首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5899篇
  免费   618篇
  国内免费   25篇
系统科学   1083篇
丛书文集   18篇
教育与普及   13篇
理论与方法论   277篇
现状及发展   872篇
研究方法   1篇
综合类   4278篇
  2023年   4篇
  2022年   7篇
  2021年   13篇
  2020年   7篇
  2019年   1篇
  2018年   731篇
  2017年   736篇
  2016年   430篇
  2015年   42篇
  2014年   13篇
  2013年   18篇
  2012年   272篇
  2011年   964篇
  2010年   831篇
  2009年   475篇
  2008年   525篇
  2007年   784篇
  2006年   25篇
  2005年   62篇
  2004年   131篇
  2003年   154篇
  2002年   70篇
  2001年   12篇
  2000年   16篇
  1999年   30篇
  1998年   28篇
  1997年   22篇
  1996年   23篇
  1995年   14篇
  1994年   21篇
  1993年   13篇
  1992年   14篇
  1991年   12篇
  1990年   8篇
  1989年   13篇
  1988年   12篇
  1987年   4篇
  1986年   4篇
  1967年   1篇
排序方式: 共有6542条查询结果,搜索用时 15 毫秒
961.
In uncertain data management, lineages are often used for probability computation of result tuples. However, most of existing works focus on tuple level lineage, which results in imprecise data derivation. Besides, correlations among attributes cannot be captured. In this paper, for base tuples with multiple uncertain attributes, we define attribute level annotation to annotate each attribute. Utilizing these annotations to generate lineages of result tuples can realize more precise derivation. Simultaneously, they can be used for dependency graph construction. Utilizing dependency graph, we can represent not only constraints on schemas but also correlations among attributes. Combining the dependency graph and attribute level lineage, we can correctly compute probabilities of result tuples and precisely derivate data. In experiments, comparing lineage on tuple level and attribute level, it shows that our method has advantages on derivation precision and storage cost.  相似文献   
962.
A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the threshold sharing, a group of t members jointly implement threshold tracking. In order to improve the security of tracking, message recovery equation is used to verify and recover data leaked by the user. Compared with Liu et al’s scheme, the proposed scheme can resist conspiracy tracking and has less computational cost. On the premise of the discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai, and Wolf (LRSW) and Diffie-Hellman (DDH) assumption, the scheme is proved to meet the demands of anonymous authentication. The scheme has broad application prospects in many fields such as ad hoc network, electronic voting, and so on.  相似文献   
963.
This paper presents a systematic method of designing the calibration toolbox of automotive electronic control unit (ECU) based on real-time workshop (RTW). To break the strong coupling of each functional layer, the hierarchical architecture of the calibration system is divided into the bottom driver layer, the intermediate interface layer and the top application layer. The driver functions meeting the specification of the automotive open system are sent and received in the intermediate interface layer. To reduce the development costs, the portable user codes are generated by RTW which provides a development environment from system simulation to hardware implementation. Specifically, the calibration codes yielded from the controller area network (CAN) calibration protocol (CCP) module are integrated into the control codes, called by a compiler in the daemons to build a corresponding project, and then downloaded into the object board to provide the A2L file. The experiments illustrate that the different drive modules are only needed to be replaced for the implementation of the calibration system applied in different hardware platforms.  相似文献   
964.
A class of singular perturbation boundary problem of elliptic equation for higher order is studied. Firstly, under suitable conditions, the generalized outer solution to reduced problems is considered. Then the generalized interior shock asymptotic solution to original problem is constructed by using the theory of generalized functions. Finally, using the fixed point theorem of functional analytic, the uniformly validity of the generalized asymptotic solution with interior shock and boundary layers is proved.  相似文献   
965.
The composite field multiplication is an important and complex module in symmetric cipher algorithms, and its realization performance directly restricts the processing speed of symmetric cipher algorithms. Based on the characteristics of composite field multiplication in symmetric cipher algorithms and the realization principle of its reconfigurable architectures, this paper describes the reconfigurable composite field multiplication over GF((2~8)~k)(k=1,2,3,4) in RISC(reduced instruction set computer) processor and VLIW(very long instruction word) processor architecture, respectively. Through configuration, the architectures can realize the composite field multiplication over GF(2~8), GF((2~8)~2), GF((2~8)~3) and GF((2~8)~4) flexibly and efficiently. We simulated the function of circuits and synthesized the reconfigurable design based on the 0.18 μm CMOS(complementary metal oxide semiconductor) standard cell library and the comparison with other same kind designs. The result shows that the reconfigurable design proposed in the paper can provide higher efficiency under the premise of flexibility.  相似文献   
966.
