首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   576篇
  免费   8篇
  国内免费   4篇
化学   440篇
晶体学   3篇
力学   7篇
数学   44篇
物理学   94篇
  2023年   4篇
  2022年   3篇
  2021年   6篇
  2019年   5篇
  2018年   8篇
  2017年   4篇
  2016年   7篇
  2015年   5篇
  2014年   7篇
  2013年   16篇
  2012年   28篇
  2011年   25篇
  2010年   20篇
  2009年   21篇
  2008年   31篇
  2007年   27篇
  2006年   49篇
  2005年   39篇
  2004年   27篇
  2003年   26篇
  2002年   19篇
  2001年   7篇
  2000年   7篇
  1999年   4篇
  1998年   14篇
  1997年   8篇
  1996年   9篇
  1995年   9篇
  1992年   5篇
  1991年   4篇
  1989年   3篇
  1988年   4篇
  1987年   5篇
  1986年   12篇
  1985年   15篇
  1984年   11篇
  1983年   4篇
  1982年   11篇
  1981年   8篇
  1980年   5篇
  1979年   10篇
  1978年   9篇
  1977年   6篇
  1974年   6篇
  1970年   4篇
  1967年   3篇
  1965年   2篇
  1964年   5篇
  1962年   4篇
  1961年   2篇
排序方式: 共有588条查询结果,搜索用时 15 毫秒
61.
To our knowledge, all network DEA models proposed in the literature so far either implicitly or explicitly assume that all entities comprised of a network (system) are owned by a single owner, i.e., a centralized system. As a result, those models are not applicable to performance evaluation for a wide variety of distributed and hybrid systems in practice. Therefore, this study aims to show the importance of taking into account the ownership structure of networks (systems) in constructing effective network DEA models, and accordingly develops three ownership-specified (centralized, distributed and hybrid) network DEA models in terms of both input- and output-orientation. A numerical example is used to validate the critical importance of the ownership with entities and thus networks in both network DEA methodologies and applications.  相似文献   
62.
In DEA, we have two measures of technical efficiency with different characteristics: radial and non-radial. In this paper we compile them into a composite model called “epsilon-based measure (EBM).” For this purpose we introduce two parameters which connect radial and non-radial models. These two parameters are obtained from the newly defined affinity index between inputs or outputs along with principal component analysis on the affinity matrix. Thus, EBM takes into account diversity of input/output data and their relative importance for measuring technical efficiency.  相似文献   
63.
64.
Three novel diterpenes, phomactins K–M (13), were isolated from the cultures of an unidentified marine-derived fungus. The structures of 13 were elucidated from spectroscopic data (NMR, MS, IR), and the absolute configurations of 1, 2, and the relative configuration of 3 were determined by X-ray diffraction analysis.  相似文献   
65.
A micellar solution of cetylpyridinium chloride (CPC) can separate into two phases due to a temperature change or to the addition of salts. Platinum(II), (IV) and palladium(II) reacted with chloride ions to form stable anionic complexes of PtCl4(2-), PtCl6(2-) and PdCl4(2-), respectively, and were adsorbed onto the CPC gel phase. The CPC phase plays the role of an ion-exchange adsorbent for the anionic complexes. By such a procedure, the precious metals of platinum and palladium could be separated from base metals such as copper, zinc and iron. The kinetic separation was performed by a ligand exchange reaction of the palladium(II) chloro-complex with EDTA at 60 degrees C. The anionic palladium(II)-EDTA complex could not bind the opposite charged CP+ and was desorbed from the CPC phase. In the aqueous phase, the recovery of palladium(II) by the double-desorption was 101.1 +/- 1.2%. The platinum(II) and (IV) chloro-complexes were stable for at least 30 min and remained in the CPC phase.  相似文献   
66.
Nitrogen‐doped carbon materials (NDCs) play an important role in various fields. A great deal of effort has been devoted to obtaining carbon materials with a high nitrogen content; however, much is still unknown about the structure of the nitrogen‐doped materials and the maximum nitrogen content possible for such compounds. Here, we demonstrate an interesting relationship between the N/C molar ratio and the N content of NDCs. The upper limit for the nitrogen content of NDCs that might be achieved was estimated and found to strongly depend on the carbonization temperature (14.32 wt % at 1000 °C and 21.66 wt % at 900 °C), irrespective of the precursor or preparation conditions. Simulations suggest that, especially in the carbon architectures obtained at high temperatures, nitrogen atoms are always located on separate hexagon moieties in a graphitic configuration, thereby yielding a critical N/C molar ratio very close to the value estimated from the experimental results.  相似文献   
67.
We construct identity-based encryption and inner product encryption schemes under the decision linear assumption. Their private user keys are leakage-resilient in several scenarios. In particular,
  • In the bounded memory leakage model (Akavia et al., TCC, vol. 5444, pp. 474–495, 2009), our basic schemes reach the maximum-possible leakage rate \(1-o(1)\).
  • In the continual memory leakage model (Brakerski et al., Overcoming the hole in the bucket: public-key cryptography resilient to continual memory leakage, 2010; Dodis et al., Cryptography against continuous memory attacks, 2010), variants of the above schemes enjoy leakage rate at least \(\frac{1}{2} -o(1)\). Among the results, we improve upon the work of Brakerski et al. by presenting adaptively secure IBE schemes.
In addition, we prove that our IBE schemes are anonymous under the DLIN assumption, so that ciphertexts leaks no information on the corresponding identities. Similarly, attributes in IPE are proved computationally hidden in the corresponding ciphertexts.
  相似文献   
68.
A linear network code is called k-secure if it is secure even if an adversary eavesdrops at most k edges. In this paper, we show an efficient deterministic construction algorithm of a linear transformation T that transforms an (insecure) linear network code to a k-secure one for any k, and extend this algorithm to strong k-security for any k . Our algorithms run in polynomial time if k is a constant, and these time complexities are explicitly presented. We also present a concrete size of \(|\mathsf{F}|\) for strong k-security, where \(\mathsf{F}\) is the underling finite field.  相似文献   
69.
It has been well recognized that to thoroughly evaluate a firm’s performance, the evaluator must assess not only its past and present records but also future potential. However, to the best of our knowledge, there are no data envelopment analysis (DEA)-type models proposed in the literature that simultaneously take past, present and, especially, future performance indicators into account. Hence, this research aims at developing a new type of DEA model referred to as Intertemporal DEA models that can be used to fully measure a firm’s efficiency by explicitly considering its key inputs and outputs involving the past-present-future time span. In this research, the proposed Intertemporal DEA models are applied to the performance evaluation of high-tech Integrated Circuit design companies in Taiwan to demonstrate their advantages over other DEA models that ignore intertemporal efficiency.  相似文献   
70.
Novel sesquiterpene alkaloids, halichonines A (1), B (2), and C (3), were identified from the marine sponge Halichondria okadai Kadota. By spectroscopic analyses and synthesis, their structures were revealed to include a 6,6-bicyclic ring system and two prenylated amine moieties. In addition, 2 induced apoptosis in HL60 human leukemia cells.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号