全文获取类型
收费全文 | 18597篇 |
免费 | 1222篇 |
国内免费 | 791篇 |
专业分类
系统科学 | 1817篇 |
丛书文集 | 410篇 |
教育与普及 | 339篇 |
理论与方法论 | 322篇 |
现状及发展 | 930篇 |
研究方法 | 42篇 |
综合类 | 16748篇 |
自然研究 | 2篇 |
出版年
2024年 | 35篇 |
2023年 | 161篇 |
2022年 | 252篇 |
2021年 | 296篇 |
2020年 | 250篇 |
2019年 | 141篇 |
2018年 | 912篇 |
2017年 | 944篇 |
2016年 | 676篇 |
2015年 | 526篇 |
2014年 | 614篇 |
2013年 | 620篇 |
2012年 | 914篇 |
2011年 | 1609篇 |
2010年 | 1407篇 |
2009年 | 1126篇 |
2008年 | 1248篇 |
2007年 | 1401篇 |
2006年 | 565篇 |
2005年 | 478篇 |
2004年 | 521篇 |
2003年 | 591篇 |
2002年 | 670篇 |
2001年 | 602篇 |
2000年 | 446篇 |
1999年 | 524篇 |
1998年 | 376篇 |
1997年 | 390篇 |
1996年 | 346篇 |
1995年 | 305篇 |
1994年 | 301篇 |
1993年 | 263篇 |
1992年 | 218篇 |
1991年 | 220篇 |
1990年 | 189篇 |
1989年 | 152篇 |
1988年 | 148篇 |
1987年 | 83篇 |
1986年 | 42篇 |
1985年 | 20篇 |
1984年 | 5篇 |
1983年 | 3篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1974年 | 2篇 |
1973年 | 1篇 |
1967年 | 1篇 |
1960年 | 1篇 |
1955年 | 6篇 |
排序方式: 共有10000条查询结果,搜索用时 879 毫秒
991.
The CLC protocol (proposed by Tzung-Her Chen, Wei-Bin Lee and Hsing-Bai Chen, CLC, for short) is a new three-party password-authenticated
key exchange (3PAKE) protocol. This CLC protocol provides a superior round efficiency (only three rounds), and its resources
required for computation are relatively few. However, we find that the leakage of values A
V
and B
V
in the CLC protocol will make a man-in-the-middle attack feasible in practice, where A
V
and B
V
are the authentication information chosen by the server for the participants A and B. In this paper, we describe our attack on the CLC protocol and further present a modified 3PAKE protocol, which is essentially
an improved CLC protocol. Our protocol can resist attacks available, including man-in-the-middle attack we mount on the initial
CLC protocol. Meanwhile, we allow that the participants choose their own passwords by themselves, thus avoiding the danger
that the server is controlled in the initialization phase. Also, the computational cost of our protocol is lower than that
of the CLC protocol. 相似文献
992.
In this paper,domain decomposition method(DDM) for numerical solutions of mathematical physics equations is improved into dynamic domain decomposition method(DDDM) . The main feature of the DDDM is that the number,shape and volume of the sub-domains are all flexibly changeable during the iterations,so it suits well to be implemented on a reconfigurable parallel computing system. Convergence analysis of the DDDM is given,while an application approach to a weak nonlinear elliptic boundary value problem and a ... 相似文献
993.
不同的学习风格产生不尽相同的学习效果,了解学习风格的类型和成因有利于提高学生的学习效率。通过对日语专业学生学习风格的问卷调查研究以及相关数据的统计分析,掌握学生学习风格的总体倾向并深入探讨其成因,有助于引导学生培养多样化的学习风格,以顺利实现人才培养目标。 相似文献
994.
Within the framework of the regularization theory, a spectral regularization method is introduced and analyzed. The convergence estimate under an appropriate choice of regularization parameter is obtained. A numerical implementation is described. Numerical examples show that the proposed method is effective and stable. 相似文献
995.
近年来,和顺县委、县政府秉持“和民心、顺民意”的发展理念,急群众所急,想群众所想,把解决乡村冬季取暖工作放在新农村建设的首位,经广大干部群众和科技人员的共同努力,截至目前,取得了非常满意的成绩.已经推广的吊炕和正在推广的农户地暖,很好地解决了乡村冬季取暖的问题,为全省乃至全国有效利用农村可再生能源、促进节能减排、改善生态环境开辟出了一条新路子. 相似文献
996.
