首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2326篇
  免费   307篇
  国内免费   71篇
化学   371篇
晶体学   3篇
力学   350篇
综合类   114篇
数学   954篇
物理学   912篇
  2023年   33篇
  2022年   54篇
  2021年   43篇
  2020年   70篇
  2019年   50篇
  2018年   49篇
  2017年   78篇
  2016年   95篇
  2015年   77篇
  2014年   122篇
  2013年   158篇
  2012年   125篇
  2011年   134篇
  2010年   113篇
  2009年   97篇
  2008年   121篇
  2007年   120篇
  2006年   114篇
  2005年   114篇
  2004年   108篇
  2003年   104篇
  2002年   103篇
  2001年   84篇
  2000年   47篇
  1999年   64篇
  1998年   50篇
  1997年   54篇
  1996年   40篇
  1995年   53篇
  1994年   39篇
  1993年   41篇
  1992年   37篇
  1991年   25篇
  1990年   6篇
  1989年   15篇
  1988年   15篇
  1987年   5篇
  1986年   6篇
  1985年   4篇
  1984年   7篇
  1983年   2篇
  1982年   4篇
  1980年   3篇
  1979年   4篇
  1978年   3篇
  1977年   3篇
  1976年   6篇
  1975年   2篇
  1974年   3篇
排序方式: 共有2704条查询结果,搜索用时 15 毫秒
1.
Having shown promising performance with high flexibility and efficiency in vehicular edge computing (VEC) network, the parked vehicles (PVs) received an increasing number of attentions in recent years. However, PVs’ residual battery power restricts their running time. In addition, there is still no alternate resource pool for the PVs to cope with the emergencies in the previous VEC framework. To alleviate these problems, we model a cloud-assisted parked vehicular edge computing (PVEC) framework, in which the PVs are classified based on their residual battery power. PVs corporate with the cloud servers (CSs) for the computational resources provision. In addition, we formulate the utilities of the service provider (SP) and PVs and design a contract-based resource allocation problem for the maximization of the SP’s utility. Considering that it is intractable to solve the optimization problem directly, the primal problem is simplified and decoupled into two sub-problems. To design the optimal contracts, we solve the sub-problems by Lagrangian multiplier method and dual function. Simulation results prove that the utilities of PVs can reach to the maximum when they choose the contract corresponding to their types. In addition, the simulation results illustrate the superiority of proposed scheme over previous schemes in improving the utilities of the SP and social welfare.  相似文献   
2.
针对二维球坐标系下中子输运方程的SN算法, 提出基于(单元, 方向)二元组的有向图模型, 在已有的基于有向图的并行流水线算法基础上, 设计粒度可控多级并行SN算法。其中, 采用区域分解和并行流水线相结合的方式挖掘空间-角度方向的并行度, 提出能群流水并行方法, 并通过设置合适的流水线粒度来平衡有向图调度、通信和空闲等待开销。实验结果表明: 该算法可以有效地求解二维球坐标系下的中子输运方程。在某国产并行机1920核上, 对于96万网格、60个方向、24能群、数十亿自由度的典型中子输运问题, 获得了71%的并行效率。  相似文献   
3.
在宽窄水平导轨上进行纯滚动双钢球碰撞实验,发现它与滑动运动中的双钢球碰撞实验明显不同;其原因在于纯滚动双钢球的碰撞是在碰撞点的正碰和切向碰撞的复合碰撞,两类碰撞遵从不同的动力学规律;碰撞过后,两钢球的运动状态都不再是纯滚动,要恢复成纯滚动,每一个钢球都必须通过自身与导轨之间的相互作用,经历一次自调整阶段;而自调整阶段的能量损耗,与钢球的滚动半径和它的即时状态与纯滚动的偏离有关.  相似文献   
4.
An enterprise’s private cloud may be attacked by attackers when communicating with the public cloud. Although traffic detection methods based on deep learning have been widely used, these methods rely on a large amount of sample data and cannot quickly detect new attacks such as Zero-day Attacks. Moreover, deep learning has a black-box nature and cannot interpret the detection results, which has certain security risks. This paper proposes an interpretable abnormal traffic detection method, which can complete the detection task with only a few malicious traffic samples. Specifically, it uses the covariance matrix to characterize each traffic category and then calculates the similarity between the query traffic and each category according to the covariance metric function to realize the traffic detection based on few-shot learning. After that, the traffic images processed by the random masks are input into the model to obtain the predicted probability of the corresponding traffic category. Finally, the predicted probability is linearly summed with each mask to generate the final saliency map to interpret and analyze the model decision. In this paper, experiments are carried out by simulating only 15 and 25 malicious traffic samples. The results show that the proposed method can obtain good accuracy and recall, and the interpretation analysis shows that the model is reliable and interpretable.  相似文献   
5.
