首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   430篇
  免费   18篇
  国内免费   3篇
化学   180篇
晶体学   1篇
力学   30篇
数学   121篇
物理学   62篇
无线电   57篇
  2023年   3篇
  2022年   11篇
  2021年   15篇
  2020年   14篇
  2019年   6篇
  2018年   19篇
  2017年   11篇
  2016年   19篇
  2015年   17篇
  2014年   16篇
  2013年   44篇
  2012年   24篇
  2011年   34篇
  2010年   24篇
  2009年   19篇
  2008年   26篇
  2007年   17篇
  2006年   15篇
  2005年   20篇
  2004年   14篇
  2003年   12篇
  2002年   6篇
  2001年   11篇
  2000年   9篇
  1999年   5篇
  1998年   3篇
  1997年   3篇
  1996年   2篇
  1995年   5篇
  1994年   7篇
  1993年   3篇
  1992年   4篇
  1991年   2篇
  1990年   1篇
  1989年   3篇
  1985年   1篇
  1982年   1篇
  1981年   1篇
  1979年   1篇
  1978年   1篇
  1940年   2篇
排序方式: 共有451条查询结果,搜索用时 15 毫秒
171.
We study the gravitational lensing scenario where the lens is a spherically symmetric charged black hole (BH) surrounded by quintessence matter. The null geodesic equations in the curved background of the black hole are derived. The resulting trajectory equation is solved analytically via perturbation and series methods for a special choice of parameters, and the distance of the closest approach to black hole is calculated. We also derive the lens equation giving the bending angle of light in the curved background. In the strong field approximation, the solution of the lens equation is also obtained for all values of the quintessence parameter \(w_q\). For all \(w_q\), we show that there are no stable closed null orbits and that corrections to the deflection angle for the Reissner–Nordström black hole when the observer and the source are at large, but finite, distances from the lens do not depend on the charge up to the inverse of the distances squared. A part of the present work, analyzed, however, with a different approach, is the extension of Younas et al. (Phys Rev D 92:084042, 2015) where the uncharged case has been treated.  相似文献   
172.
In this paper, we study quasi-periodic vibrational energy harvesting in a delayed self-excited oscillator with a delayed electromagnetic coupling. The energy harvester system consists in a delayed van der Pol oscillator with delay amplitude modulation coupled to a delayed electromagnetic coupling mechanism. It is assumed that time delay is inherently present in the mechanical subsystem of the harvester, while it is introduced in the electrical circuit to control and optimize the output power of the system. A double-step perturbation method is performed near a delay parametric resonance to approximate the quasi-periodic solutions of the harvester which are used to extract the quasi-periodic vibration-based power. The influence of the time delay introduced in the electromagnetic subsystem on the performance of the quasi-periodic vibration-based energy harvesting is examined. In particular, it is shown that for appropriate values of amplitudes and frequency of time delay the maximum output power of the harvester is not necessarily accompanied by the maximum amplitude of system response.  相似文献   
173.
Ultrasound-assisted extraction (UAE) was used to extract carotenoids from the carrot pomace. To investigate the effect of independent variables on the UAE, the response surface methodology (RSM) with central-composite design (CCD) was employed. The study was conducted with three independent variables including extraction time (min), temperature (°C), and ethanol concentration (%). The results showed that the optimal conditions for UAE were achieved with an extraction time of 17 min, temperature of 32 °C, and ethanol concentration of 51% of total carotenoids (31.82 ± 0.55); extraction time of 16 min, temperature of 29 °C, and ethanol concentration of 59% for a combination of β-carotene (14.89 ± 0.40), lutein (5.77 ± 0.19), and lycopene (2.65 ± 0.12). The non-significant (p > 0.05) correlation under optimal extraction conditions between predicted and experimental values suggested that UAE is the more productive process than conventional techniques for the extraction of carotenoids from the carrot pomace.  相似文献   
174.
We obtain upper Gaussian estimates of transition probabilities of inhomogeneous random walks on the positive quadrant. Among the most important steps in our proof are comparison arguments based on discrete variants of the Harnack principle and large deviations estimates.  相似文献   
175.
In the last few years, evidence theory, also known as Dempster-Shafer theory or belief functions theory, have received growing attention in many fields such as artificial intelligence, computer vision, telecommunications and networks, robotics, and finance. This is due to the fact that imperfect information permeates the real-world applications, and as a result, it must be incorporated into any information system that aims to provide a complete and accurate model of the real world. Although, it is in an early stage of development relative to classical probability theory, evidence theory has proved to be particularly useful to represent and reason with imperfect information in a wide range of real-world applications. In such cases, evidence theory provides a flexible framework for handling and mining uncertainty and imprecision as well as combining evidence obtained from multiple sources and modeling the conflict between them. The purpose of this paper is threefold. First, it introduces the basics of the belief functions theory with emphasis on the transferable belief model. Second, it provides a practical case study to show how the belief functions theory was used in a real network application, thereby providing guidelines for how the evidence theory may be used in telecommunications and networks. Lastly, it surveys and discusses a number of examples of applications of the evidence theory in telecommunications and network technologies.  相似文献   
176.
