全文获取类型
收费全文 | 43569篇 |
免费 | 1883篇 |
国内免费 | 2189篇 |
专业分类
系统科学 | 2823篇 |
丛书文集 | 1213篇 |
教育与普及 | 928篇 |
理论与方法论 | 419篇 |
现状及发展 | 1082篇 |
研究方法 | 94篇 |
综合类 | 41073篇 |
自然研究 | 9篇 |
出版年
2024年 | 164篇 |
2023年 | 455篇 |
2022年 | 842篇 |
2021年 | 863篇 |
2020年 | 657篇 |
2019年 | 375篇 |
2018年 | 1162篇 |
2017年 | 1272篇 |
2016年 | 1064篇 |
2015年 | 1316篇 |
2014年 | 1771篇 |
2013年 | 1752篇 |
2012年 | 2159篇 |
2011年 | 2961篇 |
2010年 | 2741篇 |
2009年 | 2625篇 |
2008年 | 2837篇 |
2007年 | 3075篇 |
2006年 | 1850篇 |
2005年 | 1719篇 |
2004年 | 1371篇 |
2003年 | 1066篇 |
2002年 | 1101篇 |
2001年 | 965篇 |
2000年 | 968篇 |
1999年 | 1368篇 |
1998年 | 1213篇 |
1997年 | 1234篇 |
1996年 | 1111篇 |
1995年 | 918篇 |
1994年 | 874篇 |
1993年 | 770篇 |
1992年 | 627篇 |
1991年 | 616篇 |
1990年 | 482篇 |
1989年 | 442篇 |
1988年 | 403篇 |
1987年 | 228篇 |
1986年 | 129篇 |
1985年 | 42篇 |
1984年 | 10篇 |
1983年 | 5篇 |
1982年 | 3篇 |
1981年 | 5篇 |
1980年 | 5篇 |
1973年 | 3篇 |
1970年 | 2篇 |
1968年 | 3篇 |
1967年 | 2篇 |
1955年 | 5篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
61.
Static extracting method of software intended behavior based on API functions invoking 总被引:1,自引:0,他引:1
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack. 相似文献
62.
XIE Xianjian WEI Fangqiang BAI Jingwen LAI Ting 《武汉大学学报:自然科学英文版》2007,12(4):729-736
In this experiment, using the methods of drought-stress in the pot and PEG simulative drought-stress, three native rocky-slope grasses Pogonatherum panideum(Lam.) Hack, Erioophorum comosum nees and Cynodon dactylon cultivated in the pots were selected as materials to study their drought-resistance by analyzing the indexes such as the leaf area index, the drying roots accumulation, the holding water ability of leaf, the relative conductance of leaf, the soluble protein, chlorophyll. At the same time, by comparing with membership function value of each index, the order of each grass drought-resistance was decided. The results showed that the drought-resistance of Erioophorum comosum nees was stronger than Cynodon dactylon and drought-resistance of Cynodon dactylon was stronger than Pogonatherum panideum (Lam.) Hack. The purpose of the experimental results was to find theoretical foundations for selecting and cultivating native protecting-slope vegetations to adapt to rocky slopes. 相似文献
63.
WANG Xibo ZHOU Benhai YU Gei LI Qian 《武汉大学学报:自然科学英文版》2007,12(5):946-950
μC/OS-Ⅱ is an open source real-time kernel adopting priority preemptive schedule strategy. Aiming at the problem of μC/OS-Ⅱ failing to support homology priority tasks scheduling, an approach for solution is proposed. The basic idea is adding round-robin scheduling strategy in its original scheduler in order to schedule homology priority tasks through time slice roundrobin. Implementation approach is given in detail. Firstly, the Task Control Block (TCB) is extended. And then, a new priority index table is created, in which each index pointer points to a set of homology priority tasks. Eventually, on the basis of reconstructing μC/OS-Ⅱ real-time kernel, task scheduling module is rewritten. Otherwise, schedulability of homology task supported by modified kernel had been analyzed, and deadline formula of created homology tasks is given. By theoretical analysis and experiment verification, the modified kernel can support homology priority tasks scheduling, meanwhile, it also remains preemptive property of original μC/OS-Ⅱ. 相似文献
64.
