全文获取类型
收费全文 | 2929篇 |
免费 | 284篇 |
国内免费 | 131篇 |
专业分类
化学 | 665篇 |
晶体学 | 3篇 |
力学 | 62篇 |
综合类 | 32篇 |
数学 | 65篇 |
物理学 | 368篇 |
无线电 | 2149篇 |
出版年
2024年 | 8篇 |
2023年 | 46篇 |
2022年 | 76篇 |
2021年 | 123篇 |
2020年 | 112篇 |
2019年 | 76篇 |
2018年 | 49篇 |
2017年 | 101篇 |
2016年 | 164篇 |
2015年 | 119篇 |
2014年 | 219篇 |
2013年 | 246篇 |
2012年 | 199篇 |
2011年 | 196篇 |
2010年 | 144篇 |
2009年 | 146篇 |
2008年 | 138篇 |
2007年 | 145篇 |
2006年 | 179篇 |
2005年 | 129篇 |
2004年 | 128篇 |
2003年 | 117篇 |
2002年 | 177篇 |
2001年 | 81篇 |
2000年 | 49篇 |
1999年 | 34篇 |
1998年 | 26篇 |
1997年 | 17篇 |
1996年 | 21篇 |
1995年 | 17篇 |
1994年 | 17篇 |
1993年 | 9篇 |
1992年 | 5篇 |
1991年 | 3篇 |
1990年 | 3篇 |
1989年 | 5篇 |
1988年 | 7篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1975年 | 1篇 |
排序方式: 共有3344条查询结果,搜索用时 15 毫秒
121.
Hossein Eshghi Zinat Gordi 《Phosphorus, sulfur, and silicon and the related elements》2013,188(7):1553-1557
Abstract A facile and efficient method for the preparation of Z-aldoximes is improved by means of P2O5/SiO2 reagent in solvent-free media. Advantages of this method are the use of inexpensive and selective reagent, with high yields in simple operation, and short reaction time under solvent-free conditions. 相似文献
122.
123.
复杂阴极保护体系三维有限元建模研究 总被引:1,自引:0,他引:1
滨海电厂常以天然海水作冷却水,其碳钢水室和钛管凝汽器在实施阴极保护过程中,要求钢电位应低于-0.85V(vs.SCE),电位过正则碳钢保护不足,而钛的电位则须高于-0.75V(vs.SCE),电位过负则易使钛管发生氢脆损伤.研究牺牲阳极阴极保护,需先得出两种金属在阴极保护过程中的电位分布.本文在设计室建立碳钢水室钛管模型,根据该实验体系阴极保护过程的(稳态极化和恒电流极化)测定获得两种金属有效的边界条件,用有限元(FEM)计算在一个牺牲阳极阴极保护状态得到三维电位分布.计算结果和测量结果基本一致,为优化阴极保护设计提供了理论依据. 相似文献
124.
针对WDM光网络中单链路失效的情况,提出了一种基于链路的保护动态组播业务的优化共享保护算法(Link-based optimized shared-protection algorithm for multicast sessions,LB-OSPM).该算法在对工作树任意光纤链路失效情况寻找保护路径时,允许组播内不同保护路径共享预留波长资源,同时通过引入预留波长使用情况矩阵和波长预留矩阵记录预留波长资源的使用情况,实现了不发生冲突的不同组播的保护链路间共享预留波长资源.研究采用欧洲光网络(European Optical Network,EON)的拓扑对不同波长资源配置和网络负载情况下LB-OSPM算法的网络连接阻塞率做了仿真.结果表明,通过引入共享机制,LB-OSPM算法在对单链路失效保证100%恢复率的同时可以获得更低的连接阻塞率,提高了波长资源利用效率. 相似文献
125.
The privacy protection in big data is a research hotspot in the field of cyberspace security.As a strict and provable definition of privacy protection,studying application status of differential privacy protection in big data environment can provide reference and guidance for its subsequent system applications.Based on the analysis of the related concepts and technical characteristics of differential privacy protection,the application of differential privacy protection technology was reviewed in data distribution and analysis,cloud computing and big data computing,location and trajectory services and social networks,which expounded the current representative research results and analyzed its existing problems.The research shows that the existing results have made effective innovation and exploration of differential privacy protection applications from the aspects of differential privacy protection mechanism,noise addition mechanism and location,and data processing methods,and the related results have been cross-applied in different scenarios.Finally,four major problems that need to be studied in the further systematic application of differential privacy protection in the big data environment are proposed. 相似文献
126.
With the continuous development of social network application,user’s personal social data is so sensitive that the problem of privacy protection needs to be solved urgently.In order to reduce the network data sensitivity,a differential privacy protection scheme BCPA based on edge betweenness model was proposed.The 2K sequence corresponding to the graph structure based on the dK model was captured,and 2K sequences based on the edge betweenness centrality were reordered.According to the result of reordering,the 2K sequence was grouped into several sub-sequences,and each sub-sequence was respectively added with noise by a dK perturbation algorithm.Finally,a social network graph satisfying differential privacy was generated according to the new 2K sequences after integration.Based on the real datasets,the scheme was compared with the classical schemes through simulation experiments.The results demonstrate that it improves the accuracy and usability of data while ensuring desired privacy protection level. 相似文献
127.
A lossless digital watermarking scheme,which was zero- perturbation on the content and graphics for the digital image maps,is proposed.During the simulation,the scheme has been utilized to model the copyright protection program as a commerce application.Compared to the traditional digital watermarking schemes,our scheme operates in redundancy areas of maps and is scalable to topology changes.Experimental results show that,with respect to the geometric attacks and image transformed,the performance of our scheme is better than the classical algorithms based space or frequency domain with much lower complexity.. 相似文献
128.
129.
130.