全文获取类型
收费全文 | 14115篇 |
免费 | 943篇 |
国内免费 | 465篇 |
专业分类
系统科学 | 1442篇 |
丛书文集 | 247篇 |
教育与普及 | 217篇 |
理论与方法论 | 318篇 |
现状及发展 | 923篇 |
研究方法 | 37篇 |
综合类 | 12335篇 |
自然研究 | 4篇 |
出版年
2024年 | 54篇 |
2023年 | 88篇 |
2022年 | 202篇 |
2021年 | 207篇 |
2020年 | 140篇 |
2019年 | 61篇 |
2018年 | 811篇 |
2017年 | 838篇 |
2016年 | 566篇 |
2015年 | 285篇 |
2014年 | 329篇 |
2013年 | 358篇 |
2012年 | 608篇 |
2011年 | 1310篇 |
2010年 | 1155篇 |
2009年 | 850篇 |
2008年 | 978篇 |
2007年 | 1213篇 |
2006年 | 370篇 |
2005年 | 387篇 |
2004年 | 388篇 |
2003年 | 458篇 |
2002年 | 429篇 |
2001年 | 378篇 |
2000年 | 302篇 |
1999年 | 383篇 |
1998年 | 314篇 |
1997年 | 329篇 |
1996年 | 281篇 |
1995年 | 206篇 |
1994年 | 228篇 |
1993年 | 217篇 |
1992年 | 163篇 |
1991年 | 157篇 |
1990年 | 140篇 |
1989年 | 118篇 |
1988年 | 96篇 |
1987年 | 52篇 |
1986年 | 36篇 |
1985年 | 17篇 |
1984年 | 5篇 |
1982年 | 1篇 |
1980年 | 1篇 |
1979年 | 3篇 |
1974年 | 1篇 |
1973年 | 3篇 |
1972年 | 1篇 |
1971年 | 3篇 |
1967年 | 2篇 |
1966年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Keeping Vehicular Ad hoc Network(VANET) from attacks requires secure and efficient distribution of information about bad entities. Negative messages are pieces of information that define the negative attributes of vehicles. By formally defining the negative message, we observe that accuracy is essential for its efficient distribution. We formally define the coverage percentage and accurate coverage percentage to describe the availability and distribution efficiency of negative message. These two metrics can jointly evaluate the performance of a distribution method. To obtain both high coverage percentage and high accurate coverage percentage, we propose meet-cloud, a scheme based on meet-table and cloud computing to securely and accurately distribute negative messages in VANET. A meet-table in a Road Side Unit(RSU) records the vehicles it encounters. All meettables are sent to cloud service to aggregate a global meet-table. The algorithm for distributing and redistributing negative messages are designed. Security analysis shows that meet-cloud is secure against fake and holding on to negative message attacks. Simulations and analysis demonstrate that meet-cloud is secure under denial of service and fake meet-table attacks. The simulation results also justify that meet-cloud outperforms the RSU broadcast and epidemic model. 相似文献
2.
3.
Through molecular dynamics(MD)simulation,the dependencies of temperature,grain size and strain rate on the mechanical properties were studied.The simulation results demonstrated that the strain rate from 0.05 to 2 ns~(–1 )affected the Young’s modulus of nickel nanowires slightly,whereas the yield stress increased.The Young’s modulus decreased approximately linearly;however,the yield stress firstly increased and subsequently dropped as the temperature increased.The Young’s modulus and yield stress increased as the mean grain size increased from 2.66 to6.72 nm.Moreover,certain efforts have been made in the microstructure evolution with mechanical properties association under uniaxial tension.Certain phenomena such as the formation of twin structures,which were found in nanowires with larger grain size at higher strain rate and lower temperature,as well as the movement of grain boundaries and dislocation,were detected and discussed in detail.The results demonstrated that the plastic deformation was mainly accommodated by the motion of grain boundaries for smaller grain size.However,for larger grain size,the formations of stacking faults and twins were the main mechanisms of plastic deformation in the polycrystalline nickel nanowire. 相似文献
4.
