全文获取类型
收费全文 | 5943篇 |
免费 | 752篇 |
国内免费 | 303篇 |
专业分类
化学 | 274篇 |
晶体学 | 9篇 |
力学 | 731篇 |
综合类 | 68篇 |
数学 | 3119篇 |
物理学 | 1275篇 |
无线电 | 1522篇 |
出版年
2024年 | 9篇 |
2023年 | 51篇 |
2022年 | 79篇 |
2021年 | 90篇 |
2020年 | 166篇 |
2019年 | 148篇 |
2018年 | 147篇 |
2017年 | 186篇 |
2016年 | 204篇 |
2015年 | 179篇 |
2014年 | 323篇 |
2013年 | 668篇 |
2012年 | 337篇 |
2011年 | 377篇 |
2010年 | 316篇 |
2009年 | 339篇 |
2008年 | 351篇 |
2007年 | 406篇 |
2006年 | 323篇 |
2005年 | 302篇 |
2004年 | 260篇 |
2003年 | 253篇 |
2002年 | 212篇 |
2001年 | 192篇 |
2000年 | 188篇 |
1999年 | 163篇 |
1998年 | 129篇 |
1997年 | 85篇 |
1996年 | 100篇 |
1995年 | 57篇 |
1994年 | 63篇 |
1993年 | 41篇 |
1992年 | 46篇 |
1991年 | 52篇 |
1990年 | 27篇 |
1989年 | 14篇 |
1988年 | 10篇 |
1987年 | 15篇 |
1986年 | 8篇 |
1985年 | 17篇 |
1984年 | 15篇 |
1983年 | 10篇 |
1982年 | 8篇 |
1981年 | 12篇 |
1979年 | 3篇 |
1978年 | 4篇 |
1977年 | 4篇 |
1976年 | 3篇 |
1974年 | 3篇 |
1957年 | 1篇 |
排序方式: 共有6998条查询结果,搜索用时 468 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security. 相似文献
2.
《Discrete Mathematics》2021,344(12):112589
Let be the set of positive integers. For a nonempty set A of integers and every integer u, denote by the number of with such that . For a sequence S of positive integers, let be the counting function of S. The set is called a perfect difference set if for every positive integer u. In 2008, Cilleruelo and Nathanson (2008) [4] constructed dense perfect difference sets from dense Sidon sets. In this paper, as a main result, we prove that: let be an increasing function satisfying for any positive integer n, then for every Sidon set B and every function , there exists a set such that for every positive integer u and for all . 相似文献
3.
The modulated signals of π /4-DQPSK can be demodulated with the differenced method,and the technology has been used in the communication. The traditional demodulated method needs a lot of calculation. In this paper, a new method based on fast arithmetic digital demodulation of DQPSK is presented. The new method only uses the sign of the modulated signal instead of digital signal through the A/D in the traditional method. With the new method, the system has higher speed, and can save some hardware in the FPGA. An experiment of the new method with the DQPSK is given in this paper. 相似文献
4.
In circuit-switched networks call streams are characterized by their mean and peakedness (two-moment method). The GI/M/C/0 system is used to model a single link, where the GI-stream is determined by fitting moments appropriately. For the moments of the overflow traffic of a GI/M/C/0 system there are efficient numerical algorithms available. However, for the moments of the freed carried traffic, defined as the moments of a virtual link of infinite capacity to which the process of calls accepted by the link (carried arrival process) is virtually directed and where the virtual calls get fresh exponential i.i.d. holding times, only complex numerical algorithms are available. This is the reason why the concept of the freed carried traffic is not used. The main result of this paper is a numerically stable and efficient algorithm for computing the moments of freed carried traffic, in particular an explicit formula for its peakedness. This result offers a unified handling of both overflow and carried traffics in networks. Furthermore, some refined characteristics for the overflow and freed carried streams are derived. 相似文献
5.
Wei Gengping~ Shen Jianhua~ 《高校应用数学学报(英文版)》2006,21(3):320-326
This paper studies the nonautonomous nonlinear system of difference equationsΔx(n)=A(n)x(n)+f(n,x(n)),n∈Z,(*) where x(n)∈R~N,A(n)=(a_(ij)(n))N×N is an N×N matrix,with a-(ij)∈C(R,R) for i,j= 1,2,3,...,N,and f=(f_1,f_2,...,f_N)~T∈C(R×R~N,R~N),satisfying A(t+ω)=A(t),f(t+ω,z)=f(t,z) for any t∈R,(t,z)∈R×R~N andωis a positive integer.Sufficient conditions for the existence ofω-periodic solutions to equations (*) are obtained. 相似文献
6.
一类非线性Schr(o)dinger方程的守恒差分法与Fourier谱方法 总被引:1,自引:0,他引:1
考察了一类带导数项的非线性Schrodinger方程的周期边值问题,提出了一种守恒的差分格式,在空间方向上采用Fourier谱方法,证明了格式的稳定性和收敛性.数值试验得到了与理论分析一致的结果. 相似文献
7.
David K Bisset 《国际流体数值方法杂志》2002,39(10):961-977
Turbulent flow simulation methods based on finite differences are attractive for their simplicity, flexibility and efficiency, but not always for accuracy or stability. This paper demonstrates that a good compromise is possible with the advected grid explicit (AGE) method. Starting from the same initial field as a previous spectral DNS, AGE method simulations of a planar turbulent wake were carried out as DNS, and then at three levels of reduced resolution. The latter cases were in a sense large‐eddy simulations (LES), although no specific sub‐grid‐scale model was used. Results for the two DNS methods, including variances and power spectra, were very similar, but the AGE simulation required much less computational effort. Small‐scale information was lost in the reduced resolution runs, but large‐scale mean and instantaneous properties were reproduced quite well, with further large reductions in computational effort. Quality of results becomes more sensitive to the value chosen for one of the AGE method parameters as resolution is reduced, from which it is inferred that the numerical stability procedure controlled by the parameter is acting in part as a sub‐grid‐scale model. Copyright © 2002 John Wiley & Sons, Ltd. 相似文献
8.
对红外热像仪参数双黑体测量装置的工作原理进行了介绍。装置采用双黑体及反射型靶标为温差辐射源,可实现黑体温度温差准直辐射的定期校准和红外热像仪参数测量量值的溯源,也可实现红外热像仪参数的可控性,以及对它进行稳定的、可复现的精确测量。推导出利用红外热像仪参数双黑体测量装置测量信号传递函数SiTF数学模型,分析了红外热像仪参数测量装置的客观因素——仪器常数,针对仪器常数对SiTF测量的影响进行了试验。试验结果表明,仪器常数对红外热像仪SiTF参数测量精度影响较大,并同时影响时域与空域NETD及3D噪声的准确测量。 相似文献
9.
10.
鞅差序列的Bernstein型不等式及其应用 总被引:3,自引:2,他引:1
本文将独立随机变量序列的Bernstein型不等式推广到鞅差序列情形,给出该不等式的一个应用,并在一定条件下证明了非参数回归中函数估计的强相合性. 相似文献