首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3159篇
  免费   301篇
  国内免费   134篇
化学   62篇
力学   37篇
综合类   26篇
数学   848篇
物理学   268篇
无线电   2353篇
  2024年   7篇
  2023年   20篇
  2022年   44篇
  2021年   77篇
  2020年   68篇
  2019年   64篇
  2018年   51篇
  2017年   99篇
  2016年   129篇
  2015年   124篇
  2014年   189篇
  2013年   201篇
  2012年   211篇
  2011年   217篇
  2010年   170篇
  2009年   202篇
  2008年   206篇
  2007年   222篇
  2006年   237篇
  2005年   198篇
  2004年   145篇
  2003年   135篇
  2002年   117篇
  2001年   78篇
  2000年   57篇
  1999年   53篇
  1998年   51篇
  1997年   41篇
  1996年   37篇
  1995年   36篇
  1994年   13篇
  1993年   11篇
  1992年   14篇
  1991年   8篇
  1990年   8篇
  1989年   6篇
  1988年   3篇
  1987年   3篇
  1986年   3篇
  1985年   7篇
  1984年   7篇
  1983年   1篇
  1982年   5篇
  1981年   5篇
  1980年   5篇
  1979年   2篇
  1978年   2篇
  1977年   2篇
  1976年   1篇
  1973年   2篇
排序方式: 共有3594条查询结果,搜索用时 15 毫秒
51.
Inappropriate development and overexploitation have seriously degraded aquatic resources in China. Stakeholders identified three fish stock enhancement and biodiversity conservation scenarios for the Beijiang River: S1, increased fish restocking; S2, no fishing season and habitat conservation; and S3, strict pollution control. Potential impacts of these actions on the livelihoods of fishers were evaluated using applied economic modeling. Baseline costs and benefits came from logbooks from 30 fishers and a survey of 90 households in three villages. The financial net benefit for a household was US$1583 (¥11,160) annually, representing a 142% and 387% return on capital and operating costs, respectively. Larger catches associated with S1 and S2 generated a net benefit of US$1651 and US$1822, respectively. Strict pollution control resulting in higher catches (+20%) and lower operating costs (?20%) would increase the net benefit by 15.9% to US$1835 annually. Pollution control would benefit other resource users and is a prerequisite for ecological restoration. Recommendations for Resource Managers
  • Stringent pollution control measures are essential to conserve aquatic biodiversity and enhance the livelihoods of fishers but will require considerable public and private sector investment.
  • Enhanced fish stocks in the Beijiang River could benefit poor livelihoods but may not be sufficient to lift households out of poverty, aged fishers require government assistance to diversify their livelihoods, access alternative urban employment, and survive with dignity.
  • Adopting the economic modeling approach presented here could enable responsible authorities to simultaneously evaluate fish stock enhancement and biodiversity conservation options.
  • Broader application of the approach presented here could help ensure small‐scale inland fisheries are managed sustainably and aquatic ecosystems are restored and protected by 2020, in line with Target 6 of the United Nations’ Convention on Biological Diversity Strategic Plan for Biodiversity.
  相似文献   
52.
李文立  赵帅 《运筹与管理》2019,28(6):98-108
优质农产品溯源系统的引入,既能提升有效供给、缩短流通时间,又能降低流通中的数量损耗和价值损失,由此带来了双渠道供应链系统在投资、销售、定价等方面的系列决策问题。考虑制造商开辟电子渠道、从溯源系统降低流通损耗和提高质量出发,分别构建制造商主导型的双渠道供应链决策模型。通过对比分析应用前后各成员在投资、定价及销售方面的最优策略,得到相关的核心边界值。数值仿真结果表明:核心边界值主要与双重损耗的改善程度及其他参数相关,各成员及系统接受溯源系统的应用成本不同,应用成本对各渠道销量的影响程度亦不相同,但各成员调整定价的应用成本边界值是一致的。  相似文献   
53.
绿色建筑凭借其诸多优点,已然成为我国未来建筑发展的新方向,而对绿色建筑的工期、成本和功能进行全面系统研究并进行综合均衡优化,对于促进绿色建筑的发展具有深远影响.在描述各工程活动的成本和持续时间之间、功能和持续时间之间的非线性关系基础上,运用多属性效用函数理论构建了绿色建筑项目的功能一工期一成本综合均衡优化模型,并用遗传算法进行求解,可以得到最佳均衡解.最后通过一个实例验证了优化模型具有良好的科学性和实用性.  相似文献   
54.
Security becomes increasingly important in computing systems. Data integrity is of utmost importance. One way to protect data integrity is attaching an identifying tag to individual data. The authenticity of the data can then be checked against its tag. If the data is altered by the adversary, the related tag becomes invalid and the attack will be detected. The work presented in this paper studies an existing tag design (CETD) for authenticating memory data in embedded processor systems, where data that are stored in the memory or transferred over the bus can be tampered. Compared to other designs, this design offers the flexibility of trading-off between the implementation cost and tag size (hence the level of security); the design is cost effective and can counter the data integrity attack with random values (namely the fake values used to replace the valid data in the attack are random). However, we find that the design is vulnerable when the fake data is not randomly selected. For some data, their tags are not distributed over the full tag value space but rather limited to a much reduced set of values. When those values were chosen as the fake value, the data alteration would likely go undetected. In this article, we analytically investigate this problem and propose a low cost enhancement to ensure the full-range distribution of tag values for each data, hence effectively removing the vulnerability of the original design.  相似文献   
55.
