首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2630篇
  免费   237篇
  国内免费   122篇
化学   1477篇
晶体学   4篇
力学   88篇
综合类   87篇
数学   826篇
物理学   507篇
  2024年   1篇
  2023年   23篇
  2022年   49篇
  2021年   67篇
  2020年   61篇
  2019年   49篇
  2018年   52篇
  2017年   97篇
  2016年   92篇
  2015年   81篇
  2014年   109篇
  2013年   194篇
  2012年   171篇
  2011年   152篇
  2010年   151篇
  2009年   154篇
  2008年   189篇
  2007年   173篇
  2006年   180篇
  2005年   165篇
  2004年   138篇
  2003年   107篇
  2002年   88篇
  2001年   87篇
  2000年   39篇
  1999年   45篇
  1998年   30篇
  1997年   29篇
  1996年   23篇
  1995年   22篇
  1994年   26篇
  1993年   28篇
  1992年   21篇
  1991年   14篇
  1990年   12篇
  1989年   8篇
  1988年   8篇
  1987年   7篇
  1986年   2篇
  1985年   5篇
  1984年   10篇
  1983年   2篇
  1982年   5篇
  1981年   3篇
  1980年   9篇
  1979年   5篇
  1978年   3篇
  1977年   1篇
  1973年   2篇
排序方式: 共有2989条查询结果,搜索用时 31 毫秒
71.
We present the minimum‐energy structures and energetics of clusters of the linear N2O molecule with small numbers of para‐hydrogen molecules with pairwise additive potentials. Interaction energies of (p‐H2)–N2O and (p‐H2)–(p‐H2) complexes were calculated by averaging the corresponding full‐dimensional potentials over the H2 angular coordinates. The averaged (p‐H2)–N2O potential has three minima corresponding to the T‐shaped and the linear (p‐H2)–ONN and (p‐H2)–NNO structures. Optimization of the minimum‐energy structures was performed using a Genetic Algorithm. It was found that p‐H2 molecules fill three solvation rings around the N2O axis, each of them containing up to five p‐H2 molecules, followed by accumulation of two p‐H2 molecules at the oxygen and nitrogen ends. The first solvation shell is completed at N = 17. The calculated chemical potential oscillates with cluster size up to the completed first solvation shell. These results are consistent with the available experimental measurements. © 2009 Wiley Periodicals, Inc. J Comput Chem, 2009  相似文献   
72.
A basic problem in the theory of simple games and other fields is to study whether a simple game (Boolean function) is weighted (linearly separable). A second related problem consists in studying whether a weighted game has a minimum integer realization. In this paper we simultaneously analyze both problems by using linear programming. For less than 9 voters, we find that there are 154 weighted games without minimum integer realization, but all of them have minimum normalized realization. Isbell in 1958 was the first to find a weighted game without a minimum normalized realization, he needed to consider 12 voters to construct a game with such a property. The main result of this work proves the existence of weighted games with this property with less than 12 voters. This research was partially supported by Grant MTM 2006-06064 of “Ministerio de Ciencia y Tecnología y el Fondo Europeo de Desarrollo Regional” and SGRC 2005-00651 of “Generalitat de Catalunya”, and by the Spanish “Ministerio de Ciencia y Tecnología” programmes ALINEX (TIN2005-05446 and TIN2006-11345).  相似文献   
73.
In this work we present a thorough investigation of the effect of noise (internal or external) on the synchronization of a drive-response configuration system (unidirectional coupling between two identical systems). Moreover, since in every practical implementation of a communication system, the transmitter and receiver circuits (although identical) operate under slightly different conditions it is essential to consider the case of the mismatch between the parameters of the transmitter and the receiver. In our work we consider the non-autonomous 2nd order nonlinear oscillator system presented in [G. Mycolaitis, A. Tamasevicious, A. Cenys, A. Namajunas, K. Navionis, A. N. Anagnostopoulos, Globally synchronizable non-autonomous chaotic oscillator, in: Proc. of 7th International Workshop on Nonlinear Dynamics of Electronic Systems, Denmark, July 1999, pp. 277-280] which is particularly suitable for digital communications.Furthermore, we modified the previous chaotic communication system in order to exhibit enhanced security features. The enhancement in the security of the system is achieved by introducing a set of parameters used in the encoding and decoding of the message signal. We also introduce a time delay parameter in the dynamical system which on the one hand improves the chaotic behavior of the system and on the other hand, adds further security in the encoding-decoding scheme.  相似文献   
74.
