346篇 |
1996年 | 331篇 |
1995年 | 257篇 |
1994年 | 205篇 |
1993年 | 160篇 |
1992年 | 100篇 |
1991年 | 69篇 |
1990年 | 53篇 |
1989年 | 39篇 |
1988年 | 36篇 |
1987年 | 17篇 |
1986年 | 25篇 |
1985年 | 23篇 |
1984年 | 18篇 |
1983年 | 3篇 |
1982年 | 11篇 |
1981年 | 16篇 |
1980年 | 4篇 |
1979年 | 10篇 |
1978年 | 3篇 |
1977年 | 7篇 |
1972年 | 2篇 |
1959年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 574 毫秒
91.
In asynchronous transfer mode (ATM) networks, fixed length cells of 53 bytes are transmitted. A cell may be discarded during transmission due to buffer overflow or a detection of errors. Cell discarding seriously degrades transmission quality. The quality degradation can be reduced by employing efficient forward error control (FEC) to recover discarded cells. In this paper, we present the design and implementation of decoding equipment for FEC in ATM networks based on a single parity check (SPC) product code using very‐large‐scale integration (VLSI) technology. FEC allows the destination to reconstruct missing data cells by using redundant parity cells that the source adds to each block of data cells. The functionality of the design has been tested using the Model Sim 5.7cXE Simulation Package. The design has been implemented for a 5 ° 5 matrix of data cells in a Virtex‐E XCV 3200E FG1156 device. The simulation and synthesis results show that the decoding function can be completed in 81 clock cycles with an optimum clock of 56.8 MHz. A test bench was written to study the performance of the decoder, and the results are presented. 相似文献
92.
基于双因子认证技术的网络身份识别 总被引:5,自引:0,他引:5
本文提出了一种基于动态双因子认证技术的网络身份识别方法,用户每次登录的口令是利用系统时间和用户ID通过MD5加密算法计算得到,其通过MD5加密后生成的登录口令是随机的,这将进一步提高开放网络环境下身份识别的可靠性和安全性。同时,本文还提出网络身份识别技术可以应用到各类网站的服务器上,用来完成对用户身份的识别,以提高网络系统的安全性。 相似文献
93.
数据通信网综合网管的设计分析 总被引:3,自引:0,他引:3
结合TMN电信管理网的体系结构.对数据通信网综合网管的结构和功能进行了分析。 相似文献
94.
软交换技术的发展及其应用 总被引:1,自引:0,他引:1
软交换是下一代网络NGN的核心技术,本文从软交换的概念入手,介绍了软交换的基本功能及其优点.软交换的网络系统结构、软交换的对外接口等内容,并探讨了软交换技术的应用。 相似文献
95.
96.
为了准确、快速地进行缺陷识别,介绍了一种新型的前馈神经网络模型,即径向基概率神经网络。与以往的算法相比,该方法具有分类识别精度高且速度快的优点。仿真获得了很好的结果。 相似文献
97.
Experimental analysis, modeling, and theoretical design of McMaster pore-filled nanofiltration membranes 总被引:1,自引:0,他引:1
A side-by-side comparison of the performance of McMaster pore-filled (MacPF) and commercial nanofiltration (NF) membranes is presented here. The single-salt and multi-component performance of these membranes is studied using experimental data and using a mathematical model. The pseudo two-dimensional model is based on the extended Nernst–Planck equation, a modified Poisson–Boltzmann equation, and hydrodynamic calculations. The model includes four structural properties of the membrane: pore radius, pure water permeability, surface charge density and the ratio of effective membrane thickness to water content. The analysis demonstrates that the rejection and transport mechanisms are the same in the commercial and MacPF membranes with different contributions from each type of mechanism (convection, diffusion and electromigration). Solute rejection in NF membranes is determined primarily by a combination of steric and electrostatic effects. The selectivity of MacPF membranes is primarily determined by electrostatic effects with a significantly smaller contribution of steric effects compared to commercial membranes. Hence, these membranes have the ability to reject ions while remaining highly permeable to low molecular weight organics. Additionally, a new theoretical membrane design approach is presented. This design procedure potentially offers the optimization of NF membrane performance by tailoring the membrane structure and operating variables to the specific process, simultaneously. The procedure is validated at the laboratory scale. 相似文献
98.
