全文获取类型
收费全文 | 8635篇 |
免费 | 601篇 |
国内免费 | 365篇 |
专业分类
化学 | 1411篇 |
晶体学 | 2篇 |
力学 | 126篇 |
综合类 | 101篇 |
数学 | 1381篇 |
物理学 | 1246篇 |
无线电 | 5334篇 |
出版年
2024年 | 6篇 |
2023年 | 67篇 |
2022年 | 104篇 |
2021年 | 147篇 |
2020年 | 99篇 |
2019年 | 61篇 |
2018年 | 83篇 |
2017年 | 135篇 |
2016年 | 163篇 |
2015年 | 148篇 |
2014年 | 1011篇 |
2013年 | 930篇 |
2012年 | 868篇 |
2011年 | 797篇 |
2010年 | 719篇 |
2009年 | 928篇 |
2008年 | 532篇 |
2007年 | 393篇 |
2006年 | 323篇 |
2005年 | 292篇 |
2004年 | 271篇 |
2003年 | 230篇 |
2002年 | 223篇 |
2001年 | 164篇 |
2000年 | 131篇 |
1999年 | 120篇 |
1998年 | 102篇 |
1997年 | 111篇 |
1996年 | 105篇 |
1995年 | 53篇 |
1994年 | 47篇 |
1993年 | 42篇 |
1992年 | 29篇 |
1991年 | 31篇 |
1990年 | 21篇 |
1989年 | 19篇 |
1988年 | 15篇 |
1987年 | 12篇 |
1986年 | 9篇 |
1985年 | 11篇 |
1984年 | 3篇 |
1983年 | 5篇 |
1982年 | 9篇 |
1981年 | 9篇 |
1980年 | 8篇 |
1979年 | 5篇 |
1978年 | 2篇 |
1974年 | 2篇 |
1966年 | 1篇 |
1959年 | 1篇 |
排序方式: 共有9601条查询结果,搜索用时 296 毫秒
1.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors. 相似文献
2.
Discrete time queueing systems have been successfully used to model packet queues in computer and digital communications systems. In this article we introduce a novel approach to analyzing the GeoX/GeoY/∞ queueing system, which is suitable for modelling high speed computer and communications systems. The approach is based on characterizing the system by a functional equation which is then solved recursively to give identical results to those obtained using other approaches. 相似文献
3.
提出在县市级广电宽带数据网络的建设过程中,要着眼业务发展,突出高扩展性,构建基于标准、扩展灵活的主干网,实现网络建设的可持续性发展,并结合实际,从核心设备、端口、中继带宽、网络业务4个方面对扩展能力进行了阐述. 相似文献
4.
宽带DDS跳频源设计 总被引:1,自引:0,他引:1
直接数字合成(DDS)简单可靠、控制方便,具有很高的频率分辨率,高速转换,非常适合快速跳频的要求。在对DDS基本原理进行了简要介绍和分析后,提出宽带跳频源设计方案。 相似文献
5.
Quality of service (QoS) support for multimedia services in the IEEE 802.11 wireless LAN is an important issue for such WLANs
to become a viable wireless access to the Internet. In this paper, we endeavor to propose a practical scheme to achieve this
goal without changing the channel access mechanism. To this end, a novel call admission and rate control (CARC) scheme is
proposed. The key idea of this scheme is to regulate the arriving traffic of the WLAN such that the network can work at an
optimal point. We first show that the channel busyness ratio is a good indicator of the network status in the sense that it
is easy to obtain and can accurately and timely represent channel utilization. Then we propose two algorithms based on the
channel busyness ratio. The call admission control algorithm is used to regulate the admission of real-time or streaming traffic
and the rate control algorithm to control the transmission rate of best effort traffic. As a result, the real-time or streaming
traffic is supported with statistical QoS guarantees and the best effort traffic can fully utilize the residual channel capacity
left by the real-time and streaming traffic. In addition, the rate control algorithm itself provides a solution that could
be used above the media access mechanism to approach the maximal theoretical channel utilization. A comprehensive simulation
study in ns-2 has verified the performance of our proposed CARC scheme, showing that the original 802.11 DCF protocol can
statically support strict QoS requirements, such as those required by voice over IP or streaming video, and at the same time,
achieve a high channel utilization.
Hongqiang Zhai received the B.E. and M.E. degrees in electrical engineering from Tsinghua University, Beijing, China, in July 1999 and January
2002 respectively. He worked as a research intern in Bell Labs Research China from June 2001 to December 2001, and in Microsoft
Research Asia from January 2002 to July 2002. Currently he is pursuing the PhD degree in the Department of Electrical and
Computer Engineering, University of Florida. He is a student member of IEEE.
Xiang Chen received the B.E. and M.E. degrees in electrical engineering from Shanghai Jiao Tong University, Shanghai, China, in 1997
and 2000, respectively, and the Ph.D. degree in electrical and computer engineering from the University of Florida, Gainesville,
in 2005. He is currently a Senior Research Engineer at Motorola Labs, Arlington Heights, IL. His research interests include
resource management, medium access control, and quality of service (QoS) in wireless networks. He is a Member of Tau Beta
Pi and a student member of IEEE.
Yuguang Fang received a Ph.D degree in Systems and Control Engineering from Case Western Reserve University in January 1994, and a Ph.D
degree in Electrical Engineering from Boston University in May 1997.
From June 1997 to July 1998, he was a Visiting Assistant Professor in Department of Electrical Engineering at the University
of Texas at Dallas. From July 1998 to May 2000, he was an Assistant Professor in the Department of Electrical and Computer
Engineering at New Jersey Institute of Technology. In May 2000, he joined the Department of Electrical and Computer Engineering
at University of Florida where he got the early promotion with tenure in August 2003 and has been an Associate Professor since
then. He has published over one hundred (100) papers in refereed professional journals and conferences. He received the National
Science Foundation Faculty Early Career Award in 2001 and the Office of Naval Research Young Investigator Award in 2002.
He is currently serving as an Editor for many journals including IEEE Transactions on Communications, IEEE Transactions on
Wireless Communications, IEEE Transactions on Mobile Computing, and ACM Wireless Networks. He is also actively participating
in conference organization such as the Program Vice-Chair for IEEE INFOCOM’2005, Program Co-Chair for the Global Internet
and Next Generation Networks Symposium in IEEE Globecom’2004 and the Program Vice Chair for 2000 IEEE Wireless Communications
and Networking Conference (WCNC’2000). 相似文献
6.
7.
8.
Xu Baowen Zhang Weifeng 《电子科学学刊(英文版)》2002,19(4)
The users' interest can be mined from the web cache and can be used widely. The interest can be specialized by the two-tuple (term, weight) in the simple interest model, in which the association relations are not mined, and then the interest cannot be associated in expressing the users' interest. Based on analyzing the WWW cache model, this letter brings forward a two-dimensional interest model and gives the interrelated methods on how to store the two-dimensional interest model effectively. 相似文献
9.
XuBaowen ZhangWeifeng 《电子科学学刊(英文版)》2002,19(4):399-402
The users‘ interest can be mined from the web cache and can be used widely.The interest can be specialized by the two-tuple(term,weight) in the simple interest model,in which the association relations are not mined.and then interest cannot be associated in expressing the users‘interest.Based on analyzing the WWW cache model,this letter brings forward a twodimensional interest model and gives the interrelated methods on how to store the two-dimensional interest model effectively. 相似文献
10.
本文介绍了广东省智能网的组网方案及所能提供的业务,并论述了智能网工程建设,安装维护以及与广东省现有移动通信网联网中存在的一些问题。 相似文献