This work analyzes a two echelon (warehouse–retailer) serial supply chain to study the impact of information sharing (IS) and lead time on bullwhip effect and on-hand inventory. The customer demand at the retailer is assumed to be an autoregressive (AR(1)) process. Both the echelons use a minimum mean squared error (MMSE) model for forecasting lead time demand (LTD), and follow an adaptive base-stock inventory policy to determine their respective order quantities. For the cases of without IS and inter as well as intra echelon IS, expressions for the bullwhip effect and on-hand inventory for the warehouse are obtained, considering deterministic lead-time. The results are compared with the previous research work and an easy analysis of the various bullwhip effect expressions under different scenarios, is done to understand the impact of IS on the bullwhip effect phenomenon. It is shown that some part of bullwhip effect will always remain even after sharing both inter as well as intra echelon information. Further, with the help of a numerical example it is shown that the lead time reduction is more beneficial in comparison to the sharing of information in terms of reduction in the bullwhip effect phenomenon.  相似文献   
75.
Factorial designs are arguably the most widely used designs in scientific investigations. Generalized minimum aberration (GMA) and uniformity are two important criteria for evaluating both regular and non-regular designs. The generation of GMA designs is a non-trivial problem due to the sequential optimization nature of the criterion. Based on an analytical expression between the generalized wordlength pattern and a uniformity measure, this paper converts the generation of GMA designs to a constrained optimization problem, and provides effective algorithms for solving this particular problem. Moreover, many new designs with GMA or near-GMA are reported, which are also (nearly) optimal under the uniformity measure.  相似文献   
76.
The first practical identity based encryption (IBE) scheme was published by Boneh and Franklin at Crypto 2001, based on the elliptic curve pairing. Since that time, many other IBE schemes have been published. In this paper, we describe a variant of Boneh-Franklin with a tight reduction in the random oracle model. Our new scheme is quite efficient compared to existing schemes; moreover, upgrading from Boneh-Franklin to our new scheme is straightforward.   相似文献   
77.
提出一种基于Hamilton路模型的新方法研究蛋白质结构预测问题,为使结构匹配序列,把已知蛋白质的3D结构信息转化为一个加权的完全图Kn,则求这个特定空间结构所匹配的氨基酸残基序列问题转化为求Kn图的最小H路问题.用此方法研究了72个单链蛋白质结构,结果表明Kn图的最小H路对应此蛋白质的序列,图的顶点数n与最小H路总长度成正比.  相似文献   
78.
Supercritical carbon dioxide (scCO2) is an inexpensive and environmentally friendly medium for radical polymerizations. ScCO2 is suited for heterogeneous controlled/living radical polymerizations (CLRPs), since the monomer, initiator, and control reagents (nitroxide, etc.) are soluble, but the polymer formed is insoluble beyond a critical degree of polymerization (Jcrit). The precipitated polymer can continue growing in (only) the particle phase giving living polymer of controlled well‐defined microstructure. The addition of a colloidal stabilizer gives a dispersion polymerization with well‐defined colloidal particles being formed. In recent years, nitroxide‐mediated polymerization (NMP), atom transfer radical polymerization (ATRP), and reversible addition fragmentation chain transfer (RAFT) polymerization have all been conducted as heterogeneous polymerizations in scCO2. This Highlight reviews this recent body of work, and describes the unique characteristics of scCO2 that allows composite particle formation of unique morphology to be achieved. © 2009 Wiley Periodicals, Inc. J Polym Sci Part A: Polym Chem 47: 3711–3728, 2009  相似文献   
79.
We show the existence of rainbow perfect matchings in μn‐bounded edge colorings of Dirac bipartite graphs, for a sufficiently small μ > 0. As an application of our results, we obtain several results on the existence of rainbow k‐factors in Dirac graphs and rainbow spanning subgraphs of bounded maximum degree on graphs with large minimum degree.  相似文献   
80.
We propose a model that optimizes enterprise investments in cybersecurity using expected utility theory. The model allows computing (a) investment in self‐defense to reduce the risk of security breaches, (b) investment in cyber insurance to transfer the residual risk to insurance companies, and (c) investment in forensic readiness to make the insured firms capable of generating provable insurance claims about security breaches. A three‐phase–based model of vulnerability rate evolution over time is proposed and used to estimate the different planned security expenditures throughout the investment horizon. At the starting time of investment, a decision maker invests to cover the existing risk of breach and periodically spends to cover the additional risk observed due to the release of new vulnerabilities. In this work, the intermediate tranches are determined while considering three different attitudes of decision makers, namely, optimistic, pessimistic, and realistic. An analysis is conducted to assess the performance of the proposed models.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号