首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8635篇
  免费   601篇
  国内免费   365篇
化学   1411篇
晶体学   2篇
力学   126篇
综合类   101篇
数学   1381篇
物理学   1246篇
无线电   5334篇
  2024年   6篇
  2023年   67篇
  2022年   104篇
  2021年   147篇
  2020年   99篇
  2019年   61篇
  2018年   83篇
  2017年   135篇
  2016年   163篇
  2015年   148篇
  2014年   1011篇
  2013年   930篇
  2012年   868篇
  2011年   797篇
  2010年   719篇
  2009年   928篇
  2008年   532篇
  2007年   393篇
  2006年   323篇
  2005年   292篇
  2004年   271篇
  2003年   230篇
  2002年   223篇
  2001年   164篇
  2000年   131篇
  1999年   120篇
  1998年   102篇
  1997年   111篇
  1996年   105篇
  1995年   53篇
  1994年   47篇
  1993年   42篇
  1992年   29篇
  1991年   31篇
  1990年   21篇
  1989年   19篇
  1988年   15篇
  1987年   12篇
  1986年   9篇
  1985年   11篇
  1984年   3篇
  1983年   5篇
  1982年   9篇
  1981年   9篇
  1980年   8篇
  1979年   5篇
  1978年   2篇
  1974年   2篇
  1966年   1篇
  1959年   1篇
排序方式: 共有9601条查询结果,搜索用时 296 毫秒
1.
The study examined a decision tree analysis using social big data to conduct the prediction model on types of risk factors related to cyberbullying in Korea. The study conducted an analysis of 103,212 buzzes that had noted causes of cyberbullying and data were collected from 227 online channels, such as news websites, blogs, online groups, social network services, and online bulletin boards. Using opinion-mining method and decision tree analysis, the types of cyberbullying were sorted using SPSS 25.0. The results indicated that the total rate of types of cyberbullying in Korea was 44%, which consisted of 32.3% victims, 6.4% perpetrators, and 5.3% bystanders. According to the results, the impulse factor was also the greatest influence on the prediction of the risk factors and the propensity for dominance factor was the second greatest factor predicting the types of risk factors. In particular, the impulse factor had the most significant effect on bystanders, and the propensity for dominance factor was also significant in influencing online perpetrators. It is necessary to develop a program to diminish the impulses that were initiated by bystanders as well as victims and perpetrators because many of those bystanders have tended to aggravate impulsive cyberbullying behaviors.  相似文献   
2.
Discrete time queueing systems have been successfully used to model packet queues in computer and digital communications systems. In this article we introduce a novel approach to analyzing the GeoX/GeoY/∞ queueing system, which is suitable for modelling high speed computer and communications systems. The approach is based on characterizing the system by a functional equation which is then solved recursively to give identical results to those obtained using other approaches.  相似文献   
3.
提出在县市级广电宽带数据网络的建设过程中,要着眼业务发展,突出高扩展性,构建基于标准、扩展灵活的主干网,实现网络建设的可持续性发展,并结合实际,从核心设备、端口、中继带宽、网络业务4个方面对扩展能力进行了阐述.  相似文献   
4.
宽带DDS跳频源设计   总被引:1,自引:0,他引:1  
直接数字合成(DDS)简单可靠、控制方便,具有很高的频率分辨率,高速转换,非常适合快速跳频的要求。在对DDS基本原理进行了简要介绍和分析后,提出宽带跳频源设计方案。  相似文献   
5.
