全文获取类型
收费全文 | 4552篇 |
免费 | 692篇 |
国内免费 | 105篇 |
专业分类
化学 | 300篇 |
晶体学 | 3篇 |
力学 | 333篇 |
综合类 | 89篇 |
数学 | 754篇 |
物理学 | 1065篇 |
无线电 | 2805篇 |
出版年
2024年 | 16篇 |
2023年 | 67篇 |
2022年 | 106篇 |
2021年 | 126篇 |
2020年 | 140篇 |
2019年 | 95篇 |
2018年 | 105篇 |
2017年 | 190篇 |
2016年 | 177篇 |
2015年 | 213篇 |
2014年 | 335篇 |
2013年 | 285篇 |
2012年 | 340篇 |
2011年 | 326篇 |
2010年 | 214篇 |
2009年 | 219篇 |
2008年 | 263篇 |
2007年 | 269篇 |
2006年 | 245篇 |
2005年 | 241篇 |
2004年 | 211篇 |
2003年 | 208篇 |
2002年 | 139篇 |
2001年 | 124篇 |
2000年 | 91篇 |
1999年 | 96篇 |
1998年 | 93篇 |
1997年 | 86篇 |
1996年 | 57篇 |
1995年 | 58篇 |
1994年 | 41篇 |
1993年 | 46篇 |
1992年 | 42篇 |
1991年 | 17篇 |
1990年 | 7篇 |
1989年 | 11篇 |
1988年 | 16篇 |
1987年 | 5篇 |
1986年 | 4篇 |
1985年 | 7篇 |
1984年 | 11篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1979年 | 1篇 |
排序方式: 共有5349条查询结果,搜索用时 15 毫秒
131.
Massively parallel sequencing (MPS) technologies have the ability to reveal sequence variations within STR alleles as well as their nominal allele lengths, which have traditionally been detected by CE instruments. Recently, Thermo Fisher Scientific has updated the MPS-STR panel, named the Precision ID GlobalFiler next-generation sequencing (NGS) STR Panel version 2, with primers redesigned to add two pentanucleotide tandem repeat loci and profile interpretation supported by the Converge software. Using the Ion Chef System, the Ion S5XL System, and the Converge software, genetic variations were characterized within STR repeat and flanking regions of 30 autosomal STR markers in 115 unrelated individuals from two Chinese population groups (58 Tibetans and 57 Hans). Nineteen STRs demonstrated a relative increase in diversity with the variant sequence alleles compared with those of traditional nominal length alleles. In total, 390 alleles were identified by their sequences compared with 258 alleles that were identified by length. Of these 92 sequence variants found within the STR repeat regions, 40 variants were located in STR flanking regions. Additionally, the agreement of the results with CE data was evaluated, as was the ability of this new MPS panel to analyze case-type (11 samples) and artificially degraded samples (seven samples in triplicate). The results generated from this study illustrate that extensive sequence variation exists in commonly used STR markers in the selected population samples and indicate that this NGS STR panel has the potential to be used as an effective tool for human forensics. 相似文献
132.
The Public key encryption scheme with keyword search (PEKS), firstly put forward by Boneh et al., can achieve the keyword searching without revealing any information of the initial data. However, the original PEKS scheme was required to construct a secure channel, which was usually expensive. Aimed at resolving this problem, Baek et al. put forward an improved scheme, which tried to construct a Secure channel free PEKS (SCF-PEKS). Subsequently, several SCF-PEKS schemes were proposed, however most of them turned out only secure in the random oracle model, which possibly lead to the construction of insecure schemes. Therefore, Fang et al. put forward an enhanced SCF-PEKS construction, which was provably secure in the standard model, however this construction needed a strong and complicated assumption. Then Yang et al. put forward an SCF-PEKS construction under simple assumption, but their construction had a big reduction in efficiency. In this article, we propose an SCF-PEKS construction, which is provably secure under the same assumption as that of Yang et al.'s scheme, however, with better performance. Then we give its full security proof, along with the performance analysis. Finally, we improve the SCF-PEKS construction to resist Keyword guessing attack (KGA) and give its security demonstration. 相似文献
133.
