首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7101篇
  免费   254篇
  国内免费   207篇
化学   529篇
晶体学   8篇
力学   244篇
综合类   83篇
数学   579篇
物理学   853篇
综合类   5266篇
  2024年   10篇
  2023年   42篇
  2022年   71篇
  2021年   88篇
  2020年   93篇
  2019年   77篇
  2018年   88篇
  2017年   132篇
  2016年   147篇
  2015年   184篇
  2014年   365篇
  2013年   373篇
  2012年   385篇
  2011年   424篇
  2010年   316篇
  2009年   380篇
  2008年   363篇
  2007年   543篇
  2006年   400篇
  2005年   410篇
  2004年   384篇
  2003年   348篇
  2002年   313篇
  2001年   263篇
  2000年   205篇
  1999年   165篇
  1998年   142篇
  1997年   138篇
  1996年   111篇
  1995年   106篇
  1994年   95篇
  1993年   76篇
  1992年   70篇
  1991年   58篇
  1990年   30篇
  1989年   55篇
  1988年   34篇
  1987年   23篇
  1986年   28篇
  1985年   6篇
  1984年   8篇
  1983年   2篇
  1982年   1篇
  1981年   2篇
  1980年   2篇
  1979年   1篇
  1978年   2篇
  1977年   1篇
  1969年   1篇
  1968年   1篇
排序方式: 共有7562条查询结果,搜索用时 500 毫秒
1.
针对裂缝热中子示踪探测方法,从中子双组扩散理论入手结合蒙特卡洛数值模拟方法,分析压裂前后地层热中子分布影响因素,并模拟不同类型示踪剂及含量的热中子裂缝响应规律,筛选最佳示踪剂并给出其在支撑剂中含量的上、下限。结果表明:压裂前后热中子计数变化量主要受裂缝宽度和标记支撑剂中示踪剂含量的影响;钆对裂缝宽度变化反应最灵敏,钆元素是作为标记支撑剂的最佳示踪元素;随支撑剂中Gd 2O 3含量的增加,热中子计数率降低,热中子计数变化量D增加;示踪剂中氧化钆的上、下限值随裂缝宽度呈指数降低,且当裂缝宽度为1.0 cm时,Gd 2O 3的质量分数上限为0.68%,下限为0.03%。  相似文献   
2.
本文讨论了实时系统的特征、开发方法、设计工具、实现手段工具等开发过程中的主要问题,论述了实时系统开发语言PEARL及该语言的对实时系统的主要支持.  相似文献   
3.
文章介绍了桅杆结构数据采集软件的编制 ,并基于HY -8021多功能数据采集板与光电位置传感器的特性 ,使得该软件可满足以低频振动为主的建筑工程结构数据采集的要求。  相似文献   
4.
Summary Experiments and simulations prove that correlation chromatography can greatly reduce the disadvantage of a non-linear response of the chromatographic column. A factor that has been accepted as being an important source of error in correlation or multiplex chromatography, has been shown not to be. Separations affected, improve dramatically when correlation chromatography is used, and a substantial amount of correlation noise only arises when there is a large difference in separation between a conventional chromatogram and a correlogram.A model has been developed for simulating these nonlinearities. It is shown that, especially for correlation chromatography, the simulation results match the practical measurements very well.  相似文献   
5.
以串联型稳压电源为例,介绍利用数/模混合电路仿真软件系统ICAP/4进行虚拟实验及故障诊断的方法,并给出仿真波形。  相似文献   
6.
Software failures have become the major factor that brings the system down or causes a degradation in the quality of service. For many applications, estimating the software failure rate from a user's perspective helps the development team evaluate the reliability of the software and determine the release time properly. Traditionally, software reliability growth models are applied to system test data with the hope of estimating the software failure rate in the field. Given the aggressive nature by which the software is exercised during system test, as well as unavoidable differences between the test environment and the field environment, the resulting estimate of the failure rate will not typically reflect the user‐perceived failure rate in the field. The goal of this work is to quantify the mismatch between the system test environment and the field environment. A calibration factor is proposed to map the failure rate estimated from the system test data to the failure rate that will be observed in the field. Non‐homogeneous Poisson process models are utilized to estimate the software failure rate in both the system test phase and the field. For projects that have only system test data, use of the calibration factor provides an estimate of the field failure rate that would otherwise be unavailable. For projects that have both system test data and previous field data, the calibration factor can be explicitly evaluated and used to estimate the field failure rate of future releases as their system test data becomes available. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   
7.
The predominant idea for using network concepts to fight terrorists centers on disabling key parts of their communication networks. Although this counternetwork strategy is clearly a sound approach, it is vulnerable to missing, incomplete, or erroneous information about the network. This paper describes a different and complementary application of network concepts to terrorist organizations. It is based on activity focus networks (AFNs), which represent the complex activity system of an organization. An activity focus is a conceptual or physical entity around which joint activity is organized. Any organization has a number of these, which are in some cases compatible and in some cases incompatible. The set of foci and their relations of compatibility and incompatibility define the AFN. A hypothetical AFN for a terrorist organization is specified and tested in a simulation called AQAS. It shows that certain activity foci, and in particular one combination, have high potential as pressure points for the activity system. The AFN approach complements the counternetwork approach by reducing the downside risk of incomplete information about the communication network, and enhancing the effectiveness of counternetwork approaches over time. Steven R. Corman is Professor in the Hugh Downs School of Human Communication at Arizona State University and Chair of the Organizational Communication Division of the International Communication Association. His research interests include communication networks and activity systems, high-resolution text and discourse analysis, and modeling and simulation of human communication systems.  相似文献   
8.
基于自适应差分量化理论,提出了在不增加转换位数的情况下提高模数转换器(ADC)动态范围的一种设计方法。该方法通过量化输入与预测的差值来获得预测增益,从而扩大ADC的动态范围;通过差分量化值与预测值相加得到输出信号,并将该分别采用LMS和RLS算法进行处理.得到输入信号的预测值.计算机模拟结果证实,上述两种算法均能使模数转换器的动态范围提高约25dB.比较而言,RLS算法收敛速度更快,收敛性更好,但计算量较大.  相似文献   
9.
对求解非线性方程方法的探索   总被引:2,自引:0,他引:2  
BaiCL在2001年提出了双曲函数法,并把解设成具体的双曲函数,即sinhw和coshw的线性组合.本文把解设成是由2个函数f(ξ)和g(ξ)组成的线性组合,它们可以有多种取法,从而使方程更直接、更有效.借助数学软件Maple,用改进后的方法和吴文俊消元法,求解Bai C L文中的一个例子,获得了包含Bai文结果在内的更为丰富、精确的行波解.  相似文献   
10.
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号