全文获取类型
收费全文 | 14109篇 |
免费 | 1459篇 |
国内免费 | 329篇 |
专业分类
化学 | 227篇 |
晶体学 | 1篇 |
力学 | 332篇 |
综合类 | 149篇 |
数学 | 268篇 |
物理学 | 1640篇 |
无线电 | 13280篇 |
出版年
2024年 | 20篇 |
2023年 | 120篇 |
2022年 | 225篇 |
2021年 | 345篇 |
2020年 | 426篇 |
2019年 | 224篇 |
2018年 | 220篇 |
2017年 | 363篇 |
2016年 | 429篇 |
2015年 | 561篇 |
2014年 | 1027篇 |
2013年 | 815篇 |
2012年 | 1142篇 |
2011年 | 1144篇 |
2010年 | 814篇 |
2009年 | 844篇 |
2008年 | 1010篇 |
2007年 | 1005篇 |
2006年 | 1004篇 |
2005年 | 842篇 |
2004年 | 744篇 |
2003年 | 639篇 |
2002年 | 436篇 |
2001年 | 314篇 |
2000年 | 261篇 |
1999年 | 166篇 |
1998年 | 133篇 |
1997年 | 124篇 |
1996年 | 106篇 |
1995年 | 132篇 |
1994年 | 67篇 |
1993年 | 51篇 |
1992年 | 30篇 |
1991年 | 28篇 |
1990年 | 16篇 |
1989年 | 14篇 |
1988年 | 12篇 |
1987年 | 3篇 |
1986年 | 5篇 |
1985年 | 9篇 |
1984年 | 12篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1981年 | 3篇 |
1980年 | 1篇 |
1979年 | 4篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1974年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 625 毫秒
1.
基于电信运营商数字化转型,系统性地提出了数据驱动的云网发展规划体系,以及六大关键数字化能力构建,设计和实现了一种云网规划数字化平台,该平台可用于实现目标网络精细规划、边缘计算精准预测等场景,并探讨了数字孪生在规划领域的应用前景,对运营商推进云网融合战略、推进高质量发展具有指导和参考意义。 相似文献
2.
5G系统将移动通信服务从移动电话、移动宽带和大规模机器通信扩展到新的应用领域,即所谓对通信服务有特殊要求的垂直领域。对使能未来工厂的5G能力进行了全面的分析总结,包括弹性网络架构、灵活频谱、超可靠低时延通信、时间敏感网络、安全和定位,而弹性网络架构又包括对网络切片、非公共网络、5G局域网和边缘计算的支持。希望从广度到深度,对相关的理论及技术应用做透彻、全面的梳理,对其挑战做清晰的总结,从而为相关研究和工程技术人员提供借鉴。 相似文献
3.
In the past, thinking of carrying electronic devices inside our bodies was only posed by non-real scenarios. The emergence of insertable devices has changed this. Since this technology is still in its initial development stages, few studies have investigated factors that influence its acceptance. This paper analyzes the predictors of the intention to use non-medical insertable devices in two Latin American contexts. We used partial least squares structural equation modeling to examine whether six constructs predicted intention to use insertable devices. A questionnaire was administered to undergraduate students located in Colombia and Chile (n = 672). We also examined whether these predictors influenced intention differently for both of them. Four common constructs significantly and positively influenced both Chilean and Colombian respondents to use insertable devices (hedonic motivation, habit, performance expectancy, and social influence). Also, the habit has a complementary mediating effect on the relationship between social influence and behavioral intention. By contrast, effort expectations were a positive and significant predictor, but only among Chilean respondents. Findings suggest that when technologies are emerging, well-known predictors of intention (e.g., performance and effort expectations) are less influential than predictors related to self-efficacy (e.g., habit and hedonic motivation). The use of insertable devices has a significant impact on society. Thus, a better understanding of what motivates their use has implications for both academia and industry. 相似文献
4.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security. 相似文献
5.
UJ24型电位差计使用时出现的故障,可以利用数字万用表排查故障,提出排查方案,进行维修与调节,使它尽快恢复到最佳工作状态,这样既节省厂家的维修时间又节省学校的维修费用。 相似文献
6.
7.
本文对运营商信息安全集中管控架构演进和信息安全管控策略面临的问题进行了深入分析,提出了信息安全集中管控架构的演进方向建议及对信息安全监控策略工作优化的若干意见。 相似文献
8.
Recently, we developed a convenient microfluidic droplet generation device based on vacuum‐driven fluid manipulation with a piezoelectric diaphragm micropump. In the present study built on our previous work, we investigate the influence of settings applied to the piezoelectric pump, such as peak‐to‐peak drive voltage (Vp‐p) and wave frequency, on droplet generation characteristics. Stepwise adjustments to the drive voltage in ±10‐Vp‐p increments over the range of 200?250 Vp‐p during droplet creation revealed that the droplet generation rate could be reproducibly controlled at a specific drive voltage. The droplet generation rate switched within <0.5 s after the input of a new voltage. Although the droplet generation rate depended on the drive voltage, this setting had almost no influence on droplet size. The frequency over the selected range (50?60 Hz) did not markedly influence the droplet generation rate or droplet size. We show that the current fluid manipulation system can be conveniently used for both droplet generation and for rapid droplet reading, which is required in many microfluidic‐based applications. 相似文献
9.
近年来,机器学习等人工智能技术被应用于蛋白质工程,其在蛋白质结构、功能预测、催化活性等研究中具有独特优势。在未知蛋白质结构的情况下,将蛋白质序列和功能特性与机器学习相结合,基于序列-活性关系(innovative sequence-activity relationship,ISAR)算法,将蛋白质氨基酸序列数字化,用快速傅里叶变换(fast four transform,FFT)进行预处理,再进行偏最小二乘回归建模,可在数据集较少情况下拟合得到最佳模型。通过机器学习对紫色球杆菌视紫红质(gloeobacter violaceus rhodopsin,GR)的突变体蛋白质氨基酸序列与光谱最大吸收波长进行建模,获得了最佳模型。用最佳索引LEVM760106建模得到的确定系数R2 为0.944,均方误差E为11.64。用小波变换进行的预处理,其R2 虽也约为0.944,但E大于11.64,不及FFT进行的预处理。方法较好地解决了蛋白质序列与功能特性之间的数学建模问题,在蛋白质工程中可为预测更优的突变体提供支持。 相似文献
10.
社会经济的快速发展促进了科学技术水平的显著提升,社会生产生活各个领域当中对计算机网络的应用程度不断提升,当前,网络已经成为了人们日常生活与工作的重要组成部分。为此,加强对网络安全等因素影响研究就显得格外重要。网络环境关系着用户的使用质量,更加影响人们的工作效率,加强对网络安全技术的研究时解决相关问题的核心内容。本文针对网络安全威胁因素以及常见的网络安全技术进行了简要分析。 相似文献