首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1488篇
  免费   85篇
  国内免费   37篇
化学   233篇
晶体学   9篇
力学   42篇
综合类   58篇
数学   708篇
物理学   560篇
  2024年   1篇
  2023年   40篇
  2022年   55篇
  2021年   59篇
  2020年   34篇
  2019年   38篇
  2018年   24篇
  2017年   61篇
  2016年   53篇
  2015年   44篇
  2014年   82篇
  2013年   128篇
  2012年   83篇
  2011年   79篇
  2010年   94篇
  2009年   98篇
  2008年   108篇
  2007年   95篇
  2006年   81篇
  2005年   45篇
  2004年   42篇
  2003年   38篇
  2002年   33篇
  2001年   23篇
  2000年   13篇
  1999年   15篇
  1998年   15篇
  1997年   14篇
  1996年   20篇
  1995年   9篇
  1994年   16篇
  1993年   4篇
  1992年   7篇
  1991年   10篇
  1990年   2篇
  1989年   5篇
  1988年   3篇
  1987年   3篇
  1986年   3篇
  1985年   4篇
  1984年   7篇
  1983年   8篇
  1982年   3篇
  1981年   3篇
  1978年   5篇
  1977年   2篇
  1969年   1篇
排序方式: 共有1610条查询结果,搜索用时 15 毫秒
101.
Hua Lu 《Optics Communications》2011,284(8):2254-2256
We present an asymptotic security proof of deterministic quantum key distribution (DQKD) with a two-way quantum channel. The security proof of DQKD with a two-way quantum channel is different from that of BB84, because Eve can attack the travel qubits twice, both in line Bob to Alice and in line Alice to Bob. With the no-signaling principle and the property of mutual information, we obtain an upper bound of the final key generation of entanglement-based DQKD and hence single-photon four-state DQKD. Our results can be applied to the protocol of QKD with two-step quantum channels.  相似文献   
102.
Reputation-based network selection mechanism using game theory   总被引:1,自引:0,他引:1  
Current and future wireless environments are based on the coexistence of multiple networks supported by various access technologies deployed by different operators. As wireless network deployments increase, their usage is also experiencing a significant growth. In this heterogeneous multi-technology multi-application multi-terminal multi-user environment users will be able to freely connect to any of the available access technologies. Network selection mechanisms will be required in order to keep mobile users “always best connected” anywhere and anytime. In such a heterogeneous environment, game theory techniques can be adopted in order to understand and model competitive or cooperative scenarios between rational decision makers. In this work we propose a theoretical framework for combining reputation-based systems, game theory and network selection mechanism. We define a network reputation factor which reflects the network’s previous behaviour in assuring service guarantees to the user. Using the repeated Prisoner’s Dilemma game, we model the user–network interaction as a cooperative game and we show that by defining incentives for cooperation and disincentives against defecting on service guarantees, repeated interaction sustains cooperation.  相似文献   
103.
The use of bubbles in applications such as surface chemistry, drug delivery, and ultrasonic cleaning etc. has been enormously popular in the past two decades. It has been recognized that acoustically-driven bubbles can be used to disturb the flow field near a boundary in order to accelerate physical or chemical reactions on the surface. The interactions between bubbles and a surface have been studied experimentally and analytically. However, most of the investigations focused on violently oscillating bubbles (also known as cavitation bubble), less attention has been given to understand the interactions between moderately oscillating bubbles and a boundary. Moreover, cavitation bubbles were normally generated in situ by a high intensity laser beam, little experimental work has been carried out to study the translational trajectory of a moderately oscillating bubble in an acoustic field and subsequent interactions with the surface. This paper describes the design of an ultrasonic test cell and explores the mechanism of bubble manipulation within the test cell. The test cell consists of a transducer, a liquid medium and a glass backing plate. The acoustic field within the multi-layered stack was designed in such a way that it was effectively one dimensional. This was then successfully simulated by a one dimensional network model. The model can accurately predict the impedance of the test cell as well as the mode shape (distribution of particle velocity and stress/pressure field) within the whole assembly. The mode shape of the stack was designed so that bubbles can be pushed from their injection point onto a backing glass plate. Bubble radial oscillation was simulated by a modified Keller–Miksis equation and bubble translational motion was derived from an equation obtained by applying Newton’s second law to a bubble in a liquid medium. Results indicated that the bubble trajectory depends on the acoustic pressure amplitude and initial bubble size: an increase of pressure amplitude or a decrease of bubble size forces bubbles larger than their resonant size to arrive at the target plate at lower heights, while the trajectories of smaller bubbles are less influenced by these factors. The test cell is also suitable for testing the effects of drag force on the bubble motion and for studying the bubble behavior near a surface.  相似文献   
104.