康殿统 《高校应用数学学报(英文版)》2006,21(2):234-242
§1Introductionandmotivation Itisalwaysofinteresttocomparethevariabilityoftworandomvariablesinreliability theoryandeconomics.Thecomparisonsbasedonmomentssuchasvarianceandstandard deviationarenotveryinformativealthoughsuchmeasuresaresimpletouse.Meanwhile,sincethesecomparisonsarestaticones,andhencetheirapplicationsinsomefields,e.g.,reliabilityandfinance,arerestricted.Inthesefields,however,somedynamicalcomparisons areneeded.Asaresult,severalstochasticordersthataremorerefinedhavebeen establishedi… 相似文献
134.
对电压型谐波源提出一种利用变压器和并联谐振抑制谐波的新方法,并通过实验验证了这种方法的有效性. 相似文献
135.
This paper presents a novel parallel processing-based frame synchronous methodology for 155·520 Mbit/s high speed networks according to ITU-T Recommendations G.707, G.708 and G.709. This scheme is expected to relax operating speed requirements of the circuits used in the system. The proposed methodology can be implemented using off-the-shelf low-rate integrated circuits (ICs). The performance of the devised methodology is analysed and found to be similar to that of traditional approaches. Finally, the proposed scheme is efficient and easy to implement at low cost without sacrificing performance. 相似文献
136.
137.
基于两重网格离散和区域分解技巧,提出三种求解非定常Navier-Stokes方程的有限元并行算法.算法的基本思想是在每一时间迭代步,在粗网格上采用Oseen迭代法求解非线性问题,在细网格上分别并行求解Oseen、Newton、Stokes线性问题以校正粗网格解.对于空间变量采用有限元离散,时间变量采用向后Euler格式离散.数值实验验证了算法的有效性. 相似文献
138.
针对现有多图像加密算法只能同时加密多张同类型同大小的图像,适用范围不广、实用性差等问题,提出一种基于图像重组和比特置乱的多图像加密算法.该算法通过将任意数量、不同大小和不同类型的图像重新组合成新多灰度图,一次完成同时加密,极大提高了加密效率和适用范围.首先,依次提取所有待加密图像像素值重新组合出N张m×n新灰度图,并将其转化成m×n×8N二进制矩阵.然后,采用3D比特置乱方式,对高位页进行行列比特置乱,低位页进行整页比特置乱.最后,进行异或扩散操作,得到密文图像.高低位分开置乱提高了算法的抗噪声能力,最终密文信息熵达到7.999以上,很好地掩盖了明文的统计特性.构造一种新型Logistic与广义三阶Fibonacci级联的混沌系统产生随机序列,增加了初值和控制参数范围,扩大了密钥空间,使其达到8×10^84以上,极大地提高了抗穷举攻击能力.既提高了序列随机性,又同时保留了低维混沌系统的快速性.结合明文哈希值(SHA-256)产生密钥,明文像素值发生微小改变后密文像素值变化率达到0.996以上,极大地提高了的明文敏感性和算法抗选择明文攻击的能力.实验分析表明,提出的多图像加密算法安全性高、实用性强. 相似文献
139.
The Gerchberg–Saxton (G-S) algorithm is a phase retrieval algorithm that is widely used in beam shaping and optical information processing. However, the G-S algorithm has difficulty obtaining the exact solution after iterating, and an approximate solution is often obtained. In this paper, we propose a series of modified G-S algorithms based on the Fresnel transform domain, including the single-phase retrieval (SPR) algorithm, the double-phase retrieval (DPR) algorithm, and the multiple-phase retrieval (MPR) algorithm. The analysis results show that the convergence of the SPR algorithm is better than that of the G-S algorithm, but the exact solution is not obtained. The DPR and MPR algorithms have good convergence and can obtain exact solutions; that is, the information is recovered losslessly. We discuss the security advantages and verification reliability of the proposed algorithms in image encryption. A multiple-image encryption scheme is proposed, in which n plaintexts can be recovered from n ciphertexts, which greatly improves the efficiency of the system. Finally, the proposed algorithms are compared with the current phase retrieval algorithms, and future applications are discussed. We hope that our research can provide new ideas for the application of the G-S algorithm. 相似文献
140.