全文获取类型
收费全文 | 7101篇 |
免费 | 254篇 |
国内免费 | 207篇 |
专业分类
化学 | 529篇 |
晶体学 | 8篇 |
力学 | 244篇 |
综合类 | 83篇 |
数学 | 579篇 |
物理学 | 853篇 |
综合类 | 5266篇 |
出版年
2024年 | 10篇 |
2023年 | 42篇 |
2022年 | 71篇 |
2021年 | 88篇 |
2020年 | 93篇 |
2019年 | 77篇 |
2018年 | 88篇 |
2017年 | 132篇 |
2016年 | 147篇 |
2015年 | 184篇 |
2014年 | 365篇 |
2013年 | 373篇 |
2012年 | 385篇 |
2011年 | 424篇 |
2010年 | 316篇 |
2009年 | 380篇 |
2008年 | 363篇 |
2007年 | 543篇 |
2006年 | 400篇 |
2005年 | 410篇 |
2004年 | 384篇 |
2003年 | 348篇 |
2002年 | 313篇 |
2001年 | 263篇 |
2000年 | 205篇 |
1999年 | 165篇 |
1998年 | 142篇 |
1997年 | 138篇 |
1996年 | 111篇 |
1995年 | 106篇 |
1994年 | 95篇 |
1993年 | 76篇 |
1992年 | 70篇 |
1991年 | 58篇 |
1990年 | 30篇 |
1989年 | 55篇 |
1988年 | 34篇 |
1987年 | 23篇 |
1986年 | 28篇 |
1985年 | 6篇 |
1984年 | 8篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1978年 | 2篇 |
1977年 | 1篇 |
1969年 | 1篇 |
1968年 | 1篇 |
排序方式: 共有7562条查询结果,搜索用时 500 毫秒
1.
针对裂缝热中子示踪探测方法,从中子双组扩散理论入手结合蒙特卡洛数值模拟方法,分析压裂前后地层热中子分布影响因素,并模拟不同类型示踪剂及含量的热中子裂缝响应规律,筛选最佳示踪剂并给出其在支撑剂中含量的上、下限。结果表明:压裂前后热中子计数变化量主要受裂缝宽度和标记支撑剂中示踪剂含量的影响;钆对裂缝宽度变化反应最灵敏,钆元素是作为标记支撑剂的最佳示踪元素;随支撑剂中Gd 2O 3含量的增加,热中子计数率降低,热中子计数变化量D增加;示踪剂中氧化钆的上、下限值随裂缝宽度呈指数降低,且当裂缝宽度为1.0 cm时,Gd 2O 3的质量分数上限为0.68%,下限为0.03%。 相似文献
2.
本文讨论了实时系统的特征、开发方法、设计工具、实现手段工具等开发过程中的主要问题,论述了实时系统开发语言PEARL及该语言的对实时系统的主要支持. 相似文献
3.
文章介绍了桅杆结构数据采集软件的编制 ,并基于HY -8021多功能数据采集板与光电位置传感器的特性 ,使得该软件可满足以低频振动为主的建筑工程结构数据采集的要求。 相似文献
4.
Summary Experiments and simulations prove that correlation chromatography can greatly reduce the disadvantage of a non-linear response of the chromatographic column. A factor that has been accepted as being an important source of error in correlation or multiplex chromatography, has been shown not to be. Separations affected, improve dramatically when correlation chromatography is used, and a substantial amount of correlation noise only arises when there is a large difference in separation between a conventional chromatogram and a correlogram.A model has been developed for simulating these nonlinearities. It is shown that, especially for correlation chromatography, the simulation results match the practical measurements very well. 相似文献
5.
以串联型稳压电源为例,介绍利用数/模混合电路仿真软件系统ICAP/4进行虚拟实验及故障诊断的方法,并给出仿真波形。 相似文献
6.
Software failures have become the major factor that brings the system down or causes a degradation in the quality of service. For many applications, estimating the software failure rate from a user's perspective helps the development team evaluate the reliability of the software and determine the release time properly. Traditionally, software reliability growth models are applied to system test data with the hope of estimating the software failure rate in the field. Given the aggressive nature by which the software is exercised during system test, as well as unavoidable differences between the test environment and the field environment, the resulting estimate of the failure rate will not typically reflect the user‐perceived failure rate in the field. The goal of this work is to quantify the mismatch between the system test environment and the field environment. A calibration factor is proposed to map the failure rate estimated from the system test data to the failure rate that will be observed in the field. Non‐homogeneous Poisson process models are utilized to estimate the software failure rate in both the system test phase and the field. For projects that have only system test data, use of the calibration factor provides an estimate of the field failure rate that would otherwise be unavailable. For projects that have both system test data and previous field data, the calibration factor can be explicitly evaluated and used to estimate the field failure rate of future releases as their system test data becomes available. Copyright © 2002 John Wiley & Sons, Ltd. 相似文献
7.
Steven R. Corman 《Computational & Mathematical Organization Theory》2006,12(1):35-49
The predominant idea for using network concepts to fight terrorists centers on disabling key parts of their communication
networks. Although this counternetwork strategy is clearly a sound approach, it is vulnerable to missing, incomplete, or erroneous
information about the network. This paper describes a different and complementary application of network concepts to terrorist
organizations. It is based on activity focus networks (AFNs), which represent the complex activity system of an organization.
An activity focus is a conceptual or physical entity around which joint activity is organized. Any organization has a number
of these, which are in some cases compatible and in some cases incompatible. The set of foci and their relations of compatibility
and incompatibility define the AFN. A hypothetical AFN for a terrorist organization is specified and tested in a simulation
called AQAS. It shows that certain activity foci, and in particular one combination, have high potential as pressure points
for the activity system. The AFN approach complements the counternetwork approach by reducing the downside risk of incomplete
information about the communication network, and enhancing the effectiveness of counternetwork approaches over time.
Steven R. Corman is Professor in the Hugh Downs School of Human Communication at Arizona State University and Chair of the Organizational
Communication Division of the International Communication Association. His research interests include communication networks
and activity systems, high-resolution text and discourse analysis, and modeling and simulation of human communication systems. 相似文献
8.
基于自适应差分量化理论,提出了在不增加转换位数的情况下提高模数转换器(ADC)动态范围的一种设计方法。该方法通过量化输入与预测的差值来获得预测增益,从而扩大ADC的动态范围;通过差分量化值与预测值相加得到输出信号,并将该分别采用LMS和RLS算法进行处理.得到输入信号的预测值.计算机模拟结果证实,上述两种算法均能使模数转换器的动态范围提高约25dB.比较而言,RLS算法收敛速度更快,收敛性更好,但计算量较大. 相似文献
9.
对求解非线性方程方法的探索 总被引:2,自引:0,他引:2
BaiCL在2001年提出了双曲函数法,并把解设成具体的双曲函数,即sinhw和coshw的线性组合.本文把解设成是由2个函数f(ξ)和g(ξ)组成的线性组合,它们可以有多种取法,从而使方程更直接、更有效.借助数学软件Maple,用改进后的方法和吴文俊消元法,求解Bai C L文中的一个例子,获得了包含Bai文结果在内的更为丰富、精确的行波解. 相似文献
10.
Static extracting method of software intended behavior based on API functions invoking 总被引:1,自引:0,他引:1
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack. 相似文献