In the present study, the chemical and mechanical properties and the thermal expansion of a carbon nanotube (CNT)-based crystalline nano-aluminum (nano Al) composite were reported. The properties of nanocomposites were tailored by incorporating CNTs into the nano Al matrix using a physical mixing method. The elastic moduli and the coefficient of thermal expansion (CTE) of the nanocomposites were also estimated to understand the effects of CNT reinforcement in the Al matrix. Microstructural characterization of the nanocomposite reveals that the CNTs are dispersed and embedded in the Al matrix. The experimental results indicate that the incorporation of CNTs into the nano Al matrix results in the increase in hardness and elastic modulus along with a concomitant decrease in the coefficient of thermal expansion. The hardness and elastic modulus of the nanocomposite increase by 21% and 20%, respectively, upon CNT addition. The CTE of CNT/Al nanocomposite decreases to 70% compared with that of nano Al.  相似文献   
967.
A long campaign life of blast furnaces is heavily linked to the existence of a protective layer in their hearths. In this work, we conducted dissection studies and investigated damage in blast furnace hearths to estimate the formation mechanism of the protective layer. The results illustrate that a significant amount of graphite phase was trapped within the hearth protective layer. Furthermore, on the basis of the thermodynamic and kinetic calculations of the graphite precipitation process, a precipitation potential index related to the formation of the graphite-rich protective layer was proposed to characterize the formation ability of this layer. We determined that, under normal operating conditions, the precipitation of graphite phase from hot metal was thermodynamically possible. Among elements that exist in hot metal, C, Si, and P favor graphite precipitation, whereas Mn and Cr inhibit this process. Moreover, at the same hot-face temperature, an increase of carbon concentration in hot metal can shorten the precipitation time. Finally, the results suggest that measures such as reducing the hot-face temperature and increasing the degree of carbon saturation in hot metal are critically important to improve the precipitation potential index.  相似文献   
968.
The morphology and growth kinetics of discontinuous precipitation (DP) in a Cu–20Ni–20Mn alloy were investigated in the temperature range of 523–673 K by optical microscopy, scanning electron microscopy, and transmission electron microscopy. A lamellar mixed structure consisting of alternating lamellae of a matrix and NiMn phase was observed in DP colonies. The volume fraction of regions formed by a DP reaction was determined by quantitative metallographic measurements. The kinetics of DP was evaluated on the basis of the Johnson–Mehl–Avrami–Kolmogorov equation, which resulted in a time exponent of approximately 1.5. We confirmed that the nucleation of the discontinuous precipitate was confined to grain edges or boundaries at an early stage of the reaction. The activation energy of DP process was determined to be approximately (72.7 ±7.2) kJ/mol based on the Arrhenius equation; this result suggests that DP is controlled by grain boundary diffusion. The hardness values exhibited good correlation with the volume fraction of DP; this correlation was attributed to the presence of the ordered NiMn phase.  相似文献   
969.
In this study, aluminum oxide (Al2O3) nanoparticles (NPs) were synthesized via an electrochemical method. The effects of reaction parameters such as supporting electrolytes, solvent, current and electrolysis time on the shape and size of the resulting NPs were investigated. The Al2O3 NPs were characterized by Fourier transform infrared spectroscopy, X-ray diffraction, transmission electron microscopy, thermogravimetric analysis/differential thermal analysis, energy-dispersive X-ray analysis, and ultraviolet–visible spectroscopy. Moreover, the Al2O3 NPs were explored for photocatalytic degradation of malachite green (MG) dye under sunlight irradiation via two processes: adsorption followed by photocatalysis; coupled adsorption and photocatalysis. The coupled process exhibited a higher photodegradation efficiency (45%) compared to adsorption followed by photocatalysis (32%). The obtained kinetic data was well fitted using a pseudo-first-order model for MG degradation.  相似文献   
970.
A better understanding of droplet formation and dripping behavior would be useful in the efficient removal of impurity elements and nonmetallic inclusions from liquid metals. In the present work, we developed a transparent experimental apparatus to study the mechanisms of droplet formation and the effects of filling ratio on droplet behavior during the electroslag remelting (ESR) process. A high-speed camera was used to clearly observe, at small time scales, the droplet formation and dripping phenomenon at the slag/metal interface during a stable ESR process. The results illustrate that a two-stage process for droplet formation and dripping occurs during the ESR process and that the droplet diameter exhibits a parabolic distribution with increasing filling ratio because of the different shape and thermal state of the electrode tip. This work also confirms that a relatively large filling ratio reduces electricity consumption and improves ingot quality.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号