Static and dynamic average polarisabilities and polarisability anisotropies of seven linear non-polar and polar molecules are calculated within the CCS, CC2, and CC3 approximations using a range of medium-sized basis sets: the polarised LPol-n (n = ds, dl, fs, fl), the aug-pc-n (n = 1, 2), the def2-SVPD, and -TZVPD basis sets. Reference values are obtained using a hierarchy of Dunning's (d-)aug-cc-pVXZ (X = D, T, Q, 5) basis sets. The results are discussed together with the available CCSD values in terms of basis set and correlation method errors, and their ratio. Detailed analysis shows that already the def2-SVPD basis set can be used in CCS polarisability calculations. When affordable, the slightly larger aug-pc-1 basis set is recommended, as it leads to significant reduction of basis set error. The def2-TZVPD, LPol-ds, and aug-pc-2 basis sets are optimal choice within the CC2 approximation, with the latter allowing to approach the CC2 basis set limit. The LPol-ds, -dl, and def2-TZVPD sets outperform the aug-cc-pVTZ set in average polarisability CCSD calculations, with the def2-TZVPD being competitive to other reduced-size sets also in determination of polarisability anisotropy. The aug-pc-2 basis is a particularly attractive choice for CCSD, giving the accuracy of aug-cc-pVQZ at a significantly reduced computational cost. The polarisability anisotropy is shown to be more computationally demanding than the average polarisability, in particular with respect to the accuracy of the correlation method and an accurate evaluation of this property requires at least the CCSD model.  相似文献   
56.
数字阵列雷达是近几年发展迅速的一种新型相控阵雷达,其中,数字阵列模块是数字阵列雷达的关键核心部件之一。针对数字阵列模块的大批量生产以及测试难点,需要专门研究数字阵列模块自动测试技术。详细介绍了 DAM 自动测试系统的功能组成、系统硬件及测试软件设计,尤其是 DAM 通道数字化接收性能指标的数据分析处理方法。目前系统已经成功应用,具有测试效率高、测量结果准确、操作简易等特点,有效地解决了 DAM 批量生产测试需求,具有较大的社会效益和经济效益。  相似文献   
57.
GNSS信号接收机是GNSS导航卫星的用户设备,是实现GNSS卫星导航定位的终端仪器。它是一种能够接收、跟踪、变换和测量GNSS卫星导航定位信号的无线电接收设备,既具有常用无线电接收设备的共性,又具有捕获、跟踪和处理弱达3.5E-16W~2.5E-17W卫星微弱信号的特性。为此,GNSS信号接收机的构件必须满足这种捕获、跟踪和测量GNSS信号的需求。  相似文献   
58.
在网络虚拟化环境中,为了减少链路映射成本和提高收益,提出了一种链路优先的协同映射算法。该算法交替映射链路和节点,并使用贪心思想优先将带宽资源需求较大的虚拟链路映射到跳数较少的物理路径上,最终达到降低虚拟网络平均消耗和提高虚拟网络接受率的目的。仿真结果表明,与已有算法相比,所提算法节约了链路映射的成本,提高了虚拟网络接受率和物理网络收益,算法运行时间也有效缩短。  相似文献   
59.
基于代价策略的H.264/AVC半脆弱水印算法   总被引:2,自引:0,他引:2  
张维纬  赵宸  黄德天  张沛  杨义先 《通信学报》2015,36(10):110-118
In order to solve some existing problems on detecting malicious tampering by video watermarking based on H.264/AVC video compression standard,a semi-fragile video watermarking algorithm for H.264/AVC based on cost strategy was proposed.To further improve the robustness of the feature codes in semi-fragile video watermarking algorithm,a new generation algorithm for feature codes by eliminating the correlation of them was proposed.In order to meet the requirement that the semi-fragile watermarks should be uniformly embedded into the video frames to locate the tampered region accurately,a minimal cost function was introduced to select a DCT coefficient in the 4 × 4 block residual to embed watermark which had minimal impact on the video quality and bit rates.Experimental results show that the proposed algorithm can significantly reduce impact on video quality and bit rate because of embedding the watermarking by adopting the minimum cost function and it is sensitive to malicious manipulations.The retrieved feature code and watermarking can detect and locate malicious manipulations.  相似文献   
60.
详细论述了POI系统实现原理、POI系统技术特点、LTE室分双路常见解决方案;结合工程实际案例,着重论述了多家运营商是如何通过POI共建室分系统实现LTE室分双路建设方案的;详细分析了POI共建节约室分建设投资情况,为LTE双路室分系统共建方案的选取提供宝贵经验。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号