Quality of service (QoS) support for multimedia services in the IEEE 802.11 wireless LAN is an important issue for such WLANs to become a viable wireless access to the Internet. In this paper, we endeavor to propose a practical scheme to achieve this goal without changing the channel access mechanism. To this end, a novel call admission and rate control (CARC) scheme is proposed. The key idea of this scheme is to regulate the arriving traffic of the WLAN such that the network can work at an optimal point. We first show that the channel busyness ratio is a good indicator of the network status in the sense that it is easy to obtain and can accurately and timely represent channel utilization. Then we propose two algorithms based on the channel busyness ratio. The call admission control algorithm is used to regulate the admission of real-time or streaming traffic and the rate control algorithm to control the transmission rate of best effort traffic. As a result, the real-time or streaming traffic is supported with statistical QoS guarantees and the best effort traffic can fully utilize the residual channel capacity left by the real-time and streaming traffic. In addition, the rate control algorithm itself provides a solution that could be used above the media access mechanism to approach the maximal theoretical channel utilization. A comprehensive simulation study in ns-2 has verified the performance of our proposed CARC scheme, showing that the original 802.11 DCF protocol can statically support strict QoS requirements, such as those required by voice over IP or streaming video, and at the same time, achieve a high channel utilization. Hongqiang Zhai received the B.E. and M.E. degrees in electrical engineering from Tsinghua University, Beijing, China, in July 1999 and January 2002 respectively. He worked as a research intern in Bell Labs Research China from June 2001 to December 2001, and in Microsoft Research Asia from January 2002 to July 2002. Currently he is pursuing the PhD degree in the Department of Electrical and Computer Engineering, University of Florida. He is a student member of IEEE. Xiang Chen received the B.E. and M.E. degrees in electrical engineering from Shanghai Jiao Tong University, Shanghai, China, in 1997 and 2000, respectively, and the Ph.D. degree in electrical and computer engineering from the University of Florida, Gainesville, in 2005. He is currently a Senior Research Engineer at Motorola Labs, Arlington Heights, IL. His research interests include resource management, medium access control, and quality of service (QoS) in wireless networks. He is a Member of Tau Beta Pi and a student member of IEEE. Yuguang Fang received a Ph.D degree in Systems and Control Engineering from Case Western Reserve University in January 1994, and a Ph.D degree in Electrical Engineering from Boston University in May 1997. From June 1997 to July 1998, he was a Visiting Assistant Professor in Department of Electrical Engineering at the University of Texas at Dallas. From July 1998 to May 2000, he was an Assistant Professor in the Department of Electrical and Computer Engineering at New Jersey Institute of Technology. In May 2000, he joined the Department of Electrical and Computer Engineering at University of Florida where he got the early promotion with tenure in August 2003 and has been an Associate Professor since then. He has published over one hundred (100) papers in refereed professional journals and conferences. He received the National Science Foundation Faculty Early Career Award in 2001 and the Office of Naval Research Young Investigator Award in 2002. He is currently serving as an Editor for many journals including IEEE Transactions on Communications, IEEE Transactions on Wireless Communications, IEEE Transactions on Mobile Computing, and ACM Wireless Networks. He is also actively participating in conference organization such as the Program Vice-Chair for IEEE INFOCOM’2005, Program Co-Chair for the Global Internet and Next Generation Networks Symposium in IEEE Globecom’2004 and the Program Vice Chair for 2000 IEEE Wireless Communications and Networking Conference (WCNC’2000).  相似文献   
6.
协同作战能力简析   总被引:2,自引:0,他引:2  
协同作战能力(CEC)是一种充分利用网络技术的新型海岸防空技术,给系统的作战能力带来了革命性的交破。本文对协同作战能力的产生、功能、组成以及未来的发展趋势作了详细的介绍,阐述了CEC系统的总体设计思想。在此基础上,将CEC系统与传统的作战系统的性能和设计思想在各方面进行了比较,交出了CEC系统各方面的优越性能。协同作战能力是现代和未来作战系统的发展方向,CEC系统的发展必将成为衡量各国国防科技现代化的重要指标。  相似文献   
7.
盛莉  戴文进 《电子质量》2002,(10):42-43
本文介绍了以PLC为主体的中低压配电网自动化中RTU的硬件组成和PCL软件设计。  相似文献   
8.
The users' interest can be mined from the web cache and can be used widely. The interest can be specialized by the two-tuple (term, weight) in the simple interest model, in which the association relations are not mined, and then the interest cannot be associated in expressing the users' interest. Based on analyzing the WWW cache model, this letter brings forward a two-dimensional interest model and gives the interrelated methods on how to store the two-dimensional interest model effectively.  相似文献   
9.
The users‘ interest can be mined from the web cache and can be used widely.The interest can be specialized by the two-tuple(term,weight) in the simple interest model,in which the association relations are not mined.and then interest cannot be associated in expressing the users‘interest.Based on analyzing the WWW cache model,this letter brings forward a twodimensional interest model and gives the interrelated methods on how to store the two-dimensional interest model effectively.  相似文献   
10.
本文介绍了广东省智能网的组网方案及所能提供的业务,并论述了智能网工程建设,安装维护以及与广东省现有移动通信网联网中存在的一些问题。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号