6.
Weihao Li 《中国物理 B》2022,31(11):117106-117106
Current-induced multilevel magnetization switching in ferrimagnetic spintronic devices is highly pursued for the application in neuromorphic computing. In this work, we demonstrate the switching plasticity in Co/Gd ferrimagnetic multilayers where the binary states magnetization switching induced by spin-orbit toque can be tuned into a multistate one as decreasing the domain nucleation barrier. Therefore, the switching plasticity can be tuned by the perpendicular magnetic anisotropy of the multilayers and the in-plane magnetic field. Moreover, we used the switching plasticity of Co/Gd multilayers for demonstrating spike timing-dependent plasticity and sigmoid-like activation behavior. This work gives useful guidance to design multilevel spintronic devices which could be applied in high-performance neuromorphic computing.  相似文献   
7.
证明6维严格近凯勒流形中的二阶平行拉格朗日子流形一定是全测地的,这推广了L.Vrancken等人文中的一个重要结果.特别地,得到了齐性近凯勒S3×S3中该类拉格朗日子流形的完全分类.  相似文献   
8.
随着集成电路特征尺寸的不断缩小, 互连线在芯片内部占的比重越来越大, 但是互连线仅用于数据传输, 芯片计算能力仍然需要依靠晶体管开关实现. 如何在有限的硬件资源内进一步提高芯片的计算能力, 已经成为当前集成电路设计的核心问题. 本文通过研究金属互连线间电容耦合效应, 采用互连线串扰现象完成逻辑运算的思想, 提出一种基于线计算的全加器设计方案. 该方案首先建立线计算模型, 通过调整反相器阈值和不同干扰线与受扰线之间电容耦合强度匹配技术, 采用相同线计算电路结构实现不同功能的逻辑门电路; 然后, 在逻辑门的基础上实现基于线计算的全加器; 最后, 在TSMC 65nm CMOS工艺下仿真验证. 结果表明, 所设计的线计算电路具有正确逻辑功能, 与传统设计方法相比, 线计算逻辑门具有更低开销, 且线计算电路具有抗逆向工程能力.  相似文献   
9.
Artificial synapse is one of the potential electronics for constructing neural network hardware. In this work, Pt/LiSiOx/TiN analog artificial synapse memristor is designed and investigated. With the increase of compliance current (C. C.) under 0.6 mA, 1 mA, and 3 mA, the current in the high resistance state (HRS) presents an increasing variation, which indicates lithium ions participates in the operation process for Pt/LiSiOx/TiN memristor. Moreover, depending on the movement of lithium ions in the functional layer, the memristor illustrates excellent conduction modulation property, so the long-term potentiation (LTP) or depression (LTD) and paired-pulse facilitation (PPF) synaptic functions are successfully achieved. The neural network simulation for pattern recognition is proposed with the recognition accuracy of 91.4%. These findings suggest the potential application of the LiSiOx memristor in the neuromorphic computing.  相似文献   
10.
The recent introduction of polymerase chain reaction (PCR)-massively parallel sequencing (MPS) technologies in forensics has changed the approach to allelic short tandem repeat (STR) typing because sequencing cloned PCR fragments enables alleles with identical molecular weights to be distinguished based on their nucleotide sequences. Therefore, because PCR fidelity mainly depends on template integrity, new technical issues could arise in the interpretation of the results obtained from the degraded samples. In this work, a set of DNA samples degraded in vitro was used to investigate whether PCR-MPS could generate “isometric drop-ins” (IDIs; i.e., molecular products having the same length as the original allele but with a different nucleotide sequence within the repeated units). The Precision ID GlobalFiler NGS STR panel kit was used to analyze 0.5 and 1 ng of mock samples in duplicate tests (for a total of 16 PCR-MPS analyses). As expected, several well-known PCR artifacts (such as allelic dropout, stutters above the threshold) were scored; 95 IDIs with an average occurrence of 5.9 IDIs per test (min: 1, max: 11) were scored as well. In total, IDIs represented one of the most frequent artifacts. The coverage of these IDIs reached up to 981 reads (median: 239 reads), and the ratios with the coverage of the original allele ranged from 0.069 to 7.285 (median: 0.221). In addition, approximately 5.2% of the IDIs showed coverage higher than that of the original allele. Molecular analysis of these artifacts showed that they were generated in 96.8% of cases through a single nucleotide change event, with the C > T transition being the most frequent (85.7%). Thus, in a forensic evaluation of evidence, IDIs may represent an actual issue, particularly when DNA mixtures need to be interpreted because they could mislead the operator regarding the number of contributors. Overall, the molecular features of the IDIs described in this work, as well as the performance of duplicate tests, may be useful tools for managing this new class of artifacts otherwise not detected by capillary electrophoresis technology.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号