首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14018篇
  免费   943篇
  国内免费   458篇
系统科学   1439篇
丛书文集   246篇
教育与普及   216篇
理论与方法论   318篇
现状及发展   923篇
研究方法   37篇
综合类   12236篇
自然研究   4篇
  2024年   54篇
  2023年   88篇
  2022年   199篇
  2021年   203篇
  2020年   138篇
  2019年   61篇
  2018年   809篇
  2017年   837篇
  2016年   564篇
  2015年   282篇
  2014年   326篇
  2013年   352篇
  2012年   605篇
  2011年   1310篇
  2010年   1153篇
  2009年   850篇
  2008年   974篇
  2007年   1212篇
  2006年   369篇
  2005年   384篇
  2004年   385篇
  2003年   457篇
  2002年   424篇
  2001年   373篇
  2000年   298篇
  1999年   372篇
  1998年   311篇
  1997年   322篇
  1996年   275篇
  1995年   203篇
  1994年   223篇
  1993年   215篇
  1992年   160篇
  1991年   156篇
  1990年   138篇
  1989年   118篇
  1988年   95篇
  1987年   52篇
  1986年   34篇
  1985年   17篇
  1984年   5篇
  1982年   1篇
  1980年   1篇
  1979年   3篇
  1974年   1篇
  1973年   3篇
  1972年   1篇
  1971年   3篇
  1967年   2篇
  1966年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
Keeping Vehicular Ad hoc Network(VANET) from attacks requires secure and efficient distribution of information about bad entities. Negative messages are pieces of information that define the negative attributes of vehicles. By formally defining the negative message, we observe that accuracy is essential for its efficient distribution. We formally define the coverage percentage and accurate coverage percentage to describe the availability and distribution efficiency of negative message. These two metrics can jointly evaluate the performance of a distribution method. To obtain both high coverage percentage and high accurate coverage percentage, we propose meet-cloud, a scheme based on meet-table and cloud computing to securely and accurately distribute negative messages in VANET. A meet-table in a Road Side Unit(RSU) records the vehicles it encounters. All meettables are sent to cloud service to aggregate a global meet-table. The algorithm for distributing and redistributing negative messages are designed. Security analysis shows that meet-cloud is secure against fake and holding on to negative message attacks. Simulations and analysis demonstrate that meet-cloud is secure under denial of service and fake meet-table attacks. The simulation results also justify that meet-cloud outperforms the RSU broadcast and epidemic model.  相似文献   
2.
在高海拔区域测制地形图,如青藏高原地区,所获取的遥感影像局部存在着大范围的高山阴影或云雪覆盖,造成立体观测地貌困难的现象,探讨应用SRTM数据对这类特殊区域地貌进行修测补绘。介绍了数据处理的作业过程,并对实验区SRTM与SPOT5影像立体测图成果进行实验对比分析,成果符合要求。  相似文献   
3.
Through molecular dynamics(MD)simulation,the dependencies of temperature,grain size and strain rate on the mechanical properties were studied.The simulation results demonstrated that the strain rate from 0.05 to 2 ns~(–1 )affected the Young’s modulus of nickel nanowires slightly,whereas the yield stress increased.The Young’s modulus decreased approximately linearly;however,the yield stress firstly increased and subsequently dropped as the temperature increased.The Young’s modulus and yield stress increased as the mean grain size increased from 2.66 to6.72 nm.Moreover,certain efforts have been made in the microstructure evolution with mechanical properties association under uniaxial tension.Certain phenomena such as the formation of twin structures,which were found in nanowires with larger grain size at higher strain rate and lower temperature,as well as the movement of grain boundaries and dislocation,were detected and discussed in detail.The results demonstrated that the plastic deformation was mainly accommodated by the motion of grain boundaries for smaller grain size.However,for larger grain size,the formations of stacking faults and twins were the main mechanisms of plastic deformation in the polycrystalline nickel nanowire.  相似文献   
4.