High-density event-related potentials (ERPs) were measured when participants were required to evaluate oneself, significant others (father and mother) and the most familiar public figures (Lei Feng and Jiang Qing) based on trait adjectives. There were three referential conditions and a non-referential control condition including self-evaluation (SE), significant other-evaluation (SOE), general other-evaluation (GOE), and semantic positivity-evaluation (SPE). The behavioral data showed that RTs to GOE condition were longer than the other three conditions. Scalp ERP analysis revealed that (1) SPE condition elicited a more negative N2 than SE condition, which was associated with inhibition of responses; (2) SE condition elicited a more positive P300 than SPE condition, which was an index of attention to self-relevant stimuli; (3) there was no difference on the amplitude and latency of P300 between SE and SOE conditions, which reflected that the concept of “self” included intimate others (e.g., father and mother) in Chinese culture. 相似文献
65.
灾害的破坏程度不仅取决于地震能量(受控于现代构造应力场的特征),同时也受岩溶塌陷,采空区塌陷等其他灾害的影响,故采用人工神经网络模型评价灾害危险性。借助地理信息系统软件,计算了唐山市各居住小区的建筑密度和建筑容积率,结合灾害危险性评价结果。确定了从防灾角度考虑的土地开发强度评价指标。应用Maplnfo自带二次开发语言MapBasic及Visual Basic进行二次开发,炳述了二次开发的步骤和过程。依据系统评价结果,对唐山市的城市规划布局和土地利用方向提出了几点建议。 相似文献
66.
XIANG Guang-li CHEN Xin-meng ZHU Ping MA Jie 《武汉大学学报:自然科学英文版》2006,11(1):181-184
The existing homomorphie eneryption scheme is based on ring of the integer, and the possible operators are restricted to addition and multiplication only. In this paper, a new operation is defined Similar Modul. Base on the Similar Modul, the number sets of the homomorphic encryption scheme is extended to real number, and the possible operators are extended to addition, subtraction, multiplication and division. Our new approach provides a practical ways of implementation because of the extension of the operators and the number sets. 相似文献
67.
网上学生思想政治工作的特点与实践 总被引:1,自引:0,他引:1
调研学生的心理状况,结合网络教育从事辅导员工作的实践,指出适应网络时代教育发展做好学生思想政治工作的根本要求. 相似文献
68.
杨志强 《山东师范大学学报(自然科学版)》2006,21(3):29-31
基于VTK环境提出了一种获取任意方位CT切片的方法:由CT图像序列重构3-D体数据之后,将3-D体数据插值为各向同性,利用VTK实现了3-D体数据内CT切片的绘制显示,并通过平移、旋转变换实现了体数据内其它方向、位置处CT切片的获取.在VTK中的应用实例表明,该方法获取的切片序列有助于医生对同一组织从多个方位进行观察、诊治,在医疗诊断中具有一定的实用价值. 相似文献
69.
通过试验筛选出适合万寿菊、满天星快速繁殖的培养基.矮壮素可使满天星和万寿菊丛苗数量减少,植株生长明显受抑制,使其节间缩短,叶片增厚,叶色浓绿.矮壮素还有使万寿菊根系发达粗壮,分支较少的作用.500mg/L的矮壮素比较适宜矮化培养,既达到了矮化的效果又不至于阻碍植株正常生长,且试管苗株形紧凑、美观. 相似文献
70.
以一维有缺陷混凝土板为研究对象,分别采用Leverberg-Marcluardt和径向基神经网络算法,对缺陷的深度与厚度进行识别,从而实现对混凝土板内部缺陷的三维重构,称为红外CT模拟.两类神经网络算法的识别结果表明:Leverberg-Marcluardt神经网络较径向基神经网络具有更好的收敛精度与计算效率. 相似文献