首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9683篇
  免费   1179篇
  国内免费   935篇
化学   5041篇
晶体学   56篇
力学   689篇
综合类   238篇
数学   2126篇
物理学   3647篇
  2024年   28篇
  2023年   234篇
  2022年   302篇
  2021年   410篇
  2020年   329篇
  2019年   212篇
  2018年   173篇
  2017年   399篇
  2016年   449篇
  2015年   344篇
  2014年   538篇
  2013年   786篇
  2012年   587篇
  2011年   587篇
  2010年   513篇
  2009年   627篇
  2008年   624篇
  2007年   649篇
  2006年   521篇
  2005年   435篇
  2004年   378篇
  2003年   333篇
  2002年   316篇
  2001年   263篇
  2000年   254篇
  1999年   217篇
  1998年   183篇
  1997年   178篇
  1996年   172篇
  1995年   102篇
  1994年   128篇
  1993年   112篇
  1992年   71篇
  1991年   58篇
  1990年   53篇
  1989年   40篇
  1988年   29篇
  1987年   24篇
  1986年   30篇
  1985年   22篇
  1984年   24篇
  1983年   3篇
  1982年   18篇
  1981年   18篇
  1980年   3篇
  1979年   6篇
  1977年   5篇
  1975年   2篇
  1972年   2篇
  1959年   4篇
排序方式: 共有10000条查询结果,搜索用时 750 毫秒
21.
In this paper we obtain Lower Bounds (LBs) to concave cost network flow problems. The LBs are derived from state space relaxations of a dynamic programming formulation, which involve the use of non-injective mapping functions guaranteing a reduction on the cardinality of the state space. The general state space relaxation procedure is extended to address problems involving transitions that go across several stages, as is the case of network flow problems. Applications for these LBs include: estimation of the quality of heuristic solutions; local search methods that use information of the LB solution structure to find initial solutions to restart the search (Fontes et al., 2003, Networks, 41, 221–228); and branch-and-bound (BB) methods having as a bounding procedure a modified version of the LB algorithm developed here, (see Fontes et al., 2005a). These LBs are iteratively improved by penalizing, in a Lagrangian fashion, customers not exactly satisfied or by performing state space modifications. Both the penalties and the state space are updated by using the subgradient method. Additional constraints are developed to improve further the LBs by reducing the searchable space. The computational results provided show that very good bounds can be obtained for concave cost network flow problems, particularly for fixed-charge problems.  相似文献   
22.
Mode-matching and effective index methods are used to analyze single-mode operation of optical rib polymer waveguides. Their single-mode waveguiding conditions are determined. Single-mode rib waveguides fabricated from guest–host polyetherketone are presented. The estimated propagation loss of straight rib-waveguides is 0.7 dB/cm at 1.55 μm. Furthermore, by using the mode field-transfer matrix method, 2×2 and 4×4 polymer Mach–Zehnder interference switch operating at 1.55 μm wavelength has been designed based on optical multi-mode interference.  相似文献   
23.
We describe the pulse forming of pulsed CO2 laser using multi-pulse superposition technique. Various pulse shapes, high duty cycle pulse forming network (PFN) are constructed by time sequence. This study shows a technology that makes it possible to make various long pulse shapes by activating SCRs of three PFN modules consecutively at a desirable delay time with the aid of a PIC one-chip microprocessor. The power supply for this experiment consists of three PFN modules. Each PFN module uses a capacitor, a pulse forming inductor, a SCR, a high voltage pulse transformer, and a bridge rectifier on each transformer secondary. The PFN modules operate at low voltage by driving the primary of HV pulse transformer. The secondary of the transformer has a full-wave rectifier, which passes the pulse energy to the load in a continuous sequence.We investigated various long pulse shapes as different trigger time intervals of SCRs among three PFN modules. As a result, we could obtain laser beam with various pulse shapes and durations from about 250 to 1000 μs.  相似文献   
24.
A side-by-side comparison of the performance of McMaster pore-filled (MacPF) and commercial nanofiltration (NF) membranes is presented here. The single-salt and multi-component performance of these membranes is studied using experimental data and using a mathematical model. The pseudo two-dimensional model is based on the extended Nernst–Planck equation, a modified Poisson–Boltzmann equation, and hydrodynamic calculations. The model includes four structural properties of the membrane: pore radius, pure water permeability, surface charge density and the ratio of effective membrane thickness to water content. The analysis demonstrates that the rejection and transport mechanisms are the same in the commercial and MacPF membranes with different contributions from each type of mechanism (convection, diffusion and electromigration). Solute rejection in NF membranes is determined primarily by a combination of steric and electrostatic effects. The selectivity of MacPF membranes is primarily determined by electrostatic effects with a significantly smaller contribution of steric effects compared to commercial membranes. Hence, these membranes have the ability to reject ions while remaining highly permeable to low molecular weight organics. Additionally, a new theoretical membrane design approach is presented. This design procedure potentially offers the optimization of NF membrane performance by tailoring the membrane structure and operating variables to the specific process, simultaneously. The procedure is validated at the laboratory scale.  相似文献   
25.
A new prediction technique is proposed for chaotic time series. The usefulness of the technique is thatit can kick off some false neighbor points which are not suitable for the local estimation of the dynamics systems. Atime-delayed embedding is used to reconstruct the underlying attractor, and the prediction model is based on the timeevolution of the topological neighboring in the phase space. We use a feedforward neural network to approximate thelocal dominant Lyapunov exponent, and choose the spatial neighbors by the Lyapunov exponent. The model is testedfor the Mackey-Glass equation and the convection amplitude of lorenz systems. The results indicate that this predictiontechnique can improve the prediction of chaotic time series.  相似文献   
26.
