全文获取类型
收费全文 | 1346篇 |
免费 | 57篇 |
国内免费 | 85篇 |
专业分类
系统科学 | 68篇 |
丛书文集 | 29篇 |
教育与普及 | 58篇 |
理论与方法论 | 10篇 |
现状及发展 | 15篇 |
研究方法 | 11篇 |
综合类 | 1297篇 |
出版年
2024年 | 10篇 |
2023年 | 24篇 |
2022年 | 36篇 |
2021年 | 50篇 |
2020年 | 22篇 |
2019年 | 10篇 |
2018年 | 15篇 |
2017年 | 23篇 |
2016年 | 31篇 |
2015年 | 43篇 |
2014年 | 78篇 |
2013年 | 71篇 |
2012年 | 69篇 |
2011年 | 72篇 |
2010年 | 70篇 |
2009年 | 73篇 |
2008年 | 68篇 |
2007年 | 57篇 |
2006年 | 35篇 |
2005年 | 48篇 |
2004年 | 40篇 |
2003年 | 32篇 |
2002年 | 20篇 |
2001年 | 35篇 |
2000年 | 34篇 |
1999年 | 57篇 |
1998年 | 56篇 |
1997年 | 55篇 |
1996年 | 52篇 |
1995年 | 36篇 |
1994年 | 29篇 |
1993年 | 27篇 |
1992年 | 31篇 |
1991年 | 16篇 |
1990年 | 13篇 |
1989年 | 17篇 |
1988年 | 16篇 |
1987年 | 10篇 |
1986年 | 4篇 |
1985年 | 1篇 |
1983年 | 1篇 |
1981年 | 1篇 |
排序方式: 共有1488条查询结果,搜索用时 140 毫秒
81.
在前人研究的基础上,本文根据沸腾换热、多孔物质内传热传质及毛细管中两相流的理论及实验,提出了烧型多孔表面沸腾换热的改进模型,再据此而得到新的烧结型多孔表面泡态沸腾换热关联式,与实验结果比较,偏差在士30%以内。关联式适用于F-11,F-12,F-22,F-113,F-114。 相似文献
82.
Considering the features of martensitic transformation in Fe-Mn-Si based alloys, the Landau theory is established by introducing the density of stacking faults as a new order parameter ηand the corresponding free energy function. By using such an order parameter, the stacking fault mechanism of the nucleation and growth for the γ(fcc)→ε(hcp) martensitic transformation can be reasonably explained, and a further detailed mechanism is proposed. The stacking faults are generated and overlapped in an irregular form at the beginning and then becoming regular to create some transition structures till a stable phase forms at a certain temperature. The importance of the interface soliton is to complete the transformations into various structures of martensite but not the twinned one. The thermodynamics of fcc→hcp transformation and those between different transition structures are described by the free energy function established in the present note. 相似文献
83.
Two virus-encoded RNA silencing suppressors, P14 of Beet necrotic yellow vein virus and S6 of Rice black streak dwarf virus 总被引:5,自引:0,他引:5
ZHANGLingdi WANGZhaohui WANGXianbing LIDawei HANChenggui ZHAIYafeng YUJialin 《科学通报(英文版)》2005,50(4):305-310
Functional analysis for gene silencing suppressor of P14 gene of Beet necrotic yellow vein virus and S6 gene of Rice black streak dwarf virus was carried out by agro- infiltration with recombinant vectors of Potato virus X. The phenotype observation of green fluorescent protein (GFP)expression and Northern blot showed that the gene silencing of gfp transgenic Nicotiana benthamiana induced by homologous sequence was strongly suppressed by the immixture infiltration of either the P14 or the $6. In the suppressed plants, the gfp mRNA accumulation was higher than that in the non-suppressed controls and the symptoms caused by PVX infection became more severe, especially the gfp DNA methylation of plant genome was significantly inhabited when co-infiltrated with RBSDV S6 gene. These results suggested that these two virus genes were potentially to encode for proteins as RNA silencing suppressors. 相似文献
84.
证明了在H ilbert空间中非空有界闭凸集上的严格伪压缩自映象有不动点,介绍了一种关于严格伪压缩映象的M ann迭代序列并证明了其强收敛于不动点,其结果把非扩展映象推广到严格伪压缩映象,从而推广了近代一些相关结果. 相似文献
85.
WANG Youren WANG Li YAO Rui ZHANG Zhai CUI Jiang 《武汉大学学报:自然科学英文版》2006,11(6):1569-1572
Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption Standard (AES) algorithm is widely applied in government department and commerce. This paper analyzed the AES algorithms with different cipher keys, adopted a novel key scheduler that generated the round key real-time, proposed a dynamically reconfigurable encryption system which supported the AES algorithm with different cipher keys, and designed the architecture of the reconfigurable system. The dynamically reconfigurable AES system had been realized on FPGA. The result proves that the reconfigurable AES system is flexible, lower cost and high security level. 相似文献
86.
WANG Zhenfei ZHAI Guangqun WANG Nengchao 《武汉大学学报:自然科学英文版》2006,11(6):1667-1670
An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet are selected according to the human visual system (HVS) characteristics. Watermark bits are added to them. And then effectively cooperates neural networks to learn the characteristics of the embedded watermark related to them. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results and comparisons with other techniques prove the effectiveness of the new algorithm. 相似文献
87.
根据对雷灾现场和环境情况的观察,结合天气情况和雷电观测资料,对一起农村雷灾的发生原因进行了分析。分析认为,雷电击中大树产生的雷电反击和跨步电压是造成这起雷灾的主要原因。对于防雷安全形势比较严峻的农村,加强防雷设施建设、普及防雷科普知识和提高农民防雷安全意识显得益发重要。 相似文献
88.
依据钢筋混凝土力学原理,讨论了钢筋混凝土偏心受压构件截面分析的一般方法,研究了构件在轴心压力和弯矩的联合作用下,构件正截面的受力性能及承载力问题。通过理论分析和具体实例,结合钢筋混凝土偏心受压构件的截面计算问题,对传统计算方法及精确计算的结果进行了比较,认为在进行截面设计时,截面复核的步骤不容忽视,且明确此时轴向力设计值并不等于轴向受压承载力设计值,由此给出合理的分析方法,以便于工程应用的合理化。 相似文献
89.
CAO Chunjie MA Jianfeng MOON Sangjae 《武汉大学学报:自然科学英文版》2007,12(1):41-45
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol. 相似文献
90.
本文以岩石力学理论为基础,应用三维弹塑性节理有限元理论对井筒煤柱的开采进行了理论模拟,特别是井筒煤柱包含断层且井筒穿过断层这样的复杂条件,本文采用了特殊方法(节理单元方法)进行了研究,在井筒煤柱开采方面有了进一步的认识. 相似文献