分析了不同的填充强化剂(后处理A液)、不同的后处理B液基料、后处理B液中水性环氧乳液的掺量及后处理液浸泡时间对石膏基打印器件耐水性、抗压强度、尺寸偏差、表面微观结构的影响.结果表明:经纳米硅超硬固化剂处理后的打印器件抗压强度大幅提高,纳米硅超硬固化剂最适宜作为后处理A液;水性聚氨酯乳液PU-202B最适宜作为后处理B液的基料;后处理B液中加入水性环氧乳液,处理后打印器件的抗压强度增加、吸水率降低,但水性环氧乳液含量增加到一定程度后会出现尺寸偏差;后处理A、B液最佳浸泡时间分别为130 s和35 s;先浸泡后处理A液、后浸泡后处理B液的打印器件具有抗压强度高、吸水率小、表面较光滑、不脱粉等优良性能. 相似文献
5.
LuJian-ke 《武汉大学学报:自然科学英文版》2004,9(1):1-5
The homogeneous quadratic Riemann boundary value problem (1) with Hoelder continuous coefficients for the normal case was considered by the author in 1997. But the solutions obtained there are incomplete. Here its general method of solution is obtained. 相似文献
6.
高中学生的物理成绩的调查与分析 总被引:1,自引:0,他引:1
任承南 《湖北师范学院学报(自然科学版)》2002,22(3):82-88
经过两年广泛的调查,对调查结果进行统计,按教育统计学相关分析的计算方法,逐条求出各单元的相应系数。并对量化的部分结果进行了初步分析,指出了高中学生学习物理困难的主要原因,以及进行矫治的初步措施。该调查采集面广,样本大,计算方法科学,量化结果数据可靠,所反映的信息具有一定的代表性,可供中学物理同仁在教学改革中参考。 相似文献
7.
Science Letters: A synthetic Toll-like receptor 2 ligand decreases allergic immune responses in a mouse rhinitis model sensitized to mite allergen 下载免费PDF全文
It has been proposed that activation of Toll-like receptors (TLRs) plays crucial roles in the polarization of adaptive immune responses. A synthetic Toll-like receptor 2 (TLR2) ligand, Pam3CSK4, has been reported to modulate the balance of Th1/Th2 responses. We evaluated the modulation effect of Pam3CSK4 on allergic immune response in a mouse rhinitis model sensitized to house dust mite allergen (HDM). Mice were sensitized and challenged with Dermatophagoidesfarinae allergen (Der f), and then the allergic mice were treated by Pam3CSK4. Nasal allergic symptoms and eosinophils were scored. Der f-specific cytokine responses were examined in the splenocytes and bronchoalveolar lavage fluid (BALF). Serum level of total IgE was also detected. After establishing a mouse allergic rhinitis model with HDM, we have showed that Pam3CSK4 treatment not only ameliorated the nasal allergic symptoms remarkably but also decreased the eosinophils and total inflammation cells in BALF significantly. Analysis of cytokine profile found that IFN-7 released from either BALF or stimulated splenocytes increased markedly in Pam3CSK4-treated mice, while IL-13 decreased significantly. Moreover, serum level of total IgE was significantly lower in Pam3CSK4-treated mice than in the untreated. Thus, in an allergic rhinitis mouse model developed with HDM, Pam3CSK4 was shown to exhibit an antiallergic effect, indicating its potential application in allergic diseases. 相似文献
8.
Static extracting method of software intended behavior based on API functions invoking 总被引:1,自引:0,他引:1
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack. 相似文献
9.
WANG Xibo ZHOU Benhai YU Gei LI Qian 《武汉大学学报:自然科学英文版》2007,12(5):946-950
μC/OS-Ⅱ is an open source real-time kernel adopting priority preemptive schedule strategy. Aiming at the problem of μC/OS-Ⅱ failing to support homology priority tasks scheduling, an approach for solution is proposed. The basic idea is adding round-robin scheduling strategy in its original scheduler in order to schedule homology priority tasks through time slice roundrobin. Implementation approach is given in detail. Firstly, the Task Control Block (TCB) is extended. And then, a new priority index table is created, in which each index pointer points to a set of homology priority tasks. Eventually, on the basis of reconstructing μC/OS-Ⅱ real-time kernel, task scheduling module is rewritten. Otherwise, schedulability of homology task supported by modified kernel had been analyzed, and deadline formula of created homology tasks is given. By theoretical analysis and experiment verification, the modified kernel can support homology priority tasks scheduling, meanwhile, it also remains preemptive property of original μC/OS-Ⅱ. 相似文献
10.
序列模式挖掘是数据挖掘的重要分支,GSP算法与PSP算法是序列模式挖掘中的两种典型算法。本文介绍了这两种算法并对其进行了分析与比较。 相似文献