首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   26191篇
  免费   3115篇
  国内免费   599篇
化学   2081篇
晶体学   35篇
力学   553篇
综合类   252篇
数学   2159篇
物理学   3180篇
无线电   21645篇
  2024年   96篇
  2023年   433篇
  2022年   829篇
  2021年   1119篇
  2020年   1069篇
  2019年   584篇
  2018年   527篇
  2017年   889篇
  2016年   1023篇
  2015年   1105篇
  2014年   1965篇
  2013年   1730篇
  2012年   1991篇
  2011年   1852篇
  2010年   1412篇
  2009年   1308篇
  2008年   1481篇
  2007年   1454篇
  2006年   1347篇
  2005年   1126篇
  2004年   1016篇
  2003年   1057篇
  2002年   791篇
  2001年   696篇
  2000年   629篇
  1999年   470篇
  1998年   378篇
  1997年   322篇
  1996年   310篇
  1995年   232篇
  1994年   186篇
  1993年   139篇
  1992年   89篇
  1991年   53篇
  1990年   45篇
  1989年   30篇
  1988年   28篇
  1987年   10篇
  1986年   20篇
  1985年   17篇
  1984年   13篇
  1983年   2篇
  1982年   6篇
  1981年   8篇
  1979年   5篇
  1977年   5篇
  1975年   1篇
  1972年   1篇
  1967年   1篇
  1959年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
91.
基于双因子认证技术的网络身份识别   总被引:5,自引:0,他引:5  
本文提出了一种基于动态双因子认证技术的网络身份识别方法,用户每次登录的口令是利用系统时间和用户ID通过MD5加密算法计算得到,其通过MD5加密后生成的登录口令是随机的,这将进一步提高开放网络环境下身份识别的可靠性和安全性。同时,本文还提出网络身份识别技术可以应用到各类网站的服务器上,用来完成对用户身份的识别,以提高网络系统的安全性。  相似文献   
92.
数据通信网综合网管的设计分析   总被引:3,自引:0,他引:3  
结合TMN电信管理网的体系结构.对数据通信网综合网管的结构和功能进行了分析。  相似文献   
93.
软交换技术的发展及其应用   总被引:1,自引:0,他引:1  
软交换是下一代网络NGN的核心技术,本文从软交换的概念入手,介绍了软交换的基本功能及其优点.软交换的网络系统结构、软交换的对外接口等内容,并探讨了软交换技术的应用。  相似文献   
94.
基于软交换的NAT/防火墙穿透技术研究   总被引:1,自引:0,他引:1  
通过对目前几种解决NAT(network addres stranslation)/防火墙穿逢方案的分析,提出了一种较易实现的穿透技术,并给出具体实现方案。  相似文献   
95.
为了准确、快速地进行缺陷识别,介绍了一种新型的前馈神经网络模型,即径向基概率神经网络。与以往的算法相比,该方法具有分类识别精度高且速度快的优点。仿真获得了很好的结果。  相似文献   
96.
A side-by-side comparison of the performance of McMaster pore-filled (MacPF) and commercial nanofiltration (NF) membranes is presented here. The single-salt and multi-component performance of these membranes is studied using experimental data and using a mathematical model. The pseudo two-dimensional model is based on the extended Nernst–Planck equation, a modified Poisson–Boltzmann equation, and hydrodynamic calculations. The model includes four structural properties of the membrane: pore radius, pure water permeability, surface charge density and the ratio of effective membrane thickness to water content. The analysis demonstrates that the rejection and transport mechanisms are the same in the commercial and MacPF membranes with different contributions from each type of mechanism (convection, diffusion and electromigration). Solute rejection in NF membranes is determined primarily by a combination of steric and electrostatic effects. The selectivity of MacPF membranes is primarily determined by electrostatic effects with a significantly smaller contribution of steric effects compared to commercial membranes. Hence, these membranes have the ability to reject ions while remaining highly permeable to low molecular weight organics. Additionally, a new theoretical membrane design approach is presented. This design procedure potentially offers the optimization of NF membrane performance by tailoring the membrane structure and operating variables to the specific process, simultaneously. The procedure is validated at the laboratory scale.  相似文献   
97.
