全文获取类型
收费全文 | 139篇 |
免费 | 0篇 |
国内免费 | 24篇 |
专业分类
教育 | 112篇 |
科学研究 | 30篇 |
各国文化 | 5篇 |
体育 | 3篇 |
信息传播 | 13篇 |
出版年
2024年 | 4篇 |
2023年 | 9篇 |
2021年 | 2篇 |
2019年 | 1篇 |
2016年 | 2篇 |
2015年 | 5篇 |
2014年 | 8篇 |
2013年 | 5篇 |
2012年 | 11篇 |
2011年 | 5篇 |
2010年 | 3篇 |
2009年 | 1篇 |
2008年 | 10篇 |
2007年 | 17篇 |
2006年 | 13篇 |
2005年 | 6篇 |
2004年 | 2篇 |
2003年 | 7篇 |
2002年 | 12篇 |
2001年 | 10篇 |
2000年 | 7篇 |
1999年 | 5篇 |
1998年 | 5篇 |
1997年 | 1篇 |
1996年 | 7篇 |
1994年 | 2篇 |
1992年 | 2篇 |
1991年 | 1篇 |
排序方式: 共有163条查询结果,搜索用时 31 毫秒
51.
52.
A GIS-based approach for estimating spatial distribution of seasonal temperature in Zhejiang Province,China 总被引:2,自引:0,他引:2
LI Jun HUANG Jing-feng WANG Xiu-zhen 《浙江大学学报(A卷英文版)》2006,7(4):647-656
INTRODUCTION Spatial distribution estimates of meteorological data are becoming increasing important as inputs to spatially explicit landscape, regional, and global models. Interpolation is a common method translating for estimated spatial distribution of meteorological data that come from distantly scattered meteorologi- cal stations into raster data, which has benefits of simplicity and convenience. The choice of spatial interpolator is especially important in mountainous areas where dat… 相似文献
53.
ZHANG Wei SUN Jun LIU Jing ZHANG Hai-bin 《浙江大学学报(A卷英文版)》2007,8(1):18-23
INTRODUCTION IEEE 802.11e is designed to support multimedia applications. The main and mandatory scheme of IEEE 802.11e standard is enhanced distributed channel access (EDCA), which adopts service dif-ferentiation in configuration. The performance analysis of EDCA has been extensively studied by analytical or numerical means in recent years (Kong et al., 2004; Xiao, 2005; Zhu and Chlamtac, 2005; Hui and Devetsikiotis, 2005; Zhang et al., 2006). With the help of these works, perf… 相似文献
54.
An approach for generating interactive 3D graphical visualization of the genetic architectures of complex traits in multiple environments is described. 3D graphical visualization is utilized for making improvements on traditional plots in quan- titative trait locus (QTL) mapping analysis. Interactive 3D graphical visualization for abstract expression of QTL, epistasis and their environmental interactions for experimental populations was developed in framework of user-friendly software QTLNetwork (http://ibi.zju.edu.cn/software/qtlnetwork). Novel definition of graphical meta system and computation of virtual coordinates are used to achieve explicit but meaningful visualization. Interactive 3D graphical visualization for QTL analysis provides geneticists and breeders a powerful and easy-to-use tool to analyze and publish their research results. 相似文献
55.
WU Jun LIU Jingbo DU Yixin 《天津大学学报(英文版)》2006,12(B09):161-164
The injury of gunners caused by muzzle shock-wave has always been a great problem when firing inside the protective cover. The distribution regularity and personnel injury from the muzzle blast-wave were investigated by both test and numerical simulation. Through the inside firing test, the changes of overpressure and noise have been measured at different measuring points in the thin-wall cover structure with different open widths and shallow covering thickness. The distribution regularity of muzzle shock-wave with different firing port widths is calculated by ANSYS/LS- DYNA software. The overpressure distribution curves of muzzle shock-wave inside the structure can be obtained by comparing the test results with the numerical results. Then, the influence of open width and shallow covering thickness is proposed to give a reference to the protective design under the condition of the inside firing with the same cannon caliber. 相似文献
56.
从新编化学实验教材引起的思考上海市静安区教育学院(200040)刘泽珺在目前使用的化学教材中,实验内容依附在讲习教材之后,往往是先集中介绍各项基本操作,再按教材的知识序列依次编排学生实验。虽然每个实验要求的具体操作项目都很明确,但是实验目的仍以理解和... 相似文献
57.
59.
In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc networks is proposed.In this scheme, a sender can simultaneously signcrypt n messeges for n receivers, and a receiver can unsigncrypt the ciphertext to get his message with his own private key.An analysis of this scheme indicates that it achieves authenticity and confidentiality in the random oracle model while being of lower computation and communication overhead.Finally, for the application of our scheme in ad hoc, a threshold key updating protocol for ad hoc networks is given. 相似文献
60.