On effectiveness of wiretap programs in mapping social networks   总被引:1,自引:0,他引:1  
Snowball sampling methods are known to be a biased toward highly connected actors and consequently produce core-periphery networks when these may not necessarily be present. This leads to a biased perception of the underlying network which can have negative policy consequences, as in the identification of terrorist networks. When snowball sampling is used, the potential overload of the information collection system is a distinct problem due to the exponential growth of the number of suspects to be monitored. In this paper, we focus on evaluating the effectiveness of a wiretapping program in terms of its ability to map the rapidly evolving networks within a covert organization. By running a series of simulation-based experiments, we are able to evaluate a broad spectrum of information gathering regimes based on a consistent set of criteria. We conclude by proposing a set of information gathering programs that achieve higher effectiveness then snowball sampling, and at a lower cost. Maksim Tsvetovat is an Assistant Professor at the Center for Social Complexity and department of Public and International Affairs at George Mason University, Fairfax, VA. He received his Ph.D. from the Computation, Organizations and Society program in the School of Computer Science, Carnegie Mellon University. His dissertation was centered on use of artificial intelligence techniques such as planning and semantic reasoning as a means of studying behavior and evolution of complex social networks, such as these of terrorist organizations. He received a Master of Science degree from University of Minnesota with a specialization in Artificial Intelligence and design of Multi-Agent Systems, and has also extensively studied organization theory and social science research methods. His research is centered on building high-fidelity simulations of social and organizational systems using concepts from distributed artificial intelligence and multi-agent systems. Other projects focus on social network analysis for mapping of internal corporate networks or study of covert and terrorist orgnaizations. Maksim’s vita and publications can be found on Kathleen M. Carley is a professor in the School of Computer Science at Carnegie Mellon University and the director of the center for Compuational Analysis of Social and Organizational Systems (CASOS) which has over 25 members, both students and research staff. Her research combines cognitive science, social networks and computer science to address complex social and organizational problems. Her specific research areas are dynamic network analysis, computational social and organization theory, adaptation and evolution, text mining, and the impact of telecommunication technologies and policy on communication, information diffusion, disease contagion and response within and among groups particularly in disaster or crisis situations. She and her lab have developed infrastructure tools for analyzing large scale dynamic networks and various multi-agent simulation systems. The infrastructure tools include ORA, a statistical toolkit for analyzing and visualizing multi-dimensional networks. ORA results are organized into reports that meet various needs such as the management report, the mental model report, and the intelligence report. Another tool is AutoMap, a text-mining systems for extracting semantic networks from texts and then cross-classifying them using an organizational ontology into the underlying social, knowledge, resource and task networks. Her simulation models meld multi-agent technology with network dynamics and empirical data. Three of the large-scale multi-agent network models she and the CASOS group have developed in the counter-terrorism area are: BioWar a city-scale dynamic-network agent-based model for understanding the spread of disease and illness due to natural epidemics, chemical spills, and weaponized biological attacks; DyNet a model of the change in covert networks, naturally and in response to attacks, under varying levels of information uncertainty; and RTE a model for examining state failure and the escalation of conflict at the city, state, nation, and international as changes occur within and among red, blue, and green forces. She is the founding co-editor with Al. Wallace of the journal Computational Organization Theory and has co-edited several books and written over 100 articles in the computational organizations and dynamic network area. Her publications can be found at: http://www.casos.cs.cmu.edu/bios/carley/publications.php  相似文献   
27.
Hybrid electrode combined coplanar waveguide (CPW) and microstrip lines in ultra-broadband electro-optic modulators. The characteristics of the modulators with hybrid electrode is like that of the modulator with the microstrip lines, in which the microstrip electrode is loaded above only one arm of Mach-Zehnder (M-Z) optical waveguide, besides the problem of microstrip line to coaxial transition and corona polarization in polymer modulators have been best solved at the same time. By using finite element method (FEM), the characteristic parameters such as half-wave voltage, modulation bandwidth characteristic impedance, effective microwave refractive index of polymer modulators with microstrip line and hybrid electrode are analysed and compared in this paper. The results present that velocity match, impendence match and lower microwave propagating loss is easily realized in modulators with hybrid electrode.  相似文献   
28.
从现行典型园区网络安全设计方案入手,结合其在安全防范解决方案上存在的问题,提出了一种网络主动安全模型;在全局网络安全认识的基础上.阐述了模型组成部件的功能定义和网络主动安全实现流程;采用统一网络入口认证、网络知识发现及资源有效控制、沟通等手段,解决了现行网络安全设计中存在的恶意攻击行为源头定位困难,以及信息安全司法取证不准、网络资源安全被动防护、网络灾难快速反映能力差等问题.实验结果表明,该设计方案具有较好的可行性和实用性.  相似文献   
29.
A simple, efficient and highly chemoselective method for tetrahydropyranylation of alcohols and phenols has been developed by their reaction with 3,4-dihydro-2H-pyran at room temperature in the presence of a catalytic amount of polystyrene supported AlCl3. The method is also highly selective for monoprotection of symmetrical diols.  相似文献   
30.
IntroductionFive- coordinated complexes with d9- configuredcations have received much attention stereochemi-cally,spectrochemically and biologically,and havebeen comprehensively discussed[1] . Usually thereare two stable configurations for the copper( )complexes with five equal coordinating atoms:anapically elongated square pyramid( SP) and a com-pressed trigonal bipyramid( TBP) ,with an obviousenergetic preference for the latter coordination.When the ligands are rigid and provide angular d…  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号