Mesoporous iron‐oxide nanoparticles (mNPs) were prepared by using a modified nanocasting approach with mesoporous carbon as a hard template. mNPs were first loaded with doxorubicin (Dox), an anticancer drug, and then coated with the thermosensitive polymer Pluronic F108 to prevent the leakage of Dox molecules from the pores that would otherwise occur under physiological conditions. The Dox‐loaded, Pluronic F108‐coated system (Dox@F108‐mNPs) was stable at room temperature and physiological pH and released its Dox cargo slowly under acidic conditions or in a sudden burst with magnetic heating. No significant toxicity was observed in vitro when Dox@F108‐mNPs were incubated with noncancerous cells, a result consistent with the minimal internalization of the particles that occurs with normal cells. On the other hand, the drug‐loaded particles significantly reduced the viability of cervical cancer cells (HeLa, IC50=0.70 μm ), wild‐type ovarian cancer cells (A2780, IC50=0.50 μm ) and Dox‐resistant ovarian cancer cells (A2780/AD, IC50=0.53 μm ). In addition, the treatment of HeLa cells with both Dox@F108‐mNPs and subsequent alternating magnetic‐field‐induced hyperthermia was significantly more effective at reducing cell viability than either Dox or Dox@F108‐mNP treatment alone. Thus, Dox@F108‐mNPs constitute a novel soft/hard hybrid nanocarrier system that is highly stable under physiological conditions, temperature‐responsive, and has chemo‐ and thermotherapeutic modes of action.  相似文献   
177.
Several β-aminothiols prepared from 3-piperideine and different thiiranes react by free radical reactio chemically initiated to yield exclusively 7-thia-1-azabicyclo (4,3,0) nonane derivatives. Even when this process is in competition with a radical addition on a terminal ethylenic chain, the bicyclic thiazolidine is always the major product.  相似文献   
178.
179.
Résumé Quand un jet liquide cylindrique vertical tombe sur une plaque plane horizontale, il s'étale en général sur celle-ci en un écoulement en film mince limité par un ressaut circulaire, au delà duquel, le film a une épaisseur plus grande. Une étude théorique est faite aussi bien en zone torrentielle qu'en zone fluviale et la position du ressaut est déterminée; ces résultats sont comparés aux courbes expérimentales et l'évolution du profil des vitesses est déterminée dans la zone fluviale par anémométrie laser.
Conclusion Cette étude nous a permis de mettre en évidence une concordance acceptable entre le profil réel et le profil semi-parabolique des vitesses dans la zone fluviale dans le cas de nos conditions expérimentales [11]. D'autres conditions, ne permettant pas le renouvellement constant du liquide de la surface libre, auraient conduit certainement à un autre type de profil [12]. Par ailleurs le calcul théorique associé à ce profil nous a permis de prévoir la position du ressaut avec une précision acceptable. Enfin, la structure du ressaut relatif à ce type d'écoulement a pu être précisée.When a cylindrical vertical liquid jet falls on an horizontal flat plate it spreads out generally in a thin layer bounded by a circular hydraulic jump outside which the layer has a much greater depth. The theoretical study is done for the supercritical and subcritical flows and the hydraulic jump is located. The relations obtained are compared with experimental results and the evolution of the velocity profil is determined in the subcritical flow by laser anemometry.


Cette recherche a fait l'objet d'un contrat ONRS (Organisme National de la Recherche Scientifique Algérien) No. 76 AA 01/1.  相似文献   
180.
A decentralized application runs on the blockchain network without the intervention of a central authority. Transparency in transactions and security in vehicular networks are the issues for central systems. The proposed system uses blockchain-based smart contracts, which eliminate the requirement for any third-party verification. Additionally, with signature verification and reduced overhead, smart contracts also help in a fast and secure transaction. This study suggests a trust-based system paradigm where certificate authority (CA) is employed for vehicle registration. We also propose a blockchain-based system that provides efficient two-way authentication and key agreement through encryption and digital signatures. The analysis of the proposed model reveals that it is an efficient way of establishing distributed trust management, which helps in preserving vehicle privacy. The proposed scheme is tested in Automated Validation of Internet Security-sensitive Protocols (AVISPA), and security parameters verification in Network Simulator 2(NS2) also shows that the proposed scheme is more effective in comparison with existing schemes in terms of authentication cost, storage cost, and overhead.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号