首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2856篇
  免费   259篇
  国内免费   124篇
化学   651篇
晶体学   3篇
力学   55篇
综合类   32篇
数学   65篇
物理学   314篇
无线电   2119篇
  2024年   5篇
  2023年   36篇
  2022年   66篇
  2021年   114篇
  2020年   102篇
  2019年   59篇
  2018年   41篇
  2017年   92篇
  2016年   158篇
  2015年   115篇
  2014年   216篇
  2013年   243篇
  2012年   198篇
  2011年   195篇
  2010年   143篇
  2009年   146篇
  2008年   135篇
  2007年   144篇
  2006年   176篇
  2005年   128篇
  2004年   127篇
  2003年   117篇
  2002年   177篇
  2001年   80篇
  2000年   49篇
  1999年   34篇
  1998年   26篇
  1997年   17篇
  1996年   21篇
  1995年   17篇
  1994年   17篇
  1993年   9篇
  1992年   5篇
  1991年   3篇
  1990年   3篇
  1989年   5篇
  1988年   7篇
  1986年   2篇
  1985年   2篇
  1984年   1篇
  1982年   2篇
  1981年   2篇
  1980年   1篇
  1979年   2篇
  1975年   1篇
排序方式: 共有3239条查询结果,搜索用时 414 毫秒
1.
以电信用户入网协议为切入点,电信用户的携号转网行为应受到《合同法》《消费者权益保护法》等私法规范的保护与限制。该行为引起的格式条款解释、合同终止、违约责任、损失赔偿等问题,不能仅靠《电信条例》等公法规范来调整。应当积极引导广大消费者用户以私法领域相关规定为依据,转变争议解决思维,拓宽纠纷处理途径,合理选择维权手段,以保护自身合法民事权益,与行业监管部门共同推动电信行业有序发展。  相似文献   
2.
A double optimal projection method that involves projections for intra-cluster and inter-cluster dimensionality reduction are proposed for video fingerprinting. The video is initially set as a graph with frames as its vertices in a high-dimensional space. A similarity measure that can compute the weights of the edges is then proposed. Subsequently, the video frames are partitioned into different clusters based on the graph model. Double optimal projection is used to explore the optimal mapping points in a low-dimensional space to reduce the video dimensions. The statistics and geometrical fingerprints are generated to determine whether a query video is copied from one of the videos in the database. During matching, the video can be roughly matched by utilizing the statistics fingerprint. Further matching is thereafter performed in the corresponding group using geometrical fingerprints. Experimental results show the good performance of the proposed video fingerprinting method in robustness and discrimination.  相似文献   
3.
数字水印技术的发展为解决图像认证和完整性保护问题提供了新的思路。对用于篡改检测和图像认证的水印技术做了综述。数字水印技术根据其识别差错的能力分为四种类型:易损水印、半易损水印、混合水印和自嵌入水印。最后还对水印认证技术的安全性问题进行了讨论。  相似文献   
4.
介绍有源电力滤波器设计中EXB841型绝缘栅场效应晶体管(IGBT)驱动器的驱动原理和电路特点,对IGBT的栅极驱动特性、栅极串联电阻进行了探讨,给出过流保护和过压吸收的有效办法。样机试运行证明此种设计方案可靠、有效。  相似文献   
5.
IKE协议的安全性分析   总被引:1,自引:0,他引:1  
袁鑫  何大可 《通信技术》2003,(11):103-105
在简略介绍IKE协议RFC2409工作机制的基础上,对协议现有的安全问题进行了分析,并针对协议阶段1中主模式与积极模式下身份保护存在的问题提出了协议修改建议,对阶段1中安全联盟建立的可靠性进行了探讨以加强协议抵御DoS攻击的能力。  相似文献   
6.
Resilient optical networks are predominately designed to protect against single failures of fiber links. But in larger networks, operators also see dual failures. As the capacity was planned for single failures, disconnections can occur by dual failures even if enough topological connectivity is provided. In our approach the design of the network minimizes the average loss caused by dual failures, while single failures are still fully survived. High dual failure restorability is the primary aim, capacity is optimized in a second step. For WDM networks with full wavelength conversion, we formulate mixed integer linear programming models for dedicated path protection, shared (backup) path protection, and path rerouting with and without stub-release. For larger problem instances in path rerouting, we propose two heuristics. Computational results indicate that the connectivity is of much more importance for high restorability values than the overall protection capacity. Shared protection has similar restorability levels as dedicated protection while the capacity is comparable to rerouting. Rerouting surpasses the protection mechanisms in restorability and comes close to 100% dual failure survivability. Compared to single failure planning, both shared path protection and rerouting need significantly more capacity in dual failure planning.  相似文献   
7.
In this letter, a new sharing mechanism, SRLG sharing, is proposed, which allows the links of the same shared risk link group (SRLG) in a primary light tree to share protections in WDM optical networks. In previous studies, how to share spare resources with SRLG constraints has not been studied in multicast optical networks. In this letter, considering SRLG sharing, we propose a novel algorithm –multicast with SRLG sharing (MSS)– to establish a protection light tree. Finally, the algorithm MSS and the algorithm multicast with no SRLG sharing (MNSS) are compared through a simulation to show that our new sharing scheme of SRLG sharing is more efficient than that of no SRLG sharing in terms of spare resource utilization and blocking probability.  相似文献   
8.
介绍了在城域波分网络中应用的四种环形保护倒换方案及其实现方式,并对各种保护倒换方案的特性进行了分析比较。  相似文献   
9.
WDM网络光层保护新算法的探讨   总被引:1,自引:1,他引:0  
首先介绍了几种按照不同标准划分的WDM网络光层保护方法,然后提出了三种实现光层保护的新算法,对它们的内容和性能做了详细描述。按照提出的算法所求得的解,可以为WDM网络提供新的光层保护方式。  相似文献   
10.
It is assumed that the probability of destruction of a biological asset by natural hazards can be reduced through investment in protection. Specifically a model, in which the hazard rate depends on both the age of the asset and the accumulated invested protection capital, is assumed. The protection capital depreciates through time and its effectiveness in reducing the hazard rate is subject to diminishing returns. It is shown how the investment schedule to maximize the expected net present value of the asset can be determined using the methods of deterministic optimal control, with the survival probability regarded as a state variable. The optimal investment pattern involves “bang-bang-singular” control. A numerical scheme for determining jointly the optimal investment policy and the optimal harvest (or replacement) age is outlined and a numerical example involving forest fire protection is given.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号