全文获取类型
收费全文 | 969篇 |
免费 | 160篇 |
国内免费 | 36篇 |
专业分类
化学 | 32篇 |
力学 | 5篇 |
综合类 | 20篇 |
数学 | 118篇 |
物理学 | 137篇 |
无线电 | 853篇 |
出版年
2023年 | 2篇 |
2022年 | 10篇 |
2021年 | 19篇 |
2020年 | 21篇 |
2019年 | 18篇 |
2018年 | 13篇 |
2017年 | 22篇 |
2016年 | 36篇 |
2015年 | 32篇 |
2014年 | 54篇 |
2013年 | 47篇 |
2012年 | 61篇 |
2011年 | 74篇 |
2010年 | 65篇 |
2009年 | 74篇 |
2008年 | 78篇 |
2007年 | 81篇 |
2006年 | 85篇 |
2005年 | 71篇 |
2004年 | 46篇 |
2003年 | 45篇 |
2002年 | 36篇 |
2001年 | 36篇 |
2000年 | 38篇 |
1999年 | 23篇 |
1998年 | 24篇 |
1997年 | 12篇 |
1996年 | 10篇 |
1995年 | 11篇 |
1994年 | 7篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1985年 | 1篇 |
1983年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有1165条查询结果,搜索用时 187 毫秒
41.
An infrared (IR) image synthesis method is proposed for the synthesis of a real IR background and modeled IR target, used as IR signatures, as well as a band-transformation between short wave IR (SWIR), middle wave IR (MWIR), and long wave IR (LWIR) in an IR imaging system simulation. IR target images are created by the RadThermIR software, an IR signature prediction software. Individual radiances for IR signatures, corresponding to the max/min temperatures of a real IR background and modeled IR target image, are calculated with Planck’s law. First, an IR background of an arbitrary wavelength band is transformed to one of the other wavelength bands with the temperature-radiance characteristics. And then, after adjusting the gray levels of the arbitrary IR target signatures based on their radiances for the wavelength band of the transformed IR background, these IR target and background signatures can be synthesized as one image for a specific wavelength band. The experimental results show that the modeled IR target images, such as a modeled helicopter and F16, can be synthesized on the IR background images of three IR wavelength bands. And we confirmed that IR background images of the three IR wavelength bands can diversely be synthesized with the modeled IR targets as the setting temperature of the target and background, the target distance, and the field of view (FOV) arbitrarily. 相似文献
42.
43.
44.
本文基于椭圆曲线上的双线性对性质,提出了一个基于身份的带凭证部分委托代理多重签名方案,该方案具有强不可伪造性、强不可否认性、强可识别性和预防误用性. 相似文献
45.
JIA Xiao-yun LUO Shou-shan YUAN Chao-wei.School of Continuing Education Beijing University of Posts Telecommunications Beijing P.R. China .School of Software Engineering Beijing University of Posts Telecommunications Beijing P.R. China .National Key Laboratory of Integrated Service Networks Xidian University Xi'an P.R. China 《中国邮电高校学报(英文版)》2006,13(2):66-69
1Introduction Withthedevelopmentofcomputerandnetworkcom municationtechnology,andwiththedifferenceofuser s demands,digitalsignaturetechniquesarebeingexpand edgreatly,fromthesinglesignature,singleverification modetothemulti user sone.Forexample,adocument sy… 相似文献
46.
47.
48.
Sang Youl Lee 《Proceedings of the American Mathematical Society》1999,127(11):3403-3412
We show that there exists a one-to-one correspondence between the class of certain block tridiagonal matrices with the entries or and the free monoid generated by generators and relation and give some applications for braids. In particular, we give new formulation of the reduced Alexander matrices for closed braids.
49.
Jonathan Rosenberg 《Proceedings of the American Mathematical Society》1999,127(12):3467-3474
On any manifold , the de Rham operator (with respect to a complete Riemannian metric), with the grading of forms by parity of degree, gives rise by Kasparov theory to a class , which when is closed maps to the Euler characteristic in . The purpose of this note is to give a quick proof of the (perhaps unfortunate) fact that is as trivial as it could be subject to this constraint. More precisely, if is connected, lies in the image of (induced by the inclusion of a basepoint into ).
50.
YANG Jun ZHOU Xian-wei QIN Bo-ping 《中国电子科技》2006,4(1):55-58
The EIGamal algorithm, which can be used for both signature and encryption, is of importance in public-key cryptosystems. However, there has arisen an issue that different criteria of selecting a random number are used for the same algorithm. In the aspects of the sufficiency, necessity, security and computational overhead of parameter selection, this paper analyzes these criteria in a comparative manner and points out the insecurities in some textbook cryptographic schemes. Meanwhile, in order to enhance security a novel generalization of the EIGamal signature scheme is made by expanding the range of selecting random numbers at an acceptable cost of additional computation, and its feasibility is demonstrated. 相似文献