105.
To minimize traffic congestion, understanding how traffic dynamics depend on network structure is necessary. Many real-world complex systems can be described as multilayer structures. In this paper, we introduce the idea of layers to establish a traffic model of two-layer complex networks. By comparing different two-layer complex networks based on random and scale-free networks, we find that the physical layer is much more important to the network capacity of two-layer complex networks than the logical layer. Two-layer complex networks with a homogeneous physical topology are found to be more tolerant to congestion. Moreover, simulation results show that the heterogeneity of logical and physical topologies makes the packet-delivery process of two-layer networks more efficient in the free-flow state, without the occurrence of traffic congestion.  相似文献   
106.
Computing optimal capacity allocations in network revenue management is computationally hard. The problem of computing exact Nash equilibria in non-zero-sum games is computationally hard, too. We present a fast heuristic that, in case it cannot converge to an exact Nash equilibrium, computes an approximation to it in general network revenue management problems under competition. We also investigate the question whether it is worth taking competition into account when making (network) capacity allocation decisions. Computational results show that the payoffs in the approximate equilibria are very close to those in exact ones. Taking competition into account never leads to a lower revenue than ignoring competition, no matter what the competitor does. Since we apply linear continuous models, computation time is very short.  相似文献   
107.
We study a single-commodity Robust Network Design problem (RND) in which an undirected graph with edge costs is given together with a discrete set of balance matrices, representing different supply/demand scenarios. In each scenario, a subset of the nodes is exchanging flow. The goal is to determine the minimum cost installation of capacities on the edges such that the flow exchange is feasible for every scenario. Previously conducted computational investigations on the problem motivated the study of the complexity of some special cases and we present complexity results on them, including hypercubes. In turn, these results lead to the definition of new instances (random graphs with {−1, 0, 1} balances) that are computationally hard for the natural flow formulation. These instances are then solved by means of a new heuristic algorithm for RND, which consists of three phases. In the first phase the graph representing the network is reduced by heuristically deleting a subset of the arcs, and a feasible solution is built. The second phase consists of a neighborhood search on the reduced graph based on a Mixed-Integer (Linear) Programming (MIP) flow model. Finally, the third phase applies a proximity search approach to further improve the solution, taking into account the original graph. The heuristic is tested on the new instances, and the comparison with the solutions obtained by Cplex on a natural flow formulation shows the effectiveness of the proposed method.  相似文献   
108.
109.
信息安全服务外包决策分析模型研究   总被引:1,自引:1,他引:0  
随着信息化的发展,信息安全得到前所未有的重视,国家主管机构的监管越来越严厉,企业在面临强制压力的合规性问题时可以选择自行部署,也可以选择服务外包.通过建立数学模型模拟了这个过程.分析结果表明:在强制压力情况下,如果用户选择外包方式,那么用户信息系统的期望值随着强制压力的提高而降低,信息安全服务供应商的利润则随着强制压力的提高而提高.  相似文献   
110.
We examine a network upgrade problem for cost flows. A budget can be distributed among the arcs of the network. An investment on each single arc can be used either to decrease the arc flow cost, or to increase the arc capacity, or both. The goal is to maximize the flow through the network while not exceeding bounds on the budget and on the total flow cost.

The problems are NP-hard even on series-parallel graphs. We provide an approximation algorithm on series-parallel graphs which, for arbitrary δ,>0, produces a solution which exceeds the bounds on the budget and the flow cost by factors of at most 1+δ and 1+, respectively, while the amount of flow is at least that of an optimum solution. The running time of the algorithm is polynomial in the input size and 1/(δ). In addition we give an approximation algorithm on general graphs applicable to problem instances with small arc capacities.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号