首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   713篇
  免费   122篇
  国内免费   13篇
化学   114篇
晶体学   1篇
力学   10篇
综合类   75篇
数学   205篇
物理学   443篇
  2023年   17篇
  2022年   53篇
  2021年   50篇
  2020年   15篇
  2019年   32篇
  2018年   14篇
  2017年   63篇
  2016年   41篇
  2015年   30篇
  2014年   57篇
  2013年   50篇
  2012年   35篇
  2011年   30篇
  2010年   39篇
  2009年   42篇
  2008年   51篇
  2007年   36篇
  2006年   39篇
  2005年   32篇
  2004年   21篇
  2003年   24篇
  2002年   18篇
  2001年   15篇
  2000年   8篇
  1999年   4篇
  1998年   7篇
  1997年   1篇
  1996年   6篇
  1995年   2篇
  1994年   2篇
  1993年   2篇
  1992年   1篇
  1991年   4篇
  1990年   1篇
  1989年   2篇
  1984年   2篇
  1983年   1篇
  1978年   1篇
排序方式: 共有848条查询结果,搜索用时 12 毫秒
101.
The paper presents a model for teaching demography used at the University of Waterloo which requires student projects. Three projects are described in some detail. They are analyses of unemployment rates, future housing requirements in the Province of Ontario, and the need to modify the normal retirement age of 65 used in the Canada/Quebec Pension Plan.  相似文献   
102.
This paper considers the problem of multi-agent consensus in the presence of adversarial agents. Such adversaries may try to introduce undesired influence on the coordination of the regular agents and to even prevent them from reaching consensus. To our setting, we extend the so-called mean subsequence reduced algorithms with the aim to reduce the use of computation and communication resources of the agents. In particular, by employing self- and event-triggered communication, the frequencies of state updates as well as data transmissions are kept low. Moreover, the control inputs of the agents take the form of ternary signals, allowing them to further reduce the amount of information at each transmission. We will observe that in hostile environments with adversaries, the self-triggered approach can bring certain advantages over the event-triggered counterpart. Moreover, a novel switching scheme is introduced to mix the two protocols to further enhance the performance of the agents.  相似文献   
103.
This paper studies the coordinated aggregation problem of a multi-agent system. Particularly, all the agents reach a consensus within a pre-specified target region. However, only a subset of agents have access to this target region, and each agent merely interacts with its neighbors by communication. Moreover, there exist unknown heterogeneous delays in communication channels. The underlying communication topology is characterized by a digraph. To accommodate the practical digital disposal, a sampled-data distributed protocol is proposed, where the sampling is asynchronous in the sense that the sampling periods of distinct agents are heterogeneous. The resulting closed-loop system from the proposed sampled-data distributed protocol is in a hybrid fashion that the continuous system is fed-back by using discrete states at sampling instants. The convergence performance of this hybrid closed-loop system is analyzed based on the contraction theory. More specifically, it is first shown that all the states are coordinated to aggregate within the target region, i.e., coordinated aggregation. With this result, it is next shown that all the states are coordinated towards a consensus, i.e., state agreement. These together guarantee the fulfillment of the concerned coordinated aggregation objective. Finally, a simulation example is given to validate the theoretical results.  相似文献   
104.
基于模糊综合评价方法的机场油库安全度评估研究   总被引:1,自引:0,他引:1  
将模糊综合评价方法应用于机场油库安全度评价,设计了四级评价因素集,结合机场油库实际,给出了安全度模糊综合评价的数学模型和计算方法.通过对某机场油库实例计算表明,评价结果与实际一致.该方法为机场油库安全管理提供了科学依据.  相似文献   
105.
