首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11847篇
  免费   1584篇
  国内免费   786篇
化学   1743篇
晶体学   24篇
力学   1099篇
综合类   120篇
数学   3742篇
物理学   3861篇
无线电   3628篇
  2024年   27篇
  2023年   112篇
  2022年   216篇
  2021年   215篇
  2020年   317篇
  2019年   306篇
  2018年   303篇
  2017年   409篇
  2016年   437篇
  2015年   445篇
  2014年   672篇
  2013年   1097篇
  2012年   715篇
  2011年   767篇
  2010年   580篇
  2009年   678篇
  2008年   717篇
  2007年   803篇
  2006年   634篇
  2005年   596篇
  2004年   548篇
  2003年   495篇
  2002年   430篇
  2001年   350篇
  2000年   350篇
  1999年   306篇
  1998年   267篇
  1997年   202篇
  1996年   184篇
  1995年   122篇
  1994年   129篇
  1993年   88篇
  1992年   86篇
  1991年   98篇
  1990年   64篇
  1989年   47篇
  1988年   38篇
  1987年   44篇
  1986年   31篇
  1985年   55篇
  1984年   37篇
  1983年   18篇
  1982年   33篇
  1981年   40篇
  1980年   14篇
  1979年   16篇
  1978年   16篇
  1977年   16篇
  1976年   17篇
  1974年   9篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
1.
网络安全事件的关联分析方法的比较研究   总被引:2,自引:0,他引:2  
随着当前攻击手段和技术的日益复杂化,一次入侵事件往往需要多个步骤才能完成,这些步骤都是彼此相关的。但是传统的入侵检测集中于检测底层的入侵或异常,所检测到的结果也仅仅是一次完整入侵的一部分,所以不能将不同的报警结合起来以发现入侵的逻辑步骤或者入侵背后的攻击策略。关联分析技术将不同分析器上产生的报警进行融合与关联分析,极大地减少了报警的数量,降低了入侵检测的误报率,并且适当的减少了入侵检测的漏报率。文中在对网络安全事件关联分析方法的系统结构进行分析后,着重介绍了当前比较流行的几种网络安全事件关联分析方法,最后对各种方法进行了比较研究。  相似文献   
2.
基于有限状态的全周期序列混沌映射的研究   总被引:1,自引:1,他引:0  
在有限长度的数字计算机中,混沌迭代序列是一个有限周期序列,其相关性能远远低于理想序列。基于skew tent映射,提出一种离散化的有限状态混沌映射,它允许精确的数值计算,没有舍入误差,通过选择合适的参数,映射能产生全周期长度的序列。仿真实验表明,归一化的序列平均周期对计算机精度不敏感,生成的二进制序列具有良好的相关性能。  相似文献   
3.
网络管理中事件关联检测机制的研究   总被引:6,自引:0,他引:6  
王平  李莉  赵宏 《通信学报》2004,25(3):73-81
网络事件的关联检测是网络管理需要解决的一个关键问题,本文根据分布式网络管理的特点,首次明确定义了网络事件的基本关联关系,在此基础上提出了一种基于Petri Net的事件关联检测机制,实现了基于事件内容的细粒度关联检测,并且在事件检测中充分考虑了时间因素,有效地提高了事件关联检测的准确性。  相似文献   
4.
By making creep and recoverable creep measurements of a nearly monodisperse low molecular weight poly(methyl phenyl siloxane) sample, we have found on decreasing temperature towardsT g that there is continuously a change in the viscoelastic spectrum concomitant with a decrease of the steadystate recoverable compliance. This behavior is exactly the same as previously observed in low molecular weight poly(styrene), proving that this spectacular anomaly in the viscoelasticity of low molecular weight polymers is general and deserves an explanation. Photon correlation spectroscopic measurements performed on the same sample have extended the observation of the viscoelastic response to shorter times and the result corroborates the trend of variation established by the creep data.Dedicated to Prof.Dr. E. W. Fischer on his 65th Birthday. Prof.Dr. Fischer is known for his valuable contribution to fosterine, international collaboration of research in polymer science. This work is an example of his contribution because it would not be possible without him bringing us together. One of us (KLN) would like to take this opportunity to thank Prof. Dr. Fischer for his unwaiving support of the 1st (Crete) and the 2nd (Alicante) International Discussion Meeting on Relaxations in Complex Systems  相似文献   
5.
