全文获取类型
收费全文 | 3159篇 |
免费 | 301篇 |
国内免费 | 134篇 |
专业分类
化学 | 62篇 |
力学 | 37篇 |
综合类 | 26篇 |
数学 | 848篇 |
物理学 | 268篇 |
无线电 | 2353篇 |
出版年
2024年 | 7篇 |
2023年 | 20篇 |
2022年 | 44篇 |
2021年 | 77篇 |
2020年 | 68篇 |
2019年 | 64篇 |
2018年 | 51篇 |
2017年 | 99篇 |
2016年 | 129篇 |
2015年 | 124篇 |
2014年 | 189篇 |
2013年 | 201篇 |
2012年 | 211篇 |
2011年 | 217篇 |
2010年 | 170篇 |
2009年 | 202篇 |
2008年 | 206篇 |
2007年 | 222篇 |
2006年 | 237篇 |
2005年 | 198篇 |
2004年 | 145篇 |
2003年 | 135篇 |
2002年 | 117篇 |
2001年 | 78篇 |
2000年 | 57篇 |
1999年 | 53篇 |
1998年 | 51篇 |
1997年 | 41篇 |
1996年 | 37篇 |
1995年 | 36篇 |
1994年 | 13篇 |
1993年 | 11篇 |
1992年 | 14篇 |
1991年 | 8篇 |
1990年 | 8篇 |
1989年 | 6篇 |
1988年 | 3篇 |
1987年 | 3篇 |
1986年 | 3篇 |
1985年 | 7篇 |
1984年 | 7篇 |
1983年 | 1篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1980年 | 5篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 1篇 |
1973年 | 2篇 |
排序方式: 共有3594条查询结果,搜索用时 15 毫秒
51.
Yiming Liu Stuart W. Bunting Shiming Luo Kunzheng Cai Qiangqiang Yang 《Natural Resource Modeling》2019,32(1)
Inappropriate development and overexploitation have seriously degraded aquatic resources in China. Stakeholders identified three fish stock enhancement and biodiversity conservation scenarios for the Beijiang River: S1, increased fish restocking; S2, no fishing season and habitat conservation; and S3, strict pollution control. Potential impacts of these actions on the livelihoods of fishers were evaluated using applied economic modeling. Baseline costs and benefits came from logbooks from 30 fishers and a survey of 90 households in three villages. The financial net benefit for a household was US$1583 (¥11,160) annually, representing a 142% and 387% return on capital and operating costs, respectively. Larger catches associated with S1 and S2 generated a net benefit of US$1651 and US$1822, respectively. Strict pollution control resulting in higher catches (+20%) and lower operating costs (?20%) would increase the net benefit by 15.9% to US$1835 annually. Pollution control would benefit other resource users and is a prerequisite for ecological restoration. Recommendations for Resource Managers
- Stringent pollution control measures are essential to conserve aquatic biodiversity and enhance the livelihoods of fishers but will require considerable public and private sector investment.
- Enhanced fish stocks in the Beijiang River could benefit poor livelihoods but may not be sufficient to lift households out of poverty, aged fishers require government assistance to diversify their livelihoods, access alternative urban employment, and survive with dignity.
- Adopting the economic modeling approach presented here could enable responsible authorities to simultaneously evaluate fish stock enhancement and biodiversity conservation options.
- Broader application of the approach presented here could help ensure small‐scale inland fisheries are managed sustainably and aquatic ecosystems are restored and protected by 2020, in line with Target 6 of the United Nations’ Convention on Biological Diversity Strategic Plan for Biodiversity.
52.
优质农产品溯源系统的引入,既能提升有效供给、缩短流通时间,又能降低流通中的数量损耗和价值损失,由此带来了双渠道供应链系统在投资、销售、定价等方面的系列决策问题。考虑制造商开辟电子渠道、从溯源系统降低流通损耗和提高质量出发,分别构建制造商主导型的双渠道供应链决策模型。通过对比分析应用前后各成员在投资、定价及销售方面的最优策略,得到相关的核心边界值。数值仿真结果表明:核心边界值主要与双重损耗的改善程度及其他参数相关,各成员及系统接受溯源系统的应用成本不同,应用成本对各渠道销量的影响程度亦不相同,但各成员调整定价的应用成本边界值是一致的。 相似文献
53.
