首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   22868篇
  免费   878篇
  国内免费   1798篇
系统科学   914篇
丛书文集   730篇
教育与普及   696篇
理论与方法论   83篇
现状及发展   94篇
综合类   23027篇
  2024年   156篇
  2023年   624篇
  2022年   684篇
  2021年   961篇
  2020年   771篇
  2019年   613篇
  2018年   283篇
  2017年   415篇
  2016年   507篇
  2015年   744篇
  2014年   1155篇
  2013年   1062篇
  2012年   1253篇
  2011年   1517篇
  2010年   1005篇
  2009年   1436篇
  2008年   1832篇
  2007年   1958篇
  2006年   1590篇
  2005年   1059篇
  2004年   828篇
  2003年   600篇
  2002年   485篇
  2001年   469篇
  2000年   575篇
  1999年   540篇
  1998年   149篇
  1997年   117篇
  1996年   125篇
  1995年   104篇
  1994年   95篇
  1993年   298篇
  1992年   307篇
  1991年   246篇
  1990年   183篇
  1989年   197篇
  1988年   287篇
  1987年   176篇
  1986年   76篇
  1985年   36篇
  1984年   20篇
  1983年   2篇
  1981年   4篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
971.
王晶 《科技信息》2013,(2):215+218-215,218
本文介绍了一种只用模拟和数字电子技术设计数控直流稳压电源的方法。  相似文献   
972.
Multi-instance multi-label learning(MIML) is a new machine learning framework where one data object is described by multiple instances and associated with multiple class labels.During the past few years,many MIML algorithms have been developed and many applications have been described.However,there lacks theoretical exploration to the learnability of MIML.In this paper,through proving a generalization bound for multi-instance single-label learner and viewing MIML as a number of multi-instance single-label learning subtasks with the correlation among the labels,we show that the MIML hypothesis class constructed from a multi-instance single-label hypothesis class is PAC-learnable.  相似文献   
973.
李伟 《科技信息》2009,(15):58-58
伴随着网络和远程教育的发展,教学资源的共享和教学系统的互操作成为了一个十分重要也十分迫切的问题,这篇文章就来论述这种使我们当今社会上的教学发生了革命性变化的教育方式:远程教育。  相似文献   
974.
Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance.  相似文献   
975.
Earthquake may cause severe damage to all kinds of bridge such as the falling down of the girder; therefore,effective measures should be employed to control the seismic displacement. In this paper,the method of comprehensive optimal control,com-bined with analytic hierarchy process,is employed to investigate the seismic response control of the Nanjing Jiangxinzhou Bridge,which is a single-tower self-anchored suspension bridge (SSSB). Also,3-dimensional nonlinear seismic response analyses are con-ducted. Three types of practical connection measures for seismic response control of SSSB are investigated,and the optimal pa-rameters of the connection devices are achieved by this method. Results show that both the elastic connection devices and the damp-ers with rational parameters can reduce the seismic displacement of the bridge effectively,but the elastic connection devices will in-crease the seismic force of the tower. When all factors are consid-ered,the optimal measure is by using the elastic connection devices and the dampers together. These results can provide references for seismic response control of SSSBs.  相似文献   
976.
蔡春杰 《科技资讯》2011,(11):50-51
简述GPS的应用以及原理,RTK技术的原理、方法、组成结构、精度影响的因素、提高精度的注意事项等等.  相似文献   
977.
天富南热电的DCS系统采用华电南自的TCS3000系统,用以满足各种运行工况的要求,确保机组的安全、高效运行。该文讨论了模拟量控制、顺序控制、锅炉炉膛安全监控的原理方法,为今后工作提供一些经验和借鉴。  相似文献   
978.
The application of protograph low density parity check(LDPC) codes involves the encoding complexity problem.Since the generator matrices are dense,and if the positions of "1" s are irregularity,the encoder needs to store every "1" of the generator matrices by using huge chip area.In order to solve this problem,we need to design the protograph LDPC codes with circular generator matrices.A theorem concerning the circulating property of generator matrices of nonsingular protograph LDPC codes is proposed.The circulating property of generator matrix of nonsingular protograph LDPC codes can be obtained from the corresponding quasi-cyclic parity check matrix.This paper gives a scheme of constructing protograph LDPC codes with circulating generator matrices,and it reveals that the fast encoding algorithm of protograph LDPC codes has lower encoding complexity under the condition of the proposed theorem.Simulation results in additive white Gaussian noise(AWGN) channels show that the bit error rate(BER) performance of the designed codes based on the proposed theorem is much better than that of GB20600 LDPC codes and Tanner LDPC codes.  相似文献   
979.
本文讨论了烧结工序开展物质流和能量流的(火用)分析意义,应用物质流分析方法,建立了烧结工序的物质流和能量流(火用)分析模型.应用该模型,分析了烧结工序的(火用)效率、(火用)损失,指出了烧结工序的节能方向和途径.  相似文献   
980.
The number of equivalent keys in multivariate cryptosystem is closely related to the scheme security. This study analyzes the structure of the private key space in some multivariate schemes.The result gives the lower bounds on the number of equivalent keys of some variants of the hidden field equation (HFE) scheme including plus, minus-plus, embedding, and internal perturbation. This method estimates the number of invertible transformations which maintain the form of the central map invariant. Furthermore,a formal proof shows that the two modifications of fixing and embedding are equivalent in security analyses of multivariate schemes. Also this paper corrects previous proofs in Wolf’s work on the number of equivalent keys in HFEv,the unbalanced oil and vinegar (UOV) scheme, and the stepwise triangular systems (STS).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号