首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   26007篇
  免费   1307篇
  国内免费   1302篇
系统科学   1991篇
丛书文集   708篇
教育与普及   319篇
理论与方法论   355篇
现状及发展   1019篇
研究方法   83篇
综合类   24135篇
自然研究   6篇
  2024年   119篇
  2023年   228篇
  2022年   422篇
  2021年   520篇
  2020年   381篇
  2019年   193篇
  2018年   961篇
  2017年   1035篇
  2016年   752篇
  2015年   686篇
  2014年   858篇
  2013年   819篇
  2012年   1160篇
  2011年   1947篇
  2010年   1711篇
  2009年   1432篇
  2008年   1662篇
  2007年   1855篇
  2006年   955篇
  2005年   959篇
  2004年   767篇
  2003年   831篇
  2002年   1065篇
  2001年   1014篇
  2000年   742篇
  1999年   881篇
  1998年   622篇
  1997年   553篇
  1996年   518篇
  1995年   502篇
  1994年   418篇
  1993年   374篇
  1992年   314篇
  1991年   329篇
  1990年   289篇
  1989年   236篇
  1988年   197篇
  1987年   146篇
  1986年   80篇
  1985年   25篇
  1984年   7篇
  1983年   3篇
  1982年   8篇
  1981年   3篇
  1980年   4篇
  1979年   5篇
  1972年   6篇
  1970年   3篇
  1969年   3篇
  1967年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
941.
On board processing (OBP) satellite systems have obtained more and more attentions in recent years because of their high efficiency and performance.However,the OBP transponders are very sensitive to the high energy particles in the space radiation environments.Single event upset (SEU) is one of the major radiation effects,which influences the satellite reliability greatly.Triple modular redundancy (TMR) is a classic and efficient method to mask SEUs.However,TMR uses three identical modules and a comparison logic,the circuit size becomes unacceptable,especially in the resource limited environments such as OBP systems.Considering that,a new SEU-tolerant method based on residue code and high-level synthesis (HLS) is proposed,and the new method is applied to FIR filters,which are typical structures in the OBP systems.The simulation results show that,for an applicable HLS scheduling scheme,area reduction can be reduced by 48.26% compared to TMR,while fault missing rate is 0.15%.  相似文献   
942.
The widespread use of Location-Based Services(LBSs),which allows untrusted service providers to collect large quantities of information regarding users’locations,has raised serious privacy concerns.In response to these issues,a variety of LBS Privacy Protection Mechanisms(LPPMs)have been recently proposed.However,evaluating these LPPMs remains problematic because of the absence of a generic adversarial model for most existing privacy metrics.In particular,the relationships between these metrics have not been examined in depth under a common adversarial model,leading to a possible selection of the inappropriate metric,which runs the risk of wrongly evaluating LPPMs.In this paper,we address these issues by proposing a privacy quantification model,which is based on Bayes conditional privacy,to specify a general adversarial model.This model employs a general definition of conditional privacy regarding the adversary’s estimation error to compare the different LBS privacy metrics.Moreover,we present a theoretical analysis for specifying how to connect our metric with other popular LBS privacy metrics.We show that our privacy quantification model permits interpretation and comparison of various popular LBS privacy metrics under a common perspective.Our results contribute to a better understanding of how privacy properties can be measured,as well as to the better selection of the most appropriate metric for any given LBS application.  相似文献   
943.
Induction hardening of dense Fe-Cr/Mo alloys processed via the powder-metallurgy route was studied. The Fe-3Cr-0.5Mo, Fe-1.5Cr-0.2Mo, and Fe-0.85Mo pre-alloyed powders were mixed with 0.4wt%, 0.6wt%, and 0.8wt% C and compacted at 500, 600, and 700 MPa, respectively. The compacts were sintered at 1473 K for 1 h and then cooled at 6 K/min. Ferrite with pearlite was mostly observed in the sintered alloys with 0.4wt% C, whereas a carbide network was also present in the alloys with 0.8wt% C. Graphite at prior particle boundaries led to deterioration of the mechanical properties of alloys with 0.8wt% C, whereas no significant induction hardening was achieved in alloys with 0.4wt% C. Among the investigated samples, alloys with 0.6wt% C exhibited the highest strength and ductility and were found to be suitable for induction hardening. The hardening was carried out at a frequency of 2.0 kHz for 2-3 s. A case depth of 2.5 mm was achieved while maintaining the bulk (interior) hardness of approximately HV 230. A martensitic structure was observed on the outer periphery of the samples. The hardness varied from HV 600 to HV 375 from the sample surface to the interior of the case hardened region. The best combination of properties and hardening depth was achieved in case of the Fe-1.5Cr-0.2Mo alloy with 0.6wt% C.  相似文献   
944.
