全文获取类型
收费全文 | 13873篇 |
免费 | 519篇 |
国内免费 | 578篇 |
专业分类
系统科学 | 490篇 |
丛书文集 | 505篇 |
教育与普及 | 362篇 |
理论与方法论 | 88篇 |
现状及发展 | 56篇 |
研究方法 | 41篇 |
综合类 | 13425篇 |
自然研究 | 3篇 |
出版年
2024年 | 60篇 |
2023年 | 162篇 |
2022年 | 243篇 |
2021年 | 251篇 |
2020年 | 181篇 |
2019年 | 73篇 |
2018年 | 118篇 |
2017年 | 131篇 |
2016年 | 127篇 |
2015年 | 317篇 |
2014年 | 391篇 |
2013年 | 371篇 |
2012年 | 409篇 |
2011年 | 489篇 |
2010年 | 432篇 |
2009年 | 536篇 |
2008年 | 600篇 |
2007年 | 635篇 |
2006年 | 521篇 |
2005年 | 484篇 |
2004年 | 358篇 |
2003年 | 342篇 |
2002年 | 337篇 |
2001年 | 389篇 |
2000年 | 401篇 |
1999年 | 839篇 |
1998年 | 668篇 |
1997年 | 774篇 |
1996年 | 673篇 |
1995年 | 634篇 |
1994年 | 528篇 |
1993年 | 469篇 |
1992年 | 426篇 |
1991年 | 375篇 |
1990年 | 343篇 |
1989年 | 299篇 |
1988年 | 257篇 |
1987年 | 196篇 |
1986年 | 92篇 |
1985年 | 31篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1955年 | 2篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
891.
LIU Gang ZHOU Jingli SUN Yufen QIN Leihua 《武汉大学学报:自然科学英文版》2006,11(6):1453-1456
Fault-tolerance is increasingly significant for large-scale storage systems in which Byzantine failure of storage nodes may happen. Traditional Byzantine Quorum systems that tolerate Byzantine failures by using replication have two main limitations: low space-efficiency and static quorum variables. We propose an Erasure-code Byzantine Fault-tolerance Quorum that can provide high reliability with far lower storage overhead than replication by adopting erasure code as redundancy scheme. Through read/write operations of clients and diagnose operation of supervisor, our Quorum system can detect Byzantine nodes, and dynamically adjust system size and fault threshold. Simulation results show that our method improves performance for the Quorum with relatively small quorums. 相似文献
892.
In recent years, with the development of 3D data acquisition equipments, the study on reverse engineering has become more and more important. However, the existing methods for parameterization can hardly ensure that the parametric domain is rectangular, and the parametric curve grid is regular. In order to overcome these limitations, we present a novel method for parameterization of triangular meshes in this paper. The basic idea is twofold: first, because the isotherms in the steady temperature do not intersect with each other, and are distributed uniformly, no singularity (fold-over) exists in the parameterization; second, a 3D harmonic equation is solved by the finite element method to obtain the steady temperature field on a 2D triangular mesh surface with four boundaries. Therefore, our proposed method avoids the embarrassment that it is impossible to solve the 2D quasi-harmonic equation on the 2D triangular mesh without the parametric values at mesh vertices. Furthermore, the isotherms on the temperature field are taken as a set of iso-parametric curves on the triangular mesh surface. The other set of iso-parametric curves can be obtained by connecting the points with the same chord-length on the isotherms sequentially. The obtained parametric curve grid is regular, and distributed uniformly, and can map the triangular mesh surface to the unit square domain with boundaries of mesh surface to boundaries of parametric domain, which ensures that the triangular mesh surface or point cloud can be fitted with the NURBS surface. 相似文献
893.
Radio frequency interference (RFI) is a major problem in high-frequency (HF) radars. Conventional filtering-involved RFI suppression methods may introduce distortions to the target signals of interest and often demand extra hardware costs. In this paper, a novel method for RFI suppression by using linearly or randomly phase-modulated (PM) chirps is proposed, which enables independent analyses of the target signal and the RFI. Furthermore, the directions of arrival (DOA) of the interference are used as constraints to ensure a better DOA estimation of the target. The effectiveness of the method is demonstrated by numerical simulation results. The method can greatly improve the anti-interference capabilities of HF radars and is extremely applicable in the portable and low-cost radar systems. 相似文献
894.
This paper proposes a checking method based on mutual instances and discusses three key problems in the method: how to deal with mistakes in the mutual instances and how to deal with too many or too few mutual instances. It provides the checking based on the weighted mutual instances considering fault tolerance, gives a way to partition the large-scale mutual instances, and proposes a process greatly reducing the manual annotation work to get more mutual instances. Intension annotation that improves the checking method is also discussed. The method is practical and effective to check subsumption relations between concept queries in different ontologies based on mutual instances. 相似文献
895.
PAN Ding SHEN Jun-yi ZHOU Mu-xin 《武汉大学学报:自然科学英文版》2006,11(1):165-169
0 IntroductionTeosda,yth meyan hya voerg daantiazbaatisoenss t hhaatv ec hmaonrgee t ahnadn glarrogwe cdoatnatibnaus--ously. One of the i mportant research issues is incrementalmining. Otherwise, various researchers have made sugges-tions that domain knowledge should be incorporated intoknowledge discovery ( KDD) process[1]. We focus on somesteps of the KDDprocess-those steps tying up with data min-ing,called a data mining (DM) process .Agrawalet al[2]showed an active data mining process ,… 相似文献
896.
作业迁移是实现网格作业服务质量保证和系统高效能的重要方法,在分析了传统进程迁移技术的基础上,根据网格系统的特点,提出了一种基于代理的网格作业全局自适应迁移模型,通过设计网格作业全局自适应迁移对象选定原则、迁移时机确定机制和作业迁移信息监控管理,解决了网格环境下作业迁移的关键问题.试验结果以及在西北工业大学校园计算网格中的实际应用验证了模型的有效性. 相似文献
897.
为分析某热轧厂R2轧机传动轴断裂的原因,对该轧机在典型工况下传动轴受力状况进行了现场试验研究,采用现代设计方法对传动轴进行分析,结果表明,平衡力产生的弯矩造成轴的应力集中而导致断裂。根据此结果对轴的结构进行了改进。 相似文献
898.
899.
900.
指出一种可抵抗敏感性攻击的水印方案仍然存在安全漏洞,攻击者对2个不同的临界信号分别实施敏感性攻击得到2个估计信号,然后将这2个信号做和或做差,便可得到有效的攻击信号,在含水印的媒体内容中迭加此攻击信号,便可去除合法水印,即使进一步改进水印方案、增加模板数量来增强水印安全性,攻击者依然可以通过多次尝试获得有效的攻击信号,进而删除水印,实验结果表明这种增强的敏感性攻击方法可以在保持高视觉质量的条件下去除水印。 相似文献