首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18957篇
  免费   2242篇
  国内免费   1123篇
化学   2374篇
晶体学   36篇
力学   1531篇
综合类   301篇
数学   9468篇
物理学   3925篇
无线电   4687篇
  2024年   35篇
  2023年   182篇
  2022年   269篇
  2021年   373篇
  2020年   492篇
  2019年   488篇
  2018年   474篇
  2017年   598篇
  2016年   744篇
  2015年   571篇
  2014年   1047篇
  2013年   1732篇
  2012年   1040篇
  2011年   1201篇
  2010年   1061篇
  2009年   1128篇
  2008年   1174篇
  2007年   1278篇
  2006年   1064篇
  2005年   973篇
  2004年   827篇
  2003年   807篇
  2002年   716篇
  2001年   604篇
  2000年   555篇
  1999年   470篇
  1998年   398篇
  1997年   305篇
  1996年   296篇
  1995年   226篇
  1994年   190篇
  1993年   161篇
  1992年   145篇
  1991年   145篇
  1990年   78篇
  1989年   69篇
  1988年   47篇
  1987年   42篇
  1986年   41篇
  1985年   47篇
  1984年   44篇
  1983年   25篇
  1982年   25篇
  1981年   30篇
  1980年   16篇
  1979年   20篇
  1978年   16篇
  1977年   18篇
  1976年   11篇
  1974年   8篇
排序方式: 共有10000条查询结果,搜索用时 546 毫秒
1.
2.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
3.
G. Peruginelli 《代数通讯》2018,46(11):4724-4738
We classify the maximal subrings of the ring of n×n matrices over a finite field, and show that these subrings may be divided into three types. We also describe all of the maximal subrings of a finite semisimple ring, and categorize them into two classes. As an application of these results, we calculate the covering number of a finite semisimple ring.  相似文献   
4.
《Discrete Mathematics》2021,344(12):112589
Let N be the set of positive integers. For a nonempty set A of integers and every integer u, denote by dA(u) the number of (a,a) with a,aA such that u=aa. For a sequence S of positive integers, let S(x) be the counting function of S. The set AN is called a perfect difference set if dA(u)=1 for every positive integer u. In 2008, Cilleruelo and Nathanson (2008) [4] constructed dense perfect difference sets from dense Sidon sets. In this paper, as a main result, we prove that: let f:NN be an increasing function satisfying f(n)2 for any positive integer n, then for every Sidon set B and every function ω(x), there exists a set AN such that dA(u)=f(u) for every positive integer u and B(x/3)ω(x)A(x)B(x/3)+ω(x) for all xCf,B,ω.  相似文献   
5.
The modulated signals of π /4-DQPSK can be demodulated with the differenced method,and the technology has been used in the communication. The traditional demodulated method needs a lot of calculation. In this paper, a new method based on fast arithmetic digital demodulation of DQPSK is presented. The new method only uses the sign of the modulated signal instead of digital signal through the A/D in the traditional method. With the new method, the system has higher speed, and can save some hardware in the FPGA. An experiment of the new method with the DQPSK is given in this paper.  相似文献   
6.
孟庆松 《信息技术》2006,30(6):49-52
对复杂高阶系统进行模型简化,为研究与设计系统提供了方便的条件。对系统模型的降阶是控制系统设计与仿真工作者的一个重要研究课题,对高阶复杂系统的分析、设计、仿真等具有重要的理论意义和工程实用价值。针对目前比较成熟的基于系统矩阵的有序实Schur分解方法,提出了采用时矩输出拟合来改善降阶系统输出响应逼近程度的改进方法,从而使简化模型具有输出误差更小、计算简便等优点,通过给出的实例仿真证实了这一点。  相似文献   
7.
微杯电子纸及其后加工制程   总被引:1,自引:0,他引:1  
SiPix利用独特的微杯(Microcup)结构和顶部灌注封装技术,通过连续整卷高速涂布的制程成功地制造出高性能的双稳性、装填电泳微粒的电子纸。SiPix可提供下列两种规格形式任意的EPD卷式成品:(A)用于有源矩阵EPD和直接驱动产品的可剥离保护膜/已灌装及密封的Microcup/无图案导体膜夹层卷;及(P)用于无源矩阵的行导体膜/已灌装及密封的Microcup/列导体膜夹层卷。已经开发出将EPD卷制成不同的显示模块或产品的简单的后续加工制程。  相似文献   
8.
本文提出了一种用于计算任意取向多个介质椭球电磁散射的混合方法.利用扩展边界条件(EBC)导出具有旋转轴对称单个椭球以球面波矢量函数为基底的T矩阵,结合球矢量波函数旋转定理和递推T矩阵方法,给出多个任意取向介质椭球的散射场.数值例子验证了该混合方法的计算精度和有效性.  相似文献   
9.
As we approach 100 nm technology the interconnect issues are becoming one of the main concerns in the testing of gigahertz system-on-chips. Voltage distortion (noise) and delay violations (skew) contribute to the signal integrity loss and ultimately functional error, performance degradation and reliability problems. In this paper, we first define a model for integrity faults on the high-speed interconnects. Then, we present a BIST-based test methodology that includes two special cells to detect and measure noise and skew occurring on the interconnects of the gigahertz system-on-chips. Using an inexpensive test architecture the integrity information accumulated by these special cells can be scanned out for final test and reliability analysis.  相似文献   
10.
In this paper, we study the existence of the uniformly minimum risk equivariant (UMRE) estimators of parameters in a class of normal linear models, which include the normal variance components model, the growth curve model, the extended growth curve model, and the seemingly unrelated regression equations model, and so on. The necessary and sufficient conditions are given for the existence of UMRE estimators of the estimable linear functions of regression coefficients, the covariance matrixV and (trV)α, where α > 0 is known, in the models under an affine group of transformations for quadratic losses and matrix losses, respectively. Under the (extended) growth curve model and the seemingly unrelated regression equations model, the conclusions given in literature for estimating regression coefficients can be derived by applying the general results in this paper, and the sufficient conditions for non-existence of UMRE estimators ofV and tr(V) are expanded to be necessary and sufficient conditions. In addition, the necessary and sufficient conditions that there exist UMRE estimators of parameters in the variance components model are obtained for the first time.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号