分析了不同的填充强化剂(后处理A液)、不同的后处理B液基料、后处理B液中水性环氧乳液的掺量及后处理液浸泡时间对石膏基打印器件耐水性、抗压强度、尺寸偏差、表面微观结构的影响.结果表明:经纳米硅超硬固化剂处理后的打印器件抗压强度大幅提高,纳米硅超硬固化剂最适宜作为后处理A液;水性聚氨酯乳液PU-202B最适宜作为后处理B液的基料;后处理B液中加入水性环氧乳液,处理后打印器件的抗压强度增加、吸水率降低,但水性环氧乳液含量增加到一定程度后会出现尺寸偏差;后处理A、B液最佳浸泡时间分别为130 s和35 s;先浸泡后处理A液、后浸泡后处理B液的打印器件具有抗压强度高、吸水率小、表面较光滑、不脱粉等优良性能.  相似文献   
5.
Reconsideration on Homogeneous Quadratic Riemann Boundary Value Problem   总被引:1,自引:0,他引:1  
The homogeneous quadratic Riemann boundary value problem (1) with Hoelder continuous coefficients for the normal case was considered by the author in 1997. But the solutions obtained there are incomplete. Here its general method of solution is obtained.  相似文献   
6.
高中学生的物理成绩的调查与分析   总被引:1,自引:0,他引:1  
经过两年广泛的调查,对调查结果进行统计,按教育统计学相关分析的计算方法,逐条求出各单元的相应系数。并对量化的部分结果进行了初步分析,指出了高中学生学习物理困难的主要原因,以及进行矫治的初步措施。该调查采集面广,样本大,计算方法科学,量化结果数据可靠,所反映的信息具有一定的代表性,可供中学物理同仁在教学改革中参考。  相似文献   
7.
It has been proposed that activation of Toll-like receptors (TLRs) plays crucial roles in the polarization of adaptive immune responses. A synthetic Toll-like receptor 2 (TLR2) ligand, Pam3CSK4, has been reported to modulate the balance of Th1/Th2 responses. We evaluated the modulation effect of Pam3CSK4 on allergic immune response in a mouse rhinitis model sensitized to house dust mite allergen (HDM). Mice were sensitized and challenged with Dermatophagoidesfarinae allergen (Der f), and then the allergic mice were treated by Pam3CSK4. Nasal allergic symptoms and eosinophils were scored. Der f-specific cytokine responses were examined in the splenocytes and bronchoalveolar lavage fluid (BALF). Serum level of total IgE was also detected. After establishing a mouse allergic rhinitis model with HDM, we have showed that Pam3CSK4 treatment not only ameliorated the nasal allergic symptoms remarkably but also decreased the eosinophils and total inflammation cells in BALF significantly. Analysis of cytokine profile found that IFN-7 released from either BALF or stimulated splenocytes increased markedly in Pam3CSK4-treated mice, while IL-13 decreased significantly. Moreover, serum level of total IgE was significantly lower in Pam3CSK4-treated mice than in the untreated. Thus, in an allergic rhinitis mouse model developed with HDM, Pam3CSK4 was shown to exhibit an antiallergic effect, indicating its potential application in allergic diseases.  相似文献   
8.
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.  相似文献   
9.
μC/OS-Ⅱ is an open source real-time kernel adopting priority preemptive schedule strategy. Aiming at the problem of μC/OS-Ⅱ failing to support homology priority tasks scheduling, an approach for solution is proposed. The basic idea is adding round-robin scheduling strategy in its original scheduler in order to schedule homology priority tasks through time slice roundrobin. Implementation approach is given in detail. Firstly, the Task Control Block (TCB) is extended. And then, a new priority index table is created, in which each index pointer points to a set of homology priority tasks. Eventually, on the basis of reconstructing μC/OS-Ⅱ real-time kernel, task scheduling module is rewritten. Otherwise, schedulability of homology task supported by modified kernel had been analyzed, and deadline formula of created homology tasks is given. By theoretical analysis and experiment verification, the modified kernel can support homology priority tasks scheduling, meanwhile, it also remains preemptive property of original μC/OS-Ⅱ.  相似文献   
10.
序列模式挖掘是数据挖掘的重要分支,GSP算法与PSP算法是序列模式挖掘中的两种典型算法。本文介绍了这两种算法并对其进行了分析与比较。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号