全文获取类型
收费全文 | 2145篇 |
免费 | 82篇 |
国内免费 | 110篇 |
专业分类
系统科学 | 107篇 |
丛书文集 | 78篇 |
教育与普及 | 83篇 |
理论与方法论 | 13篇 |
现状及发展 | 14篇 |
研究方法 | 10篇 |
综合类 | 2032篇 |
出版年
2024年 | 11篇 |
2023年 | 32篇 |
2022年 | 44篇 |
2021年 | 54篇 |
2020年 | 23篇 |
2019年 | 7篇 |
2018年 | 17篇 |
2017年 | 32篇 |
2016年 | 19篇 |
2015年 | 45篇 |
2014年 | 83篇 |
2013年 | 75篇 |
2012年 | 95篇 |
2011年 | 88篇 |
2010年 | 102篇 |
2009年 | 113篇 |
2008年 | 106篇 |
2007年 | 118篇 |
2006年 | 98篇 |
2005年 | 103篇 |
2004年 | 70篇 |
2003年 | 44篇 |
2002年 | 64篇 |
2001年 | 59篇 |
2000年 | 62篇 |
1999年 | 94篇 |
1998年 | 99篇 |
1997年 | 86篇 |
1996年 | 80篇 |
1995年 | 65篇 |
1994年 | 71篇 |
1993年 | 60篇 |
1992年 | 56篇 |
1991年 | 47篇 |
1990年 | 42篇 |
1989年 | 33篇 |
1988年 | 22篇 |
1987年 | 10篇 |
1986年 | 6篇 |
1984年 | 2篇 |
排序方式: 共有2337条查询结果,搜索用时 93 毫秒
991.
针对当前物流行业中存在的信息泄露问题,提出了一种面向物流行业的用户隐私信息保护方法。该方法基于匿名通信的思想,对现有的物流条码技术加以改进,使得物流过程中的每个站点只能获取到部分用户信息,从而有效地避免了用户隐私信息的泄露。本方法采用6位验证码作为取货码来验证取件人身份,并且该取货码在签收完成之前只有收件人知道,从而有效地防止了快递冒领等问题的出现。理论分析和模拟测试结果表明,该方法在保证物流转运效率的同时,降低了用户信息泄露的概率,有效地保护了用户的个人隐私。 相似文献
992.
A graph theory model of the human nature structure ( GMH ) for machine vision and image/graphics processing is described in this paper.Independent from the motion and deformation of con-tours, the human nature structure (HNS) embodies the most basic movement characteristics of the body.The human body can be divided into basic units like head, torso, and limbs.Using these basic units, a graph theory model for the HNS can be constructed.GMH provides a basic model for human posture processing, and the outline in the perspective projection plane is the body contour of an image.In addition, the GMH can be applied to articulated motion and deformable objects, e.g., in the design and analysis of body posture, by modifying mapping parameters of the GMH. 相似文献
993.
随着科学、信息技术的进步,政策积极引导以及市场需求的不断增加,低空无人机航摄系统突破了众多技术瓶颈,整个行业都得到了快速发展,满足了众多领域的实际应用需要。现针对弹射式低空无人机航摄系统的发展现状、特点、实施过程以及存在的若干问题进行探讨,以此来指导低空无人机航摄实践,更好地满足我国经济社会迅猛发展的航摄测绘需求。 相似文献
994.
主要就完成视频实时转播的车载卫星站对星技巧展开分析研究与提炼归纳,依据实战演练与用户需求,总结出能满足实际要求与规范化操作的快速对星3步法,以此提高工作效率与服务品质. 相似文献
995.
The success of embryo implantation is a critical step towards further embryo development and pregnancy outcome. The observations and investigations on embryo implantation have been over a century. A huge body of knowledge has been accumulated in anatomy, histology, ultrastructure and hormonal regulation; as well as recently in depth information about molecular signaling pathways got from studies of genomic wide gene screening and specific gene deletion. The knowledge from basic research has also substantially helped to initiate and improve the Artificial Reproductive Technology (ART) in clinical applications. Now we've known that the normal embryo implantation involves the embryo's development into an implantation-competent blastocyst and the synchronized transformation of uteri into a receptive stage. The interdependent relationship between the blastocyst and uterus involves complicated hormonal regulation and local paracrine, juxtacrine interactions. In this paper, we review some important historical findings regarding uterine receptivity and blastocyst activation, as well as some less discussed topics such as embryo spacing, embryo orientation. Further understandings on detailed mechanisms during the process of embryo implantation will help cure women infertility as well as develop new generation of non-steroids contraceptives. 相似文献
996.
Mouse embryo implantation is a complex process that includes trophoblast cells derived from ectoplacental cone (EPC) adhesion to and migration through the extracellular matrix (ECM) of uterine endometrium and invasion into the decidua. At the time of implantation, fibronectin (FN) is abundant in the decidua and is distributed pericellularly around each individual stromal cell, and its receptor (integrin α-5β-1) expression on trophoblast populations is up-regulated. The focal adhesion kinase, a 125 ku protein tyrosine kinase (pp125 FAK), is tyrosine phosphorylated upon integrin engagement with its ECM ligand, and its tyrosine phosphorylation sites then serve as the binding sites which couple it with cellular proteins that contain Src SH2 or SH3 domains. Through these linkages, pp125 FAK may integrate multiple signals triggered by integrins. The model of EPC culture %in vitro% was used to study the expression, distribution and function of pp125 FAK during EPC outgrowth on FN. Results indicated that, pp125 FAK primarily expressed and distributed in cellular focal adhesions of the front edge of trophoblast outgrowth from EPC, and was localized in the peripheral region of the individual migrating trophblast cell; antibody or antisense oligodeoxynucleotide to pp125 FAK inhibited EPC attachment and outgrowth, as well as trophoblast cells spreading and migration. This experiment demonstrated that pp125 FAK as an integrin-mediated signaling molecule was involved in EPC outgrowth %in vitro%, and played an important role during trophoblast cells interaction with FN. 相似文献
997.
998.
Detecting network intrusions by data mining and variable-length sequence pattern matching 总被引:1,自引:0,他引:1
下载免费PDF全文
![点击此处可从《系统工程与电子技术(英文版)》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance. 相似文献
999.
计算机应用系统中扩展WATCHDOG的一种实用方案 总被引:2,自引:0,他引:2
一种计算机应用系统中扩展 WATCHDOG的实用方案,其核心是利用可重触发单稳态电路构成WATCHDOG的定时器,具有简洁、小巧、价廉和可靠等特点 相似文献
1000.
冯端 《科技导报(北京)》1999,(4):3-7
物质世界,从最最微小的基本粒子一直延伸到囊括一切的宇宙,构成了物质科学的研究对象。物质科学是以物理学与化学为主的学科群并向地球物理与化学、空间科学和天文学延拓。一、物质世界的层次化在本世纪初出现了两大理论的突破,即相对论与量子论。相对论可视为经典物理学的登峰造极之作,因为狭义相对论无非是经典电动力学的延伸,但同时带来了高速运动物体的力学和普遍的质能关系,并且改变了人们对于时—空的概念;而广义相对论实质上是引力的几何理论,对于现代天文学,特别是宇宙论,产生了深远的影响。量子论则开启了微观世界科学的… 相似文献