全文获取类型
收费全文 | 30835篇 |
免费 | 3455篇 |
国内免费 | 606篇 |
专业分类
化学 | 2235篇 |
晶体学 | 35篇 |
力学 | 522篇 |
综合类 | 324篇 |
数学 | 3909篇 |
物理学 | 3368篇 |
无线电 | 24503篇 |
出版年
2024年 | 90篇 |
2023年 | 434篇 |
2022年 | 839篇 |
2021年 | 1185篇 |
2020年 | 1129篇 |
2019年 | 656篇 |
2018年 | 582篇 |
2017年 | 996篇 |
2016年 | 1229篇 |
2015年 | 1294篇 |
2014年 | 2377篇 |
2013年 | 2043篇 |
2012年 | 2311篇 |
2011年 | 2171篇 |
2010年 | 1666篇 |
2009年 | 1643篇 |
2008年 | 1782篇 |
2007年 | 1845篇 |
2006年 | 1641篇 |
2005年 | 1382篇 |
2004年 | 1249篇 |
2003年 | 1277篇 |
2002年 | 921篇 |
2001年 | 790篇 |
2000年 | 694篇 |
1999年 | 518篇 |
1998年 | 419篇 |
1997年 | 358篇 |
1996年 | 339篇 |
1995年 | 246篇 |
1994年 | 217篇 |
1993年 | 158篇 |
1992年 | 102篇 |
1991年 | 64篇 |
1990年 | 51篇 |
1989年 | 33篇 |
1988年 | 45篇 |
1987年 | 13篇 |
1986年 | 24篇 |
1985年 | 24篇 |
1984年 | 14篇 |
1983年 | 4篇 |
1982年 | 9篇 |
1981年 | 11篇 |
1980年 | 2篇 |
1979年 | 6篇 |
1977年 | 6篇 |
1972年 | 1篇 |
1967年 | 1篇 |
1959年 | 4篇 |
排序方式: 共有10000条查询结果,搜索用时 953 毫秒
101.
基于校园网的实验管理系统的设计 总被引:2,自引:1,他引:1
主要讨论了应用实验室管理系统的必要性,并从用户需求分析、系统总体设计、功能模块的设计等方面对B/S实验室管理系统的开发进行了详细的阐述。 相似文献
102.
Signed graphs for portfolio analysis in risk management 总被引:1,自引:0,他引:1
Harary Frank; Lim Meng-Hiot; Wunsch Donald C. 《IMA Journal of Management Mathematics》2002,13(3):201-210
We introduce the notion of structural balance for signed graphsin the context of portfolio analysis. A portfolio of securitiescan be represented as a signed graph with the nodes denotingthe securities and the edges representing the correlation betweenthe securities. With signed graphs, the characteristics of aportfolio from a risk management perspective can be uncoveredfor analysis purposes. It is shown that a portfolio characterizedby a signed graph of positive and negative edges that is structurallybalanced is characteristically more predictable. Investors whoundertake a portfolio position with all positively correlatedsecurities do so with the intention to speculate on the upside(or downside). If the portfolio consists of negative edges andis balanced, then it is likely that the position has a hedgingdisposition within it. On the other hand, an unbalanced signedgraph is representative of an investment portfolio which ischaracteristically unpredictable. 相似文献
103.
Toward Fuzzy Optimization without Mathematical Ambiguity 总被引:15,自引:0,他引:15
Baoding Liu 《Fuzzy Optimization and Decision Making》2002,1(1):43-63
Fuzzy programming has been discussed widely in literature and applied in such various disciplines as operations research, economic management, business administration, and engineering. The main purpose of this paper is to present a brief review on fuzzy programming models, and classify them into three broad classes: expected value model, chance-constrained programming and dependent-chance programming. In order to solve general fuzzy programming models, a hybrid intelligent algorithm is also documented. Finally, some related topics are discussed. 相似文献
104.
LYNDA D. RODWELL EDWARD B. BARBIER CALLUM M. ROBERTS TIM R. McCLANAHAN 《Natural Resource Modeling》2002,15(4):453-486
ABSTRACT. The excessive and unsustainable exploitation of our marine resources has led to the promotion of marine reserves as a fisheries management tool. Marine reserves, areas in which fishing is restricted or prohibited, can offer opportunities for the recovery of exploited stock and fishery enhancement. In this paper we examine the contribution of fully protected tropical marine reserves to fishery enhancement by modeling marine reserve‐fishery linkages. The consequences of reserve establishment on the long‐run equilibrium fish biomass and fishery catch levels are evaluated. In contrast to earlier models this study highlights the roles of both adult (and juvenile) fish migration and larval dispersal between the reserve and fishing grounds by employing a spawner‐recruit model. Uniform larval dispersal, uniform larval retention and complete larval retention combined with zero, moderate and high fish migration scenarios are analyzed in turn. The numerical simulations are based on Mombasa Marine National Park, Kenya, a fully protected coral reef marine reserve comprising approximately 30% of former fishing grounds. Simulation results suggest that the establishment of a fully protected marine reserve will always lead to an increase in total fish biomass. If the fishery is moderately to heavily exploited, total fishery catch will be greater with the reserve in all scenarios of fish and larval movement. If the fishery faces low levels of exploitation, catches can be optimized without a reserve but with controlled fishing effort. With high fish migration from the reserve, catches are optimized with the reserve. The optimal area of the marine reserve depends on the exploitation rate in the neighboring fishing grounds. For example, if exploitation is maintained at 40%, the ‘optimal’ reserve size would be 10%. If the rate increases to 50%, then the reserve needs to be 30% of the management area in order to maximize catches. However, even in lower exploitation fisheries (below 40%), a small reserve (up to 20%) provides significantly higher gains in fish biomass than losses in catch. Marine reserves are a valuable fisheries management tool. To achieve maximum fishery benefits they should be complemented by fishing effort controls. 相似文献
105.
