首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30834篇
  免费   3456篇
  国内免费   606篇
化学   2235篇
晶体学   35篇
力学   522篇
综合类   324篇
数学   3909篇
物理学   3368篇
无线电   24503篇
  2024年   90篇
  2023年   434篇
  2022年   839篇
  2021年   1185篇
  2020年   1129篇
  2019年   656篇
  2018年   582篇
  2017年   996篇
  2016年   1229篇
  2015年   1294篇
  2014年   2377篇
  2013年   2043篇
  2012年   2311篇
  2011年   2171篇
  2010年   1666篇
  2009年   1643篇
  2008年   1782篇
  2007年   1845篇
  2006年   1641篇
  2005年   1382篇
  2004年   1249篇
  2003年   1277篇
  2002年   921篇
  2001年   790篇
  2000年   694篇
  1999年   518篇
  1998年   419篇
  1997年   358篇
  1996年   339篇
  1995年   246篇
  1994年   217篇
  1993年   158篇
  1992年   102篇
  1991年   64篇
  1990年   51篇
  1989年   33篇
  1988年   45篇
  1987年   13篇
  1986年   24篇
  1985年   24篇
  1984年   14篇
  1983年   4篇
  1982年   9篇
  1981年   11篇
  1980年   2篇
  1979年   6篇
  1977年   6篇
  1972年   1篇
  1967年   1篇
  1959年   4篇
排序方式: 共有10000条查询结果,搜索用时 246 毫秒
111.
数据通信网综合网管的设计分析   总被引:3,自引:0,他引:3  
结合TMN电信管理网的体系结构.对数据通信网综合网管的结构和功能进行了分析。  相似文献   
112.
软交换技术的发展及其应用   总被引:1,自引:0,他引:1  
软交换是下一代网络NGN的核心技术,本文从软交换的概念入手,介绍了软交换的基本功能及其优点.软交换的网络系统结构、软交换的对外接口等内容,并探讨了软交换技术的应用。  相似文献   
113.
基于软交换的NAT/防火墙穿透技术研究   总被引:1,自引:0,他引:1  
通过对目前几种解决NAT(network addres stranslation)/防火墙穿逢方案的分析,提出了一种较易实现的穿透技术,并给出具体实现方案。  相似文献   
114.
As a result of the increased switching complexity of many communications satellites, often transponders are available with a variety of configuration options offering flexibility in power, bandwidth, and coverage. Many of these configurations share resources that prevent them from being simultaneously active, making it a challenge to understand and manage the satellite capacity inventory. In this paper we define the logical channel configuration (LCC) as an unambiguous unit of the inventory and present a novel method of modelling the interdependencies between these LCCs using linear algebra. In particular, a projector matrix is defined which can be used to update the activation state of all LCCs when the state of one or more of these is changed. As a result, a number of valid LCC scenarios can be easily generated and evaluated for optimal use of the satellite resources. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   
115.
为了准确、快速地进行缺陷识别,介绍了一种新型的前馈神经网络模型,即径向基概率神经网络。与以往的算法相比,该方法具有分类识别精度高且速度快的优点。仿真获得了很好的结果。  相似文献   
116.
A side-by-side comparison of the performance of McMaster pore-filled (MacPF) and commercial nanofiltration (NF) membranes is presented here. The single-salt and multi-component performance of these membranes is studied using experimental data and using a mathematical model. The pseudo two-dimensional model is based on the extended Nernst–Planck equation, a modified Poisson–Boltzmann equation, and hydrodynamic calculations. The model includes four structural properties of the membrane: pore radius, pure water permeability, surface charge density and the ratio of effective membrane thickness to water content. The analysis demonstrates that the rejection and transport mechanisms are the same in the commercial and MacPF membranes with different contributions from each type of mechanism (convection, diffusion and electromigration). Solute rejection in NF membranes is determined primarily by a combination of steric and electrostatic effects. The selectivity of MacPF membranes is primarily determined by electrostatic effects with a significantly smaller contribution of steric effects compared to commercial membranes. Hence, these membranes have the ability to reject ions while remaining highly permeable to low molecular weight organics. Additionally, a new theoretical membrane design approach is presented. This design procedure potentially offers the optimization of NF membrane performance by tailoring the membrane structure and operating variables to the specific process, simultaneously. The procedure is validated at the laboratory scale.  相似文献   
117.
