首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   35901篇
  免费   4292篇
  国内免费   814篇
化学   2390篇
晶体学   40篇
力学   622篇
综合类   395篇
数学   3582篇
物理学   5479篇
无线电   28499篇
  2024年   160篇
  2023年   605篇
  2022年   1290篇
  2021年   1553篇
  2020年   1458篇
  2019年   873篇
  2018年   748篇
  2017年   1238篇
  2016年   1480篇
  2015年   1490篇
  2014年   2701篇
  2013年   2326篇
  2012年   2632篇
  2011年   2473篇
  2010年   1902篇
  2009年   1853篇
  2008年   2087篇
  2007年   2099篇
  2006年   1892篇
  2005年   1624篇
  2004年   1423篇
  2003年   1406篇
  2002年   1068篇
  2001年   839篇
  2000年   765篇
  1999年   542篇
  1998年   451篇
  1997年   381篇
  1996年   372篇
  1995年   305篇
  1994年   239篇
  1993年   168篇
  1992年   108篇
  1991年   78篇
  1990年   66篇
  1989年   55篇
  1988年   44篇
  1987年   21篇
  1986年   28篇
  1985年   37篇
  1984年   24篇
  1983年   14篇
  1982年   13篇
  1981年   13篇
  1980年   7篇
  1979年   9篇
  1978年   8篇
  1977年   9篇
  1976年   5篇
  1959年   6篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
1.
2.
如何在互联网时代打造一个信息化的管理模式,已经成为广大学校图书管理发展过程中亟待处理的问题。文章就互联网时代下的高职图书管理信息化建设进行了详细探讨,以期能够给广大同仁提供一些借鉴参考,共同为图书管理工作的现代化改革和发展贡献力量。  相似文献   
3.
文章首先对智能化电子信息技术进行了深入的研究,而后分析了该技术在应用过程中出现的问题,最后结合该技术的相关特点给出了相应的问题解决措施,希望能够对智能化电子信息技术的发展提供帮助。  相似文献   
4.
本文主要总结了新冠疫情期间作者的电磁场理论课程在线教学经验。对比分析了录播和直播的优缺点后,选择录播教学方式。基于超星网络教学平台,展示了录播网络教学的具体措施,包括网上答疑和学习效果检查以及在线批改作业等。给出了网络教学可以为线下教学继续使用的方法和手段,为疫情结束后的正常教学提供了新的网络教学补充措施。  相似文献   
5.
5G系统将移动通信服务从移动电话、移动宽带和大规模机器通信扩展到新的应用领域,即所谓对通信服务有特殊要求的垂直领域。对使能未来工厂的5G能力进行了全面的分析总结,包括弹性网络架构、灵活频谱、超可靠低时延通信、时间敏感网络、安全和定位,而弹性网络架构又包括对网络切片、非公共网络、5G局域网和边缘计算的支持。希望从广度到深度,对相关的理论及技术应用做透彻、全面的梳理,对其挑战做清晰的总结,从而为相关研究和工程技术人员提供借鉴。  相似文献   
6.
Weijin Li 《中国物理 B》2022,31(8):80503-080503
Aiming at training the feed-forward threshold neural network consisting of nondifferentiable activation functions, the approach of noise injection forms a stochastic resonance based threshold network that can be optimized by various gradient-based optimizers. The introduction of injected noise extends the noise level into the parameter space of the designed threshold network, but leads to a highly non-convex optimization landscape of the loss function. Thus, the hyperparameter on-line learning procedure with respective to network weights and noise levels becomes of challenge. It is shown that the Adam optimizer, as an adaptive variant of stochastic gradient descent, manifests its superior learning ability in training the stochastic resonance based threshold network effectively. Experimental results demonstrate the significant improvement of performance of the designed threshold network trained by the Adam optimizer for function approximation and image classification.  相似文献   
7.
In this paper, we strive to propose a self-interpretable framework, termed PrimitiveTree, that incorporates deep visual primitives condensed from deep features with a conventional decision tree, bridging the gap between deep features extracted from deep neural networks (DNNs) and trees’ transparent decision-making processes. Specifically, we utilize a codebook, which embeds the continuous deep features into a finite discrete space (deep visual primitives) to distill the most common semantic information. The decision tree adopts the spatial location information and the mapped primitives to present the decision-making process of the deep features in a tree hierarchy. Moreover, the trained interpretable PrimitiveTree can inversely explain the constituents of the deep features, highlighting the most critical and semantic-rich image patches attributing to the final predictions of the given DNN. Extensive experiments and visualization results validate the effectiveness and interpretability of our method.  相似文献   
8.
To save bandwidth and storage space as well as speed up data transmission, people usually perform lossy compression on images. Although the JPEG standard is a simple and effective compression method, it usually introduces various visually unpleasing artifacts, especially the notorious blocking artifacts. In recent years, deep convolutional neural networks (CNNs) have seen remarkable development in compression artifacts reduction. Despite the excellent performance, most deep CNNs suffer from heavy computation due to very deep and wide architectures. In this paper, we propose an enhanced wide-activated residual network (EWARN) for efficient and accurate image deblocking. Specifically, we propose an enhanced wide-activated residual block (EWARB) as basic construction module. Our EWARB gives rise to larger activation width, better use of interdependencies among channels, and more informative and discriminative non-linearity activation features without more parameters than residual block (RB) and wide-activated residual block (WARB). Furthermore, we introduce an overlapping patches extraction and combination (OPEC) strategy into our network in a full convolution way, leading to large receptive field, enforced compatibility among adjacent blocks, and efficient deblocking. Extensive experiments demonstrate that our EWARN outperforms several state-of-the-art methods quantitatively and qualitatively with relatively small model size and less running time, achieving a good trade-off between performance and complexity.  相似文献   
9.
Zilu Cao 《中国物理 B》2022,31(11):118701-118701
Although the significant roles of magnetic induction and electromagnetic radiation in the neural system have been widely studied, their influence on Parkinson's disease (PD) has yet to be well explored. By virtue of the magnetic flux variable, this paper studies the transition of firing patterns induced by magnetic induction and the regulation effect of external magnetic radiation on the firing activities of the subthalamopallidal network in basal ganglia. We find: (i) The network reproduces five typical waveforms corresponding to the severity of symptoms: weak cluster, episodic, continuous cluster, episodic, and continuous wave. (ii) Magnetic induction is a double-edged sword for the treatment of PD. Although the increase of magnetic coefficient may lead the physiological firing activity to transfer to pathological firing activity, it also can regulate the pathological intensity firing activity with excessive β-band power transferring to the physiological firing pattern with weak β-band power. (iii) External magnetic radiation could inhibit continuous tremulous firing and β-band power of subthalamic nucleus (STN), which means the severity of symptoms weakened. Especially, the bi-parameter plane of the regulation region shows that a short pulse period of magnetic radiation and a medium level of pulse percentage can well regulate pathological oscillation. This work helps to understand the firing activity of the subthalamopallidal network under electromagnetic effect. It may also provide insights into the mechanisms behind the electromagnetic therapy of PD-related firing activity.  相似文献   
10.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号