全文获取类型
收费全文 | 177篇 |
免费 | 4篇 |
专业分类
化学 | 22篇 |
力学 | 2篇 |
综合类 | 2篇 |
数学 | 74篇 |
物理学 | 81篇 |
出版年
2023年 | 9篇 |
2022年 | 4篇 |
2021年 | 2篇 |
2020年 | 2篇 |
2019年 | 8篇 |
2018年 | 3篇 |
2017年 | 5篇 |
2016年 | 6篇 |
2015年 | 15篇 |
2014年 | 9篇 |
2013年 | 9篇 |
2012年 | 3篇 |
2011年 | 8篇 |
2010年 | 3篇 |
2009年 | 16篇 |
2008年 | 6篇 |
2007年 | 9篇 |
2006年 | 11篇 |
2005年 | 3篇 |
2004年 | 6篇 |
2003年 | 8篇 |
2002年 | 4篇 |
2001年 | 1篇 |
2000年 | 3篇 |
1999年 | 2篇 |
1998年 | 12篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 5篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1970年 | 2篇 |
排序方式: 共有181条查询结果,搜索用时 375 毫秒
151.
152.
In this paper we introduce a class of efficient extensions of the Myerson value for games with communication graph structures in which the surplus is allocated in proportion to measures defined on the graph. We show that the efficient proportional Myerson values can be characterized by efficiency, coherence with the Myerson value for connected graphs, and -fairness of surplus. The axiomatization implies a new characterization of the efficient egalitarian Myerson value proposed by van den Brink et al. (2012). 相似文献
153.
通过消息监控识别罪犯是一个十分有意义的实际问题。本文采用Markov模型的方法,将整个消息传递网络看作一个犯罪传递的Markov链.根据所收集到的消息估计出两个节点(人)之间犯罪传递的概率,得到一个Markov概率转移矩阵,并求出网络长期运行下去的稳定解,作为各节点(人)参与犯罪程度的度量。文章通过实例说明该方法的有效性。 相似文献
154.
Marein van der Torn Irma M. Verdonck-de Leeuw Dirk J. Kuik Hans F. Mahieu 《Journal of voice》2002,16(3):398-407
The objective of the study was to determine whether a communicative suitability rating instrument could be used in a meaningful way to assess functionality of voice following radiotherapy for T1 glottic cancer. Seventeen naive listeners judged the suitability of voice of a patient group with T1 glottic carcinoma (n = 20) just before treatment, a group of patients (n = 40) after radiotherapy, and a matched control group (n = 20) of normal speakers. Listeners rated suitability on a 10-point scale for 10 speaking situations, which supposedly make different demands. In order to validate scores on communicative suitability, ratings were related to perceptual voice quality evaluations and videolaryngostroboscopic evaluations. Results indicate that the concept of measuring listener judgments of communicative suitability of voice is basically sound. Raters are reliable and can discriminate between groups of normal and pathological voices. Patients with T1 glottic carcinoma (assessed before the start of treatment) have on average the least suitable voices. Following radiotherapy suitability is, on average, improved, but does not approach the suitability of normal voices. Ratings on communicative suitability were clearly related to perceptual voice quality aspects and videolaryngostroboscopic evaluations. A subset of three communicative suitability rating scales is recommended as part of the protocol for evaluating voice outcome after radiotherapy for early glottic cancer, besides perceptual evaluation of voice quality by trained and naive raters, videolaryngostroboscopy, acoustical analyses, and self-ratings of vocal performance. 相似文献
155.
Ercan Solak 《Physics letters. A》2004,320(5-6):389-395
In this Letter we analyze the security of some recently proposed chaotic cryptosystems and give methods to break the cipher to reveal the encrypted information. The method exploits the dependencies between the parameters and the output sequence of a dynamical system to reveal the secretly shared system parameters. For each encryption scheme a known plaintext attack and a ciphertext only attack are given. 相似文献
156.
In this paper, we have presented a parallel system model to recover data and address based on terahertz optical asymmetric demultiplexer (TOAD)/semiconductor optical amplifier (SOA)-assisted Sagnac gate. The architecture is based on a system which has its input information containing data and address. Here, we first convert the original data into a coded form with the help of input address. Then the coded information is transmitted through the optical routing channel. At the receiver end, the model simultaneously extracts data and address at any point of the routing channel. The operations of the circuits are studied theoretically and analyzed through numerical simulations. The variation of contrast ratio, amplitude modulation, extinction ratio and bit error rate with control pulse energy and switching crosstalk with gain ratio has been thoroughly investigated. 相似文献
157.
158.
This paper deals with the detection and prediction of losses due to cyber attacks waged on vital networks. The accumulation of losses to a network during a series of attacks is modeled by a 2-dimensional monotone random walk process as observed by an independent delayed renewal process. The first component of the process is associated with the number of nodes (such as routers or operational sites) incapacitated by successive attacks. Each node has a weight associated with its incapacitation (such as loss of operational capacity or financial cost associated with repair), and the second component models the cumulative weight associated with the nodes lost. Each component has a fixed threshold, and crossing of a threshold by either component represents the network entering a critical condition. Results are given as joint functionals of the predicted time of the first observed threshold crossing along with the values of each component upon this time. 相似文献
159.
We propose a new design of a security scheme by using the nonlinear behaviors of temporal dark and bright solitons within a micro-ring resonator system for signal security application. When a dark soliton pulse is input into the proposed system, the chaotic signal is generated, where the required bright soliton pulse can be retrieved and detected by the add/drop filtering device. The chaotic wave form can be cancelled by using an add/drop device, which can be connected and used in the communication link. By using the appropriate ring parameters, simulation results obtained have shown that the soliton conversion can be performed. The ring radii used are within the ranges from 5 to 10 μms and Aeff=0.10-0.50 μm2. In application, the chaotic signal is generated and formed by the dark soliton within a nonlinear micro-ring device. This can be seen by using the add/drop device, where the bright soliton is formed and detected, which is available to use in communication link. The different temporal soliton response time is seen, the response times of 169 and 84 ns are noted for temporal dark and bright solitons, respectively, which can also be used to form the security key. 相似文献
160.
Internal communication within a company is essential for the implementation and proper functioning of any ISO-based quality
system. Moreover, staff empowerment and distribution of responsibilities are key points in the ISO 9000:2000 quality guides.
Although not specifically mentioned in the quality guides, external communication plays a fundamental role in assuring customer
satisfaction and obtaining good ideas to improve company performance. This paper has two main parts. First, the importance
of internal and external communication is reviewed and it is shown that managers should allocate more resources to both areas.
It is also demonstrated that environmental management systems are directly derived from the quality guides. Second, the results
of an enquiry to assess the efforts being made by a group of Italian senior managers to improve internal and external communication
are evaluated.
Received: 8 March 2002 Accepted: 12 September 2002 相似文献