提出了在多信道环境下的无线Mesh网络中的一种混合型路由协议TOIRP(tree-based and on-de-mand integrated routing protocol)以及一种分布式的信道分配算法CLBCA(channel load based channel assign-ment).TOIRP协议采用HWMP(hybrid wireless mesh protocol)所提出的混合路由技术,将基于树的路由与传统的AODV(ad hoc on-demand distance vector)路由相结合,减少路由发现的时延,同时采用了一种新的路由判据CETTI(cumulative expected transmission time with interference).该路由判据充分考虑多信道的特性,设计了一种量化通信干扰的方法,将干扰分为外部数据流对路径的干扰以及路径内部数据流的干扰两个方面,并综合考虑了跳数、时延等因素,提高了网络的吞吐量.信道分配算法分为收发器与邻居节点绑定和收发器与信道绑定两个部分,将信道的负载作为选择信道的标准,避免了多信道中常见的信道依赖所造成的影响,并且提高了信道的利用率.模拟结果表明,采用新的路由判据后,网络的吞吐量最优情况下得到提升.  相似文献   
106.
In a key predistribution scheme, some secret information is distributed among a set of users. For a given family of privileged groups, this secret information must enable every user in a privileged group to compute a common key associated with that group. Besides, this common key must remain unknown to some specified coalitions of users outside the privileged group. We present in this paper a new model, based on linear algebraic techniques, for the design of key predistribution schemes that unifies all previous proposals. This new model provides a common mathematical formulation and a better understanding of key predistribution schemes. Two new families of key predistribution schemes that are obtained by using this model are presented. Those families provide, for some specification structures, schemes that have better information rates than the ones given in previous proposals or fit in situations that have not been considered before.  相似文献   
107.
This paper analyzes the aritrage-tree security markets and the general equilibrium ex-istence problem for a stochastic economy with incomplete financial markets. Information structure is given by an event tree. This paper restricts attention to puraly financial securities. It isassume that trading takes place in the sequence of spot markets and futures markets for securi-ties payable in units of account. Unlimited short-selling in securities is allowed. Financial markets may be incomplete, some consumption streams may be impossible to obtain by any tradingstrategy. Securities may be individually precluded from trade at arbitrary states and dates. Thesecurity price process is arbitrage-free the dividend process if and only if there exists a stochaticstate price (present value) process : the present value of the security prices at every vertex isthe present value of their dividend and capital values over the set of immediate successors ; thecurrent value of each security at every vertex is the present value of its future dividend streamover all succeeding vertices. The existence of such an equilibrium is proved under the followingcondition: continuous, weakly convex, strictly monotone and complete preferences, strictlypositive endowmenta and dividends processes.  相似文献   
108.
从现行典型园区网络安全设计方案入手,结合其在安全防范解决方案上存在的问题,提出了一种网络主动安全模型;在全局网络安全认识的基础上.阐述了模型组成部件的功能定义和网络主动安全实现流程;采用统一网络入口认证、网络知识发现及资源有效控制、沟通等手段,解决了现行网络安全设计中存在的恶意攻击行为源头定位困难,以及信息安全司法取证不准、网络资源安全被动防护、网络灾难快速反映能力差等问题.实验结果表明,该设计方案具有较好的可行性和实用性.  相似文献   
109.
常规Webshell检测方法一般基于代码特征库和基于通信特征. 代码混淆和虚假通信等反检测技术的出现, 提升了Webshell隐蔽度, 常规方法难于发现. 为了检测此类隐蔽度较高的Webshell, 采用了抽取程序代码多维Webshell特征, 用余弦相似计算原理度量代码文件间的相似度, 平均相似度极低的文件即为可疑Webshell文件. 实验表明, 正常代码文件间的平均相似度在10-1~10-2量级, 而Webshell文件和正常代码文件的平均相似度在10-4量级, 此方法可以有效地检测出Webshell.  相似文献   
110.
A class of service stage Petri net models whose equilibrium probabilities satisfy local balance equations is presented. Examples of their applicability include bus oriented multiprocessor interconnections, the classical dining philosophers problem and the alternating bit protocol. The natural topological space for embedding the state transition lattice for this class of SSPN is shown to be a multidimensional toroidal manifold.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号