A new prediction technique is proposed for chaotic time series. The usefulness of the technique is thatit can kick off some false neighbor points which are not suitable for the local estimation of the dynamics systems. Atime-delayed embedding is used to reconstruct the underlying attractor, and the prediction model is based on the timeevolution of the topological neighboring in the phase space. We use a feedforward neural network to approximate thelocal dominant Lyapunov exponent, and choose the spatial neighbors by the Lyapunov exponent. The model is testedfor the Mackey-Glass equation and the convection amplitude of lorenz systems. The results indicate that this predictiontechnique can improve the prediction of chaotic time series.  相似文献   
118.
On effectiveness of wiretap programs in mapping social networks   总被引:1,自引:0,他引:1  
Snowball sampling methods are known to be a biased toward highly connected actors and consequently produce core-periphery networks when these may not necessarily be present. This leads to a biased perception of the underlying network which can have negative policy consequences, as in the identification of terrorist networks. When snowball sampling is used, the potential overload of the information collection system is a distinct problem due to the exponential growth of the number of suspects to be monitored. In this paper, we focus on evaluating the effectiveness of a wiretapping program in terms of its ability to map the rapidly evolving networks within a covert organization. By running a series of simulation-based experiments, we are able to evaluate a broad spectrum of information gathering regimes based on a consistent set of criteria. We conclude by proposing a set of information gathering programs that achieve higher effectiveness then snowball sampling, and at a lower cost. Maksim Tsvetovat is an Assistant Professor at the Center for Social Complexity and department of Public and International Affairs at George Mason University, Fairfax, VA. He received his Ph.D. from the Computation, Organizations and Society program in the School of Computer Science, Carnegie Mellon University. His dissertation was centered on use of artificial intelligence techniques such as planning and semantic reasoning as a means of studying behavior and evolution of complex social networks, such as these of terrorist organizations. He received a Master of Science degree from University of Minnesota with a specialization in Artificial Intelligence and design of Multi-Agent Systems, and has also extensively studied organization theory and social science research methods. His research is centered on building high-fidelity simulations of social and organizational systems using concepts from distributed artificial intelligence and multi-agent systems. Other projects focus on social network analysis for mapping of internal corporate networks or study of covert and terrorist orgnaizations. Maksim’s vita and publications can be found on Kathleen M. Carley is a professor in the School of Computer Science at Carnegie Mellon University and the director of the center for Compuational Analysis of Social and Organizational Systems (CASOS) which has over 25 members, both students and research staff. Her research combines cognitive science, social networks and computer science to address complex social and organizational problems. Her specific research areas are dynamic network analysis, computational social and organization theory, adaptation and evolution, text mining, and the impact of telecommunication technologies and policy on communication, information diffusion, disease contagion and response within and among groups particularly in disaster or crisis situations. She and her lab have developed infrastructure tools for analyzing large scale dynamic networks and various multi-agent simulation systems. The infrastructure tools include ORA, a statistical toolkit for analyzing and visualizing multi-dimensional networks. ORA results are organized into reports that meet various needs such as the management report, the mental model report, and the intelligence report. Another tool is AutoMap, a text-mining systems for extracting semantic networks from texts and then cross-classifying them using an organizational ontology into the underlying social, knowledge, resource and task networks. Her simulation models meld multi-agent technology with network dynamics and empirical data. Three of the large-scale multi-agent network models she and the CASOS group have developed in the counter-terrorism area are: BioWar a city-scale dynamic-network agent-based model for understanding the spread of disease and illness due to natural epidemics, chemical spills, and weaponized biological attacks; DyNet a model of the change in covert networks, naturally and in response to attacks, under varying levels of information uncertainty; and RTE a model for examining state failure and the escalation of conflict at the city, state, nation, and international as changes occur within and among red, blue, and green forces. She is the founding co-editor with Al. Wallace of the journal Computational Organization Theory and has co-edited several books and written over 100 articles in the computational organizations and dynamic network area. Her publications can be found at: http://www.casos.cs.cmu.edu/bios/carley/publications.php  相似文献   
119.
简要介绍了ASON技术的特点、ASON的引入为新一代光网络带来的好处及衡量网络质量的一些参数和注意事项。  相似文献   
120.
3-D MCM封装技术及其应用   总被引:1,自引:0,他引:1  
介绍了超大规模集成电路(VLSI)用的3-D MCM封装技术的最新发展,重点介绍了3-D MCM封装垂直互连工艺,分析了3-D MCM封装技术的硅效率、复杂程度、热处理、互连密度、系统功率与速度等问题,并对3-D MCM封装的应用作了简要说明。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号