High-speed all-optical logic circuits have attracted much attention because of their important roles in signal processing in next-generation optical networks.The digital encoder is widely used in binary calculation,multiplexing,demultiplexing,address recognition and data encryption.A priority encoder allows the existence of multiple valid inputs simultaneously,identifies the priority of the request signals and encodes the priority.We propose and experimentally demonstrate an all-optical 4-bit priority encoder for return-to-zero signals at 40 Gbit/s based on cross-gain modulation in semiconductor optical amplifiers.Detuning fil-ters after semiconductor optical amplifiers are employed to improve the output performance.Correct logic bit sequences and clear open eye patterns with extinction ratios exceeding 10 dB are achieved. 相似文献
997.
The approach of available transfer capability (denoted as ATC) incorporating wind generation has been paid very high attention
since the development of wind generation. Based on the maximum function, this paper presents an ATC model. The characteristic
of the new model is twofold. First, it considers wind turbines connected to power system and static security of power system
simultaneously. Second, it is a system of semismooth equations and can be solved easily. By using the smoothing strategy,
a smoothing Newton method is adopted for solving the proposed new ATC model. Numerical simulation results of the IEEE 30-bus
and 118-bus system show that the new model and algorithm are feasible and effective. The impact of wind turbines connected
to power system on ATC is also analyzed. 相似文献
998.
Mobile genomic islands (GIs) can be excised from the chromosome, then form a circular intermediate and be reintegrated into
the chromosome by the GI internal integrase. Some mobile GIs can also be transferred into a new receptor cell by transformation,
conjugation, or transduction. The action sites of the integrase are usually flanked direct repeats (DRs) of the GIs. Accurate
localization of the flanking sequences is a precondition for determining the mobility of the GI. Mobile GIs are generally
associated with transfer RNAs (tRNAs). Based on the correlation between flanking sequences and tRNA sequences, the flanking
sequences of 11 putative mobile GIs in Pseudomonas aeruginosa PAO1, P. aeruginosa PA14, P. fluorescens Pf-5 and P. fluorescens Pf0-1 were identified. Among the 11 GIs, Pf0-1GI-1 is responsible for benzoate degradation. PAO1GI-1, Pf5GI-2, Pf5GI-3, and
Pf5GI-4 were confirmed experimentally to be excised from a chromosome to form a circular intermediate. The action sites of
the integrases are these GIs direct repeats. Due to distinct DRs, cutting sites for the internal integrase of PAO1GI-1, Pf5GI-2,
Pf5GI-3 and Pf5GI-4 were determined outside the T-loop of the tRNAGly gene, outside the anticodon loop of the tRNASer gene and tRNALys gene, and at the asymmetric 3′-end of the tRNALeu gene, respectively. PAO1GI-1 and other mobile GIs may be transferred into many different strains that belong to different
phyla because of the clear flanking sequences. This study describes basic information about the action sites of the integrases,
assesses the mobility of GIs, and can help design and transfer mobile GIs to candidate strains. 相似文献
999.
The shock compression experiment of liquid helium is an available way to gain properties of specimen at high temperatures and pressures.Based on Fluent,a thermal insulation analysis and design of a liquid helium temperature target in the environment condition of 100 Pa for shock compression experiment is performed.Then,a cryogenic target with a 10 K helium vapor shield and a separated vacuum interval is particularly developed.A lowest temperature of 3.63 K and a stable temperature of 3.70 K in the specimen cavity with an accuracy of 0.1 K are obtained by means of continuous flow and vacuum cooling.Both time-consuming and temperature stability are well-suited to the requirements of the shock compression experiment.The results show that the calculated and experimental data well-matched each other.The simulation method may be effective and feasible for the optimal design of the cryogenic target. 相似文献
1000.
DNA damage,signaling and repair: Protecting genomic integrity and reducing the risk of human disease
PingKun Zhou 《科学通报(英文版)》2011,56(30):3119-3121
DNA is the genetic material that contains the "instructions" to not only guide the continuation of life but also govern the development, metabolism and functioning of living organisms. DNA damage occurs daily due to various exogenous (environ- 相似文献