A new prediction technique is proposed for chaotic time series. The usefulness of the technique is thatit can kick off some false neighbor points which are not suitable for the local estimation of the dynamics systems. Atime-delayed embedding is used to reconstruct the underlying attractor, and the prediction model is based on the timeevolution of the topological neighboring in the phase space. We use a feedforward neural network to approximate thelocal dominant Lyapunov exponent, and choose the spatial neighbors by the Lyapunov exponent. The model is testedfor the Mackey-Glass equation and the convection amplitude of lorenz systems. The results indicate that this predictiontechnique can improve the prediction of chaotic time series. 相似文献
99.
On effectiveness of wiretap programs in mapping social networks 总被引:1,自引:0,他引:1
Maksim Tsvetovat Kathleen M. Carley 《Computational & Mathematical Organization Theory》2007,13(1):63-87
Snowball sampling methods are known to be a biased toward highly connected actors and consequently produce core-periphery networks when these may not necessarily be present. This leads to a biased perception of the underlying network which can have negative policy consequences, as in the identification of terrorist networks. When snowball sampling is used, the potential overload of the information collection system is a distinct problem due to the exponential growth of the number of suspects to be monitored. In this paper, we focus on evaluating the effectiveness of a wiretapping program in terms of its ability to map the rapidly evolving networks within a covert organization. By running a series of simulation-based experiments, we are able to evaluate a broad spectrum of information gathering regimes based on a consistent set of criteria. We conclude by proposing a set of information gathering programs that achieve higher effectiveness then snowball sampling, and at a lower cost.
Maksim Tsvetovat is an Assistant Professor at the Center for Social Complexity and department of Public and International Affairs at George Mason University, Fairfax, VA. He received his Ph.D. from the Computation, Organizations and Society program in the School of Computer Science, Carnegie Mellon University. His dissertation was centered on use of artificial intelligence techniques such as planning and semantic reasoning as a means of studying behavior and evolution of complex social networks, such as these of terrorist organizations. He received a Master of Science degree from University of Minnesota with a specialization in Artificial Intelligence and design of Multi-Agent Systems, and has also extensively studied organization theory and social science research methods. His research is centered on building high-fidelity simulations of social and organizational systems using concepts from distributed artificial intelligence and multi-agent systems. Other projects focus on social network analysis for mapping of internal corporate networks or study of covert and terrorist orgnaizations. Maksim’s vita and publications can be found on
Kathleen M. Carley is a professor in the School of Computer Science at Carnegie Mellon University and the director of the center for Compuational Analysis of Social and Organizational Systems (CASOS) which has over 25 members, both students and research staff. Her research combines cognitive science, social networks and computer science to address complex social and organizational problems. Her specific research areas are dynamic network analysis, computational social and organization theory, adaptation and evolution, text mining, and the impact of telecommunication technologies and policy on communication, information diffusion, disease contagion and response within and among groups particularly in disaster or crisis situations. She and her lab have developed infrastructure tools for analyzing large scale dynamic networks and various multi-agent simulation systems. The infrastructure tools include ORA, a statistical toolkit for analyzing and visualizing multi-dimensional networks. ORA results are organized into reports that meet various needs such as the management report, the mental model report, and the intelligence report. Another tool is AutoMap, a text-mining systems for extracting semantic networks from texts and then cross-classifying them using an organizational ontology into the underlying social, knowledge, resource and task networks. Her simulation models meld multi-agent technology with network dynamics and empirical data. Three of the large-scale multi-agent network models she and the CASOS group have developed in the counter-terrorism area are: BioWar a city-scale dynamic-network agent-based model for understanding the spread of disease and illness due to natural epidemics, chemical spills, and weaponized biological attacks; DyNet a model of the change in covert networks, naturally and in response to attacks, under varying levels of information uncertainty; and RTE a model for examining state failure and the escalation of conflict at the city, state, nation, and international as changes occur within and among red, blue, and green forces. She is the founding co-editor with Al. Wallace of the journal Computational Organization Theory and has co-edited several books and written over 100 articles in the computational organizations and dynamic network area. Her publications can be found at: http://www.casos.cs.cmu.edu/bios/carley/publications.php 相似文献
100.
简要介绍了ASON技术的特点、ASON的引入为新一代光网络带来的好处及衡量网络质量的一些参数和注意事项。 相似文献