全文获取类型
收费全文 | 3955篇 |
免费 | 562篇 |
国内免费 | 215篇 |
专业分类
化学 | 946篇 |
晶体学 | 5篇 |
力学 | 502篇 |
综合类 | 52篇 |
数学 | 448篇 |
物理学 | 723篇 |
无线电 | 2056篇 |
出版年
2024年 | 21篇 |
2023年 | 82篇 |
2022年 | 169篇 |
2021年 | 159篇 |
2020年 | 135篇 |
2019年 | 104篇 |
2018年 | 132篇 |
2017年 | 166篇 |
2016年 | 186篇 |
2015年 | 191篇 |
2014年 | 268篇 |
2013年 | 294篇 |
2012年 | 300篇 |
2011年 | 316篇 |
2010年 | 219篇 |
2009年 | 242篇 |
2008年 | 252篇 |
2007年 | 232篇 |
2006年 | 212篇 |
2005年 | 157篇 |
2004年 | 154篇 |
2003年 | 113篇 |
2002年 | 99篇 |
2001年 | 70篇 |
2000年 | 68篇 |
1999年 | 57篇 |
1998年 | 51篇 |
1997年 | 36篇 |
1996年 | 34篇 |
1995年 | 29篇 |
1994年 | 26篇 |
1993年 | 27篇 |
1992年 | 24篇 |
1991年 | 18篇 |
1990年 | 18篇 |
1989年 | 8篇 |
1988年 | 10篇 |
1987年 | 9篇 |
1986年 | 8篇 |
1985年 | 5篇 |
1984年 | 10篇 |
1983年 | 2篇 |
1982年 | 4篇 |
1981年 | 6篇 |
1980年 | 1篇 |
1979年 | 3篇 |
1978年 | 1篇 |
1977年 | 3篇 |
1974年 | 1篇 |
排序方式: 共有4732条查询结果,搜索用时 46 毫秒
71.
AT88RF020是13.56MHz的低端射频识别卡,遵循ISO/IEC 14443 Type B协议.着重介绍AT88RF020型射频卡的特点、工作原理及其在学校就餐管理中的应用,同时给出部分程序代码. 相似文献
72.
在RFID(射频识别)系统的阅读器和后台数据管理系统之间引进一种新的连接方法———无线连接,可以突破有线连接的限制。基于WUSB(W ireless USB)的无线连接方案传输距离适中、成本低、功耗低、开发简单、系统稳定,是目前较适合RFID系统的解决方案。同时提供详细、完整的实施方案,包含设计方法、数据流程和设计实例,并对有关芯片进行了描述。 相似文献
73.
采用Chartered 0.35μm EEPROM工艺设计并实现了一个适用于无源射频电子标签的256位超低功耗EEPROM存储器.芯片实现了块编程和擦写功能,并通过优化敏感放大器和控制逻辑的结构,实现了读存储器时间和功耗的最优化.最后给出了芯片在编程/擦写/读操作情况下的功耗测试结果.在电源电压为1.8V,数据率为640kHz时,EEPROM编程/擦写的平均功耗约为68μA,读操作平均功耗约为0.6μA. 相似文献
74.
盲签名的匿名性不仅能保护个人的隐私,也同样给犯罪分子带来了可乘之机.为了解决这一问题,一些方案利用了可信中心给用户颁发的公私钥,然而,用户的不同活动可由用户的公钥及证书联系起来.为了避免这种联系,本文利用况RSA和Fiat-Shamir身份鉴别方案提出了一种简单易行的方案,只需可信中心给用户颁发一次私钥,而由用户在每次使用时根据该私钥来生成不同的公钥,从而保证了多次使用活动的不可联系性.同时在法院授权许可的情况下,可信中心可以揭示用户的身份,以防止用户的犯罪。 相似文献
75.
76.
Xue-qiang ZOU Peng ZHANG Cai-yun HUANG Zhi-peng CHEN Yong SUN Qing-yun LIU 《通信学报》2016,37(Z1):116-124
Based on the similarity of the layout structure between the phishing sites and real sites,an approach to discover phishing sites was presented.First,the tag with link attribute as a feature was extracted,and then based on the feature,the page tag sequence branch to identify website was extracted,followed by the page layout similarity-HTMLTagAntiPhish,the alignment of page tag sequence tree into the alignment of page tag sequence branches was converted,this converted two-dimention tree structure into one-dimention string structure,and finally through the substitution matrix of bioinfor-matics BLOSUM62 coding,alignment score quickly to improve the phishing sites detection efficiency was computed.A series of simulation experiments show that this approach is feasible and has higher precision and recall rates. 相似文献
77.
Hermann Singer 《The Journal of mathematical sociology》2013,37(1):39-49
In a recent paper it was shown that the aliasing phenomenon, which leads to a severe identification problem in the estimation of stochastic differential equations, can be overcome by using a polygonal (or higher) approximation for the time paths of the exogenous variables. This work attempts to visualize the problem and presents several simulated trajectories of a continuous time AR(2)‐process (Ornstein‐Uhlenbeck‐process) together with the observationally equivalent structures. Furthermore it is shown that aliasing can even change the analytical properties of the time paths of the system: whereas the first component of the Ornstein‐Uhlenbeck‐process is differentiable, the trajectories of the aliasing structures are continuous, but not differentiable any more. 相似文献
78.
A novel method for fast and accurately tracing reused code was proposed. Based on simhash and inverted in-dex, the method can fast trace similar functions in massive code. First of all, a code database with three-level inverted in-dex structures was constructed. For the function to be traced, similar code blocks could be found quickly according to simhash value of the code block in the function code. Then the potential similar functions could be fast traced using in-verted index. Finally, really similar functions could be identified by comparing jump relationships of similar code blocks. Further, malware samples containing similar functions could be traced. The experimental results show that the method can quickly identify the functions inserted by compilers and the reused functions based on the code database under the premise of high accuracy and recall rate. 相似文献
79.
Siwei Wang Jesse Ward Sven Leyffer Stefan M. Wild Chris Jacobsen Stefan Vogt 《Journal of synchrotron radiation》2014,21(3):568-579
A novel approach to locate, identify and refine positions and whole areas of cell structures based on elemental contents measured by X‐ray fluorescence microscopy is introduced. It is shown that, by initializing with only a handful of prototypical cell regions, this approach can obtain consistent identification of whole cells, even when cells are overlapping, without training by explicit annotation. It is robust both to different measurements on the same sample and to different initializations. This effort provides a versatile framework to identify targeted cellular structures from datasets too complex for manual analysis, like most X‐ray fluorescence microscopy data. Possible future extensions are also discussed. 相似文献
80.