A new prediction technique is proposed for chaotic time series. The usefulness of the technique is thatit can kick off some false neighbor points which are not suitable for the local estimation of the dynamics systems. Atime-delayed embedding is used to reconstruct the underlying attractor, and the prediction model is based on the timeevolution of the topological neighboring in the phase space. We use a feedforward neural network to approximate thelocal dominant Lyapunov exponent, and choose the spatial neighbors by the Lyapunov exponent. The model is testedfor the Mackey-Glass equation and the convection amplitude of lorenz systems. The results indicate that this predictiontechnique can improve the prediction of chaotic time series.  相似文献   
98.
On effectiveness of wiretap programs in mapping social networks   总被引:1,自引:0,他引:1  
Snowball sampling methods are known to be a biased toward highly connected actors and consequently produce core-periphery networks when these may not necessarily be present. This leads to a biased perception of the underlying network which can have negative policy consequences, as in the identification of terrorist networks. When snowball sampling is used, the potential overload of the information collection system is a distinct problem due to the exponential growth of the number of suspects to be monitored. In this paper, we focus on evaluating the effectiveness of a wiretapping program in terms of its ability to map the rapidly evolving networks within a covert organization. By running a series of simulation-based experiments, we are able to evaluate a broad spectrum of information gathering regimes based on a consistent set of criteria. We conclude by proposing a set of information gathering programs that achieve higher effectiveness then snowball sampling, and at a lower cost. Maksim Tsvetovat is an Assistant Professor at the Center for Social Complexity and department of Public and International Affairs at George Mason University, Fairfax, VA. He received his Ph.D. from the Computation, Organizations and Society program in the School of Computer Science, Carnegie Mellon University. His dissertation was centered on use of artificial intelligence techniques such as planning and semantic reasoning as a means of studying behavior and evolution of complex social networks, such as these of terrorist organizations. He received a Master of Science degree from University of Minnesota with a specialization in Artificial Intelligence and design of Multi-Agent Systems, and has also extensively studied organization theory and social science research methods. His research is centered on building high-fidelity simulations of social and organizational systems using concepts from distributed artificial intelligence and multi-agent systems. Other projects focus on social network analysis for mapping of internal corporate networks or study of covert and terrorist orgnaizations. Maksim’s vita and publications can be found on Kathleen M. Carley is a professor in the School of Computer Science at Carnegie Mellon University and the director of the center for Compuational Analysis of Social and Organizational Systems (CASOS) which has over 25 members, both students and research staff. Her research combines cognitive science, social networks and computer science to address complex social and organizational problems. Her specific research areas are dynamic network analysis, computational social and organization theory, adaptation and evolution, text mining, and the impact of telecommunication technologies and policy on communication, information diffusion, disease contagion and response within and among groups particularly in disaster or crisis situations. She and her lab have developed infrastructure tools for analyzing large scale dynamic networks and various multi-agent simulation systems. The infrastructure tools include ORA, a statistical toolkit for analyzing and visualizing multi-dimensional networks. ORA results are organized into reports that meet various needs such as the management report, the mental model report, and the intelligence report. Another tool is AutoMap, a text-mining systems for extracting semantic networks from texts and then cross-classifying them using an organizational ontology into the underlying social, knowledge, resource and task networks. Her simulation models meld multi-agent technology with network dynamics and empirical data. Three of the large-scale multi-agent network models she and the CASOS group have developed in the counter-terrorism area are: BioWar a city-scale dynamic-network agent-based model for understanding the spread of disease and illness due to natural epidemics, chemical spills, and weaponized biological attacks; DyNet a model of the change in covert networks, naturally and in response to attacks, under varying levels of information uncertainty; and RTE a model for examining state failure and the escalation of conflict at the city, state, nation, and international as changes occur within and among red, blue, and green forces. She is the founding co-editor with Al. Wallace of the journal Computational Organization Theory and has co-edited several books and written over 100 articles in the computational organizations and dynamic network area. Her publications can be found at: http://www.casos.cs.cmu.edu/bios/carley/publications.php  相似文献   
99.
简要介绍了ASON技术的特点、ASON的引入为新一代光网络带来的好处及衡量网络质量的一些参数和注意事项。  相似文献   
100.
介绍了一种基于人工神经网络(ANN)的声目标识别系统,概述了用MATLAB专用工具箱对神经网络权值进行训练及仿真的过程,叙述了ANN目标识别系统的数字信号处理器(DSP)实时实现过程,并着重分析定点实现过程中程序变量的定标、非线性运算的实现、溢出的处理等关键步骤.对不同字长的识别结果进行比较表明,基于定点实时实现的系统数据保持很高的精度,可以得到与浮点处理相同的识别率.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号