全文获取类型
收费全文 | 2543篇 |
免费 | 54篇 |
国内免费 | 73篇 |
专业分类
化学 | 209篇 |
晶体学 | 8篇 |
力学 | 41篇 |
综合类 | 7篇 |
数学 | 548篇 |
物理学 | 305篇 |
综合类 | 1552篇 |
出版年
2024年 | 5篇 |
2023年 | 58篇 |
2022年 | 30篇 |
2021年 | 29篇 |
2020年 | 41篇 |
2019年 | 32篇 |
2018年 | 23篇 |
2017年 | 35篇 |
2016年 | 45篇 |
2015年 | 61篇 |
2014年 | 138篇 |
2013年 | 169篇 |
2012年 | 144篇 |
2011年 | 167篇 |
2010年 | 177篇 |
2009年 | 191篇 |
2008年 | 166篇 |
2007年 | 153篇 |
2006年 | 127篇 |
2005年 | 117篇 |
2004年 | 109篇 |
2003年 | 81篇 |
2002年 | 86篇 |
2001年 | 65篇 |
2000年 | 47篇 |
1999年 | 49篇 |
1998年 | 59篇 |
1997年 | 51篇 |
1996年 | 40篇 |
1995年 | 22篇 |
1994年 | 26篇 |
1993年 | 20篇 |
1992年 | 13篇 |
1991年 | 15篇 |
1990年 | 8篇 |
1989年 | 9篇 |
1988年 | 13篇 |
1987年 | 13篇 |
1986年 | 4篇 |
1985年 | 5篇 |
1984年 | 6篇 |
1983年 | 7篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1978年 | 5篇 |
1977年 | 2篇 |
1969年 | 1篇 |
排序方式: 共有2670条查询结果,搜索用时 15 毫秒
1.
2.
关于高师院校计算机专业教学改革的几点建议 总被引:1,自引:0,他引:1
本文以高等师范院校计算机专业教学改革为例,从教育观念的更新、教学模式的转变、教学手段的更新、教学对象的再认识、教学中的教材教法等多个方面分析以网络为主的现代教育模式改革的思想,目的在于探索出一条以多媒体和网络为主体的教学环境下的教育新思路。 相似文献
3.
4.
Steven R. Corman 《Computational & Mathematical Organization Theory》2006,12(1):35-49
The predominant idea for using network concepts to fight terrorists centers on disabling key parts of their communication
networks. Although this counternetwork strategy is clearly a sound approach, it is vulnerable to missing, incomplete, or erroneous
information about the network. This paper describes a different and complementary application of network concepts to terrorist
organizations. It is based on activity focus networks (AFNs), which represent the complex activity system of an organization.
An activity focus is a conceptual or physical entity around which joint activity is organized. Any organization has a number
of these, which are in some cases compatible and in some cases incompatible. The set of foci and their relations of compatibility
and incompatibility define the AFN. A hypothetical AFN for a terrorist organization is specified and tested in a simulation
called AQAS. It shows that certain activity foci, and in particular one combination, have high potential as pressure points
for the activity system. The AFN approach complements the counternetwork approach by reducing the downside risk of incomplete
information about the communication network, and enhancing the effectiveness of counternetwork approaches over time.
Steven R. Corman is Professor in the Hugh Downs School of Human Communication at Arizona State University and Chair of the Organizational
Communication Division of the International Communication Association. His research interests include communication networks
and activity systems, high-resolution text and discourse analysis, and modeling and simulation of human communication systems. 相似文献
5.
针对目前电磁场数值处理中计算繁杂慢速和耗费资源过多的问题,本文提出了一种基于神经网络小波理论进行计算的新方法。文中着重介绍了利用小波变换神经网络的基本理论,结合电磁场数值计算的基本方法,推导变换进而得到一个通用公式和处理方法。在该方法中,神经网络学习内容少和数据处理简单,因此该方法具有计算速度快,占用资源少的优点,并有用硬件实现的前景。 相似文献
6.
李鲁群 《山东科技大学学报(自然科学版)》1996,(4)
本文通过对非网络版软件在单机上运行环境分析,找出了一套调整此类软件使其在Novell网上运行的方法,并提出了非网络软件在Novell网上运行环境的设计的观点,具有较大的意义。 相似文献
7.
Luca Lambertini Raimondello Orsini 《Central European Journal of Operations Research》2007,15(1):105-117
We reconsider the role of network externalities in a dynamic spatial monopoly where the firm must invest in order to accumulate
capacity, while consumers may have either linear or quadratic preferences. We (1) characterise saddle point equilibria, (2)
prove that the extent of market coverage is increasing in the network effect and (3) unlike the existing static literature
on the same problem, the monopolist may not make introductory price offers. Then, we briefly deal with the socially optimal
solution, showing that, in general, a planner would serve more consumers than a profit-seeking monopolist.
相似文献
8.
9.
模糊集技术在网络信息过滤系统中的应用研究 总被引:2,自引:0,他引:2
本文将模糊模式识别引入到校园网信息过滤系统中,通过网页内容识别和分级技术将各种不同网站进行分类,过滤和禁止有害网络信息,从而达到校园网的信息“净化”目的。 相似文献
10.
We examine the problem of building or fortifying a network to defend against enemy attacks in various scenarios. In particular,
we examine the case in which an enemy can destroy any portion of any arc that a designer constructs on the network, subject
to some interdiction budget. This problem takes the form of a three-level, two-player game, in which the designer acts first
to construct a network and transmit an initial set of flows through the network. The enemy acts next to destroy a set of constructed
arcs in the designer’s network, and the designer acts last to transmit a final set of flows in the network. Most studies of
this nature assume that the enemy will act optimally; however, in real-world scenarios one cannot necessarily assume rationality
on the part of the enemy. Hence, we prescribe optimal network design algorithms for three different profiles of enemy action:
an enemy destroying arcs based on capacities, based on initial flows, or acting optimally to minimize our maximum profits
obtained from transmitting flows. 相似文献