首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9234篇
  免费   816篇
  国内免费   166篇
化学   1646篇
晶体学   3篇
力学   940篇
综合类   69篇
数学   2481篇
物理学   1426篇
无线电   3651篇
  2024年   82篇
  2023年   245篇
  2022年   402篇
  2021年   437篇
  2020年   582篇
  2019年   335篇
  2018年   282篇
  2017年   327篇
  2016年   489篇
  2015年   384篇
  2014年   565篇
  2013年   589篇
  2012年   523篇
  2011年   483篇
  2010年   397篇
  2009年   458篇
  2008年   400篇
  2007年   441篇
  2006年   388篇
  2005年   367篇
  2004年   337篇
  2003年   319篇
  2002年   259篇
  2001年   241篇
  2000年   192篇
  1999年   118篇
  1998年   122篇
  1997年   76篇
  1996年   71篇
  1995年   37篇
  1994年   51篇
  1993年   30篇
  1992年   32篇
  1991年   30篇
  1990年   15篇
  1989年   17篇
  1988年   6篇
  1987年   9篇
  1986年   33篇
  1985年   9篇
  1984年   9篇
  1983年   4篇
  1982年   2篇
  1980年   2篇
  1979年   13篇
  1978年   2篇
  1976年   2篇
  1957年   1篇
  1936年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
931.
932.
Implementing mathematically challenging tasks is difficult for teachers when working with emergent bilinguals because cognitively demanding tasks in mathematics commonly have high language demand. Currently, inadequate teacher preparation for teaching emergent bilinguals is becoming a significant concern in the United States as this population of students is rapidly growing. This study investigated how two mathematics preservice teachers (PSTs) support middle school emergent bilinguals to understand cognitively demanding mathematical problems through task modification. Fieldwork with a concurrent intervention was designed for the PSTs to work with emergent bilinguals in a one‐on‐one setting. The PSTs modified cognitively demanding mathematics tasks and designed a lesson for the emergent bilinguals based on the modified tasks. The results revealed that the task modification made by the PSTs tended to shift from reducing cognitive demands in mathematics and language to maintaining the demands through learning strategies of contextual support.  相似文献   
933.
In this paper, we study the quadratic matrix equations. To improve the application of iterative schemes, we use a transform of the quadratic matrix equation into an equivalent fixed‐point equation. Then, we consider an iterative process of Chebyshev‐type to solve this equation. We prove that this iterative scheme is more efficient than Newton's method. Moreover, we obtain a local convergence result for this iterative scheme. We finish showing, by an application to noisy Wiener‐Hopf problems, that the iterative process considered is computationally more efficient than Newton's method.  相似文献   
934.
在高职教学中,电工电子技术是工科类学生所必修的专业基础课程,是一项实践性非常强的课程,同时这门课程也具有较多的理论知识。在我国进行新一轮教学改革的背景下,如果有效提高高职电工电子技术教学的质量,成为高职教师面临的一个新课题。在本文中,笔者结合自身工作实际,从电工电子技术教学中存在的问题和应对策略两个方面做了探讨。  相似文献   
935.
The purpose of this paper is to examine the cognitive demand levels of tasks used by an in-service primary teacher during length measurement and perimeter instruction and to examine a possible link between these tasks and the teacher’s mathematical knowledge in teaching. For this purpose, a case study approach was used and the data was drawn from classroom observations, semi-structured interviews, and field notes. Specific tasks from length measurement and perimeter instruction were presented and analyzed according to the Mathematical Tasks Framework. Then, how these tasks gave information about the teacher’s mathematical knowledge in teaching in the length measurement and perimeter topics was examined according to the Knowledge Quartet model. According to the findings of the study, the tasks used during length measurement and perimeter instruction were mostly categorized as low-level tasks. In addition, teacher’s mathematical knowledge in teaching affected the implementation of the tasks.  相似文献   
936.
Device-to-Device (D2D) com- munication has been proposed as a promising implementation of green communication to benefit the existed cellular network. In order to limit cross-tier interference while explore the gain of short-range communication, we devise a series of distributed power control (DPC) schemes for energy conservation (EC) and enhancement of radio resource utilization in the hybrid system. Firstly, a constrained opportunistic power control model is built up to take advantage of the interference avoidance methodology in the presence of service requirement and power constraint. Then, biasing scheme and admission control are added to evade ineffective power consumption and maintain the feasibility of the system. Upon feasibility, a non-cooperative game is further formulated to exploit the profit in EC with minor influence on spectral efficiency (SE). The convergence of the DPC schemes is validated and their performance is confirmed via simulation results.  相似文献   
937.
Device-to-Device(D2D) communication has been proposed as a promising implementation of green communication to benefit the existed cellular network.In order to limit cross-tier interference while explore the gain of short-range communication,we devise a series of distributed power control(DPC) schemes for energy conservation(EC)and enhancement of radio resource utilization in the hybrid system.Firstly,a constrained opportunistic power control model is built up to take advantage of the interference avoidance methodology in the presence of service requirement and power constraint.Then,biasing scheme and admission control are added to evade ineffective power consumption and maintain the feasibility of the system.Upon feasibility,a non-cooperative game is further formulated to exploit the profit in EC with minor influence on spectral efficiency(SE).The convergence of the DPC schemes is validated and their performance is confirmed via simulation results.  相似文献   
938.
Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio zero-watermark scheme based on energy relationship between adjacent audio sections.Taking use of discrete wavelet transformation(DWT),it gets power approximations,or energies,of audio segments.Then,it extracts the audio profile,i.e.the zero-watermark,according to the relative size of energies of consecutive fragments.The experimental results demonstrate that the proposed scheme is robust against general malicious attacks including noise addition,resampling,low-pass filtering,etc.,and this approach effectively solves the contradiction between inaudibility and robustness.  相似文献   
939.
基于降低新疆农职院教学管理系统被攻击和出错后能自我纠错的目的。采用软件工程的方法,进行对教学管理系统的业务流程分析、了解各种可能存在的安全风险,提出了对用户采用分层管理等解决方案。每层的用户权限有严格的规定,同时对系统管理员的权限有所限制。系统管理员是本系统权限最高,其次分别是教学秘书、教师和学生。得出结论,通过在本院应用该系统,由于提高了安全性能,使得该系统更加的稳健,免受不法分子的入侵,同时提高了工作效率。  相似文献   
940.
本文从项目教学的需求与系统设计的矛盾入手提出问题,从基于项目教学课程管理系统的概念入手,分析了项目教学系统特征,并结合一般课程管理系统的共性,最终提出了基于项目教学的系统开发原则,用于指导项目化教学平台的开发。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号