绿色建筑凭借其诸多优点,已然成为我国未来建筑发展的新方向,而对绿色建筑的工期、成本和功能进行全面系统研究并进行综合均衡优化,对于促进绿色建筑的发展具有深远影响.在描述各工程活动的成本和持续时间之间、功能和持续时间之间的非线性关系基础上,运用多属性效用函数理论构建了绿色建筑项目的功能一工期一成本综合均衡优化模型,并用遗传算法进行求解,可以得到最佳均衡解.最后通过一个实例验证了优化模型具有良好的科学性和实用性. 相似文献
54.
Security becomes increasingly important in computing systems. Data integrity is of utmost importance. One way to protect data integrity is attaching an identifying tag to individual data. The authenticity of the data can then be checked against its tag. If the data is altered by the adversary, the related tag becomes invalid and the attack will be detected. The work presented in this paper studies an existing tag design (CETD) for authenticating memory data in embedded processor systems, where data that are stored in the memory or transferred over the bus can be tampered. Compared to other designs, this design offers the flexibility of trading-off between the implementation cost and tag size (hence the level of security); the design is cost effective and can counter the data integrity attack with random values (namely the fake values used to replace the valid data in the attack are random). However, we find that the design is vulnerable when the fake data is not randomly selected. For some data, their tags are not distributed over the full tag value space but rather limited to a much reduced set of values. When those values were chosen as the fake value, the data alteration would likely go undetected. In this article, we analytically investigate this problem and propose a low cost enhancement to ensure the full-range distribution of tag values for each data, hence effectively removing the vulnerability of the original design. 相似文献
55.
Angelika Baranowska-Łączkowska Berta Fernández Antonio Rizzo Filip Pawłowski 《Molecular physics》2015,113(13-14):1786-1793
Static and dynamic average polarisabilities and polarisability anisotropies of seven linear non-polar and polar molecules are calculated within the CCS, CC2, and CC3 approximations using a range of medium-sized basis sets: the polarised LPol-n (n = ds, dl, fs, fl), the aug-pc-n (n = 1, 2), the def2-SVPD, and -TZVPD basis sets. Reference values are obtained using a hierarchy of Dunning's (d-)aug-cc-pVXZ (X = D, T, Q, 5) basis sets. The results are discussed together with the available CCSD values in terms of basis set and correlation method errors, and their ratio. Detailed analysis shows that already the def2-SVPD basis set can be used in CCS polarisability calculations. When affordable, the slightly larger aug-pc-1 basis set is recommended, as it leads to significant reduction of basis set error. The def2-TZVPD, LPol-ds, and aug-pc-2 basis sets are optimal choice within the CC2 approximation, with the latter allowing to approach the CC2 basis set limit. The LPol-ds, -dl, and def2-TZVPD sets outperform the aug-cc-pVTZ set in average polarisability CCSD calculations, with the def2-TZVPD being competitive to other reduced-size sets also in determination of polarisability anisotropy. The aug-pc-2 basis is a particularly attractive choice for CCSD, giving the accuracy of aug-cc-pVQZ at a significantly reduced computational cost. The polarisability anisotropy is shown to be more computationally demanding than the average polarisability, in particular with respect to the accuracy of the correlation method and an accurate evaluation of this property requires at least the CCSD model. 相似文献
56.
57.
GNSS信号接收机是GNSS导航卫星的用户设备,是实现GNSS卫星导航定位的终端仪器。它是一种能够接收、跟踪、变换和测量GNSS卫星导航定位信号的无线电接收设备,既具有常用无线电接收设备的共性,又具有捕获、跟踪和处理弱达3.5E-16W~2.5E-17W卫星微弱信号的特性。为此,GNSS信号接收机的构件必须满足这种捕获、跟踪和测量GNSS信号的需求。 相似文献
58.
59.
基于代价策略的H.264/AVC半脆弱水印算法 总被引:2,自引:0,他引:2
In order to solve some existing problems on detecting malicious tampering by video watermarking based on H.264/AVC video compression standard,a semi-fragile video watermarking algorithm for H.264/AVC based on cost strategy was proposed.To further improve the robustness of the feature codes in semi-fragile video watermarking algorithm,a new generation algorithm for feature codes by eliminating the correlation of them was proposed.In order to meet the requirement that the semi-fragile watermarks should be uniformly embedded into the video frames to locate the tampered region accurately,a minimal cost function was introduced to select a DCT coefficient in the 4 × 4 block residual to embed watermark which had minimal impact on the video quality and bit rates.Experimental results show that the proposed algorithm can significantly reduce impact on video quality and bit rate because of embedding the watermarking by adopting the minimum cost function and it is sensitive to malicious manipulations.The retrieved feature code and watermarking can detect and locate malicious manipulations. 相似文献
60.