全文获取类型
收费全文 | 15173篇 |
免费 | 921篇 |
国内免费 | 705篇 |
专业分类
系统科学 | 1543篇 |
丛书文集 | 251篇 |
教育与普及 | 195篇 |
理论与方法论 | 309篇 |
现状及发展 | 914篇 |
研究方法 | 38篇 |
综合类 | 13547篇 |
自然研究 | 2篇 |
出版年
2024年 | 34篇 |
2023年 | 72篇 |
2022年 | 181篇 |
2021年 | 166篇 |
2020年 | 125篇 |
2019年 | 71篇 |
2018年 | 817篇 |
2017年 | 838篇 |
2016年 | 566篇 |
2015年 | 309篇 |
2014年 | 384篇 |
2013年 | 370篇 |
2012年 | 659篇 |
2011年 | 1376篇 |
2010年 | 1233篇 |
2009年 | 935篇 |
2008年 | 1090篇 |
2007年 | 1289篇 |
2006年 | 463篇 |
2005年 | 499篇 |
2004年 | 494篇 |
2003年 | 547篇 |
2002年 | 663篇 |
2001年 | 574篇 |
2000年 | 390篇 |
1999年 | 452篇 |
1998年 | 262篇 |
1997年 | 277篇 |
1996年 | 274篇 |
1995年 | 220篇 |
1994年 | 222篇 |
1993年 | 201篇 |
1992年 | 166篇 |
1991年 | 139篇 |
1990年 | 122篇 |
1989年 | 111篇 |
1988年 | 106篇 |
1987年 | 59篇 |
1986年 | 29篇 |
1985年 | 8篇 |
1984年 | 4篇 |
1967年 | 1篇 |
1955年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
21.
22.
数字调制方式的识别研究 总被引:5,自引:0,他引:5
数字调制方式的识别对于通信信号分析有着重要的作用 .此文首先介绍了数字调制方式的识别算法(DMRA) ,即判决理论算法的原理 ;然后提出了一种基于该算法的判决流程 ;最后在软件环境中进行计算机仿真 ,通过实验数据对该算法进行修正 .仿真结果表明 ,该修正算法具有较高的识别率和良好的可行性 . 相似文献
23.
肖瑾 《北华大学学报(自然科学版)》2008,9(2):116-120
利用uv-分解理论,将半光滑函数应用到uv-分解中.首先利用半光滑函数的性质,对半光滑函数uv-分解的合理性予以考虑,主要考虑了Lu函数和最优解集W(u)在u-空间的性质,得出了相关的结论和定理,并利用Newton法和得出的性质定理,给出了半光滑方程的另一种求解方法. 相似文献
24.
本论文选用Apple-Ⅱ作主机,开发了一套外设接口扩展箱和相应的应用软件,用于实现在钢厂中对六台单轧机的热轧钢板长度在线检测和现场显示,同时对钢板的长度按照合格、超长、超短进行分类统计,打印生产报表。此外还提供随时修改钢板长度(标尺)设定值和随机查询各台轧机产质量状况的功能。在接口扩展箱中,采用了包括光电耦合在内的若干抗干扰措施,保证系统能在钢厂恶劣环境中正常运行。本系统已在工厂轧机上试用成功。 相似文献
25.
Static extracting method of software intended behavior based on API functions invoking 总被引:1,自引:0,他引:1
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack. 相似文献
26.
XIE Xianjian WEI Fangqiang BAI Jingwen LAI Ting 《武汉大学学报:自然科学英文版》2007,12(4):729-736
In this experiment, using the methods of drought-stress in the pot and PEG simulative drought-stress, three native rocky-slope grasses Pogonatherum panideum(Lam.) Hack, Erioophorum comosum nees and Cynodon dactylon cultivated in the pots were selected as materials to study their drought-resistance by analyzing the indexes such as the leaf area index, the drying roots accumulation, the holding water ability of leaf, the relative conductance of leaf, the soluble protein, chlorophyll. At the same time, by comparing with membership function value of each index, the order of each grass drought-resistance was decided. The results showed that the drought-resistance of Erioophorum comosum nees was stronger than Cynodon dactylon and drought-resistance of Cynodon dactylon was stronger than Pogonatherum panideum (Lam.) Hack. The purpose of the experimental results was to find theoretical foundations for selecting and cultivating native protecting-slope vegetations to adapt to rocky slopes. 相似文献
27.
WANG Xibo ZHOU Benhai YU Gei LI Qian 《武汉大学学报:自然科学英文版》2007,12(5):946-950
μC/OS-Ⅱ is an open source real-time kernel adopting priority preemptive schedule strategy. Aiming at the problem of μC/OS-Ⅱ failing to support homology priority tasks scheduling, an approach for solution is proposed. The basic idea is adding round-robin scheduling strategy in its original scheduler in order to schedule homology priority tasks through time slice roundrobin. Implementation approach is given in detail. Firstly, the Task Control Block (TCB) is extended. And then, a new priority index table is created, in which each index pointer points to a set of homology priority tasks. Eventually, on the basis of reconstructing μC/OS-Ⅱ real-time kernel, task scheduling module is rewritten. Otherwise, schedulability of homology task supported by modified kernel had been analyzed, and deadline formula of created homology tasks is given. By theoretical analysis and experiment verification, the modified kernel can support homology priority tasks scheduling, meanwhile, it also remains preemptive property of original μC/OS-Ⅱ. 相似文献
28.
LUO HaiYing WANG YunFang KONG Wei PEI XueTao 《科学通报(英文版)》2007,52(18):2449-2456
Today, liver transplantation (LT) is the only established treatment for end-stage liver diseases. The de- velopment of LT, including OLT, cadaveric LT, split LT, living donor LT (LDLT), brings hopes to patients with these diseases. However, increasing donor shortage, rejection and life-long immunosuppression with its side effects are the major limitations of this therapy strategy. Bone marrow-derived stem cells (BMDSCs) are capable of differentiating into hepatocyte-like cells and contribute to liver injury repair. The microenvironment of liver injury caused by rejection, ischemia/reperfusion, loss of liver mass, recurrence of HCV and "small-for-size syndrome" after LT can attract a variety of bone marrow-derived stem cell population to the peripheral circulation and then migration to the injury liver to promote the hepatic function restoration. Additionally, BMDSCs can also take part in the functional regeneration of living donor liver after LDLT. This participation in liver regeneration may be associated to the interac- tion between SDF-1and its receptor CXCR4, involving HGF, IL-8, MMP9, and VEGF/VEGFR-2. BMDSC with its bio-characteristics could maintain the allograft tolerance from different angles and in different ways. In conclusion, BMDSCs transplantation, as a new assistant therapeutic method for LT, will ex- pand the space of LT, and provide more survival opportunities for the patients suffering liver diseases in the future. 相似文献
29.
30.