首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   825篇
  免费   52篇
  国内免费   95篇
化学   101篇
晶体学   1篇
力学   22篇
综合类   19篇
数学   746篇
物理学   83篇
  2024年   2篇
  2023年   13篇
  2022年   25篇
  2021年   33篇
  2020年   22篇
  2019年   24篇
  2018年   13篇
  2017年   19篇
  2016年   14篇
  2015年   9篇
  2014年   28篇
  2013年   47篇
  2012年   27篇
  2011年   59篇
  2010年   61篇
  2009年   50篇
  2008年   48篇
  2007年   49篇
  2006年   51篇
  2005年   37篇
  2004年   36篇
  2003年   60篇
  2002年   30篇
  2001年   27篇
  2000年   31篇
  1999年   24篇
  1998年   27篇
  1997年   12篇
  1996年   19篇
  1995年   9篇
  1994年   12篇
  1993年   5篇
  1992年   6篇
  1991年   7篇
  1990年   5篇
  1989年   3篇
  1988年   1篇
  1987年   5篇
  1986年   2篇
  1985年   5篇
  1984年   6篇
  1982年   3篇
  1981年   2篇
  1978年   2篇
  1936年   2篇
排序方式: 共有972条查询结果,搜索用时 62 毫秒
81.
With the popularity of Android, malware detection and family classification have also become a research focus. Many excellent methods have been proposed by previous authors, but static and dynamic analyses inevitably require complex processes. A hybrid analysis method for detecting Android malware and classifying malware families is presented in this paper, and is partially optimized for multiple-feature data. For static analysis, we use permissions and intent as static features and use three feature selection methods to form a subset of three candidate features. Compared with various models, including k-nearest neighbors and random forest, random forest is the best, with a detection rate of 95.04%, while the chi-square test is the best feature selection method. After using feature selection to explore the critical static features contained in this dataset, we analyzed a subset of important features to gain more insight into the malware. In a dynamic analysis based on network traffic, unlike those that focus on a one-way flow of traffic and work on HTTP protocols and transport layer protocols, we focused on sessions and retained protocol layers. The Res7LSTM model is then used to further classify the malicious and partially benign samples detected in the static detection. The experimental results show that our approach can not only work with fewer static features and guarantee sufficient accuracy, but also improve the detection rate of Android malware family classification from 71.48% in previous work to 99% when cutting the traffic in terms of the sessions and protocols of all layers.  相似文献   
82.
This study describes the catalytic properties of a GH30_7 xylanase produced by the fungus Talaromyces leycettanus. The enzyme is an ando-β-1,4-xylanase, showing similar specific activity towards glucuronoxylan, arabinoxylan, and rhodymenan (linear β-1,3-β-1,4-xylan). The heteroxylans are hydrolyzed to a mixture of linear as well as branched β-1,4-xylooligosaccharides that are shorter than the products generated by GH10 and GH11 xylanases. In the rhodymenan hydrolyzate, the linear β-1,4-xylooligosaccharides are accompanied with a series of mixed linkage homologues. Initial hydrolysis of glucuronoxylan resembles the action of other GH30_7 and GH30_8 glucuronoxylanases, resulting in a series of aldouronic acids of a general formula MeGlcA2Xyln. Due to the significant non-specific endoxylanase activity of the enzyme, these acidic products are further attacked in the unbranched regions, finally yielding MeGlcA2Xyl2-3. The accommodation of a substituted xylosyl residue in the −2 subsite also applies in arabinoxylan depolymerization. Moreover, the xylose residue may be arabinosylated at both positions 2 and 3, without negatively affecting the main chain cleavage. The catalytic properties of the enzyme, particularly the great tolerance of the side-chain substituents, make the enzyme attractive for biotechnological applications. The enzyme is also another example of extraordinarily great catalytic diversity among eukaryotic GH30_7 xylanases.  相似文献   
83.
84.
研究函数族的正规性定则是复变函数论中的一个重要且有意义的工作.引进多元K-拟全纯函数的定义,并给出了多元K-拟全纯函数族的一个正规定则.  相似文献   
85.
Banach空间中无限簇广义集值变分包含   总被引:3,自引:1,他引:3       下载免费PDF全文
在Banach空间中推广两个集值映射的广义变分包含到无限个集值映射的广义变分包含的情况,利用预解方程和迭代的方法,研究了其解的存在性及其迭代逼近问题.所得结果改进和推广了一些最新的成果.  相似文献   
86.
In this paper we use fixed point and coincidence theorems due to Park [8] to give matching theorems concerning closed coverings of nonempty convex sets in a real topological vector space. Our new results extend previously given ones due to Ky Fan [2], [3], Shih [10], Shih and Tan [11], and Park [7].  相似文献   
87.
In this paper, we mainly discuss the normality of two families of functions concerning shared values and proved: Let F and G be two families of functions meromorphic on a domain D■C,a1, a2, a3, a4 be four distinct finite complex numbers. If G is normal, and for every f ∈ F , there exists g ∈ G such that f(z) and g(z) share the values a1, a2, a3, a4, then F is normal on D.  相似文献   
88.
89.
毛华  刘三阳 《数学学报》2012,(2):351-354
给出了任意集上的一个集族有横贯的一些Hall-型判定定理,回答了Welsh关于相应的无限情形的公开问题,即对于无限情况,找到一个集族有横贯的充要条件.  相似文献   
90.
OnSomePropertiesofLTypeIntuitionisticFuzzyFamilyYueShusong;(岳树松)WangJianping(王建平)(HenanNormalUniversity)(HenanUniversity)Abst...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号