本文利用统计计量学方法对山西省农民家庭消费水平和消费结构的变化及原因进行了实证分析。建立了山西省农民人均消费的消费函数和山西省农民总消费支出与食品、衣着、住房、日用品、燃料及文化生活服务支出的关系模型,并通过模型分析解释了农民的消费结构,也为决策者提供一些有效的参考资料。  相似文献   
6.
This paper studies the nonautonomous nonlinear system of difference equationsΔx(n)=A(n)x(n)+f(n,x(n)),n∈Z,(*) where x(n)∈R~N,A(n)=(a_(ij)(n))N×N is an N×N matrix,with a-(ij)∈C(R,R) for i,j= 1,2,3,...,N,and f=(f_1,f_2,...,f_N)~T∈C(R×R~N,R~N),satisfying A(t+ω)=A(t),f(t+ω,z)=f(t,z) for any t∈R,(t,z)∈R×R~N andωis a positive integer.Sufficient conditions for the existence ofω-periodic solutions to equations (*) are obtained.  相似文献   
7.
Turbulent flow simulation methods based on finite differences are attractive for their simplicity, flexibility and efficiency, but not always for accuracy or stability. This paper demonstrates that a good compromise is possible with the advected grid explicit (AGE) method. Starting from the same initial field as a previous spectral DNS, AGE method simulations of a planar turbulent wake were carried out as DNS, and then at three levels of reduced resolution. The latter cases were in a sense large‐eddy simulations (LES), although no specific sub‐grid‐scale model was used. Results for the two DNS methods, including variances and power spectra, were very similar, but the AGE simulation required much less computational effort. Small‐scale information was lost in the reduced resolution runs, but large‐scale mean and instantaneous properties were reproduced quite well, with further large reductions in computational effort. Quality of results becomes more sensitive to the value chosen for one of the AGE method parameters as resolution is reduced, from which it is inferred that the numerical stability procedure controlled by the parameter is acting in part as a sub‐grid‐scale model. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   
8.
In this work we study nonnegativity and positivity of a discrete quadratic functional with separately varying endpoints. We introduce a notion of an interval coupled with 0, and hence, extend the notion of conjugate interval to 0 from the case of fixed to variable endpoint(s). We show that the nonnegativity of the discrete quadratic functional is equivalent to each of the following conditions: The nonexistence of intervals coupled with 0, the existence of a solution to Riccati matrix equation and its boundary conditions. Natural strengthening of each of these conditions yields a characterization of the positivity of the discrete quadratic functional. Since the quadratic functional under consideration could be a second variation of a discrete calculus of variations problem with varying endpoints, we apply our results to obtain necessary and sufficient optimality conditions for such problems. This paper generalizes our recent work in [R. Hilscher, V. Zeidan, Comput. Math. Appl., to appear], where the right endpoint is fixed.  相似文献   
9.
介绍了几种光纤干涉仪等臂长技术,比较了各自的优缺点和适用范围,对光纤干涉仪的平衡有较大的参考价值。  相似文献   
10.
This paper investigates the behavior of numerical schemes for nonlinear conservation laws with source terms. We concentrate on two significant examples: relaxation approximations and genuinely nonhomogeneous scalar laws. The main tool in our analysis is the extensive use of weak limits and nonconservative products which allow us to describe accurately the operations achieved in practice when using Riemann-based numerical schemes. Some illustrative and relevant computational results are provided.

  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号