首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18597篇
  免费   1222篇
  国内免费   791篇
系统科学   1817篇
丛书文集   410篇
教育与普及   339篇
理论与方法论   322篇
现状及发展   930篇
研究方法   42篇
综合类   16748篇
自然研究   2篇
  2024年   35篇
  2023年   161篇
  2022年   252篇
  2021年   296篇
  2020年   250篇
  2019年   141篇
  2018年   912篇
  2017年   944篇
  2016年   676篇
  2015年   526篇
  2014年   614篇
  2013年   620篇
  2012年   914篇
  2011年   1609篇
  2010年   1407篇
  2009年   1126篇
  2008年   1248篇
  2007年   1401篇
  2006年   565篇
  2005年   478篇
  2004年   521篇
  2003年   591篇
  2002年   670篇
  2001年   602篇
  2000年   446篇
  1999年   524篇
  1998年   376篇
  1997年   390篇
  1996年   346篇
  1995年   305篇
  1994年   301篇
  1993年   263篇
  1992年   218篇
  1991年   220篇
  1990年   189篇
  1989年   152篇
  1988年   148篇
  1987年   83篇
  1986年   42篇
  1985年   20篇
  1984年   5篇
  1983年   3篇
  1980年   4篇
  1979年   2篇
  1978年   1篇
  1974年   2篇
  1973年   1篇
  1967年   1篇
  1960年   1篇
  1955年   6篇
排序方式: 共有10000条查询结果,搜索用时 879 毫秒
991.
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources required for computation are relatively few. However, we find that the leakage of values A V and B V in the CLC protocol will make a man-in-the-middle attack feasible in practice, where A V and B V are the authentication information chosen by the server for the participants A and B. In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial CLC protocol. Meanwhile, we allow that the participants choose their own passwords by themselves, thus avoiding the danger that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that of the CLC protocol.  相似文献   
992.
In this paper,domain decomposition method(DDM) for numerical solutions of mathematical physics equations is improved into dynamic domain decomposition method(DDDM) . The main feature of the DDDM is that the number,shape and volume of the sub-domains are all flexibly changeable during the iterations,so it suits well to be implemented on a reconfigurable parallel computing system. Convergence analysis of the DDDM is given,while an application approach to a weak nonlinear elliptic boundary value problem and a ...  相似文献   
993.
蔡超 《韶关学院学报》2010,31(10):164-166
不同的学习风格产生不尽相同的学习效果,了解学习风格的类型和成因有利于提高学生的学习效率。通过对日语专业学生学习风格的问卷调查研究以及相关数据的统计分析,掌握学生学习风格的总体倾向并深入探讨其成因,有助于引导学生培养多样化的学习风格,以顺利实现人才培养目标。  相似文献   
994.
Within the framework of the regularization theory, a spectral regularization method is introduced and analyzed. The convergence estimate under an appropriate choice of regularization parameter is obtained. A numerical implementation is described. Numerical examples show that the proposed method is effective and stable.  相似文献   
995.
近年来,和顺县委、县政府秉持“和民心、顺民意”的发展理念,急群众所急,想群众所想,把解决乡村冬季取暖工作放在新农村建设的首位,经广大干部群众和科技人员的共同努力,截至目前,取得了非常满意的成绩.已经推广的吊炕和正在推广的农户地暖,很好地解决了乡村冬季取暖的问题,为全省乃至全国有效利用农村可再生能源、促进节能减排、改善生态环境开辟出了一条新路子.  相似文献   
996.
High-speed all-optical logic circuits have attracted much attention because of their important roles in signal processing in next-generation optical networks.The digital encoder is widely used in binary calculation,multiplexing,demultiplexing,address recognition and data encryption.A priority encoder allows the existence of multiple valid inputs simultaneously,identifies the priority of the request signals and encodes the priority.We propose and experimentally demonstrate an all-optical 4-bit priority encoder for return-to-zero signals at 40 Gbit/s based on cross-gain modulation in semiconductor optical amplifiers.Detuning fil-ters after semiconductor optical amplifiers are employed to improve the output performance.Correct logic bit sequences and clear open eye patterns with extinction ratios exceeding 10 dB are achieved.  相似文献   
997.
The approach of available transfer capability (denoted as ATC) incorporating wind generation has been paid very high attention since the development of wind generation. Based on the maximum function, this paper presents an ATC model. The characteristic of the new model is twofold. First, it considers wind turbines connected to power system and static security of power system simultaneously. Second, it is a system of semismooth equations and can be solved easily. By using the smoothing strategy, a smoothing Newton method is adopted for solving the proposed new ATC model. Numerical simulation results of the IEEE 30-bus and 118-bus system show that the new model and algorithm are feasible and effective. The impact of wind turbines connected to power system on ATC is also analyzed.  相似文献   
998.
Mobile genomic islands (GIs) can be excised from the chromosome, then form a circular intermediate and be reintegrated into the chromosome by the GI internal integrase. Some mobile GIs can also be transferred into a new receptor cell by transformation, conjugation, or transduction. The action sites of the integrase are usually flanked direct repeats (DRs) of the GIs. Accurate localization of the flanking sequences is a precondition for determining the mobility of the GI. Mobile GIs are generally associated with transfer RNAs (tRNAs). Based on the correlation between flanking sequences and tRNA sequences, the flanking sequences of 11 putative mobile GIs in Pseudomonas aeruginosa PAO1, P. aeruginosa PA14, P. fluorescens Pf-5 and P. fluorescens Pf0-1 were identified. Among the 11 GIs, Pf0-1GI-1 is responsible for benzoate degradation. PAO1GI-1, Pf5GI-2, Pf5GI-3, and Pf5GI-4 were confirmed experimentally to be excised from a chromosome to form a circular intermediate. The action sites of the integrases are these GIs direct repeats. Due to distinct DRs, cutting sites for the internal integrase of PAO1GI-1, Pf5GI-2, Pf5GI-3 and Pf5GI-4 were determined outside the T-loop of the tRNAGly gene, outside the anticodon loop of the tRNASer gene and tRNALys gene, and at the asymmetric 3′-end of the tRNALeu gene, respectively. PAO1GI-1 and other mobile GIs may be transferred into many different strains that belong to different phyla because of the clear flanking sequences. This study describes basic information about the action sites of the integrases, assesses the mobility of GIs, and can help design and transfer mobile GIs to candidate strains.  相似文献   
999.
The shock compression experiment of liquid helium is an available way to gain properties of specimen at high temperatures and pressures.Based on Fluent,a thermal insulation analysis and design of a liquid helium temperature target in the environment condition of 100 Pa for shock compression experiment is performed.Then,a cryogenic target with a 10 K helium vapor shield and a separated vacuum interval is particularly developed.A lowest temperature of 3.63 K and a stable temperature of 3.70 K in the specimen cavity with an accuracy of 0.1 K are obtained by means of continuous flow and vacuum cooling.Both time-consuming and temperature stability are well-suited to the requirements of the shock compression experiment.The results show that the calculated and experimental data well-matched each other.The simulation method may be effective and feasible for the optimal design of the cryogenic target.  相似文献   
1000.
DNA is the genetic material that contains the "instructions" to not only guide the continuation of life but also govern the development, metabolism and functioning of living organisms. DNA damage occurs daily due to various exogenous (environ-  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号