首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   220篇
  免费   7篇
  国内免费   1篇
化学   151篇
晶体学   1篇
力学   6篇
数学   24篇
物理学   46篇
  2023年   2篇
  2022年   1篇
  2021年   5篇
  2020年   2篇
  2019年   2篇
  2017年   3篇
  2016年   5篇
  2015年   5篇
  2014年   6篇
  2013年   8篇
  2012年   11篇
  2011年   10篇
  2010年   13篇
  2009年   17篇
  2008年   12篇
  2007年   18篇
  2006年   19篇
  2005年   13篇
  2004年   7篇
  2003年   7篇
  2002年   6篇
  2001年   5篇
  2000年   6篇
  1999年   3篇
  1998年   3篇
  1997年   3篇
  1996年   8篇
  1995年   2篇
  1994年   1篇
  1993年   5篇
  1992年   1篇
  1991年   8篇
  1988年   1篇
  1987年   1篇
  1986年   3篇
  1985年   1篇
  1983年   3篇
  1982年   1篇
  1978年   1篇
排序方式: 共有228条查询结果,搜索用时 0 毫秒
31.
32.
A Ni80Fe20/(Ni,Fe)O thin film exhibits a positive exchange bias when cooled in a zero field and a negative exchange bias when field cooled. With transmission electron microscopy and electron energy loss spectrometry, the composition and magnetic structure has been ascertained and a distribution of magnetization easy axes about the interface extrapolated. The results indicate that the positive exchange bias is from antiferromagnetic interface moments perpendicular to their ferromagnetic counterparts. With field cooling the alignment is put into a parallel configuration resulting in a negative exchange bias.  相似文献   
33.
This work experimentally studies the flow characteristics and forced convective heat transfer in a sintered porous channel that filled with sintered copper beads of three average diameters ( 0.830, and 1.163 mm). The pressure drop and the local temperature measurements can be applied to figure out the distributions of the friction coefficient and the heat transfer coefficient. Three sintered porous channels differ in the arrangement of obstacle blocks. Model A has no obstacle. Models B and C have five obstacle blocks facing down and up, respectively, in a sintered porous channel. The range of experimental parameters, porosity, heat flux, and effect of forced convection are 0.370 ≤ ɛ ≤ 0.385, q=0.228, 0.872, 1.862 W/cm2, and 200 ≤ Re d ≤ 800. The permeability and inertia coefficient of each of the three sintered porous channels are analyzed. The results for Model A agree with those obtained by previous investigations in C f distribution. The heat transfer of Model C exceeds that of Model A by approximately 20%. Finally, a series of empirical correlation equations were obtained for practical applications and engineering problems.  相似文献   
34.
This study analyzed variations of tribological behaviors that depend on the injection molding techniques during the blending of short glass fiber (SGF) and polytetrafluoroethylene (PTFE) reinforced polycarbonate (PC) composites. The proposed planning of blending experiments is to use a D‐optimal mixture design (DMD). The tribological behaviors of friction coefficient and wear mass loss were selected for discussion. Nine experimental runs, based on a DMD method, utilized to train the back‐propagation neural network (BPNN) and then the simulated annealing algorithm (SAA) approach is applied to search for an optimal mixture ratio setting. In addition, the result of BPNN integrating SAA was also compared with response surface methodology (RSM) approach. The results of confirmation experiment show that DMD, RSM, and BPNN integrating SAA method are effective tools for the optimization of reinforced process. Furthermore, the scanning electron microscope (SEM) images show that the abundant debris are peeled off from the matrix materials and predominant delamination mechanisms and plastic deformation are shown on the worn surface after tribological behavior tests. Copyright © 2010 John Wiley & Sons, Ltd.  相似文献   
35.
Four new lanostane-type triterpenes, 24-ethyl-3beta-methoxylanost-9(11)-en-25-ol (1), 3beta-methoxy-24-methylenelanost-9(11)-en-25-ol (2), 3beta-methoxy-25-methyl-24-methylenelanost-9(11)-en-21-ol (3) and 3beta-methoxy-24-methyllanosta-9(11),25-dien-24-ol (4) together with three known triterpenes, betulinaldehyde, betulinic acid methyl ester, and ursaldehyde have been isolated from the methanol extract of the twigs of Diospyros discolor. The structures of those new compounds were elucidated by spectroscopic methods.  相似文献   
36.
Synergy effects are the motives to enter into strategic alliances; however due to lack of adequate preparation or planning, these alliances often fail. It is of no doubt that a successful strategic alliance depends on choosing the correct alliance partners and appropriate resource allocation. In this paper, the fuzzy multi-objective dummy programming model is proposed to overcome the above-mentioned problems. Two types of strategic alliances, joint ventures and mergers and acquisitions (M&A), are demonstrated to choose the best alliance partners and allocate the optimal alliance resources in a numerical example. Based on the results, our method can provide the optimal alliance cluster and satisfaction in strategic alliances.  相似文献   
37.
We investigate electron acceleration from space-charge waves driven by single-frequency lasers using a fully explicit particle-in-cell (PIC) model. The two dimensional (2-D) simulations model ~100 fs pulses at densities near n=4×1019 cm-3 for 1-μm lasers. The pulses are found to break up due to a combination of longitudinal and transverse bunching of the laser intensity via Raman forward scattering type instabilities. The ponderomotive force of these intensity modulations generates large amplitude plasma waves. Large numbers of self-trapped electrons and multiple Raman forward scattering satellites are observed. The relevance of these simulations to experiments is discussed  相似文献   
38.
39.
40.
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares   总被引:2,自引:0,他引:2  
We proposed a new public-key traitor tracing scheme with revocation capability using dynamic shares and entity revocation techniques. Our schemes traitor tracing and revocation programs cohere tightly. The size of the enabling block of our scheme is independent of the number of receivers. Each receiver holds one decryption key only. The distinct feature of our scheme is that when traitors are found, we can revoke their private keys (up to some threshold z) without updating the private keys of other receivers. In particular, no revocation messages are broadcast and all receivers do nothing. Previously proposed revocation schemes need update existing keys and entail large amount of broadcast messages. Our traitor tracing algorithm works in a black-box way. It is conceptually simple and fully k-resilient, that is, it can find all traitors if the number of them is k or less. The encryption algorithm of our scheme is semantically secure assuming that the decisional Diffie-Hellman problem is hard.AMS Classification: 11T71, 68P30  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号