全文获取类型
收费全文 | 8183篇 |
免费 | 860篇 |
国内免费 | 566篇 |
专业分类
化学 | 1313篇 |
晶体学 | 9篇 |
力学 | 170篇 |
综合类 | 159篇 |
数学 | 2757篇 |
物理学 | 970篇 |
无线电 | 4231篇 |
出版年
2024年 | 12篇 |
2023年 | 72篇 |
2022年 | 147篇 |
2021年 | 225篇 |
2020年 | 232篇 |
2019年 | 171篇 |
2018年 | 167篇 |
2017年 | 245篇 |
2016年 | 311篇 |
2015年 | 280篇 |
2014年 | 514篇 |
2013年 | 649篇 |
2012年 | 467篇 |
2011年 | 562篇 |
2010年 | 414篇 |
2009年 | 489篇 |
2008年 | 517篇 |
2007年 | 554篇 |
2006年 | 509篇 |
2005年 | 426篇 |
2004年 | 421篇 |
2003年 | 375篇 |
2002年 | 419篇 |
2001年 | 257篇 |
2000年 | 192篇 |
1999年 | 190篇 |
1998年 | 154篇 |
1997年 | 138篇 |
1996年 | 98篇 |
1995年 | 77篇 |
1994年 | 65篇 |
1993年 | 45篇 |
1992年 | 34篇 |
1991年 | 24篇 |
1990年 | 30篇 |
1989年 | 18篇 |
1988年 | 22篇 |
1987年 | 6篇 |
1986年 | 11篇 |
1985年 | 10篇 |
1984年 | 11篇 |
1983年 | 7篇 |
1982年 | 10篇 |
1981年 | 7篇 |
1980年 | 3篇 |
1979年 | 9篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1971年 | 2篇 |
1936年 | 2篇 |
排序方式: 共有9609条查询结果,搜索用时 31 毫秒
1.
2.
3.
冯鹏一 《信息通信技术与政策》2020,(1):12-15
以电信用户入网协议为切入点,电信用户的携号转网行为应受到《合同法》《消费者权益保护法》等私法规范的保护与限制。该行为引起的格式条款解释、合同终止、违约责任、损失赔偿等问题,不能仅靠《电信条例》等公法规范来调整。应当积极引导广大消费者用户以私法领域相关规定为依据,转变争议解决思维,拓宽纠纷处理途径,合理选择维权手段,以保护自身合法民事权益,与行业监管部门共同推动电信行业有序发展。 相似文献
4.
A double optimal projection method that involves projections for intra-cluster and inter-cluster dimensionality reduction are proposed for video fingerprinting. The video is initially set as a graph with frames as its vertices in a high-dimensional space. A similarity measure that can compute the weights of the edges is then proposed. Subsequently, the video frames are partitioned into different clusters based on the graph model. Double optimal projection is used to explore the optimal mapping points in a low-dimensional space to reduce the video dimensions. The statistics and geometrical fingerprints are generated to determine whether a query video is copied from one of the videos in the database. During matching, the video can be roughly matched by utilizing the statistics fingerprint. Further matching is thereafter performed in the corresponding group using geometrical fingerprints. Experimental results show the good performance of the proposed video fingerprinting method in robustness and discrimination. 相似文献
5.
文章介绍了一种新型的短波跳频通信技术——差分跳频,分析了差分跳频技术区别于常规跳频技术的主要特点。针对按序列检测的信号接收方法,对差分跳频通信系统在AWGN信道下的性能进行了理论分析,同时做出相应的计算机仿真,证实了差分跳频通信技术和按序列检测方法的结合,使通信系统在AWGN信道下的性能得到了比较显著的提升。 相似文献
6.
From its foundation until 2004, ETRI has registered over 1,000 US patents. This letter analyzes the characteristics of these patents and addresses the explanatory factors affecting their citation counts. For explanatory variables, research team related variables, invention specific variables, and geographical domain related variables are suggested. Zero‐altered count data models are used to test the impact of independent variables. A key finding is that technological cumulativeness, the scale of invention, outputs in the electronic field, and the degree of dependence on the US technology domain positively affect the citation counts of ETRI‐invented US patents. The magnitude of international presence appears to negatively affect the citation counts of ETRI‐invented US patents. 相似文献
7.
数字水印技术的发展为解决图像认证和完整性保护问题提供了新的思路。对用于篡改检测和图像认证的水印技术做了综述。数字水印技术根据其识别差错的能力分为四种类型:易损水印、半易损水印、混合水印和自嵌入水印。最后还对水印认证技术的安全性问题进行了讨论。 相似文献
8.
9.
IKE协议的安全性分析 总被引:1,自引:0,他引:1
在简略介绍IKE协议RFC2409工作机制的基础上,对协议现有的安全问题进行了分析,并针对协议阶段1中主模式与积极模式下身份保护存在的问题提出了协议修改建议,对阶段1中安全联盟建立的可靠性进行了探讨以加强协议抵御DoS攻击的能力。 相似文献
10.
Resilient optical networks are predominately designed to protect against single failures of fiber links. But in larger networks, operators also see dual failures. As the capacity was planned for single failures, disconnections can occur by dual failures even if enough topological connectivity is provided. In our approach the design of the network minimizes the average loss caused by dual failures, while single failures are still fully survived. High dual failure restorability is the primary aim, capacity is optimized in a second step. For WDM networks with full wavelength conversion, we formulate mixed integer linear programming models for dedicated path protection, shared (backup) path protection, and path rerouting with and without stub-release. For larger problem instances in path rerouting, we propose two heuristics. Computational results indicate that the connectivity is of much more importance for high restorability values than the overall protection capacity. Shared protection has similar restorability levels as dedicated protection while the capacity is comparable to rerouting. Rerouting surpasses the protection mechanisms in restorability and comes close to 100% dual failure survivability. Compared to single failure planning, both shared path protection and rerouting need significantly more capacity in dual failure planning. 相似文献