首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6772篇
  免费   666篇
  国内免费   83篇
系统科学   1143篇
丛书文集   55篇
教育与普及   36篇
理论与方法论   279篇
现状及发展   874篇
研究方法   3篇
综合类   5131篇
  2024年   16篇
  2023年   19篇
  2022年   39篇
  2021年   53篇
  2020年   30篇
  2019年   21篇
  2018年   746篇
  2017年   752篇
  2016年   458篇
  2015年   80篇
  2014年   76篇
  2013年   81篇
  2012年   334篇
  2011年   1027篇
  2010年   890篇
  2009年   531篇
  2008年   597篇
  2007年   824篇
  2006年   58篇
  2005年   101篇
  2004年   166篇
  2003年   193篇
  2002年   92篇
  2001年   28篇
  2000年   24篇
  1999年   32篇
  1998年   26篇
  1997年   28篇
  1996年   25篇
  1995年   29篇
  1994年   38篇
  1993年   24篇
  1992年   29篇
  1991年   18篇
  1990年   13篇
  1989年   9篇
  1988年   7篇
  1987年   4篇
  1986年   2篇
  1967年   1篇
排序方式: 共有7521条查询结果,搜索用时 343 毫秒
901.
Varieties of trusted computing products usually follow the mechanism of liner-style chain of trust according to the specifications of TCG. The distinct advantage is that the compatibility with the existing computing platform is preferable, while the shortcomings are obvious simultaneously. A new star-style trust model with the ability of data recovery is proposed in this paper. The model can enhance the hardware-based root of trust in platform measurement, reduce the loss of trust during transfer process, extend the border of trust flexibly, and have the ability of data backup and recovery. The security and reliability of system is much more improved. It is proved that the star-style trust model is much better than the liner-style trust model in trust transfer and boundary extending etc. using formal methods in this paper. We illuminate the design and implementation of a kind of trusted PDA acting on star-style trust model.  相似文献   
902.
In uncertain data management, lineages are often used for probability computation of result tuples. However, most of existing works focus on tuple level lineage, which results in imprecise data derivation. Besides, correlations among attributes cannot be captured. In this paper, for base tuples with multiple uncertain attributes, we define attribute level annotation to annotate each attribute. Utilizing these annotations to generate lineages of result tuples can realize more precise derivation. Simultaneously, they can be used for dependency graph construction. Utilizing dependency graph, we can represent not only constraints on schemas but also correlations among attributes. Combining the dependency graph and attribute level lineage, we can correctly compute probabilities of result tuples and precisely derivate data. In experiments, comparing lineage on tuple level and attribute level, it shows that our method has advantages on derivation precision and storage cost.  相似文献   
903.
A novel anonymous authentication scheme is proposed based on the ring signature. In the scheme, the private key and the the freely chosen anonymity set are used to achieve anonymous authentication. In terms of the threshold sharing, a group of t members jointly implement threshold tracking. In order to improve the security of tracking, message recovery equation is used to verify and recover data leaked by the user. Compared with Liu et al’s scheme, the proposed scheme can resist conspiracy tracking and has less computational cost. On the premise of the discrete-logarithm-based assumption put forth by Lysyanskaya, Rivest, Sahai, and Wolf (LRSW) and Diffie-Hellman (DDH) assumption, the scheme is proved to meet the demands of anonymous authentication. The scheme has broad application prospects in many fields such as ad hoc network, electronic voting, and so on.  相似文献   
904.
This paper presents a systematic method of designing the calibration toolbox of automotive electronic control unit (ECU) based on real-time workshop (RTW). To break the strong coupling of each functional layer, the hierarchical architecture of the calibration system is divided into the bottom driver layer, the intermediate interface layer and the top application layer. The driver functions meeting the specification of the automotive open system are sent and received in the intermediate interface layer. To reduce the development costs, the portable user codes are generated by RTW which provides a development environment from system simulation to hardware implementation. Specifically, the calibration codes yielded from the controller area network (CAN) calibration protocol (CCP) module are integrated into the control codes, called by a compiler in the daemons to build a corresponding project, and then downloaded into the object board to provide the A2L file. The experiments illustrate that the different drive modules are only needed to be replaced for the implementation of the calibration system applied in different hardware platforms.  相似文献   
905.
A class of singular perturbation boundary problem of elliptic equation for higher order is studied. Firstly, under suitable conditions, the generalized outer solution to reduced problems is considered. Then the generalized interior shock asymptotic solution to original problem is constructed by using the theory of generalized functions. Finally, using the fixed point theorem of functional analytic, the uniformly validity of the generalized asymptotic solution with interior shock and boundary layers is proved.  相似文献   
906.
