全文获取类型
收费全文 | 65897篇 |
免费 | 1947篇 |
国内免费 | 3281篇 |
专业分类
系统科学 | 2672篇 |
丛书文集 | 2216篇 |
教育与普及 | 2265篇 |
理论与方法论 | 254篇 |
现状及发展 | 299篇 |
研究方法 | 170篇 |
综合类 | 63238篇 |
自然研究 | 11篇 |
出版年
2024年 | 285篇 |
2023年 | 779篇 |
2022年 | 1194篇 |
2021年 | 1253篇 |
2020年 | 890篇 |
2019年 | 391篇 |
2018年 | 578篇 |
2017年 | 765篇 |
2016年 | 800篇 |
2015年 | 1655篇 |
2014年 | 2322篇 |
2013年 | 2234篇 |
2012年 | 2436篇 |
2011年 | 2881篇 |
2010年 | 2829篇 |
2009年 | 3147篇 |
2008年 | 3565篇 |
2007年 | 3428篇 |
2006年 | 2741篇 |
2005年 | 2669篇 |
2004年 | 1947篇 |
2003年 | 1800篇 |
2002年 | 2270篇 |
2001年 | 2145篇 |
2000年 | 2081篇 |
1999年 | 3148篇 |
1998年 | 2730篇 |
1997年 | 2768篇 |
1996年 | 2578篇 |
1995年 | 2278篇 |
1994年 | 2000篇 |
1993年 | 1674篇 |
1992年 | 1511篇 |
1991年 | 1354篇 |
1990年 | 1165篇 |
1989年 | 1020篇 |
1988年 | 862篇 |
1987年 | 528篇 |
1986年 | 275篇 |
1985年 | 103篇 |
1984年 | 21篇 |
1983年 | 6篇 |
1982年 | 2篇 |
1981年 | 4篇 |
1979年 | 2篇 |
1968年 | 2篇 |
1966年 | 1篇 |
1965年 | 1篇 |
1963年 | 1篇 |
1955年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 906 毫秒
61.
数字调制方式的识别研究 总被引:5,自引:0,他引:5
数字调制方式的识别对于通信信号分析有着重要的作用 .此文首先介绍了数字调制方式的识别算法(DMRA) ,即判决理论算法的原理 ;然后提出了一种基于该算法的判决流程 ;最后在软件环境中进行计算机仿真 ,通过实验数据对该算法进行修正 .仿真结果表明 ,该修正算法具有较高的识别率和良好的可行性 . 相似文献
62.
采用密度泛函理论(DFT)中的B3LYP方法, 在6-311+G(2df)基组水平上, 对气相赖氨酸(Lys)分子和Lys2-的基态稳定构型进行优化, 并用含时密度泛函理论(TD DFT)方法考察气相Lys分子和带电离子体系单重激发态的特性. 结果表明: Lys分子体系捕获双电子时, 其体系能量有所增加; S1单重激发态与S0基态能量差值变小; 分子体系的荧光波长增加; S7单重激发态跃迁轨道数减少. 相似文献
63.
介绍了CALIS分布式联合虚拟参考咨询系统CDCVRS,在调查排名前50位的大学图书馆使用CDCVRS的情况基础上,总结了CDCVRS使用过程中存在的问题,提出了相应的解决办法。 相似文献
64.
对用磷酸脲的结晶母液合成的氮-磷膨高效胀型阻燃剂性能进行了研究,测定了经该阻燃剂处理后的木材的耐火性能和使用性能。实验结果表明,该阻燃剂具有良好的木材阻燃性能,用该阻燃剂处理后的木材各项综合性能均较理想,是一种高效的木材阻燃剂,可以广泛用于木材阻燃。 相似文献
65.
Static extracting method of software intended behavior based on API functions invoking 总被引:1,自引:0,他引:1
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack. 相似文献
66.
67.
High-density event-related potentials (ERPs) were measured when participants were required to evaluate oneself, significant others (father and mother) and the most familiar public figures (Lei Feng and Jiang Qing) based on trait adjectives. There were three referential conditions and a non-referential control condition including self-evaluation (SE), significant other-evaluation (SOE), general other-evaluation (GOE), and semantic positivity-evaluation (SPE). The behavioral data showed that RTs to GOE condition were longer than the other three conditions. Scalp ERP analysis revealed that (1) SPE condition elicited a more negative N2 than SE condition, which was associated with inhibition of responses; (2) SE condition elicited a more positive P300 than SPE condition, which was an index of attention to self-relevant stimuli; (3) there was no difference on the amplitude and latency of P300 between SE and SOE conditions, which reflected that the concept of “self” included intimate others (e.g., father and mother) in Chinese culture. 相似文献
68.
XIANG Guang-li CHEN Xin-meng ZHU Ping MA Jie 《武汉大学学报:自然科学英文版》2006,11(1):181-184
The existing homomorphie eneryption scheme is based on ring of the integer, and the possible operators are restricted to addition and multiplication only. In this paper, a new operation is defined Similar Modul. Base on the Similar Modul, the number sets of the homomorphic encryption scheme is extended to real number, and the possible operators are extended to addition, subtraction, multiplication and division. Our new approach provides a practical ways of implementation because of the extension of the operators and the number sets. 相似文献
69.
Duan Jinqing Liu Hongbin Zhang Xinian Lu Hongmin Gou Ai Liu Zheng Wang Tao Ge Rili 《中国工程科学》2006,4(2):183-186
Study Objective: To compare and analyze the changes of the pulmonary-artery pressure of the migrants coming from different elevation in the hypoxic environment of 4636 - 4907 m extreme altitude. To explore the susceptibility to hypoxic pulmonary-artery hypertension (PH) in the subjects from different altitude and profession. Methods: By using Color Doppler Ultmsonography (CDU), measuring the pulmonary-artery pressure of 207 healthy men, who had continuously being lived and worked at the extreme altitude for more than six months, and then were divided into three groups according to their profession and the altitude of original living place. Results: There was a significant difference in the outcomes of pulmonary-artery pressure from the 3 groups. Conclusions: Altitude of original living place, labor intensity are some of factors that impact the pulmonary-artery pressure of the people who exposure to a hypoxic environment. The pulmonary- artery pressure of person without strenuously physical work experience was more sensitive to hypoxic surroundings than that of labor workers. It was not always the fact at an extreme altitude that the moderate altitude mountaineers were superior to other migrants from a lower altitude or plain. The higher PH was found in the groups of the moderate altitude mountaineers and labor workers. It is unlikely certain that one with PH would surfer from HAPE. 相似文献
70.
以一维有缺陷混凝土板为研究对象,分别采用Leverberg-Marcluardt和径向基神经网络算法,对缺陷的深度与厚度进行识别,从而实现对混凝土板内部缺陷的三维重构,称为红外CT模拟.两类神经网络算法的识别结果表明:Leverberg-Marcluardt神经网络较径向基神经网络具有更好的收敛精度与计算效率. 相似文献