首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5288篇
  免费   692篇
  国内免费   131篇
化学   586篇
晶体学   6篇
力学   258篇
综合类   124篇
数学   673篇
物理学   874篇
无线电   3590篇
  2024年   25篇
  2023年   110篇
  2022年   176篇
  2021年   242篇
  2020年   259篇
  2019年   160篇
  2018年   154篇
  2017年   200篇
  2016年   248篇
  2015年   266篇
  2014年   481篇
  2013年   423篇
  2012年   445篇
  2011年   399篇
  2010年   313篇
  2009年   238篇
  2008年   244篇
  2007年   230篇
  2006年   224篇
  2005年   221篇
  2004年   157篇
  2003年   147篇
  2002年   138篇
  2001年   108篇
  2000年   70篇
  1999年   65篇
  1998年   49篇
  1997年   45篇
  1996年   43篇
  1995年   40篇
  1994年   30篇
  1993年   24篇
  1992年   29篇
  1991年   20篇
  1990年   7篇
  1989年   16篇
  1988年   9篇
  1987年   3篇
  1986年   4篇
  1985年   6篇
  1984年   8篇
  1983年   3篇
  1982年   4篇
  1980年   2篇
  1979年   4篇
  1978年   4篇
  1977年   3篇
  1976年   7篇
  1975年   2篇
  1974年   3篇
排序方式: 共有6111条查询结果,搜索用时 268 毫秒
61.
Let {X t:0} denote random walk in the random waiting time model, i.e., simple random walk with jump ratew –1(X t), where {w(x):xd} is an i.i.d. random field. We show that (under some mild conditions) theintermediate scattering function F(q,t)=E 0 (qd) is completely monotonic int (E 0 denotes double expectation w.r.t. walk and field). We also show that thedynamic structure factor S(q, w)=2 0 cos(t)F(q, t) exists for 0 and is strictly positive. Ind=1, 2 it diverges as 1/||1/2, resp. –ln(||), in the limit 0; ind3 its limit value is strictly larger than expected from hydrodynamics. This and further results support the conclusion that the hydrodynamic region is limited to smallq and small such that ||D |q|2, whereD is the diffusion constant.  相似文献   
62.
Prospecting for oil and gas resources poses the problem of determining the geological structure of the earth's crust from indirect measurements. Seismic migration is an acoustic image reconstruction technique based on the inversion of the scalar wave equation. Extensive computation is necessary before reliable information can be extracted from large sets of recorded data. In this paper a collection of industrial migration techniques, each giving rise to a data parallel algorithm, is outlined. Computer simulations on synthetic seismic data illustrate the problem and the approach.  相似文献   
63.
李翠锦  瞿中 《电讯技术》2023,63(9):1291-1299
针对目前复杂交通环境下还存在多目标检测精度和速度不高等问题,以特征金字塔网络(Feature Pyramid Network, FPN)为基础,提出了一种多层融合多目标检测与识别算法,以提高目标检测精度和网络泛化能力。首先,采用ResNet101的五层架构将空间分辨率上采样2倍构建自上而下的特征图,按照元素相加的方式将上采样图和自下而上的特征图合并,并构建一个融合高层语义信息与低层几何信息的特征层;然后,根据BBox回归存在训练样本不平衡问题,选择Efficient IOU Loss损失函数并结合Focal Loss提出一种改进Focal EIOU Loss;最后,充分考虑复杂交通环境下的实际情况,进行人工标注混合数据集进行训练。该模型在KITTI测试集上的平均检测精度和速度比FPN分别提升了2.4%和5 frame/s,在Cityscale测试集上平均检测精度和速度比FPN提升了1.9%和4 frame/s。  相似文献   
64.
The booming development of artificial intelligence (AI) requires faster physical processing units as well as more efficient algorithms. Recently, reservoir computing (RC) has emerged as an alternative brain-inspired framework for fast learning with low training cost, since only the weights associated with the output layers should be trained. Physical RC becomes one of the leading paradigms for computation using high-dimensional, nonlinear, dynamic substrates. Among them, memristor appears to be a simple, adaptable, and efficient framework for constructing physical RC since they exhibit nonlinear features and memory behavior, while memristor-implemented artificial neural networks display increasing popularity towards neuromorphic computing. In this review, the memristor-implemented RC systems from the following aspects: architectures, materials, and applications are summarized. It starts with an introduction to the RC structures that can be simulated with memristor blocks. Specific interest then focuses on the dynamic memory behaviors of memristors based on various material systems, optimizing the understanding of the relationship between the relaxation behaviors and materials, which provides guidance and references for building RC systems coped with on-demand application scenarios. Furthermore, recent advances in the application of memristor-based physical RC systems are surveyed. In the end, the further prospects of memristor-implemented RC system in a material view are envisaged.  相似文献   
65.
