首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9385篇
  免费   1050篇
  国内免费   217篇
化学   553篇
晶体学   5篇
力学   108篇
综合类   138篇
数学   1371篇
物理学   2131篇
无线电   6346篇
  2024年   28篇
  2023年   129篇
  2022年   415篇
  2021年   469篇
  2020年   394篇
  2019年   242篇
  2018年   185篇
  2017年   324篇
  2016年   445篇
  2015年   382篇
  2014年   710篇
  2013年   607篇
  2012年   645篇
  2011年   650篇
  2010年   468篇
  2009年   503篇
  2008年   572篇
  2007年   613篇
  2006年   501篇
  2005年   461篇
  2004年   367篇
  2003年   320篇
  2002年   250篇
  2001年   157篇
  2000年   140篇
  1999年   85篇
  1998年   71篇
  1997年   66篇
  1996年   63篇
  1995年   78篇
  1994年   61篇
  1993年   28篇
  1992年   18篇
  1991年   23篇
  1990年   20篇
  1989年   24篇
  1988年   17篇
  1987年   12篇
  1986年   9篇
  1985年   20篇
  1984年   10篇
  1983年   11篇
  1982年   7篇
  1981年   5篇
  1980年   6篇
  1979年   5篇
  1978年   8篇
  1976年   5篇
  1974年   4篇
  1972年   4篇
排序方式: 共有10000条查询结果,搜索用时 8 毫秒
1.
In 1976 S. Hawking claimed that “Because part of the information about the state of the system is lost down the hole, the final situation is represented by a density matrix rather than a pure quantum state”. 1 This was the starting point of the popular “black hole (BH) information paradox”.  相似文献   
2.
本文对运营商信息安全集中管控架构演进和信息安全管控策略面临的问题进行了深入分析,提出了信息安全集中管控架构的演进方向建议及对信息安全监控策略工作优化的若干意见。  相似文献   
3.
Information‐Centric Networking (ICN) has been accepted to overcome some weaknesses of the current Internet architecture, showing that “what is being exchanged” is more important than “who are exchanging information.” Given the inadequate considerations on Quality of Service (QoS) and energy saving in ICN routing, we propose in this paper a routing algorithm to enhance the two aspects. At first, on one hand, Cauchy distribution is used as a fuzzy model to evaluate users' QoS requirements, such as bandwidth, delay, and error rate; on the other hand, we formulate energy saving problem to evaluate the green quality of routing algorithm. Then, we design a link selection approach by considering QoS and energy saving, which belongs to a multi‐objective decision problem resolved by intelligent drops algorithm. Finally, we implement the proposed algorithm and compare it with the famous adaptive forwarding mechanism in terms of some significant metrics, and the experimental results reveal that the proposed algorithm is more efficient.  相似文献   
4.
Nonclassical light states are important for both conceptual and practical reasons: they are basic ingredients in testing and exploring quantum foundations, and are crucial resources in quantum technologies. Various useful criteria have been developed to detect nonclassicality in the literature, and several meaningful measures of nonclassicality have been introduced and measured experimentally. In this work, by use of a non-Hermitian generalization of the Wigner-Yanase-Dyson skew information and playing with operator ordering in evaluating average photon number, we develop a novel family of criteria for detecting nonclassicality of light based on Lieb's concavity, which is a deep and powerful result concerning interaction between quantum states and observables. We elucidate the information-theoretic as well as the physical meaning of the criteria, and illustrate their effectiveness in capturing and quantifying nonclassicality of various important light states.  相似文献   
5.
如今我国信息化技术全面发展,尤其对于工程测量工作领域来讲,不管是在工程建设和管理方面都产生不小的支撑引导效用。由此,笔者具体结合如今工程建设信息化测绘核心任何以及设备布置细节,进行结构整体安全管理周期和周边地理空间信息技术发展能效整理解析,试图将工程测量最新发展机遇和技术挑战问题处理完全。希望能够借此为日后一定时期范围内相关工程测量规划主体提供合理指导性建议内容,最终为我国各类工程事业可持续发展前景绽放奠定深刻适应基础。  相似文献   
6.
采用DIS数字信息化系统,对不同浓度的蓝墨水溶液在激光光源照射下的透射平均照度及照度分布图像进行实验研究,得到了平均照度值随溶液浓度变化的规律。对不同颜色塑料膜片对白炽灯光源透过照度值及照度分布图像进行实验研究得到及其相关之规律。  相似文献   
7.
With the proliferation of mobile computing technologies, location based services have been identified as one of the most promising target application. We classify mobile information service domains based on feature characteristics of the information sources and different patterns of mobile information access. By carefully examining the service requirements, we identify the dynamic data management problem that must be addressed for effective location based services in mobile environments. We then devise a general architecture and cost model for servicing both location independent and location dependent data. Based on the architecture and cost model, we propose a set of dynamic data management strategies that employs judicious caching, proactive server pushing and neighborhood replication to reduce service cost and improve response time under changing user mobility and access patterns. Detail behavior analysis helps us in precisely capturing when and how to apply these strategies. Simulation results suggest that different strategies are effective for different types of data in response to different patterns of movement and information access. Shiow-yang Wu is an associate professor of the Department of Computer Science and Information Engineering at National Dong Hwa University, Hualien, Taiwan, R.O.C. He received the BS and MS degrees in computer engineering from National Chiao Tung University, Hsinchu, Taiwan, ROC, and the PhD degree in computer science from the University of Texas at Austin in 1984, 1986, and 1995, respectively. His research interests include data/knowledge bases, mobile computing, distributed processing, intelligence information systems, and electronic commerce. Kun-Ta Wu was born in Taipei, Taiwan, R.O.C., in 1976. He received the B.S. degree in computer science from Soochow University, Taipei, Taiwan, R.O.C., in 1999 and the M.S. degree in computer science and information engineering from National Dong Hwa University, Hualien, Taiwan, R.O.C., in 2001. Currently, he is an Assistant Researcher in the Domestic Division at Science and Technology Information Center, National Science Council, R.O.C., as a member of Information Gathering and Analysis Group of National Information and Communication Security Taskforce. His research interests include mobile computing, wireless network and information security.  相似文献   
8.
基于ISO/IEC17799标准建立了一个综合的信息系统风险分析框架,并运用模糊多准则决策(FMCDM)方法计算信息安全风险,根据风险等级矩阵(RLM)对信息资产风险进行级别划分,最终建立评估信息资产相关风险的完整模型。  相似文献   
9.
龚强 《信息技术》2006,30(1):1-4
地理空间信息网格调度技术,要比传统的高性能计算中的调度技术复杂,原因是如果将全部网格资源作为一个应用程序的调度和执行目标,必将导致通信延迟、成本昂贵、执行低效等。为此,综合考虑应用程序特性、机器特性等,研究设计了地理空间信息网格高性能调度技术中的应用程序调度模型,包括地理空间信息网格应用程序分析;资源特性分析;应用程序分解;性能预测;资源调度;机器选择;任务映射;任务调度;任务调度器和调度器管理模块。以实现为不同的应用程序匹配不同的计算资源,提高计算资源的利用率和应用程序的执行效率。  相似文献   
10.
冯雪峰 《信息技术》2006,30(1):30-32
首先分析了BMP图像文件格式,然后根据传统LSB算法在BMP图像文件中应用,提出一种改进的LSB隐藏算法,提高了伪装图像质量。最后通过仿真验证了该算法的优越性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号