首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1346篇
  免费   57篇
  国内免费   85篇
系统科学   68篇
丛书文集   29篇
教育与普及   58篇
理论与方法论   10篇
现状及发展   15篇
研究方法   11篇
综合类   1297篇
  2024年   10篇
  2023年   24篇
  2022年   36篇
  2021年   50篇
  2020年   22篇
  2019年   10篇
  2018年   15篇
  2017年   23篇
  2016年   31篇
  2015年   43篇
  2014年   78篇
  2013年   71篇
  2012年   69篇
  2011年   72篇
  2010年   70篇
  2009年   73篇
  2008年   68篇
  2007年   57篇
  2006年   35篇
  2005年   48篇
  2004年   40篇
  2003年   32篇
  2002年   20篇
  2001年   35篇
  2000年   34篇
  1999年   57篇
  1998年   56篇
  1997年   55篇
  1996年   52篇
  1995年   36篇
  1994年   29篇
  1993年   27篇
  1992年   31篇
  1991年   16篇
  1990年   13篇
  1989年   17篇
  1988年   16篇
  1987年   10篇
  1986年   4篇
  1985年   1篇
  1983年   1篇
  1981年   1篇
排序方式: 共有1488条查询结果,搜索用时 140 毫秒
81.
在前人研究的基础上,本文根据沸腾换热、多孔物质内传热传质及毛细管中两相流的理论及实验,提出了烧型多孔表面沸腾换热的改进模型,再据此而得到新的烧结型多孔表面泡态沸腾换热关联式,与实验结果比较,偏差在士30%以内。关联式适用于F-11,F-12,F-22,F-113,F-114。  相似文献   
82.
Landau theory of martensitic transformation in Fe-Mn-Si based alloys   总被引:1,自引:0,他引:1  
Considering the features of martensitic transformation in Fe-Mn-Si based alloys, the Landau theory is established by introducing the density of stacking faults as a new order parameter ηand the corresponding free energy function. By using such an order parameter, the stacking fault mechanism of the nucleation and growth for the γ(fcc)→ε(hcp) martensitic transformation can be reasonably explained, and a further detailed mechanism is proposed. The stacking faults are generated and overlapped in an irregular form at the beginning and then becoming regular to create some transition structures till a stable phase forms at a certain temperature. The importance of the interface soliton is to complete the transformations into various structures of martensite but not the twinned one. The thermodynamics of fcc→hcp transformation and those between different transition structures are described by the free energy function established in the present note.  相似文献   
83.
Functional analysis for gene silencing suppressor of P14 gene of Beet necrotic yellow vein virus and S6 gene of Rice black streak dwarf virus was carried out by agro- infiltration with recombinant vectors of Potato virus X. The phenotype observation of green fluorescent protein (GFP)expression and Northern blot showed that the gene silencing of gfp transgenic Nicotiana benthamiana induced by homologous sequence was strongly suppressed by the immixture infiltration of either the P14 or the $6. In the suppressed plants, the gfp mRNA accumulation was higher than that in the non-suppressed controls and the symptoms caused by PVX infection became more severe, especially the gfp DNA methylation of plant genome was significantly inhabited when co-infiltrated with RBSDV S6 gene. These results suggested that these two virus genes were potentially to encode for proteins as RNA silencing suppressors.  相似文献   
84.
证明了在H ilbert空间中非空有界闭凸集上的严格伪压缩自映象有不动点,介绍了一种关于严格伪压缩映象的M ann迭代序列并证明了其强收敛于不动点,其结果把非扩展映象推广到严格伪压缩映象,从而推广了近代一些相关结果.  相似文献   
85.
Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption Standard (AES) algorithm is widely applied in government department and commerce. This paper analyzed the AES algorithms with different cipher keys, adopted a novel key scheduler that generated the round key real-time, proposed a dynamically reconfigurable encryption system which supported the AES algorithm with different cipher keys, and designed the architecture of the reconfigurable system. The dynamically reconfigurable AES system had been realized on FPGA. The result proves that the reconfigurable AES system is flexible, lower cost and high security level.  相似文献   
86.
An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet are selected according to the human visual system (HVS) characteristics. Watermark bits are added to them. And then effectively cooperates neural networks to learn the characteristics of the embedded watermark related to them. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results and comparisons with other techniques prove the effectiveness of the new algorithm.  相似文献   
87.
根据对雷灾现场和环境情况的观察,结合天气情况和雷电观测资料,对一起农村雷灾的发生原因进行了分析。分析认为,雷电击中大树产生的雷电反击和跨步电压是造成这起雷灾的主要原因。对于防雷安全形势比较严峻的农村,加强防雷设施建设、普及防雷科普知识和提高农民防雷安全意识显得益发重要。  相似文献   
88.
朱剑锋 《甘肃科技》2007,23(7):142-144
依据钢筋混凝土力学原理,讨论了钢筋混凝土偏心受压构件截面分析的一般方法,研究了构件在轴心压力和弯矩的联合作用下,构件正截面的受力性能及承载力问题。通过理论分析和具体实例,结合钢筋混凝土偏心受压构件的截面计算问题,对传统计算方法及精确计算的结果进行了比较,认为在进行截面设计时,截面复核的步骤不容忽视,且明确此时轴向力设计值并不等于轴向受压承载力设计值,由此给出合理的分析方法,以便于工程应用的合理化。  相似文献   
89.
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol.  相似文献   
90.
本文以岩石力学理论为基础,应用三维弹塑性节理有限元理论对井筒煤柱的开采进行了理论模拟,特别是井筒煤柱包含断层且井筒穿过断层这样的复杂条件,本文采用了特殊方法(节理单元方法)进行了研究,在井筒煤柱开采方面有了进一步的认识.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号