Dalila B. M. M. Fontes Eleni Hadjiconstantinou Nicos Christofides 《Journal of Global Optimization》2006,34(1):97-125
In this paper we obtain Lower Bounds (LBs) to concave cost network flow problems. The LBs are derived from state space relaxations
of a dynamic programming formulation, which involve the use of non-injective mapping functions guaranteing a reduction on
the cardinality of the state space. The general state space relaxation procedure is extended to address problems involving
transitions that go across several stages, as is the case of network flow problems. Applications for these LBs include: estimation
of the quality of heuristic solutions; local search methods that use information of the LB solution structure to find initial
solutions to restart the search (Fontes et al., 2003, Networks, 41, 221–228); and branch-and-bound (BB) methods having as
a bounding procedure a modified version of the LB algorithm developed here, (see Fontes et al., 2005a). These LBs are iteratively
improved by penalizing, in a Lagrangian fashion, customers not exactly satisfied or by performing state space modifications.
Both the penalties and the state space are updated by using the subgradient method. Additional constraints are developed to
improve further the LBs by reducing the searchable space. The computational results provided show that very good bounds can
be obtained for concave cost network flow problems, particularly for fixed-charge problems. 相似文献
106.
宽带建设低潮期实际上是一次优胜劣汰的过程,宽带运营竞争的手段将由低价竞争转向服务质量和特色的竞争。应在重视宽带接入建设的同时,也要重视业务运营管理平台的建设。应从长远考虑,不应仅为了节省投资而降低对设备的要求。由于降低成本的主要方向是在线缆部分,因此EVDSL技术应用的速度将大大超过人们的预期。在网络建设上,IPDSLAM虽有优势但也有不足,还需要进一步的成熟、稳定和实践的检验。 相似文献
107.
Yu-Soo Lee Hyun-Ju Chung Jong-Han Joung Eung-Jo Kim Hee-Je Kim 《Optics & Laser Technology》2004,36(1):461-61
We describe the pulse forming of pulsed CO2 laser using multi-pulse superposition technique. Various pulse shapes, high duty cycle pulse forming network (PFN) are constructed by time sequence. This study shows a technology that makes it possible to make various long pulse shapes by activating SCRs of three PFN modules consecutively at a desirable delay time with the aid of a PIC one-chip microprocessor. The power supply for this experiment consists of three PFN modules. Each PFN module uses a capacitor, a pulse forming inductor, a SCR, a high voltage pulse transformer, and a bridge rectifier on each transformer secondary. The PFN modules operate at low voltage by driving the primary of HV pulse transformer. The secondary of the transformer has a full-wave rectifier, which passes the pulse energy to the load in a continuous sequence.We investigated various long pulse shapes as different trigger time intervals of SCRs among three PFN modules. As a result, we could obtain laser beam with various pulse shapes and durations from about 250 to 1000 μs. 相似文献
108.
In asynchronous transfer mode (ATM) networks, fixed length cells of 53 bytes are transmitted. A cell may be discarded during transmission due to buffer overflow or a detection of errors. Cell discarding seriously degrades transmission quality. The quality degradation can be reduced by employing efficient forward error control (FEC) to recover discarded cells. In this paper, we present the design and implementation of decoding equipment for FEC in ATM networks based on a single parity check (SPC) product code using very‐large‐scale integration (VLSI) technology. FEC allows the destination to reconstruct missing data cells by using redundant parity cells that the source adds to each block of data cells. The functionality of the design has been tested using the Model Sim 5.7cXE Simulation Package. The design has been implemented for a 5 ° 5 matrix of data cells in a Virtex‐E XCV 3200E FG1156 device. The simulation and synthesis results show that the decoding function can be completed in 81 clock cycles with an optimum clock of 56.8 MHz. A test bench was written to study the performance of the decoder, and the results are presented. 相似文献
109.
Relying on reliability growth testing to improve system designis neither usually effective nor efficient. Instead it is importantto design in reliability. This requires models to estimate reliabilitygrowth in the design that can be used to assess whether goalreliability will be achieved within the target timescale forthe design process. Many models have been developed for analysisof reliability growth on test, but there has been much lessattention given to reliability growth in design. This paperdescribes and compares two models: one motivated by the practicalengineering process; the other by extending the reasoning ofstatistical reliability growth modelling. Both models are referencedin the recently revised edition of international standard IEC61164. However, there has been no reported evaluation of theirproperties. Therefore, this paper explores the commonalitiesand differences between these models through an assessment oftheir logic and their application to an industrial example.Recommendations are given for the use of reliability growthmodels to aid management of the design process and to informproduct development. 相似文献
110.
基于双因子认证技术的网络身份识别 总被引:5,自引:0,他引:5
本文提出了一种基于动态双因子认证技术的网络身份识别方法,用户每次登录的口令是利用系统时间和用户ID通过MD5加密算法计算得到,其通过MD5加密后生成的登录口令是随机的,这将进一步提高开放网络环境下身份识别的可靠性和安全性。同时,本文还提出网络身份识别技术可以应用到各类网站的服务器上,用来完成对用户身份的识别,以提高网络系统的安全性。 相似文献