首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   23880篇
  免费   871篇
  国内免费   1806篇
系统科学   928篇
丛书文集   758篇
教育与普及   687篇
理论与方法论   81篇
现状及发展   96篇
综合类   24007篇
  2024年   155篇
  2023年   633篇
  2022年   691篇
  2021年   969篇
  2020年   779篇
  2019年   623篇
  2018年   279篇
  2017年   421篇
  2016年   516篇
  2015年   776篇
  2014年   1244篇
  2013年   1153篇
  2012年   1358篇
  2011年   1621篇
  2010年   1109篇
  2009年   1572篇
  2008年   1913篇
  2007年   2034篇
  2006年   1651篇
  2005年   1095篇
  2004年   844篇
  2003年   624篇
  2002年   553篇
  2001年   497篇
  2000年   582篇
  1999年   539篇
  1998年   160篇
  1997年   116篇
  1996年   115篇
  1995年   85篇
  1994年   78篇
  1993年   288篇
  1992年   290篇
  1991年   236篇
  1990年   180篇
  1989年   189篇
  1988年   280篇
  1987年   173篇
  1986年   75篇
  1985年   37篇
  1984年   20篇
  1981年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
随着我国经济的持续增长,国民收入逐步提高,人们生活水平日益提高,人们对家居环境的舒适性要求越来越高,空调成为人们家居生活不可缺少的重要组成部分。本文结合工程实例,对如何进行商住楼空调设计进行了探讨。  相似文献   
992.
李伟 《科技信息》2009,(15):58-58
伴随着网络和远程教育的发展,教学资源的共享和教学系统的互操作成为了一个十分重要也十分迫切的问题,这篇文章就来论述这种使我们当今社会上的教学发生了革命性变化的教育方式:远程教育。  相似文献   
993.
Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance.  相似文献   
994.
Earthquake may cause severe damage to all kinds of bridge such as the falling down of the girder; therefore,effective measures should be employed to control the seismic displacement. In this paper,the method of comprehensive optimal control,com-bined with analytic hierarchy process,is employed to investigate the seismic response control of the Nanjing Jiangxinzhou Bridge,which is a single-tower self-anchored suspension bridge (SSSB). Also,3-dimensional nonlinear seismic response analyses are con-ducted. Three types of practical connection measures for seismic response control of SSSB are investigated,and the optimal pa-rameters of the connection devices are achieved by this method. Results show that both the elastic connection devices and the damp-ers with rational parameters can reduce the seismic displacement of the bridge effectively,but the elastic connection devices will in-crease the seismic force of the tower. When all factors are consid-ered,the optimal measure is by using the elastic connection devices and the dampers together. These results can provide references for seismic response control of SSSBs.  相似文献   
995.
蔡春杰 《科技资讯》2011,(11):50-51
简述GPS的应用以及原理,RTK技术的原理、方法、组成结构、精度影响的因素、提高精度的注意事项等等.  相似文献   
996.
天富南热电的DCS系统采用华电南自的TCS3000系统,用以满足各种运行工况的要求,确保机组的安全、高效运行。该文讨论了模拟量控制、顺序控制、锅炉炉膛安全监控的原理方法,为今后工作提供一些经验和借鉴。  相似文献   
997.
The application of protograph low density parity check(LDPC) codes involves the encoding complexity problem.Since the generator matrices are dense,and if the positions of "1" s are irregularity,the encoder needs to store every "1" of the generator matrices by using huge chip area.In order to solve this problem,we need to design the protograph LDPC codes with circular generator matrices.A theorem concerning the circulating property of generator matrices of nonsingular protograph LDPC codes is proposed.The circulating property of generator matrix of nonsingular protograph LDPC codes can be obtained from the corresponding quasi-cyclic parity check matrix.This paper gives a scheme of constructing protograph LDPC codes with circulating generator matrices,and it reveals that the fast encoding algorithm of protograph LDPC codes has lower encoding complexity under the condition of the proposed theorem.Simulation results in additive white Gaussian noise(AWGN) channels show that the bit error rate(BER) performance of the designed codes based on the proposed theorem is much better than that of GB20600 LDPC codes and Tanner LDPC codes.  相似文献   
998.
本文讨论了烧结工序开展物质流和能量流的(火用)分析意义,应用物质流分析方法,建立了烧结工序的物质流和能量流(火用)分析模型.应用该模型,分析了烧结工序的(火用)效率、(火用)损失,指出了烧结工序的节能方向和途径.  相似文献   
999.
本文依据工业厂房的类型特点展开了对其暖通空调系统的节能设计探讨,着重就现实设计中存在的问题进行了深入研究并制定了科学的应对策略,对促进工业厂房暖通设备的节能优化、设计方案的合理完善有积极有效的推进作用。  相似文献   
1000.
The number of equivalent keys in multivariate cryptosystem is closely related to the scheme security. This study analyzes the structure of the private key space in some multivariate schemes.The result gives the lower bounds on the number of equivalent keys of some variants of the hidden field equation (HFE) scheme including plus, minus-plus, embedding, and internal perturbation. This method estimates the number of invertible transformations which maintain the form of the central map invariant. Furthermore,a formal proof shows that the two modifications of fixing and embedding are equivalent in security analyses of multivariate schemes. Also this paper corrects previous proofs in Wolf’s work on the number of equivalent keys in HFEv,the unbalanced oil and vinegar (UOV) scheme, and the stepwise triangular systems (STS).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号