首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6365篇
  免费   628篇
  国内免费   34篇
系统科学   1087篇
丛书文集   2篇
教育与普及   3篇
理论与方法论   285篇
现状及发展   1056篇
研究方法   131篇
综合类   4437篇
自然研究   26篇
  2020年   5篇
  2019年   5篇
  2018年   732篇
  2017年   739篇
  2016年   437篇
  2015年   41篇
  2014年   21篇
  2013年   20篇
  2012年   323篇
  2011年   1039篇
  2010年   845篇
  2009年   477篇
  2008年   557篇
  2007年   826篇
  2006年   54篇
  2005年   103篇
  2004年   159篇
  2003年   210篇
  2002年   108篇
  2001年   40篇
  2000年   43篇
  1999年   20篇
  1996年   4篇
  1992年   10篇
  1991年   10篇
  1990年   4篇
  1989年   10篇
  1988年   9篇
  1987年   9篇
  1986年   5篇
  1985年   9篇
  1983年   3篇
  1982年   6篇
  1981年   7篇
  1980年   8篇
  1979年   8篇
  1978年   7篇
  1977年   10篇
  1976年   5篇
  1975年   9篇
  1974年   5篇
  1973年   9篇
  1972年   3篇
  1971年   9篇
  1970年   9篇
  1969年   7篇
  1968年   5篇
  1967年   8篇
  1966年   5篇
  1965年   7篇
排序方式: 共有7027条查询结果,搜索用时 171 毫秒
921.
Varieties of trusted computing products usually follow the mechanism of liner-style chain of trust according to the specifications of TCG. The distinct advantage is that the compatibility with the existing computing platform is preferable, while the shortcomings are obvious simultaneously. A new star-style trust model with the ability of data recovery is proposed in this paper. The model can enhance the hardware-based root of trust in platform measurement, reduce the loss of trust during transfer process, extend the border of trust flexibly, and have the ability of data backup and recovery. The security and reliability of system is much more improved. It is proved that the star-style trust model is much better than the liner-style trust model in trust transfer and boundary extending etc. using formal methods in this paper. We illuminate the design and implementation of a kind of trusted PDA acting on star-style trust model.  相似文献   
922.
In uncertain data management, lineages are often used for probability computation of result tuples. However, most of existing works focus on tuple level lineage, which results in imprecise data derivation. Besides, correlations among attributes cannot be captured. In this paper, for base tuples with multiple uncertain attributes, we define attribute level annotation to annotate each attribute. Utilizing these annotations to generate lineages of result tuples can realize more precise derivation. Simultaneously, they can be used for dependency graph construction. Utilizing dependency graph, we can represent not only constraints on schemas but also correlations among attributes. Combining the dependency graph and attribute level lineage, we can correctly compute probabilities of result tuples and precisely derivate data. In experiments, comparing lineage on tuple level and attribute level, it shows that our method has advantages on derivation precision and storage cost.  相似文献   
923.
A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the threshold sharing, a group of t members jointly implement threshold tracking. In order to improve the security of tracking, message recovery equation is used to verify and recover data leaked by the user. Compared with Liu et al’s scheme, the proposed scheme can resist conspiracy tracking and has less computational cost. On the premise of the discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai, and Wolf (LRSW) and Diffie-Hellman (DDH) assumption, the scheme is proved to meet the demands of anonymous authentication. The scheme has broad application prospects in many fields such as ad hoc network, electronic voting, and so on.  相似文献   
924.
This paper presents a systematic method of designing the calibration toolbox of automotive electronic control unit (ECU) based on real-time workshop (RTW). To break the strong coupling of each functional layer, the hierarchical architecture of the calibration system is divided into the bottom driver layer, the intermediate interface layer and the top application layer. The driver functions meeting the specification of the automotive open system are sent and received in the intermediate interface layer. To reduce the development costs, the portable user codes are generated by RTW which provides a development environment from system simulation to hardware implementation. Specifically, the calibration codes yielded from the controller area network (CAN) calibration protocol (CCP) module are integrated into the control codes, called by a compiler in the daemons to build a corresponding project, and then downloaded into the object board to provide the A2L file. The experiments illustrate that the different drive modules are only needed to be replaced for the implementation of the calibration system applied in different hardware platforms.  相似文献   
925.
A class of singular perturbation boundary problem of elliptic equation for higher order is studied. Firstly, under suitable conditions, the generalized outer solution to reduced problems is considered. Then the generalized interior shock asymptotic solution to original problem is constructed by using the theory of generalized functions. Finally, using the fixed point theorem of functional analytic, the uniformly validity of the generalized asymptotic solution with interior shock and boundary layers is proved.  相似文献   
926.
