首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   920篇
  免费   7篇
  国内免费   41篇
教育   730篇
科学研究   139篇
体育   6篇
综合类   64篇
信息传播   29篇
  2023年   1篇
  2022年   7篇
  2021年   8篇
  2020年   5篇
  2019年   10篇
  2018年   5篇
  2017年   3篇
  2016年   8篇
  2015年   28篇
  2014年   58篇
  2013年   45篇
  2012年   56篇
  2011年   90篇
  2010年   54篇
  2009年   55篇
  2008年   55篇
  2007年   79篇
  2006年   70篇
  2005年   58篇
  2004年   48篇
  2003年   40篇
  2002年   40篇
  2001年   34篇
  2000年   27篇
  1999年   20篇
  1998年   14篇
  1997年   21篇
  1996年   12篇
  1995年   5篇
  1994年   2篇
  1993年   3篇
  1992年   3篇
  1991年   2篇
  1989年   2篇
排序方式: 共有968条查询结果,搜索用时 46 毫秒
1.
构建网络安全防护体系   总被引:1,自引:0,他引:1  
随着计算机技术和通信技术的发展,计算机网络将日益成为工业、农业和国防等方面的重要信息交换手段,渗透到社会生活的各个领域.网络安全问题日益突出,为了提高网络的整体安全水平必须全方位的构建网络安全防护体系,本文介绍网络安全防护体系的构建过程,并描述网络安全防护体系结构.  相似文献   
2.
Bast fibres have been commonly used as a textile material in Northern Europe since Neolithic times. However, the process of identifying the different species has been problematic, and many important questions related to their cultural history are still unanswered. For example, a modified Herzog test and the presence of calcium oxalate crystals have both been used in identification. In order to generate more reliable results, further research and advancement in multi-methodological methods is required. This paper introduces a combination of methods which can be used to identify and distinguish flax (Linum usitatissimum), hemp (Cannabis sativa), and stinging nettle (Urtica dioica). The research material consisted of reference fibres and 25 fibre samples obtained from 12 textiles assumed to be made of nettle. The textiles were from the Finno-Ugric and Historical Collections of The National Museum of Finland. The fibre samples were studied by observing the surface characteristics and cross sections with transmitted light microscopy, and by using a modified Herzog test with polarized light, in order to identify the distinguishable features in their morphological structures. The study showed that five out of 25 samples were cotton, 16 nettle, one flax, and one hemp. Findings from two samples were inconsistent. The results show that it is possible to distinguish common north European bast fibres from each other by using a combination of microscopic methods. Furthermore, by utilizing these combined methods, new and more reliable information could be obtained from historical ethnographic textiles, which creates new vistas for the interpretation of their cultural history.  相似文献   
3.
本文论述一个由单片机和双端口存储器构成的加密机,阐述了加密机的工作原理和操作流程.由于双端口RAM的采用,支持中断机制,同步与协调控制单片机与算法单片机并行工作,双端口RAM弹性连接控制单片机与算法单片机,匹配它们的传输速率和处理能力,提高了加解密的处理效率,控制单片与主机之间可进行全双工通信,这样的传输可以节省控制单片机的时间,提高效率.  相似文献   
4.
根据河南省漯河至界首(简称漯周界界)高速公路的实际情况,分析了高速公路通信系统中传输的业务,给出了光中继段的估算方法、网络拓扑结构、网络保护方式、网同步方式、网络管理方式等.设计方案不仅满足现有业务对系统容量和技术要求,并为网络的扩展提供了技术上的可行性.  相似文献   
5.
Modern high-security cryptography and optical communication call for covert bit sequences with high coding capacity and efficient authentication. Stimuli-responsive lasing emissions with easily distinguishable readout are promising in the coding field as a novel cryptographic primitive, while the application is frequently restricted by the limited number of emission states. Here, we report a strategy of achieving multiple competitive lasing signals in responsive organic microspheres where a donor–acceptor pair was introduced. The competitive lasing from the donor and acceptor was reversibly switched by modulating the competition between the radiative rate of the donor and the rate of energy transfer, and the generated multiple lasing signals enabled a quaternary coding for recognizable cryptographic implementation. Data encryption and extraction were demonstrated using a 4 × 4 microlaser array, showing vast prospects in avoiding the disclosure of security information. The results offer a comprehensive understanding of excited-state dynamics in organic composite materials, which may play a major role in high-security optical recording and information encryption.  相似文献   
6.
According to the statistics of the World Health Organization, an estimated 17.9 million people die from cardiovascular diseases each year, representing 31% of all global deaths. Continuous non-invasive arterial pressure (CNAP) is essential for the management of cardiovascular diseases. However, it is difficult to achieve long-term CNAP monitoring with the daily use of current devices due to irritation of the skin as well as the lack of motion artifacts suppression. Here, we report a high-performance skin-like optoelectronic system integrated with ultra-thin flexible circuits to monitor CNAP. We introduce a theoretical model via the virtual work principle for predicting the precise blood pressure and suppressing motion artifacts, and propose optical difference in the frequency domain for stable optical measurements in terms of skin-like devices. We compare the results with the blood pressure acquired by invasive (intra-arterial) blood pressure monitoring for >1500 min in total on 44 subjects in an intensive care unit. The maximum absolute errors of diastolic and systolic blood pressure were ±7/±10 mm Hg, respectively, in immobilized, and ±10/±14 mm Hg, respectively, in walking scenarios. These strategies provide advanced blood pressure monitoring techniques, which would directly address an unmet clinical need or daily use for a highly vulnerable population.  相似文献   
7.
DES是我国信息传递领域中通常采用的密码算法,在金卡工程中得到广泛应用。本文分析了DES算法的加密和解密规则,指出了DES算法中存在的缺陷,介绍了加强DES算法安全性的七种改进措施。  相似文献   
8.
全光纤无源耦合器件制作过程中的实践创新能力培养   总被引:1,自引:0,他引:1  
结合本科生毕业设计“全光纤光功率比耦合器件的制备”的实践过程,在理论上基于光波的耦合波方程,对熔融拉锥单模光纤耦合器的功率耦合比与拉伸长度、拉伸位置和损耗的关系进行数值模拟,使本科生在毕业设计的有限时间内掌握一种基本软件工具。通过设计过程中的实践活动,学生在指导教师的科研理念引导下,利用实验室现有的设备制作出2×2型、单窗口1×2型1550 nm和1310 nm宽带耦合器, 并完成了对制备出的光纤耦合器的光功率和光谱的检测。在实践教学过程中,突出体现了知识、能力、科研素质提高和创新能力的培养。通过无源耦合器件的制备,培养了学生的实践动手能力和科研思维能力, 为今后的学习或就业奠定了良好的基础。  相似文献   
9.
提出了一种测量三维火焰温度的新方法 .根据光学分层成像理论 ,三维火焰可以看成若干个互相平行的二维发光断层的组合 .用高速摄像控制系统沿着某一固定方向对火焰进行分层聚焦摄像 ,得到一组辐射图像 ,每个图像都是其对应断层的聚焦像和其它断层离焦像的叠加像 ,运用图像反演算法 ,即可重建各断层的原始图像 ,再用彩色三基色测温方法 ,处理所得到的原始图像 ,即可建立火焰的三维温度场 .通过蜡烛火焰的试验 ,验证了该方法的可行性  相似文献   
10.
计算机网络是一个分层的体系结构,对每一层都有其有代表的物理设备,每一层都有其相应的服务与协议,而网络安全就渗入到每一层中,采取相应的网络设备和安全策略,从传输技术上分类的两种网络:局域网和广域网采取了不同的安全方法。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号