Confronted by the difficulties of the von Neumann bottleneck and memory wall, traditional computing systems are gradually inadequate for satisfying the demands of future data-intensive computing applications. Recently, memristors have emerged as promising candidates for advanced in-memory and neuromorphic computing, which pave one way for breaking through the dilemma of current computing architecture. Till now, varieties of functional materials have been developed for constructing high-performance memristors. Herein, the review focuses on the emerging 2D MXene materials-based memristors. First, the mainstream synthetic strategies and characterization methods of MXenes are introduced. Second, the different types of MXene-based memristive materials and their widely adopted switching mechanisms are overviewed. Third, the recent progress of MXene-based memristors for data storage, artificial synapses, neuromorphic computing, and logic circuits is comprehensively summarized. Finally, the challenges, development trends, and perspectives are discussed, aiming to provide guidelines for the preparation of novel MXene-based memristors and more engaging information technology applications.  相似文献   
66.
大口径反射镜高反膜是大口径空间相机光学系统中的重要光学元件。为了观测到更多的目标、获取更多的地球以及空间观测信息,对大口径空间相机的反向射膜提出了更高要求,即要求有更宽的工作谱段和更高的反射率,还要提升基底光学性能,降低空间环境对高反膜性能的影响以及降低薄膜应力等等。对近年国内外天基大口径空间相机反射镜高反膜研究进行了综述,概述了针对以上要求所取得的成果。尽管高反膜的设计制造仍面临许多困难,但随着研究的深入与新方法的提出,这几方面难点已基本找到解决的途径。  相似文献   
67.
Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With the goal of shielding network systems from illegal access in cloud servers and IoT systems, Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) are proposed in this study. An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances. The NBIPS is usually located specifically behind a firewall, and it provides a reciprocal layer of investigation that adversely chooses unsafe substances. Network-based IPS sensors can be installed either in an inline or a passive model. An inline sensor is installed to monitor the traffic passing through it. The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol.  相似文献   
68.
With the rapid development of mobile devices and deep learning, mobile smart applications using deep learning technology have sprung up. It satisfies multiple needs of users, network operators and service providers, and rapidly becomes a main research focus. In recent years, deep learning has achieved tremendous success in image processing, natural language processing, language analysis and other research fields. Despite the task performance has been greatly improved, the resources required to run these models have increased significantly. This poses a major challenge for deploying such applications on resource-restricted mobile devices. Mobile intelligence needs faster mobile processors, more storage space, smaller but more accurate models, and even the assistance of other network nodes. To help the readers establish a global concept of the entire research direction concisely, we classify the latest works in this field into two categories, which are local optimization on mobile devices and distributed optimization based on the computational position of machine learning tasks. We also list a few typical scenarios to make readers realize the importance and indispensability of mobile deep learning applications. Finally, we conjecture what the future may hold for deploying deep learning applications on mobile devices research, which may help to stimulate new ideas.  相似文献   
69.
Due to the complexity of blockchain technology, it usually costs too much effort to build, maintain and monitor a blockchain system that supports a targeted application. To this end, the emerging “Blockchain as a Service” (BaaS) makes the blockchain and distributed ledgers more accessible, particularly for businesses, by reducing costs and overheads. BaaS combines the high computing power of cloud computing, the pervasiveness of IoT and the decentralization of blockchain, allowing people to build their own applications while ensuring the transparency and openness of the system. This paper surveys the research outputs of both academia and industry. First, it introduces the representative architectures of BaaS systems and then summarizes the research contributions of BaaS from the technologies for service provision, roles, container and virtualization, interfaces, customization and evaluation. The typical applications of BaaS in both academic and practical domains are also introduced. At present, the research on the blockchain is abundant, but research on BaaS is still in its infancy. Six challenges of BaaS are concluded in this paper for further study directions.  相似文献   
70.
Grid technology based on parallel theory is used to study a large amount of data processing. This research mainly discusses the fault detection of grid dynamic system in a big data environment. In order to verify the communication efficiency between different security nodes of the ZSS system under different operating system conditions, this study will use four physical computers and VM Ware software to establish a simulated communication environment, using GlobusToolkit (GT)'s existing deployment mechanism to realize the overall grid dynamic deployment architecture. Using Web service technology remotely calls the monitoring module interface of resource nodes in the domain and uses standard protocols to send monitoring data. At the same time, in order for the management node to save the monitoring data in the local standardized form of XML, the administrator can use the saved historical data to process system failures, analyze, and predict system performance. In order to solve the problem of information explosion, a fault detector is used to precisely control the cost of message detection and the state distribution of the detection result and the time of message delay. Under special circumstances, it takes 60 min to execute a 30-min job, and the fault detection point consumes an average of 54.33 min. The research results show that the fault-tolerant strategy can improve the performance of resource consumption in the fault-tolerant tracking system. Adopting the method of dynamically adjustable detection interval can effectively reduce the overhead of the grid dynamic system. The detection method used in this study can meet the application requirements of the grid.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号