首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   139篇
  免费   0篇
  国内免费   24篇
教育   112篇
科学研究   30篇
各国文化   5篇
体育   3篇
信息传播   13篇
  2024年   4篇
  2023年   9篇
  2021年   2篇
  2019年   1篇
  2016年   2篇
  2015年   5篇
  2014年   8篇
  2013年   5篇
  2012年   11篇
  2011年   5篇
  2010年   3篇
  2009年   1篇
  2008年   10篇
  2007年   17篇
  2006年   13篇
  2005年   6篇
  2004年   2篇
  2003年   7篇
  2002年   12篇
  2001年   10篇
  2000年   7篇
  1999年   5篇
  1998年   5篇
  1997年   1篇
  1996年   7篇
  1994年   2篇
  1992年   2篇
  1991年   1篇
排序方式: 共有163条查询结果,搜索用时 31 毫秒
51.
52.
INTRODUCTION Spatial distribution estimates of meteorological data are becoming increasing important as inputs to spatially explicit landscape, regional, and global models. Interpolation is a common method translating for estimated spatial distribution of meteorological data that come from distantly scattered meteorologi- cal stations into raster data, which has benefits of simplicity and convenience. The choice of spatial interpolator is especially important in mountainous areas where dat…  相似文献   
53.
INTRODUCTION IEEE 802.11e is designed to support multimedia applications. The main and mandatory scheme of IEEE 802.11e standard is enhanced distributed channel access (EDCA), which adopts service dif-ferentiation in configuration. The performance analysis of EDCA has been extensively studied by analytical or numerical means in recent years (Kong et al., 2004; Xiao, 2005; Zhu and Chlamtac, 2005; Hui and Devetsikiotis, 2005; Zhang et al., 2006). With the help of these works, perf…  相似文献   
54.
An approach for generating interactive 3D graphical visualization of the genetic architectures of complex traits in multiple environments is described. 3D graphical visualization is utilized for making improvements on traditional plots in quan- titative trait locus (QTL) mapping analysis. Interactive 3D graphical visualization for abstract expression of QTL, epistasis and their environmental interactions for experimental populations was developed in framework of user-friendly software QTLNetwork (http://ibi.zju.edu.cn/software/qtlnetwork). Novel definition of graphical meta system and computation of virtual coordinates are used to achieve explicit but meaningful visualization. Interactive 3D graphical visualization for QTL analysis provides geneticists and breeders a powerful and easy-to-use tool to analyze and publish their research results.  相似文献   
55.
The injury of gunners caused by muzzle shock-wave has always been a great problem when firing inside the protective cover. The distribution regularity and personnel injury from the muzzle blast-wave were investigated by both test and numerical simulation. Through the inside firing test, the changes of overpressure and noise have been measured at different measuring points in the thin-wall cover structure with different open widths and shallow covering thickness. The distribution regularity of muzzle shock-wave with different firing port widths is calculated by ANSYS/LS- DYNA software. The overpressure distribution curves of muzzle shock-wave inside the structure can be obtained by comparing the test results with the numerical results. Then, the influence of open width and shallow covering thickness is proposed to give a reference to the protective design under the condition of the inside firing with the same cannon caliber.  相似文献   
56.
从新编化学实验教材引起的思考上海市静安区教育学院(200040)刘泽珺在目前使用的化学教材中,实验内容依附在讲习教材之后,往往是先集中介绍各项基本操作,再按教材的知识序列依次编排学生实验。虽然每个实验要求的具体操作项目都很明确,但是实验目的仍以理解和...  相似文献   
57.
58.
59.
In this paper, the security technology of ad hoc networks is studied.To improve the previous multi-receiver signcryption schemes, an ID-based multi-message and multi-receiver signcryption scheme for rekeying in ad hoc networks is proposed.In this scheme, a sender can simultaneously signcrypt n messeges for n receivers, and a receiver can unsigncrypt the ciphertext to get his message with his own private key.An analysis of this scheme indicates that it achieves authenticity and confidentiality in the random oracle model while being of lower computation and communication overhead.Finally, for the application of our scheme in ad hoc, a threshold key updating protocol for ad hoc networks is given.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号