The composite field multiplication is an important and complex module in symmetric cipher algorithms, and its realization performance directly restricts the processing speed of symmetric cipher algorithms. Based on the characteristics of composite field multiplication in symmetric cipher algorithms and the realization principle of its reconfigurable architectures, this paper describes the reconfigurable composite field multiplication over GF((2~8)~k)(k=1,2,3,4) in RISC(reduced instruction set computer) processor and VLIW(very long instruction word) processor architecture, respectively. Through configuration, the architectures can realize the composite field multiplication over GF(2~8), GF((2~8)~2), GF((2~8)~3) and GF((2~8)~4) flexibly and efficiently. We simulated the function of circuits and synthesized the reconfigurable design based on the 0.18 μm CMOS(complementary metal oxide semiconductor) standard cell library and the comparison with other same kind designs. The result shows that the reconfigurable design proposed in the paper can provide higher efficiency under the premise of flexibility.  相似文献   
907.
In the present study, the chemical and mechanical properties and the thermal expansion of a carbon nanotube (CNT)-based crystalline nano-aluminum (nano Al) composite were reported. The properties of nanocomposites were tailored by incorporating CNTs into the nano Al matrix using a physical mixing method. The elastic moduli and the coefficient of thermal expansion (CTE) of the nanocomposites were also estimated to understand the effects of CNT reinforcement in the Al matrix. Microstructural characterization of the nanocomposite reveals that the CNTs are dispersed and embedded in the Al matrix. The experimental results indicate that the incorporation of CNTs into the nano Al matrix results in the increase in hardness and elastic modulus along with a concomitant decrease in the coefficient of thermal expansion. The hardness and elastic modulus of the nanocomposite increase by 21% and 20%, respectively, upon CNT addition. The CTE of CNT/Al nanocomposite decreases to 70% compared with that of nano Al.  相似文献   
908.
Comparative voltammetry and differential double-layer capacitance studies were performed to evaluate interfacial interactions between chalcopyrite (CuFeS2) and n-isopropyl xanthate (X) in the presence of ammonium bisulfite/39wt% SO2 and caustic starch at different pH values. Raman spectroscopy, Fourier transform infrared (FTIR) spectroscopy, contact angle measurements, and microflotation tests were used to establish the type and extent of xanthate adsorption as well as the species involved under different mineral surface conditions in this study. The results demonstrate that the species that favor a greater hydrophobicity of chalcopyrite are primarily CuX and S0, whereas oxides and hydroxides of Cu and Fe as well as an excess of starch decrease the hydrophobicity. A conditioning of the mineral surface with ammonium bisulfite/39wt% SO2 at pH 6 promotes the activation of surface and enhances the xanthate adsorption. However, this effect is diminished at pH ≥ 8, when an excess of starch is added during the preconditioning step.  相似文献   
909.
A long campaign life of blast furnaces is heavily linked to the existence of a protective layer in their hearths. In this work, we conducted dissection studies and investigated damage in blast furnace hearths to estimate the formation mechanism of the protective layer. The results illustrate that a significant amount of graphite phase was trapped within the hearth protective layer. Furthermore, on the basis of the thermodynamic and kinetic calculations of the graphite precipitation process, a precipitation potential index related to the formation of the graphite-rich protective layer was proposed to characterize the formation ability of this layer. We determined that, under normal operating conditions, the precipitation of graphite phase from hot metal was thermodynamically possible. Among elements that exist in hot metal, C, Si, and P favor graphite precipitation, whereas Mn and Cr inhibit this process. Moreover, at the same hot-face temperature, an increase of carbon concentration in hot metal can shorten the precipitation time. Finally, the results suggest that measures such as reducing the hot-face temperature and increasing the degree of carbon saturation in hot metal are critically important to improve the precipitation potential index.  相似文献   
910.
程潮铁矿的矿体随着开采深度的增加而逐渐西移,导致选矿车间下保安矿柱所占矿量不断增多,故拟采用联合开采方法回收-430~-500m阶段矿体:充填法回收选矿车间下预留保安矿柱;无底柱分段崩落法开采保安矿柱以外的其他矿体。为了研究联合开采时回采顺序对地表稳定性的影响,采用数值模拟方法得到不同回采顺序下地表监测点的垂直位移,确定地表沉降最小且施工组织容易的回采顺序组合为最优方案,即充填法采用"中-左-右"以及无底柱分段崩落法采用"左-右-中"的回采顺序。模拟开采结果表明,在该回采顺序方案下,选矿车间区域的地表稳定性、充填采场及隔离矿柱的安全性均满足要求。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号