The composite field multiplication is an important and complex module in symmetric cipher algorithms, and its realization performance directly restricts the processing speed of symmetric cipher algorithms. Based on the characteristics of composite field multiplication in symmetric cipher algorithms and the realization principle of its reconfigurable architectures, this paper describes the reconfigurable composite field multiplication over GF((2~8)~k)(k=1,2,3,4) in RISC(reduced instruction set computer) processor and VLIW(very long instruction word) processor architecture, respectively. Through configuration, the architectures can realize the composite field multiplication over GF(2~8), GF((2~8)~2), GF((2~8)~3) and GF((2~8)~4) flexibly and efficiently. We simulated the function of circuits and synthesized the reconfigurable design based on the 0.18 μm CMOS(complementary metal oxide semiconductor) standard cell library and the comparison with other same kind designs. The result shows that the reconfigurable design proposed in the paper can provide higher efficiency under the premise of flexibility.  相似文献   
927.
In the present study, the chemical and mechanical properties and the thermal expansion of a carbon nanotube (CNT)-based crystalline nano-aluminum (nano Al) composite were reported. The properties of nanocomposites were tailored by incorporating CNTs into the nano Al matrix using a physical mixing method. The elastic moduli and the coefficient of thermal expansion (CTE) of the nanocomposites were also estimated to understand the effects of CNT reinforcement in the Al matrix. Microstructural characterization of the nanocomposite reveals that the CNTs are dispersed and embedded in the Al matrix. The experimental results indicate that the incorporation of CNTs into the nano Al matrix results in the increase in hardness and elastic modulus along with a concomitant decrease in the coefficient of thermal expansion. The hardness and elastic modulus of the nanocomposite increase by 21% and 20%, respectively, upon CNT addition. The CTE of CNT/Al nanocomposite decreases to 70% compared with that of nano Al.  相似文献   
928.
Comparative voltammetry and differential double-layer capacitance studies were performed to evaluate interfacial interactions between chalcopyrite (CuFeS2) and n-isopropyl xanthate (X) in the presence of ammonium bisulfite/39wt% SO2 and caustic starch at different pH values. Raman spectroscopy, Fourier transform infrared (FTIR) spectroscopy, contact angle measurements, and microflotation tests were used to establish the type and extent of xanthate adsorption as well as the species involved under different mineral surface conditions in this study. The results demonstrate that the species that favor a greater hydrophobicity of chalcopyrite are primarily CuX and S0, whereas oxides and hydroxides of Cu and Fe as well as an excess of starch decrease the hydrophobicity. A conditioning of the mineral surface with ammonium bisulfite/39wt% SO2 at pH 6 promotes the activation of surface and enhances the xanthate adsorption. However, this effect is diminished at pH ≥ 8, when an excess of starch is added during the preconditioning step.  相似文献   
929.
A long campaign life of blast furnaces is heavily linked to the existence of a protective layer in their hearths. In this work, we conducted dissection studies and investigated damage in blast furnace hearths to estimate the formation mechanism of the protective layer. The results illustrate that a significant amount of graphite phase was trapped within the hearth protective layer. Furthermore, on the basis of the thermodynamic and kinetic calculations of the graphite precipitation process, a precipitation potential index related to the formation of the graphite-rich protective layer was proposed to characterize the formation ability of this layer. We determined that, under normal operating conditions, the precipitation of graphite phase from hot metal was thermodynamically possible. Among elements that exist in hot metal, C, Si, and P favor graphite precipitation, whereas Mn and Cr inhibit this process. Moreover, at the same hot-face temperature, an increase of carbon concentration in hot metal can shorten the precipitation time. Finally, the results suggest that measures such as reducing the hot-face temperature and increasing the degree of carbon saturation in hot metal are critically important to improve the precipitation potential index.  相似文献   
930.
The morphology and growth kinetics of discontinuous precipitation (DP) in a Cu–20Ni–20Mn alloy were investigated in the temperature range of 523–673 K by optical microscopy, scanning electron microscopy, and transmission electron microscopy. A lamellar mixed structure consisting of alternating lamellae of a matrix and NiMn phase was observed in DP colonies. The volume fraction of regions formed by a DP reaction was determined by quantitative metallographic measurements. The kinetics of DP was evaluated on the basis of the Johnson–Mehl–Avrami–Kolmogorov equation, which resulted in a time exponent of approximately 1.5. We confirmed that the nucleation of the discontinuous precipitate was confined to grain edges or boundaries at an early stage of the reaction. The activation energy of DP process was determined to be approximately (72.7 ±7.2) kJ/mol based on the Arrhenius equation; this result suggests that DP is controlled by grain boundary diffusion. The hardness values exhibited good correlation with the volume fraction of DP; this correlation was attributed to the presence of the ordered NiMn phase.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号