采用密度泛函理论,在B3LYP/6—31G(d)水平下,对苯并[1,2-b:4,5-b’]二噻吩(BDT)-thieno[3,4-b]thiadiaz01e(TD)的低聚物和聚合物进行了理论计算.其中,BDT为电子供体,TD为电子受体,以1:2的方式结合形成化合物,并计算了二面角、分子内的电荷传输、桥键键长和中心键电荷密度.结果显示:随着聚合链增长,共轭程度增加.NICSs值显示:中心环比边环的共轭程度更大.聚合物的能带结构表明:该聚合物的带隙比较低(0.87eV),故其可以作为潜在的导电材料.  相似文献   
945.
运用人体测量学方法对四川羌族602例(男299例,女303例)成年人进行7项皮褶(面颊、肱二头肌、肱三头肌、肩胛下、髂嵴上、髂前上棘、小腿内侧)厚度的测量,分析该族群皮褶厚度随年龄变化的特征,并与我国部分族群进行比较.结果表明:(1)四川羌族男性和女性的躯干皮褶厚度总体上高于面部和四肢皮褶厚度,后者最低;(2)男性和女性的7项皮褶中,均是髂嵴上皮褶厚度最大,肱二头肌皮褶厚度最小;(3)女性的皮褶厚度和体脂率均高于同年龄组男性的数值,性别间差异均具有统计学意义(P0.05);(4)男性和女性各项皮褶、体脂率之间均存在正相关,相关性具有高度统计学意义(P0.01);(5)同西部地区13个族群基于皮褶厚度的聚类分析结果表明,羌族男性与甘肃汉族最接近,羌族女性与四川汉族、贵州屯堡人最接近.  相似文献   
946.
Amidst the rapid development of the Internet of Things(IoT), Vehicular Ad-Hoc NETwork(VANET), a typical IoT application, are bringing an ever-larger number of intelligent and convenient services to the daily lives of individuals. However, there remain challenges for VANETs in preserving privacy and security. In this paper, we propose the first lattice-based Double-Authentication-Preventing Ring Signature(DAPRS) and adopt it to propose a novel privacy-preserving authentication scheme for VANETs, offering the potential for security against quantum computers. The new construction is proven secure against chosen message attacks. Our scheme is more efficient than other ring signature in terms of the time cost of the message signing phase and verification phase, and also in terms of signature length. Analyses of security and efficiency demonstrate that our proposed scheme is provably secure and efficient in the application.  相似文献   
947.
Cobalt oxide doped titanate nanotubes are synthesized with a simple hydrothermal treatment of mixed Co_3O_4 and TiO_2 powders. The formed tubular nanostructure, chemical composition,and the elemental distribution are analyzed using TEM, BET, FTIR, XRD, and XPS. The electrocatalytic activity towards oxygen evolution reactions and photodegradation against Rhodamine B are investigated. It has been found out that the oxygen evolutions starts at 0.8 V and reaches 0.98 mA ·cm~(–1) at 1.4 V vs. SCE. For photodegradation of Rhodamine B, the concentration decreased to 24% after 1 h irradiation using the sample with a mass percentage of 5% cobalt. The results demonstrate that the cobalt oxide doped titanate nanotubes are good candidates as electrocatalysts and photocatalytic materials.  相似文献   
948.
Wearable devices usually work together with smart phones. To ensure only legitimate smart phones can read the data, they must conduct pairing to establish a shared key. Traditional pairing methods require that the pairing devices have a keyboard or screen for user interaction. However, due to the size limitation, keyboards or screens are hard to be installed in the wearable devices. To solve this problem, we propose a novel pairing method by using ambient sound and light. In this new scheme, any pairing request from smart phone will trigger wearable device vibration. Only after users press the confirm key on the device can the pairing process continues. Then pairing devices collect ambient sound and light at the predetermined time and establish a shared key by using the Diffie-Hellman protocol. To protect against potential man-in-the-middle attacks in the key establishment process, an improved interlock protocol with sound and light comparison is conducted to authenticate the key. If both the sound and light collected by the pairing devices are similar enough, the key is accepted. Otherwise, it is rejected. Compared with current context based pairing methods, our scheme does not impose strict synchronization on devices to collect ambient context data. Moreover, our scheme need not collect and exchange contextual information for multiple times to resist offline brute force attacks. The experimental results and security analysis prove the effectiveness of our scheme.  相似文献   
949.
《蓝桥会》是黄梅戏七十二小戏之一,演绎了蓝玉莲与魏魁元追求自由爱情的故事。这一故事缘起于尾生事迹,后结合了唐代裴铏的小说《裴航》,逐渐发展成了一个凄美的爱情故事,但黄梅戏《蓝桥会》的主题却由最初的赞美尾生重信义变成了追求自由爱情、反对封建婚姻制度。《蓝桥会》也凭借着黄梅戏独特的魅力及演员的精彩演出,突出了两个鲜明的人物形象。  相似文献   
950.
 为评估光电干扰目标的威胁度,选取了目标的类型、速度、高度、距离、角度和目标的航路捷径等指标,构建了干扰任务分配模型,应用遗传算法对分配任务模型进行了求解,并通过实例验证方法的可行性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号